{"id":7073,"date":"2024-08-27T12:57:04","date_gmt":"2024-08-27T17:57:04","guid":{"rendered":"https:\/\/www.axxima.ca\/?p=7073"},"modified":"2024-10-04T08:41:48","modified_gmt":"2024-10-04T13:41:48","slug":"should-your-board-purchase-cyber-insurance","status":"publish","type":"post","link":"https:\/\/www.axxima.ca\/fr\/blog\/should-your-board-purchase-cyber-insurance\/","title":{"rendered":"Votre conseil d'administration devrait-il souscrire a une cyberassurance ?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"7073\" class=\"elementor elementor-7073\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b4c92fd she-header-yes elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b4c92fd\" data-element_type=\"section\" data-settings=\"{&quot;transparent&quot;:&quot;yes&quot;,&quot;transparent_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;scroll_distance&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:60,&quot;sizes&quot;:[]},&quot;scroll_distance_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;scroll_distance_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;she_offset_top&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;she_offset_top_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;she_offset_top_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;she_width&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:100,&quot;sizes&quot;:[]},&quot;she_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;she_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;she_padding&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:0,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:0,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;she_padding_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;she_padding_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true}}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f33250a\" data-id=\"f33250a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8fb7239 elementor-invisible elementor-widget elementor-widget-eael-creative-button\" data-id=\"8fb7239\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"eael-creative-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"eael-creative-button-wrapper\">\n\n            <a class=\"eael-creative-button eael-creative-button--wayra\" href=\"https:\/\/www.axxima.ca\/fr\/blog\/\" data-text=\"Blog\">\n\n\t    \n                <div class=\"creative-button-inner\">\n\n                                            <span class=\"eael-creative-button-icon-left\"><i aria-hidden=\"true\" class=\"icon icon-left-arrows\"><\/i><\/span>                    \n                    <span class=\"cretive-button-text\">Retour<\/span>\n\n                                    <\/div>\n\t                        <\/a>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a5ceab0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a5ceab0\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0433ba5\" data-id=\"0433ba5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0163194 elementor-widget elementor-widget-spacer\" data-id=\"0163194\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9ca7819 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9ca7819\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a746b48\" data-id=\"a746b48\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-204ee86 elementor-widget elementor-widget-heading\" data-id=\"204ee86\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">La cyberassurance pour les conseils d'administration : Tout ce que vous devez savoir<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b4d6d4b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b4d6d4b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-dc9e0e5\" data-id=\"dc9e0e5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a7f20fc elementor-widget elementor-widget-text-editor\" data-id=\"a7f20fc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La cybers\u00e9curit\u00e9 est devenue une pr\u00e9occupation majeure pour les entreprises du monde entier, et le Canada ne fait pas exception. Avec la fr\u00e9quence et la gravit\u00e9 croissantes des cyberincidents, la question n'est plus de savoir si une entreprise sera cibl\u00e9e par des criminels, mais plut\u00f4t quand cela se produira.<\/p><p>Les membres du conseil, en tant que fiduciaires de la gouvernance d'entreprise, doivent adopter une approche proactive pour \u00e9valuer les risques li\u00e9s \u00e0 la cybers\u00e9curit\u00e9. Un aspect essentiel de cette approche proactive consiste \u00e0 comprendre et \u00e0 utiliser la cyberassurance.<\/p><p>Ci-dessous, nous examinerons l'importance de la cyberassurance pour les conseils d'administration, l'\u00e9tendue de sa couverture et son r\u00f4le dans la protection des administrateurs et des dirigeants.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6680384 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6680384\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7eadd28\" data-id=\"7eadd28\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f2ae4dd elementor-widget elementor-widget-heading\" data-id=\"f2ae4dd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Qu'est-ce que la cyberassurance ?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b3c5eb7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b3c5eb7\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-80065b9\" data-id=\"80065b9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-69a8e0b elementor-widget elementor-widget-text-editor\" data-id=\"69a8e0b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.axxima.ca\/fr\/blog\/cyber-insurance-what-it-is-and-why-you-need-it\/\">La cyberassurance<\/a> est un produit d'assurance sp\u00e9cialis\u00e9 con\u00e7u pour aider les organisations \u00e0 att\u00e9nuer l'impact financier des cyberincidents. Ces incidents peuvent aller des violations de donn\u00e9es et des piratages aux attaques par ran\u00e7ongiciel et autres formes de cybercriminalit\u00e9.<\/p><p>Le principal objectif de la cyberassurance est de couvrir les co\u00fbts associ\u00e9s \u00e0 la r\u00e9ponse \u00e0 un cyberincident, y compris les frais juridiques, la restauration des donn\u00e9es, les efforts de relations publiques et l'indemnisation des parties affect\u00e9es.<\/p><p>Avec l'\u00e9volution constante des cybermenaces, il est essentiel que les entreprises s'adaptent. C'est pourquoi les polices de cyberassurance sont devenues plus sophistiqu\u00e9es, offrant une large gamme d'options de couverture adapt\u00e9es aux besoins sp\u00e9cifiques de diff\u00e9rents secteurs. Dans ce contexte, il est crucial pour les conseils d'administration de comprendre les nuances de la cyberassurance afin de garantir que leur organisation est ad\u00e9quatement prot\u00e9g\u00e9e.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e612c36 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e612c36\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-21ed734\" data-id=\"21ed734\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d32bb42 elementor-widget elementor-widget-heading\" data-id=\"d32bb42\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Pourquoi les conseils d'administration auraient-ils besoin d'une cyberassurance ?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0beb1fd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0beb1fd\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0571670\" data-id=\"0571670\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-94be853 elementor-widget elementor-widget-text-editor\" data-id=\"94be853\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>En 2024, presque toutes les organisations, quel que soit leur secteur d'activit\u00e9, sont expos\u00e9es aux cyberincidents. Selon un <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-outcomes-report.html?utm_medium=media-article&amp;utm_source=MarketWatch&amp;utm_campaign=umb-fy23-q2-content-ebook-security-outcomes-report-v3&amp;utm_content=umb-fy23-q2-content-ebook-security-outcomes-report-v3?ccid=cc002884&amp;dtid=pdiotr000030&amp;oid=rptsc030713\">rapport de Cisco<\/a>, pr\u00e8s des deux tiers des organisations ont subi des incidents de s\u00e9curit\u00e9 majeurs qui ont compromis leurs op\u00e9rations commerciales.<\/p><p>\u00c9tant donn\u00e9 la nature omnipr\u00e9sente de ces menaces, les conseils d'administration doivent reconna\u00eetre le r\u00f4le critique que joue la cyberassurance dans leur strat\u00e9gie globale de gestion des risques.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6dae77d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6dae77d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f96ad4c\" data-id=\"f96ad4c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-76c071c elementor-widget elementor-widget-heading\" data-id=\"76c071c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Impact financier des cyberincidents<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b0b558 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1b0b558\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a3fddb1\" data-id=\"a3fddb1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cbdcd4e elementor-widget elementor-widget-text-editor\" data-id=\"cbdcd4e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les cyberincidents peuvent avoir des cons\u00e9quences financi\u00e8res potentiellement d\u00e9vastatrices. Selon le <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\">rapport 2024 sur le co\u00fbt d'une violation de donn\u00e9es<\/a>, publi\u00e9 par IBM Security et l'Institut Ponemon, le co\u00fbt moyen d'une violation de donn\u00e9es aux \u00c9tats-Unis s'\u00e9l\u00e8ve \u00e0 un impressionnant 4,88 millions USD, marquant une augmentation de 10 % par rapport \u00e0 2023. Ces co\u00fbts peuvent inclure des amendes r\u00e9glementaires, des frais juridiques, les d\u00e9penses li\u00e9es \u00e0 la notification des personnes affect\u00e9es, ainsi que la restauration des syst\u00e8mes compromis.<\/p><p>Pour les conseils d'administration, les cons\u00e9quences financi\u00e8res potentielles d'un cyberincident soulignent la n\u00e9cessit\u00e9 de disposer d\u2019une police de cyberassurance solide.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-75ec726 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"75ec726\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1f34bcd\" data-id=\"1f34bcd\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-17c628f elementor-widget elementor-widget-heading\" data-id=\"17c628f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">R\u00e9putation et valeur marchande<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b13e154 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b13e154\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-982d951\" data-id=\"982d951\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-152b787 elementor-widget elementor-widget-text-editor\" data-id=\"152b787\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les effets d'un cyberincident d\u00e9passent les pertes financi\u00e8res imm\u00e9diates, car les dommages \u00e0 la r\u00e9putation d'une organisation peuvent \u00eatre durables, en particulier pour celles qui sont cot\u00e9es en bourse.<\/p><p>Bitglass a constat\u00e9 qu'apr\u00e8s une violation de donn\u00e9es, les actions des entreprises cot\u00e9es en bourse <a href=\"https:\/\/www.businesswire.com\/news\/home\/20190515005023\/en\/Bitglass-Report-Publicly-Traded-Companies-Suffering-the-Worst-Data-Breaches-Averaged-a-7.5-Percent-Decrease-in-Stock-Price\">chutent en moyenne de 7,5 %<\/a>. De plus, il faut en moyenne 45 jours pour retrouver des niveaux ant\u00e9rieurs \u00e0 la violation.<\/p><p>Dans un monde o\u00f9 la r\u00e9putation est si pr\u00e9cieuse, la perception d'un manque de contr\u00f4les en mati\u00e8re de cybers\u00e9curit\u00e9, entra\u00eenant une perte ou une att\u00e9nuation inad\u00e9quate des pertes par l'assurance, pourrait avoir des cons\u00e9quences durables. \u00a0<\/p><p>De plus, de nombreuses polices de cyberassurance incluent une couverture pour les efforts de relations publiques visant \u00e0 restaurer la confiance des consommateurs et des investisseurs apr\u00e8s une violation. Ce type de soutien peut s'av\u00e9rer inestimable pour permettre \u00e0 une organisation de se r\u00e9tablir plus rapidement.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b76b118 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b76b118\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2897599\" data-id=\"2897599\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e68ec8f elementor-widget elementor-widget-heading\" data-id=\"e68ec8f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Continuit\u00e9 des affaires et interruptions op\u00e9rationnelles<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f343a89 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f343a89\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fa24d5e\" data-id=\"fa24d5e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-00edf01 elementor-widget elementor-widget-text-editor\" data-id=\"00edf01\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les cyberincidents peuvent \u00e9galement perturber les op\u00e9rations commerciales, entra\u00eenant une perte de productivit\u00e9. Les attaques par ran\u00e7ongiciel, par exemple, peuvent chiffrer certains ou tous les syst\u00e8mes d'une entreprise, les rendant inutilisables jusqu'\u00e0 ce qu'une ran\u00e7on soit pay\u00e9e ou que les syst\u00e8mes soient restaur\u00e9s.<\/p><p>Le temps d'arr\u00eat associ\u00e9 \u00e0 ces attaques peut \u00eatre extr\u00eamement co\u00fbteux. Par exemple, si les syst\u00e8mes d'une entreprise restent hors ligne pendant plusieurs jours, les pertes de revenus peuvent s'av\u00e9rer consid\u00e9rables.<\/p><p>Les conseils d'administration doivent prendre en compte que les polices de cyberassurance couvrent souvent les co\u00fbts associ\u00e9s \u00e0 l'interruption des activit\u00e9s, y compris les profits perdus et les d\u00e9penses engag\u00e9es pour la r\u00e9cup\u00e9ration des syst\u00e8mes.<\/p><p>Cette couverture peut faire la diff\u00e9rence entre la survie d'une entreprise apr\u00e8s un cyberincident et sa fermeture.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4886a78 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4886a78\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4fed587\" data-id=\"4fed587\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2bb0ac5 elementor-widget elementor-widget-heading\" data-id=\"2bb0ac5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Conformit\u00e9 l\u00e9gale et r\u00e9glementaire<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-60fa0b6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"60fa0b6\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c453a4a\" data-id=\"c453a4a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3371c32 elementor-widget elementor-widget-text-editor\" data-id=\"3371c32\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Le paysage juridique entourant la cybers\u00e9curit\u00e9 au Canada est \u00e0 la fois complexe et en constante \u00e9volution.<\/p><p>Les lois sur la protection de la vie priv\u00e9e, tant au niveau f\u00e9d\u00e9ral que provincial, imposent la protection des informations personnelles et pr\u00e9voient des sanctions en cas de non-conformit\u00e9. Un cyberincident entra\u00eenant l'exposition de donn\u00e9es sensibles peut entra\u00eener des batailles juridiques co\u00fbteuses et des amendes significatives.<\/p><p>Selon l'assureur, la cyberassurance peut fournir une couverture pour les frais juridiques, les amendes et les co\u00fbts associ\u00e9s aux amendes et\/ou aux enqu\u00eates r\u00e9glementaires. Cette protection est particuli\u00e8rement importante pour les organisations \u00e9voluant dans des secteurs hautement r\u00e9glement\u00e9s, tels que la finance et la sant\u00e9.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e13c448 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e13c448\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-87a39d5\" data-id=\"87a39d5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-068128c elementor-widget elementor-widget-heading\" data-id=\"068128c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">\u00c9volution du paysage des menaces<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ba08170 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ba08170\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6dde260\" data-id=\"6dde260\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-21020fe elementor-widget elementor-widget-text-editor\" data-id=\"21020fe\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Le paysage des menaces \u00e9volue constamment, les cybercriminels utilisant des tactiques de plus en plus sophistiqu\u00e9es pour contourner les d\u00e9fenses des organisations. Des menaces persistantes avanc\u00e9es (APT) aux exploits zero-day, les m\u00e9thodes utilis\u00e9es par les attaquants deviennent de plus en plus difficiles \u00e0 d\u00e9tecter et \u00e0 d\u00e9fendre.<\/p><p>Ce paysage de menaces en \u00e9volution signifie que m\u00eame les organisations disposant de mesures de cybers\u00e9curit\u00e9 robustes restent \u00e0 risque. Il est donc crucial que les conseils reconnaissent que la cyberassurance ne remplace pas la cybers\u00e9curit\u00e9, mais vient plut\u00f4t la compl\u00e9ter.<\/p><p>Une police de cyberassurance compl\u00e8te peut servir de filet de s\u00e9curit\u00e9 lorsque les mesures pr\u00e9ventives \u00e9chouent, garantissant ainsi que l'organisation peut se remettre rapidement des attaques les plus sophistiqu\u00e9es.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c747061 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c747061\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5b97fdf\" data-id=\"5b97fdf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9bc6560 elementor-widget elementor-widget-heading\" data-id=\"9bc6560\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Que couvre la cyberassurance ?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a1d960a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a1d960a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e86c2ba\" data-id=\"e86c2ba\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0039549 elementor-widget elementor-widget-text-editor\" data-id=\"0039549\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les polices de cyberassurance varient consid\u00e9rablement en termes de couverture. Il est donc essentiel que les conseils examinent attentivement et comprennent ce que leur police inclut. En g\u00e9n\u00e9ral, la cyberassurance peut couvrir un large \u00e9ventail de d\u00e9penses li\u00e9es \u00e0 un cyberincident.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0429fff elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0429fff\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-351f1bb\" data-id=\"351f1bb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f0adf18 elementor-widget elementor-widget-heading\" data-id=\"f0adf18\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Couverture de premi\u00e8re partie<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3725506 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3725506\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-10ca8a0\" data-id=\"10ca8a0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2b4cc81 elementor-widget elementor-widget-text-editor\" data-id=\"2b4cc81\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La couverture de premi\u00e8re partie se r\u00e9f\u00e8re aux co\u00fbts encourus directement par l'organisation \u00e0 la suite d'un cyberincident. Cela peut inclure :<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3487e06 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3487e06\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ade5bda\" data-id=\"ade5bda\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-48d345a elementor-widget elementor-widget-text-editor\" data-id=\"48d345a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n \t<li><strong>R\u00e9ponse \u00e0 une violation de donn\u00e9es<\/strong><\/li>\n \t<l>Couverture des co\u00fbts associ\u00e9s \u00e0 la r\u00e9ponse \u00e0 une violation de donn\u00e9es, y compris les enqu\u00eates judiciaires, les frais juridiques et la notification des personnes affect\u00e9es.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-295cf6f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"295cf6f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c7e8996\" data-id=\"c7e8996\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bb50d6a elementor-widget elementor-widget-text-editor\" data-id=\"bb50d6a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n \t<li><strong>Interruption des affaires<\/strong><\/li>\n \t<l>Compensation pour les revenus perdus et les d\u00e9penses suppl\u00e9mentaires engag\u00e9es en raison d'une perturbation des op\u00e9rations commerciales caus\u00e9e par un cyberincident.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d28493c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d28493c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c130073\" data-id=\"c130073\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8315ff2 elementor-widget elementor-widget-text-editor\" data-id=\"8315ff2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n \t<li><strong>Extorsion cybern\u00e9tique<\/strong><\/li>\n \t<l>Couverture des paiements de ran\u00e7on et des co\u00fbts associ\u00e9s \u00e0 la n\u00e9gociation avec les cybercriminels en cas d'attaque par ran\u00e7ongiciel.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-662d4ad elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"662d4ad\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3e0d53a\" data-id=\"3e0d53a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7692585 elementor-widget elementor-widget-text-editor\" data-id=\"7692585\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n \t<li><strong>Restauration des donn\u00e9es<\/strong><\/li>\n \t<l>Co\u00fbts associ\u00e9s \u00e0 la r\u00e9cup\u00e9ration ou \u00e0 la restauration des donn\u00e9es perdues ou compromises, y compris les frais d'experts externes.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9fb1a0f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9fb1a0f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5bd2f6a\" data-id=\"5bd2f6a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1ac1afb elementor-widget elementor-widget-text-editor\" data-id=\"1ac1afb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n \t<li><strong>Dommages \u00e0 la r\u00e9putation<\/strong><\/li>\n \t<l>Couverture des efforts de relations publiques visant \u00e0 att\u00e9nuer les dommages \u00e0 la r\u00e9putation de l'organisation \u00e0 la suite d'un cyberincident.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-49a450c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"49a450c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e1ec13f\" data-id=\"e1ec13f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-88dd284 elementor-widget elementor-widget-heading\" data-id=\"88dd284\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Couverture de tiers<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-02a3460 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"02a3460\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-98c7e7d\" data-id=\"98c7e7d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6ab645e elementor-widget elementor-widget-text-editor\" data-id=\"6ab645e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La couverture de tiers traite des r\u00e9clamations formul\u00e9es contre l'organisation par des tiers \u00e0 la suite d'un cyberincident. Cela peut inclure :<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e511b8b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e511b8b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e8cd31\" data-id=\"1e8cd31\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fa8ef60 elementor-widget elementor-widget-text-editor\" data-id=\"fa8ef60\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n \t<li><strong>Amendes et p\u00e9nalit\u00e9s r\u00e9glementaires<\/strong><\/li>\n \t<l>Couverture des amendes et des p\u00e9nalit\u00e9s impos\u00e9es par les organismes de r\u00e9glementation en raison de la non-conformit\u00e9 aux lois et r\u00e8glements sur la protection des donn\u00e9es.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-37ac015 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"37ac015\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2f2441a\" data-id=\"2f2441a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fab0f3c elementor-widget elementor-widget-text-editor\" data-id=\"fab0f3c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n \t<li><strong>Frais de d\u00e9fense juridique<\/strong><\/li>\n \t<l>Couverture des frais juridiques et des d\u00e9penses engag\u00e9es pour se d\u00e9fendre contre des poursuites li\u00e9es \u00e0 un cyberincident, y compris les recours collectifs de la part de personnes affect\u00e9es.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c797f3f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c797f3f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8205ed4\" data-id=\"8205ed4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-422dd80 elementor-widget elementor-widget-text-editor\" data-id=\"422dd80\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n \t<li><strong>Responsabilit\u00e9 en cas de violation de donn\u00e9es<\/strong><\/li>\n \t<l>Couverture des dommages dus \u00e0 des tiers \u00e0 la suite d'une violation de donn\u00e9es, y compris les r\u00e8glements ou jugements issus de proc\u00e9dures judiciaires.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dd52a91 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dd52a91\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5325c48\" data-id=\"5325c48\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c72c3a9 elementor-widget elementor-widget-heading\" data-id=\"c72c3a9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">La cyberassurance prot\u00e8ge-t-elle les administrateurs ?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8f8b63d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8f8b63d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7108f8e\" data-id=\"7108f8e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5da86b4 elementor-widget elementor-widget-text-editor\" data-id=\"5da86b4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Pour les membres du conseil, l'une des principales pr\u00e9occupations est de savoir si la cyberassurance offre une protection aux administrateurs et dirigeants (D&amp;O) en cas de cyberincident.<\/p><p>Il est important de noter que la cyberassurance est principalement con\u00e7ue pour couvrir l'organisation dans son ensemble, plut\u00f4t qu'\u00e0 prot\u00e9ger la responsabilit\u00e9 personnelle des administrateurs et dirigeants. L'assurance D&amp;O est con\u00e7ue pour prot\u00e9ger les administrateurs et dirigeants contre la responsabilit\u00e9 personnelle d\u00e9coulant de leurs actions ou d\u00e9cisions prises dans le cadre de leur fonction. Tout langage relatif \u00e0 la cybers\u00e9curit\u00e9 dans une police D&amp;O devrait \u00eatre examin\u00e9 en conjunction avec la police de cyberassurance de l'organisation afin de comprendre comment elles interagissent.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fd3234c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fd3234c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e549ca5\" data-id=\"e549ca5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-266f767 elementor-widget elementor-widget-heading\" data-id=\"266f767\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Directors & officers (D&O) insurance<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-353acf4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"353acf4\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-25eb181\" data-id=\"25eb181\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e5240b elementor-widget elementor-widget-text-editor\" data-id=\"4e5240b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.axxima.ca\/fr\/blog\/sides-a-b-c-of-a-do-insurance-policy-what-you-need-to-know\/\">L'assurance D&amp;O<\/a>\u00a0est distincte de la cyberassurance. Elle peut couvrir un large \u00e9ventail de risques, notamment :<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6bd615c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6bd615c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7471fb4\" data-id=\"7471fb4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-df142f8 elementor-widget elementor-widget-text-editor\" data-id=\"df142f8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n \t<li><strong>R\u00e9clamations pour mauvaise gestion<\/strong><\/li>\n \t<l>Couverture des r\u00e9clamations all\u00e9guant que les administrateurs et dirigeants n'ont pas correctement g\u00e9r\u00e9 l'organisation. Cela peut inclure un manquement \u00e0 mettre en \u0153uvre des mesures de cybers\u00e9curit\u00e9 ad\u00e9quates.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f36dd98 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f36dd98\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-adf895c\" data-id=\"adf895c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c5d0a13 elementor-widget elementor-widget-text-editor\" data-id=\"c5d0a13\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n \t<li><strong>Enqu\u00eates r\u00e9glementaires<\/strong><\/li>\n \t<l>Couverture des co\u00fbts associ\u00e9s \u00e0 la d\u00e9fense contre des enqu\u00eates r\u00e9glementaires concernant les actions des administrateurs et dirigeants, y compris celles li\u00e9es \u00e0 des violations de cybers\u00e9curit\u00e9.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-96d8e93 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"96d8e93\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-261d70e\" data-id=\"261d70e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e49a20a elementor-widget elementor-widget-text-editor\" data-id=\"e49a20a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n \t<li><strong>Poursuites des actionnaires<\/strong><\/li>\n \t<l>Couverture des frais de d\u00e9fense juridique et des r\u00e8glements d\u00e9coulant de poursuites intent\u00e9es par des actionnaires, en particulier lorsqu\u2019un cyberincident a eu un impact n\u00e9gatif sur le cours de l'action de l'entreprise.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3b9753d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3b9753d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-55944f3\" data-id=\"55944f3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8586d3d elementor-widget elementor-widget-heading\" data-id=\"8586d3d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Questions sur la cyberassurance pour votre conseil ?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f1a1dd elementor-widget elementor-widget-text-editor\" data-id=\"6f1a1dd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Alors que les cybermenaces continuent d'\u00e9voluer et de devenir plus sophistiqu\u00e9es, le besoin d'une cyberassurance compl\u00e8te est plus crucial que jamais. Les conseils d'administration ont une responsabilit\u00e9 fiduciaire de prot\u00e9ger leurs organisations contre les risques financiers, r\u00e9putationnels et op\u00e9rationnels associ\u00e9s aux cyberincidents.<\/p><p>La cyberassurance, associ\u00e9e \u00e0 l'assurance D&amp;O, peut aider les organisations \u00e0 se remettre rapidement et efficacement en cas de violation. Si votre conseil n'est pas encore pleinement pr\u00e9par\u00e9 \u00e0 g\u00e9rer les complexit\u00e9s du cyberrisque, il est temps de passer \u00e0 l'action.<\/p><p>Collaborer avec un <a href=\"https:\/\/www.axxima.ca\/fr\/services\/\">courtier d\u2019assurance<\/a> exp\u00e9riment\u00e9 comme Axxima peut vous fournir les conseils et solutions sur mesure n\u00e9cessaires pour prot\u00e9ger l'avenir de votre organisation.<\/p><p>Contactez <a href=\"https:\/\/www.axxima.ca\/fr\/\">Axxima<\/a> d\u00e8s aujourd'hui pour explorer comment la cyberassurance peut faire partie int\u00e9grante de votre strat\u00e9gie de gestion des risques. Prot\u00e9gez votre organisation, votre conseil et assurez-vous la tranquillit\u00e9 d'esprit en discutant avec Axxima de vos besoins en cyberassurance.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9273f71 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9273f71\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-07de6d6\" data-id=\"07de6d6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-310b8b4 elementor-widget elementor-widget-spacer\" data-id=\"310b8b4\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Back Cyber Insurance for Boards: Everything You Need to Know Cybersecurity has become a top concern for businesses all around the world, and Canada is no exception.\u00a0 With the increasing frequency and severity of cyber incidents, it&#8217;s no longer a question of if a company will be targeted by cyber criminals, but likely when. And [&hellip;]<\/p>","protected":false},"author":1,"featured_media":7082,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-7073","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/www.axxima.ca\/wp-content\/uploads\/2024\/08\/Picture2.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.axxima.ca\/fr\/wp-json\/wp\/v2\/posts\/7073","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.axxima.ca\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.axxima.ca\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.axxima.ca\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.axxima.ca\/fr\/wp-json\/wp\/v2\/comments?post=7073"}],"version-history":[{"count":25,"href":"https:\/\/www.axxima.ca\/fr\/wp-json\/wp\/v2\/posts\/7073\/revisions"}],"predecessor-version":[{"id":7135,"href":"https:\/\/www.axxima.ca\/fr\/wp-json\/wp\/v2\/posts\/7073\/revisions\/7135"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.axxima.ca\/fr\/wp-json\/wp\/v2\/media\/7082"}],"wp:attachment":[{"href":"https:\/\/www.axxima.ca\/fr\/wp-json\/wp\/v2\/media?parent=7073"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.axxima.ca\/fr\/wp-json\/wp\/v2\/categories?post=7073"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.axxima.ca\/fr\/wp-json\/wp\/v2\/tags?post=7073"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}