﻿{"id":1999,"date":"2021-01-25T14:34:10","date_gmt":"2021-01-25T18:34:10","guid":{"rendered":"https:\/\/www.uqac.ca\/cybersecurite\/?p=1999"},"modified":"2024-02-29T09:19:21","modified_gmt":"2024-02-29T14:19:21","slug":"nouvelles-infographies-pour-bien-comprendre-et-se-proteger","status":"publish","type":"post","link":"https:\/\/www.uqac.ca\/cybersecurite\/nouvelles-infographies-pour-bien-comprendre-et-se-proteger\/","title":{"rendered":"Nouvelles infographies pour bien comprendre et se prot\u00e9ger"},"content":{"rendered":"\n<p class=\"has-very-dark-gray-color has-text-color has-medium-font-size\">Afin de vulgariser diff\u00e9rents th\u00e8mes de cybers\u00e9curit\u00e9, la firme Terranova a d\u00e9velopp\u00e9 des trousses d&rsquo;apprentissages qui vous permettront d&rsquo;\u00eatre sensibilis\u00e9s et prot\u00e9g\u00e9s des cybermenaces.  Consultez-les.  <\/p>\n\n\n\n<p class=\"has-medium-font-size\">Ces infographies sont un des moyens mis en place par l&rsquo;UQAC afin de rehausser le niveau de s\u00e9curit\u00e9 de l&rsquo;information par de la formation et de la sensibilisation de sa communaut\u00e9 .<\/p>\n\n\n\n<p class=\"has-very-light-gray-color has-text-color has-background has-medium-font-size\" style=\"background-color:#5a7410\">Le t\u00e9l\u00e9travail<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2021\/01\/Cybermenaces-communes.pdf\">Les cybermenaces communes en t\u00e9l\u00e9travail<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2021\/01\/7-Cyber-Security-Habits-FR.pdf\">Sept habitudes \u00e0 prendre pour se prot\u00e9ger<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2021\/01\/Prot\u00e9ger-ses-donn\u00e9es.pdf\">Prot\u00e9ger ses donn\u00e9es<\/a><\/li>\n<\/ul>\n\n\n\n<p class=\"has-very-light-gray-color has-text-color has-background has-medium-font-size\" style=\"background-color:#5a7410\">L&rsquo;hame\u00e7onnage par courriel<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2021\/01\/hame\u00e7onnage-1.pdf\">Bien le comprendre<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2021\/01\/proection-hameconnage-1.pdf\">Comment se prot\u00e9ger ?<\/a><\/li>\n<\/ul>\n\n\n\n<p class=\"has-very-light-gray-color has-text-color has-background has-medium-font-size\" style=\"background-color:#5a7410\">L&rsquo;hame\u00e7onnage vocal et texto<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2021\/01\/What-is-Smishing-and-Vishing-infographic-FR.pdf\">Bien le comprendre<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2021\/01\/How-to-Protect-Your-Data-from-Smishing-and-Vishing-infographic-FR.pdf\">Comment se prot\u00e9ger ?<\/a><\/li>\n<\/ul>\n\n\n\n<p class=\"has-very-light-gray-color has-text-color has-background has-medium-font-size\" style=\"background-color:#5a7410\">La mystification (spoofing)<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2021\/01\/What-is-Spoofing-infographic-FR.pdf\">Bien le comprendre<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2021\/01\/How-to-Protect-Your-Data-from-a-Spoofing-Attack-infographic-FR.pdf\">Comment se prot\u00e9ger ?<\/a><\/li>\n<\/ul>\n\n\n\n<p class=\"has-very-light-gray-color has-text-color has-background has-medium-font-size\" style=\"background-color:#5a7410\">Le ran\u00e7ongiciel<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2021\/01\/What-is-Ransomware-infographic-FR.pdf\">Bien le comprendre<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2021\/01\/How-to-Protect-Your-Data-from-a-Ransomware-Attack-infographic-FR.pdf\">Comment se prot\u00e9ger ?<\/a><\/li>\n<\/ul>\n\n\n\n<p class=\"has-very-light-gray-color has-text-color has-background has-medium-font-size\" style=\"background-color:#5a7410\">Des mots de passe robustes<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2021\/01\/Strong-password-FR-NO-CTA.pdf\">Cr\u00e9er un mot de passe robuste<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Afin de vulgariser diff\u00e9rents th\u00e8mes de cybers\u00e9curit\u00e9, la firme Terranova a d\u00e9velopp\u00e9 des trousses d&rsquo;apprentissages qui vous permettront d&rsquo;\u00eatre sensibilis\u00e9s et prot\u00e9g\u00e9s des cybermenaces.<\/p>\n","protected":false},"author":9,"featured_media":2000,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4,10,11],"tags":[],"class_list":["post-1999","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-campagne-de-sensibilisation","category-15-mesures-de-securite"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/1999","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/comments?post=1999"}],"version-history":[{"count":22,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/1999\/revisions"}],"predecessor-version":[{"id":2907,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/1999\/revisions\/2907"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media\/2000"}],"wp:attachment":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media?parent=1999"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/categories?post=1999"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/tags?post=1999"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}