{"id":7461,"date":"2025-09-08T14:17:05","date_gmt":"2025-09-08T19:17:05","guid":{"rendered":"https:\/\/www.axxima.ca\/?p=7461"},"modified":"2025-09-08T15:12:05","modified_gmt":"2025-09-08T20:12:05","slug":"how-boards-can-and-should-manage-cybersecurity-risk","status":"publish","type":"post","link":"https:\/\/www.axxima.ca\/fr\/blog\/how-boards-can-and-should-manage-cybersecurity-risk\/","title":{"rendered":"Comment les conseils d\u2019administrations peuvent (et devraient) g\u00e9rer le risque de Cybers\u00e9curit\u00e9"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"7461\" class=\"elementor elementor-7461\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b4c92fd she-header-yes elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b4c92fd\" data-element_type=\"section\" data-settings=\"{&quot;transparent&quot;:&quot;yes&quot;,&quot;transparent_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;scroll_distance&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:60,&quot;sizes&quot;:[]},&quot;scroll_distance_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;scroll_distance_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;she_offset_top&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;she_offset_top_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;she_offset_top_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;she_width&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:100,&quot;sizes&quot;:[]},&quot;she_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;she_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;she_padding&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:0,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:0,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;she_padding_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;she_padding_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true}}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f33250a\" data-id=\"f33250a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8fb7239 elementor-invisible elementor-widget elementor-widget-eael-creative-button\" data-id=\"8fb7239\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"eael-creative-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"eael-creative-button-wrapper\">\n\n            <a class=\"eael-creative-button eael-creative-button--wayra\" href=\"https:\/\/www.axxima.ca\/fr\/blog\/\" data-text=\"Blog\">\n\n\t    \n                <div class=\"creative-button-inner\">\n\n                                            <span class=\"eael-creative-button-icon-left\"><i aria-hidden=\"true\" class=\"icon icon-left-arrows\"><\/i><\/span>                    \n                    <span class=\"cretive-button-text\">Retour<\/span>\n\n                                    <\/div>\n\t                        <\/a>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a5ceab0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a5ceab0\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0433ba5\" data-id=\"0433ba5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0163194 elementor-widget elementor-widget-spacer\" data-id=\"0163194\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9ca7819 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9ca7819\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a746b48\" data-id=\"a746b48\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-204ee86 elementor-widget elementor-widget-heading\" data-id=\"204ee86\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Gouvernance des conseils d'administration - Partie 2 : Cybers\u00e9curit\u00e9 et g\u00e9rer le risque num\u00e9rique<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b4d6d4b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b4d6d4b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-dc9e0e5\" data-id=\"dc9e0e5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a7f20fc elementor-widget elementor-widget-text-editor\" data-id=\"a7f20fc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><em>Ceci est notre deuxi\u00e8me article sur notre s\u00e9rie de gestion de conseil. Retrouvez le premier article <\/em><\/strong><a href=\"https:\/\/www.axxima.ca\/fr\/blog\/5-critical-emerging-board-governance-issues-in-2025\/\"><strong><em>ici<\/em><\/strong><\/a><strong><em>.<\/em><\/strong><\/p><p>Vous \u00eates assis dans la salle du conseil. Un caf\u00e9 \u00e0 la main, l\u2019ordre du jour devant vous.\nTout semble normal, jusqu\u2019\u00e0 ce que le visage du \/de la PDG bl\u00eamisse en pleine r\u00e9union. \nIl\/Elle vient de recevoir un message : les serveurs de l\u2019entreprise sont verrouill\u00e9s, les donn\u00e9es des clients ont \u00e9t\u00e9 compromises \u2013 et les attaquants exigent 2 millions de dollars en cryptomonnaie.<\/p><p>Malheureusement, ceci n\u2019est pas un exercice du service informatique. C\u2019est une v\u00e9ritable attaque de ran\u00e7ongiciel. Et en tant que membre du conseil, vous en serez responsable.<\/p><p>Ce sc\u00e9nario se produit partout au Canada \u00e0 une fr\u00e9quence alarmante.\nDes \u00e9tablissements de sant\u00e9 en Ontario, aux fabricants en Alberta, personne n\u2019est \u00e0 l\u2019abri de ce type d\u2019attaque.<\/p><p>Les conseils ne peuvent plus traiter la cybers\u00e9curit\u00e9 comme une responsabilit\u00e9 des TI. C\u2019est un probl\u00e8me de gouvernance et l\u00e9gal qui doit \u00eatre abord\u00e9 avec une strat\u00e9gie claire et bien pens\u00e9e.\nVoici ce que vous devez savoir (et faire) maintenant pour bien g\u00e9rer le risque digital de cybers\u00e9curit\u00e9 si vous si\u00e9gez sur un conseil d\u2019administration au Canada.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6680384 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6680384\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7eadd28\" data-id=\"7eadd28\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f2ae4dd elementor-widget elementor-widget-heading\" data-id=\"f2ae4dd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Pourquoi la cybers\u00e9curit\u00e9 est-elle une responsabilit\u00e9 du conseil d\u2019administration<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b3c5eb7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b3c5eb7\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-80065b9\" data-id=\"80065b9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-69a8e0b elementor-widget elementor-widget-text-editor\" data-id=\"69a8e0b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les cybermenaces ne concernent plus uniquement les entreprises technologiques ou les institutions gouvernementales. Chaque entreprise, qu\u2019elle soit grande ou petite, est une entreprise num\u00e9rique \u00e0 un certain niveau.<\/p><p>Les conseils d\u2019administration (CA) ont un devoir fiduciaire de s\u2019assurer que les entreprises qu\u2019ils supervisent soient r\u00e9silientes, conformes et op\u00e8rent dans l\u2019int\u00e9r\u00eat des parties prenantes.<\/p><p>\u00c9chouer d\u2019adresser la cybermenace peut entra\u00eener de graves cons\u00e9quences : perturbations majeures des activit\u00e9s, perte de confiance des clients, sanctions et responsabilit\u00e9 personnelle pour les administrateurs.<\/p><p>En 2023, le co\u00fbt moyen d\u2019une violation de donn\u00e9es au Canada \u00e9tait de <a href=\"https:\/\/canada.newsroom.ibm.com\/2023-IBM-Cost-of-a-Data-Breach-Report-Canadian-businesses-are-being-hit-hard\"><span style=\"text-decoration: underline;\">$6.94 millions de dollars CA<\/span><\/a>, parmi les plus \u00e9lev\u00e9s au monde, selon le rapport d\u2019IBM sur le co\u00fbt d\u2019une violation des donn\u00e9es.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-256f8cb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"256f8cb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-132e1c4\" data-id=\"132e1c4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bc85fd1 elementor-widget elementor-widget-heading\" data-id=\"bc85fd1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Les cybermenaces cl\u00e9s que les conseils canadiens doivent comprendre.<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c8d9471 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c8d9471\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c71b973\" data-id=\"c71b973\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-88275f0 elementor-widget elementor-widget-text-editor\" data-id=\"88275f0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les cybermenaces sont dynamiques et complexes, mais voici quelques exemples plus urgents pour les entreprises canadiennes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6dae77d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6dae77d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f96ad4c\" data-id=\"f96ad4c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-76c071c elementor-widget elementor-widget-heading\" data-id=\"76c071c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Attaques par ran\u00e7ongiciel<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-60fa0b6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"60fa0b6\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c453a4a\" data-id=\"c453a4a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3371c32 elementor-widget elementor-widget-text-editor\" data-id=\"3371c32\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les cybercriminels bloquent les syst\u00e8mes et exigent un paiement. M\u00eame si la ran\u00e7on est pay\u00e9e, il n\u2019y a pas de garantie que les donn\u00e9es seront restaur\u00e9es et qu\u2019il n\u2019y aura pas de fuite.<\/p><p>Le nombre d\u2019attaques par ran\u00e7ongiciel a explos\u00e9 au cours des derni\u00e8res ann\u00e9es. Selon l\u2019\u00c9valuation des cybermenaces nationales 2025-2026, le paiement moyen estim\u00e9 \u00e9tait de <a href=\"https:\/\/www.cyber.gc.ca\/en\/guidance\/national-cyber-threat-assessment-2025-2026\"><span style=\"text-decoration: underline;\">$1,13 million de dollars CA<\/span><\/a>en 2023. Cela repr\u00e9sente une augmentation de 150% depuis 2021.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1d18fd7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1d18fd7\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b829024\" data-id=\"b829024\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b0b1b22 elementor-widget elementor-widget-heading\" data-id=\"b0b1b22\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Hame\u00e7onnage (phishing) et ing\u00e9nierie sociale<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b4795f8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b4795f8\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-de5c6b9\" data-id=\"de5c6b9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-75e5043 elementor-widget elementor-widget-text-editor\" data-id=\"75e5043\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les cybercriminels ciblent souvent les donn\u00e9es personnelles, financi\u00e8res et d\u2019entreprises via des techniques d\u2019ing\u00e9nierie sociale comme l\u2019hame\u00e7onnage. \nIl s\u2019agit de courriels, de SMS et d\u2019appels con\u00e7us pour tromper les employ\u00e9s (et les dirigeants) et leur faire divulguer des identifiants ou transf\u00e9rer des fonds.<\/p><p>Au Canada, l\u2019hame\u00e7onnage figure parmi les fraudes <a href=\"https:\/\/www.cyber.gc.ca\/en\/guidance\/national-cyber-threat-assessment-2025-2026\"><span style=\"text-decoration: underline;\">les plus fr\u00e9quemment signal\u00e9es<\/span><\/a>, tandis que les attaques cibl\u00e9es (spearfishing) ont tendance \u00e0 causer le plus de dommages financiers.<\/p><p>Ces attaques cibl\u00e9es peuvent mener \u00e0 la divulgation d\u2019informations sensibles et des pertes financi\u00e8res pour les entreprises.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-02da2bc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"02da2bc\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1231d3d\" data-id=\"1231d3d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ddfbbb9 elementor-widget elementor-widget-heading\" data-id=\"ddfbbb9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Menaces internes<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1848a25 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1848a25\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d22fbac\" data-id=\"d22fbac\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-025d41f elementor-widget elementor-widget-text-editor\" data-id=\"025d41f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ce ne sont pas toutes les violations des donn\u00e9es qui sont faites par des hackers externes, des employ\u00e9s m\u00e9contents ou n\u00e9gligents peuvent causer de s\u00e9rieux d\u00e9g\u00e2ts.<\/p><p>Une personne peut tenter d\u2019acc\u00e9der aux syst\u00e8mes sans autorisation pour diverses raisons : vengeance pour un conflit sur le lieu de travail, agir sous contrainte, ou par gains personnels ou financiers.<\/p><p>Des menaces internes peuvent venir de toute personne ayant un acc\u00e8s l\u00e9gitime aux syst\u00e8mes : employ\u00e9s, fournisseurs et partenaires d\u2019affaires.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-97c6701 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"97c6701\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f0c5d5f\" data-id=\"f0c5d5f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-190100f elementor-widget elementor-widget-heading\" data-id=\"190100f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Ce que les conseils canadiens doivent faire maintenant pour att\u00e9nuer les risques cybern\u00e9tiques<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fe62259 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fe62259\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d6f10cd\" data-id=\"d6f10cd\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a508131 elementor-widget elementor-widget-text-editor\" data-id=\"a508131\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Il n\u2019est pas suffisant de laisser les cybermenaces aux d\u00e9partements TI. Les conseils d\u2019administration doivent montrer l\u2019exemple. Voici comment :<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-48a699a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"48a699a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0d5f69d\" data-id=\"0d5f69d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-95b82ba elementor-widget elementor-widget-heading\" data-id=\"95b82ba\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Inclure r\u00e9guli\u00e8rement la cybers\u00e9curit\u00e9 \u00e0 l\u2019ordre du jour<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1c857c7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1c857c7\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e460fc9\" data-id=\"e460fc9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7290191 elementor-widget elementor-widget-text-editor\" data-id=\"7290191\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Plusieurs dirigeants voient encore la cybers\u00e9curit\u00e9 comme un probl\u00e8me pour le d\u00e9partement TI \u00e0 \u201cg\u00e9rer\u201d, plut\u00f4t qu\u2019un risque strat\u00e9gique n\u00e9cessitant une supervision. La cybers\u00e9curit\u00e9 devrait \u00eatre discut\u00e9e au moins trimestriellement, avec des indicateurs sur les risques actuels et la pr\u00e9paration aux incidents.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-20e3be1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"20e3be1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3b41808\" data-id=\"3b41808\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-098e2e2 elementor-widget elementor-widget-heading\" data-id=\"098e2e2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">S\u2019assurer que les \u00e9valuations de risques sont \u00e0 jour<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-aa6fae2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"aa6fae2\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ebaecf0\" data-id=\"ebaecf0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b606cde elementor-widget elementor-widget-text-editor\" data-id=\"b606cde\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les menaces ne sont jamais statiques quand il s\u2019agit de la cybers\u00e9curit\u00e9. De nouveaux comp\u00e9titeurs, technologies et vuln\u00e9rabilit\u00e9s \u00e9mergent tout le temps.<\/p><p>Sans \u00e9valuations \u00e0 jour, les conseils et dirigeants prennent des d\u00e9cisions sur des profils de risques obsol\u00e8tes, ce qui peut laisser la compagnie expos\u00e9e.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-46fa8d5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"46fa8d5\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7d228ba\" data-id=\"7d228ba\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2c2c282 elementor-widget elementor-widget-heading\" data-id=\"2c2c282\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">\u00c9valuer et tester les plans de r\u00e9ponse aux incidents<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-18657ed elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"18657ed\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9942986\" data-id=\"9942986\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4a58359 elementor-widget elementor-widget-text-editor\" data-id=\"4a58359\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00c9valuer et tester la r\u00e9ponse aux incidents est essentiel pour s\u2019assurer qu\u2019une organisation puisse r\u00e9agir rapidement et efficacement quand un risque cyber se produit.<\/p><p>Un plan d\u2019accident bien \u00e9crit est inutile si les personnes responsables de le mettre en action ne le comprennent pas ou ne peuvent pas agir sous pression. Des \u00e9valuations r\u00e9guli\u00e8res assurent que le plan soit clair, pratique et align\u00e9 avec les capacit\u00e9s de l\u2019organisation.<\/p><p>Les conseils devraient organiser des simulations de cyberincidents comme ils le feraient pour des catastrophes naturelles ou des crises financi\u00e8res.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-543b53b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"543b53b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-070c9bb\" data-id=\"070c9bb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bb4f83d elementor-widget elementor-widget-heading\" data-id=\"bb4f83d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Encourager une culture d\u2019hygi\u00e8ne cybern\u00e9tique<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9605b54 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9605b54\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bd5502e\" data-id=\"bd5502e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9e423f6 elementor-widget elementor-widget-text-editor\" data-id=\"9e423f6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Encourager une culture d\u2019hygi\u00e8ne cybern\u00e9tique signifie int\u00e9grer des comportements quotidiens ax\u00e9s sur la s\u00e9curit\u00e9.<\/p><p>La plupart des violations de donn\u00e9es ont un \u00e9l\u00e9ment humain : cliquer un lien malveillant, utiliser un mot de passe faible ou une mauvaise utilisation des donn\u00e9es personnelles.\nUne forte culture d\u2019hygi\u00e8ne cybern\u00e9tique r\u00e9duit ces risques en rendant les bonnes habitudes la norme.<\/p><p>Les conseils doivent donner l\u2019exemple en affirmant que la s\u00e9curit\u00e9 est la responsabilit\u00e9 de tous.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3c90b57 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3c90b57\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b088bf6\" data-id=\"b088bf6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4c13818 elementor-widget elementor-widget-heading\" data-id=\"4c13818\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Comprendre le cadre juridique<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5be0aeb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5be0aeb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3f561fc\" data-id=\"3f561fc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-315604a elementor-widget elementor-widget-text-editor\" data-id=\"315604a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Au Canada, la <a href=\"https:\/\/www.priv.gc.ca\/en\/privacy-topics\/business-privacy\/breaches-and-safeguards\/privacy-breaches-at-your-business\/gd_pb_201810\/\"><em>Loi sur la protection des renseignements personnels et les documents \u00e9lectroniques<\/em><\/a><a href=\"https:\/\/www.priv.gc.ca\/en\/privacy-topics\/business-privacy\/breaches-and-safeguards\/privacy-breaches-at-your-business\/gd_pb_201810\/\"> (LPRDE)<\/a> exige que les organisations signalent les violations de mesures de s\u00e9curit\u00e9 qui pr\u00e9sentent un \u201crisque r\u00e9el de pr\u00e9judice grave\u201d pour les personnes concern\u00e9es.<\/p><p>Dans ces rapports de violation, les organisations doivent inclure une panoplie d\u2019informations telles que les d\u00e9tails de la violation et quand elle s\u2019est produite.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-77fb90d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"77fb90d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-dfd9bfb\" data-id=\"dfd9bfb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9cbf426 elementor-widget elementor-widget-heading\" data-id=\"9cbf426\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">V\u00e9rifiez la couverture d\u2019assurance<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1cb856a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1cb856a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-eb8fb14\" data-id=\"eb8fb14\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-df6aca5 elementor-widget elementor-widget-text-editor\" data-id=\"df6aca5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>N\u2019assumez pas que votre police <a href=\"https:\/\/www.axxima.ca\/fr\/blog\/cyber-insurance-what-it-is-and-why-you-need-it\/\"><span style=\"text-decoration: underline;\">d\u2019assurance couvre les cybermenaces<\/span><\/a>. Plusieurs polices ne les couvrent pas ou offrent une protection minimale.<\/p><p>Les polices de cybermenaces peuvent varier. Chacune est compos\u00e9e de diff\u00e9rents accords de couverture qui d\u00e9finissent les risques couverts. Des couvertures courantes incluent la responsabilit\u00e9 en mati\u00e8re de s\u00e9curit\u00e9 et de confidentialit\u00e9, les interruptions et la reprise du r\u00e9seau, les frais li\u00e9s \u00e0 l\u2019assistance lors d\u2019\u00e9v\u00e9nements, la d\u00e9fense en mati\u00e8re de r\u00e9glementation de la confidentialit\u00e9, l\u2019extorsion sur le r\u00e9seau et la protection contre le vol \u00e9lectronique et la fraude par ing\u00e9nierie sociale.<\/p><p>Puisque chaque entreprise a des risques uniques, certaines couvertures peuvent \u00eatre plus importantes que d\u2019autres. Travailler avec des consultants comp\u00e9tents vous garantit une police d\u2019assurance adapt\u00e9e \u00e0 votre profil de risque et vous offre une protection ad\u00e9quate sans ajouts suppl\u00e9mentaires inutiles.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3b9753d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3b9753d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-55944f3\" data-id=\"55944f3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8586d3d elementor-widget elementor-widget-heading\" data-id=\"8586d3d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Besoin de conseils sur la bonne cyberassurance pour votre entreprise? <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f1a1dd elementor-widget elementor-widget-text-editor\" data-id=\"6f1a1dd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La cybers\u00e9curit\u00e9 est complexe. Mais obtenir de l'aide ne doit pas n\u00e9cessairement l'\u00eatre. Les courtiers d'Axxima peuvent vous aider \u00e0 examiner les solutions d'assurance cyber pour les entreprises canadiennes, allant des petites entreprises aux soci\u00e9t\u00e9s cot\u00e9es en bourse.<\/p><p>Nos experts travaillent en \u00e9troite collaboration avec les conseils d'administration et les \u00e9quipes de direction pour \u00e9valuer les risques cybern\u00e9tiques, trouver la couverture d'assurance ad\u00e9quate, anticiper les menaces \u00e9mergentes et renforcer la r\u00e9silience de votre cadre de gouvernance.<\/p><p>N'attendez pas une cyberattaque pour d\u00e9couvrir vos vuln\u00e9rabilit\u00e9s.<\/p><p>Contactez d\u00e8s aujourd'hui <a href=\"https:\/\/www.axxima.ca\/fr\/services\/\"><span style=\"text-decoration: underline;\">un courtier d\u2019Axxima<\/span><\/a> pour obtenir des conseils strat\u00e9giques et une protection compl\u00e8te.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9273f71 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9273f71\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-07de6d6\" data-id=\"07de6d6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-310b8b4 elementor-widget elementor-widget-spacer\" data-id=\"310b8b4\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Back Board Governance Part 2 &#8211; Cybersecurity and Managing Digital Risk This is the second article in our series of board governance. Catch up by reading the first here. You\u2019re sitting in the boardroom. Coffee in hand, agenda in front of you. Everything seems routine. Until the CEO\u2019s face goes pale mid-meeting. She just received [&hellip;]<\/p>","protected":false},"author":1,"featured_media":7470,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-7461","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/www.axxima.ca\/wp-content\/uploads\/2025\/09\/1520123488747.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.axxima.ca\/fr\/wp-json\/wp\/v2\/posts\/7461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.axxima.ca\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.axxima.ca\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.axxima.ca\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.axxima.ca\/fr\/wp-json\/wp\/v2\/comments?post=7461"}],"version-history":[{"count":16,"href":"https:\/\/www.axxima.ca\/fr\/wp-json\/wp\/v2\/posts\/7461\/revisions"}],"predecessor-version":[{"id":7496,"href":"https:\/\/www.axxima.ca\/fr\/wp-json\/wp\/v2\/posts\/7461\/revisions\/7496"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.axxima.ca\/fr\/wp-json\/wp\/v2\/media\/7470"}],"wp:attachment":[{"href":"https:\/\/www.axxima.ca\/fr\/wp-json\/wp\/v2\/media?parent=7461"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.axxima.ca\/fr\/wp-json\/wp\/v2\/categories?post=7461"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.axxima.ca\/fr\/wp-json\/wp\/v2\/tags?post=7461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}