{"id":13005,"date":"2023-05-03T08:32:36","date_gmt":"2023-05-03T06:32:36","guid":{"rendered":"https:\/\/www.sage.com\/fr-fr\/blog\/?p=13005"},"modified":"2025-05-07T15:34:15","modified_gmt":"2025-05-07T13:34:15","slug":"la-securite-numerique-mise-en-equation","status":"publish","type":"post","link":"https:\/\/www.sage.com\/fr-fr\/blog\/la-securite-numerique-mise-en-equation\/","title":{"rendered":"La s\u00e9curit\u00e9 num\u00e9rique mise en \u00e9quation"},"content":{"rendered":"<header class=\"entry-header has-dark-background-color entry-header--has-illustration entry-header--has-illustration--generic\">\n\t<div class=\"container\">\n\t\t<div class=\"entry-header__row row align-center\">\n\t\t\t<div class=\"col col-lg-7 col-xlg-6 entry-header__content\">\n\t\t\t\t\t\t\t<div class=\"component component-single-header\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"entry-header__misc text--subtitle text--uppercase text--small\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.sage.com\/fr-fr\/blog\/categorie\/digitalisation-et-tendances\/\" class=\"entry-header__link\">Digitalisation &amp; Tendances<\/a>\t\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"entry-title-wrapper\">\n\t\t\t\t\t<h1 class=\"entry-title\">\n\t\t\t\t\t\tLa s\u00e9curit\u00e9 num\u00e9rique mise en \u00e9quation\t\t\t\t\t<\/h1>\n\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<p class=\"entry-header__description\">\n\t\t\t\t\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t<\/div>\n\t<div class=\"single-post-details container\">\n\t\t<div class=\"col\">\n\t\t\t<span class=\"posted-on \"><time class=\"entry-date published\" datetime=\"2023-05-03T08:32:36+02:00\">3 mai 2023<\/time><\/span><span class=\"reading-time\"> min de lecture<\/span>\n\t\t<button\n\t\t\ttype=\"button\"\n\t\t\tclass=\"social-share-button button button--icon button--secondary js-social-share-button\"\n\t\t\tdata-share-title=\"La s\u00e9curit\u00e9 num\u00e9rique mise en \u00e9quation\"\n\t\t\tdata-share-url=\"https:\/\/www.sage.com\/fr-fr\/blog\/la-securite-numerique-mise-en-equation\/\"\n\t\t\tdata-share-text=\"Veuillez lire cet article int\u00e9ressant\"\n\t\t>\n\t\t\t<span class=\"social-share-button__share-label\">Partager<\/span>\n\t\t\t<span class=\"social-share-button__copy-label\" hidden>Copier le lien<\/span>\n\t\t\t<span class=\"social-share-button__copy-tooltip\" aria-hidden=\"true\" hidden>Copi\u00e9<\/span>\n\t\t<\/button>\n\n\t\t\t\t<\/div>\n\t<\/div>\n<\/header>\n\n\n<div class=\"wp-block-post-author has-dark-background-color alignfull\">\n\t<div class=\"container\">\n\t\t<div class=\"col\">\n\t\t\t\t\t\t\t<div class=\"co-authors\">\n\t\t\t\t\t\n\t\t<div class=\"entry-author-wrapper\">\n\t\t\t<a class=\"entry-author\" href=\"https:\/\/www.sage.com\/fr-fr\/blog\/author\/sabineducrot\/\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"40\" height=\"40\" src=\"https:\/\/www.sage.com\/fr-fr\/blog\/wp-content\/uploads\/sites\/4\/2021\/04\/Sabine-Ducrot-Ciss-350x350.png\" class=\"entry-author__image\" alt=\"\" \/>\t\t\t\t<span class=\"entry-author__name\">Sabine Ducrot-Ciss<\/span>\n\t\t\t<\/a>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n<p class=\"\">Avec 831 intrusions majeures av\u00e9r\u00e9es en 2022<sup>1<\/sup>, l\u2019<a href=\"https:\/\/www.ssi.gouv.fr\/\" target=\"_blank\" rel=\"noreferrer noopener\">ANSSI<\/a><sup>2<\/sup> invite les ETI \u00e0 maintenir leur vigilance et \u00e0 actualiser leurs protocoles de s\u00e9curit\u00e9 num\u00e9rique. <strong>Les cyber-attaques demeurent un fl\u00e9au pour les entreprises et leur pr\u00e9vention une priorit\u00e9 dans l\u2019agenda des DSI<\/strong>. \u00c0 eux d\u2019animer une culture de la cyber-s\u00e9r\u00e9nit\u00e9, en plus de mettre \u00e0 la disposition des utilisateurs les ressources digitales les mieux prot\u00e9g\u00e9es. &nbsp;<\/p>\n\n\n\n<p class=\"\">Les modalit\u00e9s de la menace \u00e9voluent sans cesse. C\u2019est pourquoi les pratiques de pr\u00e9vention des risques cyber doivent \u00eatre constamment questionn\u00e9es et les strat\u00e9gies actualis\u00e9es en permanence. Personne ne sait ce qui pourrait demain se passer mais il est possible de <a href=\"https:\/\/www.sage.com\/fr-fr\/blog\/tresoriers-ont-besoin-de-securite\/\">mieux se d\u00e9fendre<\/a> \u00e0 partir d\u2019une veille stricte des ant\u00e9c\u00e9dents malveillants. <strong>C\u2019est le r\u00f4le collectif de l\u2019\u00e9cosyst\u00e8me num\u00e9rique que de contribuer \u00e0 \u00e9lever le niveau de protection des entreprises<\/strong>. <\/p>\n\n\n\n<p class=\"\"><div class=\"single-cta\">\n\t<a\n\t\tclass=\"button button--primary gate-35cab9f4-b7ef-4bd1-8f0b-c088dd551769\"\n\t\trole=\"button\"\n\t\tdata-button-location=\"content_area\"\n\t\thref=\"#gate-35cab9f4-b7ef-4bd1-8f0b-c088dd551769\"\n\t>T\u00e9l\u00e9chargez le guide \u00ab\u00a0ETI, et si on faisait vraiment attention \u00e0 nos donn\u00e9es\u2026\u00a0\u00bb<\/a>\n<\/div>\n&nbsp;<br>Clairement, la s\u00e9curit\u00e9 num\u00e9rique repose sur <strong>l\u2019alliance entre une <a href=\"https:\/\/www.sage.com\/fr-fr\/produits\/sage-xrt-advanced\/\">technologie<\/a> pass\u00e9e au crible des menaces identifi\u00e9es et un collectif d\u2019utilisateurs pr\u00e9par\u00e9 \u00e0 tous les sc\u00e9narios<\/strong>&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Syst\u00e8mes d\u2019authentification (des personnes, des entreprises, des signatures\u2026).<\/li>\n\n\n\n<li>Syst\u00e8mes de validation et d\u2019habilitation.<\/li>\n\n\n\n<li>Protocoles de contr\u00f4les et r\u00e8gles de fonctionnement.<\/li>\n\n\n\n<li>Transmission et archivage s\u00e9curis\u00e9s des donn\u00e9es.<\/li>\n\n\n\n<li>Sc\u00e9narisation des protocoles de r\u00e9activit\u00e9.<\/li>\n\n\n\n<li>Entra\u00eenement des femmes et des hommes et test des \u00e9quipements.<\/li>\n\n\n\n<li>Certification de la <a href=\"https:\/\/www.sage.com\/fr-fr\/blog\/glossaire\/iso-27001-securite-des-informations\/\">s\u00e9curit\u00e9 du syst\u00e8me d\u2019information<\/a>.<\/li>\n<\/ul>\n\n\n\n<p class=\"\">Comme le fait remarquer l\u2019ANSSI<sup>1<\/sup>, \u00ab&nbsp;<em>l\u2019application rigoureuse d\u2019une politique <\/em><em>de mise \u00e0 jour, une sensibilisation r\u00e9guli\u00e8re des utilisateurs et le d\u00e9veloppement de capacit\u00e9s de <\/em><em>d\u00e9tection et de traitement d\u2019incident permettent de se pr\u00e9munir des menaces les plus courantes<\/em>&nbsp;\u00bb. Ainsi, <strong>la pr\u00e9vention du risque cyber a beaucoup \u00e0 voir avec l\u2019application syst\u00e9matique de r\u00e8gles et la mise en \u0153uvre de processus automatis\u00e9s<\/strong>. C\u2019est en tout cas l\u2019orientation que Sage a souhait\u00e9 donner au sixi\u00e8me num\u00e9ro de se s\u00e9rie \u00c9quations, consacr\u00e9 \u00e0 la cybers\u00e9curit\u00e9.<\/p>\n\n\n\n<p class=\"\"><\/p>\n\n\n\n<p class=\"\">Avec sa collection \u00c9quations, Sage propose aux ETI <strong>des guides courts et complets qui donnent de nouveaux leviers pour relever les d\u00e9fis d\u2019aujourd\u2019hui.<\/strong><\/p>\n\n\n\n<p class=\"\">Dans ce num\u00e9ro consacr\u00e9 \u00e0 la cybers\u00e9curit\u00e9, le fil conducteur est la vigilance&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Prendre la mesure des <strong>menaces d\u2019aujourd\u2019hui<\/strong>.<\/li>\n\n\n\n<li>Construire une <strong>culture de la s\u00e9curit\u00e9<\/strong> en 3 \u00e9tapes.<\/li>\n\n\n\n<li>Approfondir la question de la <strong>fraude au virement<\/strong>.<\/li>\n\n\n\n<li>Prendre conscience de l\u2019importance de l\u2019int\u00e9grit\u00e9 de la donn\u00e9e dans la pr\u00e9paration de la <strong><a href=\"https:\/\/www.sage.com\/fr-fr\/dematerialisation\/facture-electronique\/\">facture \u00e9lectronique<\/a><\/strong>.<\/li>\n\n\n\n<li>Profiter du <strong>retour d\u2019exp\u00e9rience<\/strong> d\u2019une ETI internationale.<\/li>\n\n\n\n<li>Apprendre \u00e0 \u00e9valuer le niveau de protection d\u2019une <strong>solution de gestion en ligne<\/strong>.<\/li>\n<\/ul>\n\n\n\n<p class=\"\">L\u2019humain est au centre du dispositif de s\u00e9curit\u00e9 num\u00e9rique. Toute la strat\u00e9gie de d\u00e9fense consiste \u00e0 le mettre en capacit\u00e9 de d\u00e9tecter toute anomalie et d\u2019actionner avec efficacit\u00e9 un cycle d\u2019op\u00e9rations adapt\u00e9es \u00e0 la nature de l\u2019intrusion \u00e9ventuelle. <strong>C\u2019est l\u2019alliance humain\/syst\u00e8me qui constitue l\u2019ultime rempart face \u00e0 la malveillance<\/strong>.<\/p>\n\n\n\n<p class=\"\">D\u00e9couvrez dans Sage Advice les autres num\u00e9ros de la collection \u00c9quations&nbsp;!&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.sage.com\/fr-fr\/blog\/economie-circulaire-et-si-on-arretait-de-tourner-en-rond\/\">\u00c9conomie circulaire&nbsp;: et si on arr\u00eatait de tourner en rond&nbsp;!<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.sage.com\/fr-fr\/blog\/risques-financiers-et-si-on-essayait-de-les-maitriser-vraiment\/\">Risques financiers&nbsp;: et si on essayait de les ma\u00eetriser vraiment&nbsp;?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.sage.com\/fr-fr\/blog\/facture-electronique-et-si-on-allegeait-son-montant-en-anticipant\/\">Facture \u00e9lectronique&nbsp;: et si on all\u00e9geait son montant en anticipant&nbsp;?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.sage.com\/fr-fr\/blog\/eti-accelerer-la-rotation-du-cash\/\">Recouvrement&nbsp;: et si on acc\u00e9l\u00e9rait la rotation du cash&nbsp;?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.sage.com\/fr-fr\/blog\/eti-passer-a-la-finance-dynamique\/\">ETI, et si on passait \u00e0 la finance dynamique\u2026<\/a><\/li>\n<\/ul>\n\n\n\n<p class=\"\"><sup>1<\/sup><em>Panorama de la cybermenace 2022 \u2013 Janvier 2023<\/em><\/p>\n\n\n\n<p class=\"\"><sup>2<\/sup><em>Agence Nationale de la S\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Information<\/em><\/p>\n \n<div class=\"single-cta gated-content\">\n\t<div class=\"single-cta__positioner\">\n\t\t<div class=\"single-cta__wrapper has-dark-background-color\">\n\t\t\t<div class=\"single-cta__content\">\n\t\t\t\t\t\t\t\t<h2 class=\"single-cta__title h3\">ETI, et si on faisait vraiment attention \u00e0 nos donn\u00e9es\u2026<\/h2>\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a\n\t\t\t\t\t\thref=\"#gate-35cab9f4-b7ef-4bd1-8f0b-c088dd551769\"\n\t\t\t\t\t\tclass=\"single-cta__button button button--primary\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t>T\u00e9l\u00e9chargez le guide<\/a>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<img decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/www.sage.com\/fr-fr\/blog\/wp-content\/uploads\/sites\/4\/2023\/05\/equation_6_1200x675.jpg\" class=\"single-cta__image\" alt=\"La s\u00e9curit\u00e9 num\u00e9rique des ETI est sans cesse d\u00e9fi\u00e9e par des acteurs malveillants. Explorez les ressorts de la cybers\u00e9curit\u00e9 en 5 tableaux\" loading=\"lazy\" srcset=\"https:\/\/www.sage.com\/fr-fr\/blog\/wp-content\/uploads\/sites\/4\/2023\/05\/equation_6_1200x675.jpg 1200w\" sizes=\"auto, (min-width: 48em) 33vw, 100vw\" \/>\t\t\t<\/div>\n<\/div>\n\n\n<div class=\"single-cta\">\n\t<div class=\"single-cta__positioner\">\n\t\t<div class=\"single-cta__wrapper has-dark-background-color\">\n\t\t\t<div class=\"single-cta__content\">\n\t\t\t\t\t\t\t\t<h2 class=\"single-cta__title h3\">Inscrivez-vous \u00e0 la e-newsletter mensuelle<\/h2>\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a\n\t\t\t\t\t\thref=\"#gate-a947ade1-e692-455f-94ce-a275d72a9a11\"\n\t\t\t\t\t\tclass=\"single-cta__button button button--primary\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t>Je m&#039;abonne<\/a>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"779\" src=\"https:\/\/www.sage.com\/fr-fr\/blog\/wp-content\/uploads\/sites\/4\/2021\/05\/spreadsheets-1024x779-1.jpg\" class=\"single-cta__image\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.sage.com\/fr-fr\/blog\/wp-content\/uploads\/sites\/4\/2021\/05\/spreadsheets-1024x779-1.jpg 1024w\" sizes=\"auto, (min-width: 48em) 33vw, 100vw\" \/>\t\t\t<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Avec 831 intrusions majeures av\u00e9r\u00e9es en 20221, l\u2019ANSSI2 invite les ETI \u00e0 maintenir leur vigilance et \u00e0 actualiser leurs protocoles de s\u00e9curit\u00e9 num\u00e9rique. Les cyber-attaques demeurent un fl\u00e9au pour les entreprises et leur pr\u00e9vention une priorit\u00e9 dans l\u2019agenda des DSI. \u00c0 eux d\u2019animer une culture de la cyber-s\u00e9r\u00e9nit\u00e9, en plus de mettre \u00e0 la disposition [&hellip;]<\/p>\n","protected":false},"author":902,"featured_media":13070,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_sage_video":false,"post_featured_image_hide":false,"footnotes":""},"categories":[16],"tags":[118,239,779],"business_type":[8,9],"lilypad":[],"context":[],"industry":[23,24,25,26],"persona":[35,34,37],"imagine_tag":[],"coauthors":[901],"class_list":["post-13005","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisation-et-tendances","tag-cybersecurite-ou-securite-informatique","tag-donnees","tag-it-informatique-infra-reseaux","business_type-artisans-et-petites-entreprises","business_type-petites-et-moyennes-entreprises","industry-btp","industry-industrie","industry-negoce","industry-services"],"sage_meta":{"region":"fr-fr","author_name":"Sabine Ducrot-Ciss","featured_image":"https:\/\/www.sage.com\/fr-fr\/blog\/wp-content\/uploads\/sites\/4\/2023\/05\/equation_6_1200x675.jpg","imagine_tags":[]},"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Sage Advice France","distributor_original_site_url":"https:\/\/www.sage.com\/fr-fr\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.sage.com\/fr-fr\/blog\/api\/wp\/v2\/posts\/13005","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sage.com\/fr-fr\/blog\/api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sage.com\/fr-fr\/blog\/api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sage.com\/fr-fr\/blog\/api\/wp\/v2\/users\/902"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sage.com\/fr-fr\/blog\/api\/wp\/v2\/comments?post=13005"}],"version-history":[{"count":0,"href":"https:\/\/www.sage.com\/fr-fr\/blog\/api\/wp\/v2\/posts\/13005\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sage.com\/fr-fr\/blog\/api\/wp\/v2\/media\/13070"}],"wp:attachment":[{"href":"https:\/\/www.sage.com\/fr-fr\/blog\/api\/wp\/v2\/media?parent=13005"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sage.com\/fr-fr\/blog\/api\/wp\/v2\/categories?post=13005"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sage.com\/fr-fr\/blog\/api\/wp\/v2\/tags?post=13005"},{"taxonomy":"business_type","embeddable":true,"href":"https:\/\/www.sage.com\/fr-fr\/blog\/api\/wp\/v2\/business_type?post=13005"},{"taxonomy":"lilypad","embeddable":true,"href":"https:\/\/www.sage.com\/fr-fr\/blog\/api\/wp\/v2\/lilypad?post=13005"},{"taxonomy":"context","embeddable":true,"href":"https:\/\/www.sage.com\/fr-fr\/blog\/api\/wp\/v2\/context?post=13005"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.sage.com\/fr-fr\/blog\/api\/wp\/v2\/industry?post=13005"},{"taxonomy":"persona","embeddable":true,"href":"https:\/\/www.sage.com\/fr-fr\/blog\/api\/wp\/v2\/persona?post=13005"},{"taxonomy":"imagine_tag","embeddable":true,"href":"https:\/\/www.sage.com\/fr-fr\/blog\/api\/wp\/v2\/imagine_tag?post=13005"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.sage.com\/fr-fr\/blog\/api\/wp\/v2\/coauthors?post=13005"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}