﻿{"id":2199,"date":"2022-08-17T10:17:12","date_gmt":"2022-08-17T15:17:12","guid":{"rendered":"https:\/\/www.uqac.ca\/cybersecurite\/?p=2199"},"modified":"2022-08-18T06:52:20","modified_gmt":"2022-08-18T11:52:20","slug":"bonne-rentree-universitaire","status":"publish","type":"post","link":"https:\/\/www.uqac.ca\/cybersecurite\/bonne-rentree-universitaire\/","title":{"rendered":"La rentr\u00e9e 2022"},"content":{"rendered":"\n<div class=\"wp-block-image\"><figure class=\"alignleft\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"168\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/08\/rentr\u00e9e.jpg\" alt=\"\" class=\"wp-image-2577\"\/><\/figure><\/div>\n\n\n\n<p style=\"color:#5a7410;font-size:17px\" class=\"has-text-color\">La rentr\u00e9e universitaire d\u2019automne 2022 est \u00e0 nos portes et c&rsquo;est un moment important pour toute la communaut\u00e9. Cependant c\u2019est \u00e9galement une opportunit\u00e9 pour les cybercriminels d&rsquo;exploiter les technologies de l&rsquo;information. En effet, dans le contexte actuel, une recrudescence importante d&rsquo;entr\u00e9e de pourriels et de d\u00e9tection de programmes malveillants sur les postes de travail sont autant de menaces \u00e0 la s\u00e9curit\u00e9 de l&rsquo;information.<br><br>Contribuons en tant que communaut\u00e9, soyons vigilants ! C\u2019est l\u2019occasion de se rappeler les meilleures pratiques afin de prot\u00e9ger nos renseignements personnels et les informations n\u00e9cessaires \u00e0 la mission d\u2019enseignement de recherche et de gestion de l\u2019UQAC, de prendre des habitudes de sensibilisation en continue et de d\u00e9clarer les incidents de s\u00e9curit\u00e9 de l\u2019information.&nbsp;  <a href=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2019\/10\/Semaine-5-Meilleures-pratiques-1.pdf\"><br><br><\/a><a href=\"https:\/\/secure.terranovasite.com\/portal\/Login\/LoginSso?e=84aaf608-9278-4b17-9a30-866caa6ea8f3\">Compl\u00e9ter sa formation en s\u00e9curit\u00e9&nbsp;de&nbsp;l&rsquo;information<\/a> <br><a href=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2019\/10\/Semaine-5-Meilleures-pratiques-1.pdf\">Consulter un rappel des meilleures pratiqu<\/a>es <br><a href=\"https:\/\/www.uqac.ca\/cybersecurite\/index.php\/2021\/01\/25\/nouvelles-infographies-pour-bien-comprendre-et-se-proteger\/\">Comprendre les cybermenaces et s\u2019en prot\u00e9ger<\/a> <br><a href=\"https:\/\/www.uqac.ca\/cybersecurite\/\">Consulter le site &nbsp;web de s\u00e9curit\u00e9 de l\u2019information de l\u2019UQAC<\/a> <br><a href=\"https:\/\/www.uqac.ca\/cybersecurite\/index.php\/disi\/\">D\u00e9clarer les incidents de s\u00e9curit\u00e9 de l\u2019information<\/a><br><\/p>\n\n\n\n<p style=\"color:#5a7410\" class=\"has-text-color\">Bonne rentr\u00e9e en Cybers\u00e9curit\u00e9 !<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La rentr\u00e9e universitaire de la session d\u2019automne 2021, qu\u2019elle soit en pr\u00e9sentiel ou en virtuel est un moment important pour toute la communaut\u00e9. Cependant c\u2019est \u00e9galement une opportunit\u00e9 pour les cybercriminels. <\/p>\n","protected":false},"author":9,"featured_media":2577,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4,8,3],"tags":[],"class_list":["post-2199","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-calendrier","category-formations-et-conseils"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/2199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/comments?post=2199"}],"version-history":[{"count":28,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/2199\/revisions"}],"predecessor-version":[{"id":2579,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/2199\/revisions\/2579"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media\/2577"}],"wp:attachment":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media?parent=2199"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/categories?post=2199"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/tags?post=2199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}