﻿{"id":3013,"date":"2024-10-10T00:01:30","date_gmt":"2024-10-10T05:01:30","guid":{"rendered":"https:\/\/www.uqac.ca\/cybersecurite\/?p=3013"},"modified":"2024-09-24T14:10:13","modified_gmt":"2024-09-24T19:10:13","slug":"octobre-2024-semaine-2-connexions-securitaire","status":"publish","type":"post","link":"https:\/\/www.uqac.ca\/cybersecurite\/octobre-2024-semaine-2-connexions-securitaire\/","title":{"rendered":"Octobre 2024 &#8211; Semaine #2 &#8211; Connexions s\u00e9curitaire"},"content":{"rendered":"<h4><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-3014\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2024\/09\/header-blog-Connexions-300x171.jpg\" alt=\"\" width=\"475\" height=\"271\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2024\/09\/header-blog-Connexions-300x171.jpg 300w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2024\/09\/header-blog-Connexions.jpg 580w\" sizes=\"auto, (max-width: 475px) 100vw, 475px\" \/><\/h4>\n<h4><span style=\"color: #000000;\"><strong>Connexions s\u00e9curitaires c&rsquo;est l&rsquo;affaire de tous<\/strong><\/span><\/h4>\n<p>Vos r\u00e9seaux sont de la plus haute importance pour l\u2019utilisation de vos appareils et l\u2019acc\u00e8s \u00e0 vos donn\u00e9es. Voyez tout ce qu\u2019il faut savoir pour vous assurer qu\u2019ils sont bien prot\u00e9g\u00e9s.<\/p>\n<p>Aujourd\u2019hui, les appareils intelligents sont plus que jamais connect\u00e9s entre eux. Qu\u2019ils partagent le m\u00eame r\u00e9seau\u00a0<a id=\"wb-auto-30\" class=\"wb-lbx cse-tooltip wb-lbx-inited\" role=\"button\" href=\"https:\/\/www.pensezcybersecurite.gc.ca\/#defn-r%C3%A9seau\" aria-label=\"Terme du glossaire - R\u00e9seau\" data-wb-lbx=\"{&quot;focus&quot;:&quot;button.mfp-close&quot;}\"><\/a> Wi-Fi ou qu\u2019ils soient reli\u00e9s par Bluetooth, ils sont li\u00e9s par vos r\u00e9seaux et c\u2019est pourquoi il est si important de vous assurer que vos r\u00e9seaux sont bien prot\u00e9g\u00e9s.<\/p>\n<p>Apprenez en plus sur comment s\u00e9curiser vos r\u00e9seaux en cliquant sur les liens suivants:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.pensezcybersecurite.gc.ca\/fr\/securisez-vos-connexions\">S\u00e9curisez vos connexions &#8211; Pensez cybers\u00e9curit\u00e9 (pensezcybersecurite.gc.ca)<\/a><\/li>\n<li><a href=\"https:\/\/www.pensezcybersecurite.gc.ca\/fr\/blogues\/cybersecurite-des-reseaux-une-introduction\">Cybers\u00e9curit\u00e9 des r\u00e9seaux: une introduction &#8211; Pensez cybers\u00e9curit\u00e9 (pensezcybersecurite.gc.ca)<\/a><\/li>\n<li><a href=\"https:\/\/www.keepersecurity.com\/blog\/fr\/2023\/02\/07\/how-to-secure-your-home-wifi-network\/\">Comment s\u00e9curiser votre r\u00e9seau WiFi domestique \u2013 Keeper Security<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.fr\/resource-center\/preemptive-safety\/how-to-set-up-a-secure-home-network\">Comment prot\u00e9ger votre r\u00e9seau domestique (kaspersky.fr)<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Connexions s\u00e9curitaires c&rsquo;est l&rsquo;affaire de tous Vos r\u00e9seaux sont de la plus haute importance pour l\u2019utilisation de vos appareils et l\u2019acc\u00e8s \u00e0 vos donn\u00e9es. Voyez tout ce qu\u2019il faut savoir pour vous assurer qu\u2019ils sont bien prot\u00e9g\u00e9s. Aujourd\u2019hui, les appareils intelligents sont plus que jamais connect\u00e9s entre eux. Qu\u2019ils partagent le m\u00eame r\u00e9seau\u00a0 Wi-Fi ou [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":125,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4,10,3,2],"tags":[],"class_list":["post-3013","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-campagne-de-sensibilisation","category-formations-et-conseils","category-outils"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/3013","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/comments?post=3013"}],"version-history":[{"count":4,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/3013\/revisions"}],"predecessor-version":[{"id":3073,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/3013\/revisions\/3073"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media\/125"}],"wp:attachment":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media?parent=3013"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/categories?post=3013"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/tags?post=3013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}