{"id":5664,"date":"2022-05-09T11:32:18","date_gmt":"2022-05-09T09:32:18","guid":{"rendered":"https:\/\/vaultinum.com\/resources\/cyber-audit-checklist"},"modified":"2025-07-10T14:33:52","modified_gmt":"2025-07-10T12:33:52","slug":"checklist-de-cybersecurite","status":"publish","type":"ressource","link":"https:\/\/vaultinum.com\/fr\/ressources\/checklist-de-cybersecurite","title":{"rendered":"Checklist de Cybers\u00e9curit\u00e9"},"content":{"rendered":"<p>Saviez-vous qu\u2019en 2022, une entreprise a \u00e9t\u00e9 victime d\u2019une cyberattaque toutes les 11 secondes ? Et ce chiffre est en augmentation. Par cons\u00e9quent, la question n\u2019est plus de savoir si une entreprise sera victime d\u2019une cyberattaque, mais quand. De la mise en \u0153uvre des basiques de la cybers\u00e9curit\u00e9 \u00e0 l\u2019impl\u00e9mentation de boucliers plus sophistiqu\u00e9s, les entreprises doivent s\u2019assurer qu\u2019elles sont pr\u00eates \u00e0 faire face aux cyberattaques. <\/p>\n\n\n\n<p>La premi\u00e8re \u00e9tape serait de r\u00e9aliser un audit, afin d\u2019\u00e9valuer la situation et leur niveau de pr\u00e9paration cyber. Pour commencer, cette checklist passe en revue quelques questions de base li\u00e9es \u00e0 la cybers\u00e9curit\u00e9, afin d\u2019aider les entreprises \u00e0 identifier les cyber-vuln\u00e9rabilit\u00e9s potentielles de leurs syst\u00e8mes.<\/p>\n\n\n","protected":false},"featured_media":8196,"template":"","meta":{"_acf_changed":true,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_lmt_disableupdate":"no","_lmt_disable":""},"class_list":["post-5664","ressource","type-ressource","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Une checklist pour \u00e9valuer sa cybersecurit\u00e9 | Vaultinum<\/title>\n<meta name=\"description\" content=\"T\u00e9l\u00e9chargez notre checklist de cybers\u00e9curit\u00e9 pour d\u00e9terminer vos faiblesses en mati\u00e8re de gestion des donn\u00e9es, organisation, certification, \u00e9quipement et infrastructure informatique.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/vaultinum.com\/fr\/ressources\/checklist-de-cybersecurite\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Une checklist pour \u00e9valuer sa cybersecurit\u00e9 | Vaultinum\" \/>\n<meta property=\"og:description\" content=\"T\u00e9l\u00e9chargez notre checklist de cybers\u00e9curit\u00e9 pour d\u00e9terminer vos faiblesses en mati\u00e8re de gestion des donn\u00e9es, organisation, certification, \u00e9quipement et infrastructure informatique.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/vaultinum.com\/fr\/ressources\/checklist-de-cybersecurite\" \/>\n<meta property=\"og:site_name\" content=\"Vaultinum\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-10T12:33:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/vaultinum.com\/wp-content\/uploads\/2025\/07\/Cyber-audit-CL.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"240\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/vaultinum.com\/fr\/ressources\/checklist-de-cybersecurite\",\"url\":\"https:\/\/vaultinum.com\/fr\/ressources\/checklist-de-cybersecurite\",\"name\":\"Une checklist pour \u00e9valuer sa cybersecurit\u00e9 | Vaultinum\",\"isPartOf\":{\"@id\":\"https:\/\/vaultinum.com\/fr#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/vaultinum.com\/fr\/ressources\/checklist-de-cybersecurite#primaryimage\"},\"image\":{\"@id\":\"https:\/\/vaultinum.com\/fr\/ressources\/checklist-de-cybersecurite#primaryimage\"},\"thumbnailUrl\":\"https:\/\/vaultinum.com\/wp-content\/uploads\/2025\/07\/Cyber-audit-CL.webp\",\"datePublished\":\"2022-05-09T09:32:18+00:00\",\"dateModified\":\"2025-07-10T12:33:52+00:00\",\"description\":\"T\u00e9l\u00e9chargez notre checklist de cybers\u00e9curit\u00e9 pour d\u00e9terminer vos faiblesses en mati\u00e8re de gestion des donn\u00e9es, organisation, certification, \u00e9quipement et infrastructure informatique.\",\"breadcrumb\":{\"@id\":\"https:\/\/vaultinum.com\/fr\/ressources\/checklist-de-cybersecurite#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/vaultinum.com\/fr\/ressources\/checklist-de-cybersecurite\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/vaultinum.com\/fr\/ressources\/checklist-de-cybersecurite#primaryimage\",\"url\":\"https:\/\/vaultinum.com\/wp-content\/uploads\/2025\/07\/Cyber-audit-CL.webp\",\"contentUrl\":\"https:\/\/vaultinum.com\/wp-content\/uploads\/2025\/07\/Cyber-audit-CL.webp\",\"width\":600,\"height\":240},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/vaultinum.com\/fr\/ressources\/checklist-de-cybersecurite#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Vaultinum\",\"item\":\"https:\/\/vaultinum.com\/fr\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Checklist de Cybers\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/vaultinum.com\/fr#website\",\"url\":\"https:\/\/vaultinum.com\/fr\",\"name\":\"Vaultinum\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/vaultinum.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/vaultinum.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/vaultinum.com\/fr#organization\",\"name\":\"Vaultinum\",\"url\":\"https:\/\/vaultinum.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/vaultinum.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/vaultinum.com\/wp-content\/uploads\/2025\/03\/logo-vaultinum-color.svg\",\"contentUrl\":\"https:\/\/vaultinum.com\/wp-content\/uploads\/2025\/03\/logo-vaultinum-color.svg\",\"width\":247,\"height\":75,\"caption\":\"Vaultinum\"},\"image\":{\"@id\":\"https:\/\/vaultinum.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/vaultinum\/\",\"https:\/\/www.youtube.com\/@vaultinum_official\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Une checklist pour \u00e9valuer sa cybersecurit\u00e9 | Vaultinum","description":"T\u00e9l\u00e9chargez notre checklist de cybers\u00e9curit\u00e9 pour d\u00e9terminer vos faiblesses en mati\u00e8re de gestion des donn\u00e9es, organisation, certification, \u00e9quipement et infrastructure informatique.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/vaultinum.com\/fr\/ressources\/checklist-de-cybersecurite","og_locale":"fr_FR","og_type":"article","og_title":"Une checklist pour \u00e9valuer sa cybersecurit\u00e9 | Vaultinum","og_description":"T\u00e9l\u00e9chargez notre checklist de cybers\u00e9curit\u00e9 pour d\u00e9terminer vos faiblesses en mati\u00e8re de gestion des donn\u00e9es, organisation, certification, \u00e9quipement et infrastructure informatique.","og_url":"https:\/\/vaultinum.com\/fr\/ressources\/checklist-de-cybersecurite","og_site_name":"Vaultinum","article_modified_time":"2025-07-10T12:33:52+00:00","og_image":[{"width":600,"height":240,"url":"https:\/\/vaultinum.com\/wp-content\/uploads\/2025\/07\/Cyber-audit-CL.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/vaultinum.com\/fr\/ressources\/checklist-de-cybersecurite","url":"https:\/\/vaultinum.com\/fr\/ressources\/checklist-de-cybersecurite","name":"Une checklist pour \u00e9valuer sa cybersecurit\u00e9 | Vaultinum","isPartOf":{"@id":"https:\/\/vaultinum.com\/fr#website"},"primaryImageOfPage":{"@id":"https:\/\/vaultinum.com\/fr\/ressources\/checklist-de-cybersecurite#primaryimage"},"image":{"@id":"https:\/\/vaultinum.com\/fr\/ressources\/checklist-de-cybersecurite#primaryimage"},"thumbnailUrl":"https:\/\/vaultinum.com\/wp-content\/uploads\/2025\/07\/Cyber-audit-CL.webp","datePublished":"2022-05-09T09:32:18+00:00","dateModified":"2025-07-10T12:33:52+00:00","description":"T\u00e9l\u00e9chargez notre checklist de cybers\u00e9curit\u00e9 pour d\u00e9terminer vos faiblesses en mati\u00e8re de gestion des donn\u00e9es, organisation, certification, \u00e9quipement et infrastructure informatique.","breadcrumb":{"@id":"https:\/\/vaultinum.com\/fr\/ressources\/checklist-de-cybersecurite#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/vaultinum.com\/fr\/ressources\/checklist-de-cybersecurite"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/vaultinum.com\/fr\/ressources\/checklist-de-cybersecurite#primaryimage","url":"https:\/\/vaultinum.com\/wp-content\/uploads\/2025\/07\/Cyber-audit-CL.webp","contentUrl":"https:\/\/vaultinum.com\/wp-content\/uploads\/2025\/07\/Cyber-audit-CL.webp","width":600,"height":240},{"@type":"BreadcrumbList","@id":"https:\/\/vaultinum.com\/fr\/ressources\/checklist-de-cybersecurite#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Vaultinum","item":"https:\/\/vaultinum.com\/fr"},{"@type":"ListItem","position":2,"name":"Checklist de Cybers\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/vaultinum.com\/fr#website","url":"https:\/\/vaultinum.com\/fr","name":"Vaultinum","description":"","publisher":{"@id":"https:\/\/vaultinum.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/vaultinum.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/vaultinum.com\/fr#organization","name":"Vaultinum","url":"https:\/\/vaultinum.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/vaultinum.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/vaultinum.com\/wp-content\/uploads\/2025\/03\/logo-vaultinum-color.svg","contentUrl":"https:\/\/vaultinum.com\/wp-content\/uploads\/2025\/03\/logo-vaultinum-color.svg","width":247,"height":75,"caption":"Vaultinum"},"image":{"@id":"https:\/\/vaultinum.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/vaultinum\/","https:\/\/www.youtube.com\/@vaultinum_official"]}]}},"_links":{"self":[{"href":"https:\/\/vaultinum.com\/fr\/wp-json\/wp\/v2\/ressource\/5664","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vaultinum.com\/fr\/wp-json\/wp\/v2\/ressource"}],"about":[{"href":"https:\/\/vaultinum.com\/fr\/wp-json\/wp\/v2\/types\/ressource"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/vaultinum.com\/fr\/wp-json\/wp\/v2\/media\/8196"}],"wp:attachment":[{"href":"https:\/\/vaultinum.com\/fr\/wp-json\/wp\/v2\/media?parent=5664"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}