﻿{"id":2093,"date":"2021-03-30T15:32:18","date_gmt":"2021-03-30T19:32:18","guid":{"rendered":"https:\/\/www.uqac.ca\/cybersecurite\/?p=2093"},"modified":"2021-03-30T15:49:28","modified_gmt":"2021-03-30T19:49:28","slug":"le-poisson-davril-le-temps-ideal-pour-discuter-hameconnage","status":"publish","type":"post","link":"https:\/\/www.uqac.ca\/cybersecurite\/le-poisson-davril-le-temps-ideal-pour-discuter-hameconnage\/","title":{"rendered":"Le \u00abPoisson d&rsquo;avril\u00bb, le temps id\u00e9al pour discuter hame\u00e7onnage."},"content":{"rendered":"\n<div class=\"wp-block-image\"><figure class=\"alignleft is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2021\/03\/poisson.jpg\" alt=\"\" class=\"wp-image-2095\" width=\"139\" height=\"139\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2021\/03\/poisson.jpg 612w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2021\/03\/poisson-150x150.jpg 150w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2021\/03\/poisson-300x300.jpg 300w\" sizes=\"auto, (max-width: 139px) 100vw, 139px\" \/><\/figure><\/div>\n\n\n\n<p style=\"color:#5a7410\" class=\"has-text-color has-normal-font-size\">Les cyberincidents et l&rsquo;hame\u00e7onnage se multiplient, ce qui a pour cons\u00e9quences, des pertes de temps, de donn\u00e9es ou des pertes financi\u00e8res. Prenez le temps aujourd&rsquo;hui de lire <a href=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2021\/01\/hame%C3%A7onnage-1.pdf\">l&rsquo;infographie de cybers\u00e9curit\u00e9 sur le sujet<\/a> afin de mieux comprendre le ph\u00e9nom\u00e8ne. <br><br>Votre sensibilisation peut faire la diff\u00e9rence pour ne pas mordre \u00e0 l&rsquo;hame\u00e7on alors, <a href=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2021\/01\/proection-hameconnage-1.pdf\">consultez les 7 astuces pour vous en prot\u00e9ger.<\/a><\/p>\n\n\n\n<p style=\"color:#5a7410\" class=\"has-text-color has-normal-font-size\">Il n&rsquo;est pas n\u00e9cessaire d&rsquo;attendre l&rsquo;ouverture des pourvoiries pour en apprendre davantage. Consultez le site de <a href=\"https:\/\/www.uqac.ca\/cybersecurite\/\">cybers\u00e9curit\u00e9 de l&rsquo;UQAC<\/a> ou <a href=\"https:\/\/twitter.com\/hashtag\/CybersecUQAC?src=hash\">#CybersecUQAC sur Twitter.<\/a> <\/p>\n\n\n\n<p><a href=\"https:\/\/www.uqac.ca\/cybersecurite\/index.php\/2021\/01\/25\/nouvelles-infographies-pour-bien-comprendre-et-se-proteger\/\">Pour consulter les autres infographies<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les cyberincidents et l&rsquo;hame\u00e7onnage se multiplient, Si vous connaissez les techniques, vous ne mordrez pas \u00e0 l&rsquo;hame\u00e7on.<\/p>\n","protected":false},"author":9,"featured_media":2095,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[8,3],"tags":[],"class_list":["post-2093","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-calendrier","category-formations-et-conseils"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/2093","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/comments?post=2093"}],"version-history":[{"count":21,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/2093\/revisions"}],"predecessor-version":[{"id":2128,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/2093\/revisions\/2128"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media\/2095"}],"wp:attachment":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media?parent=2093"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/categories?post=2093"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/tags?post=2093"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}