{"id":29,"date":"2021-09-30T04:17:21","date_gmt":"2021-09-30T02:17:21","guid":{"rendered":"http:\/\/cyberespacehome.com\/?page_id=29"},"modified":"2021-10-17T19:15:27","modified_gmt":"2021-10-17T17:15:27","slug":"services","status":"publish","type":"page","link":"https:\/\/cyberespacehome.com\/","title":{"rendered":"NOS SERVICES"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"29\" class=\"elementor elementor-29\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bbcb816 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bbcb816\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9b2581b\" data-id=\"9b2581b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c6b159c elementor-widget elementor-widget-heading\" data-id=\"c6b159c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">1- CYBER-ASSURANCE : L'ULTIME PROTECTION FACE A LA CYBERCRIMINALITE<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c519600 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c519600\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8c36293 elementor-invisible\" data-id=\"8c36293\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInRight&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cb82e48 animated-slow elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"cb82e48\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/cyberespacehome.com\/index.php\/produit\/assurance-cyber-pour-les-entreprises\/\">1- a: Assurance Cyber pour les entreprises<\/a><\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85d186e elementor-widget elementor-widget-image\" data-id=\"85d186e\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"300\" src=\"https:\/\/cyberespacehome.com\/wp-content\/uploads\/2021\/10\/ordinateur-mac-clavier_10047.jpg\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/cyberespacehome.com\/wp-content\/uploads\/2021\/10\/ordinateur-mac-clavier_10047.jpg 450w, https:\/\/cyberespacehome.com\/wp-content\/uploads\/2021\/10\/ordinateur-mac-clavier_10047-300x200.jpg 300w, https:\/\/cyberespacehome.com\/wp-content\/uploads\/2021\/10\/ordinateur-mac-clavier_10047-416x277.jpg 416w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b708737 elementor-widget elementor-widget-text-editor\" data-id=\"b708737\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"woocommerce-product-details__short-description\">\n\t<p>Dans un monde de plus en plus digitalis\u00e9, le \u00ab risque num\u00e9rique \u00bb ou\n \u00ab risque cyber\u00bb, est devenu en quelques ann\u00e9es incontournable et \ndifficile \u00e0 maitriser pour nos entreprises. Ces nouvelles menaces p\u00e8sent\n sur les entreprises qui doivent \u00e0 pr\u00e9sent s\u2019adapter en renfor\u00e7ant leur \nniveau de cyber-s\u00e9curit\u00e9.<\/p>\n<p>Aucune entreprise n\u2019est \u00e0 l\u2019abri d\u2019une cyber attaque, une violation \ndes donn\u00e9es personnelles accidentelle,un ran\u00e7ongiciel et s\u2019expose ainsi \u00e0\n des cons\u00e9quences financi\u00e8res majeures, cons\u00e9quences non couvertes par \nles contrats d\u2019assurance traditionnels.<\/p>\n<p>L\u2019assurance Cyber pour les entreprises prot\u00e8ge votre entreprise \ncontre les pertes financi\u00e8res pouvant r\u00e9sulter d\u2019une cyberattaque.<\/p>\n<p>Vous b\u00e9n\u00e9ficiez automatiquement d\u2019une Cyber-Assistance qui vous aide \ndans la gestion de la crise 24H \/ 24 \u2013 7J \/ 7, d\u2019un contrat d\u2019assurance \ncomplet (CYBER + RGPD) vous garantissant la prise en charge des dommages\n subis, des pertes d\u2019exploitation et des dommages caus\u00e9s \u00e0 des tiers, et\n l\u2019accompagnement d\u2019un sp\u00e9cialiste dans la maitrise de vos risques \nnum\u00e9riques.<\/p>\n<\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-fd62995 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fd62995\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-58b77df elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"58b77df\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0851612\" data-id=\"0851612\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c562756 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"c562756\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/cyberespacehome.com\/index.php\/produit\/assurance-cyber-pour-particuliers\/\">1-b: Assurance Cyber pour particuliers<\/a><\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a14668d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a14668d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-180c7e0\" data-id=\"180c7e0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0d1ccd2 elementor-aspect-ratio-169 elementor-widget elementor-widget-video\" data-id=\"0d1ccd2\" data-element_type=\"widget\" data-settings=\"{&quot;video_type&quot;:&quot;hosted&quot;,&quot;controls&quot;:&quot;yes&quot;,&quot;aspect_ratio&quot;:&quot;169&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"e-hosted-video elementor-wrapper elementor-fit-aspect-ratio elementor-open-inline\">\n\t\t\t\t\t<video class=\"elementor-video\" src=\"http:\/\/cyberespacehome.com\/wp-content\/uploads\/2021\/10\/tutoriel-daxa-assurance-cyber-plus-axa.mp4\" controls=\"\" controlsList=\"nodownload\"><\/video>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-95a2f7c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"95a2f7c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5ddae62\" data-id=\"5ddae62\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a95080f elementor-widget elementor-widget-text-editor\" data-id=\"a95080f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"woocommerce-product-details__short-description\">\n\t<p>Qu\u2019il s\u2019agisse d\u2019achats en ligne, de posts sur les r\u00e9seaux sociaux \nou de banque en ligne, \u00e0 quel point votre s\u00e9curit\u00e9 num\u00e9rique est-elle \ngarantie? Les diff\u00e9rents modules de notre assurance Cyber Plus vous \nprot\u00e8gent de fa\u00e7on compl\u00e8te, vous et vos enfants, contre les nombreux \nrisques li\u00e9s \u00e0 l\u2019utilisation d\u2019Internet ainsi que contre les pr\u00e9judices \nfinanciers qui en d\u00e9coulent.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-162ea8d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"162ea8d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-99f40b3\" data-id=\"99f40b3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d00ce2f elementor-widget elementor-widget-heading\" data-id=\"d00ce2f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">2 - TEST D'INTRUISION<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7ce81f26 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7ce81f26\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-75e97079\" data-id=\"75e97079\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7e49872 elementor-widget elementor-widget-image\" data-id=\"7e49872\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"150\" src=\"https:\/\/cyberespacehome.com\/wp-content\/uploads\/2021\/10\/intr-300x150.jpg\" class=\"attachment-medium size-medium\" alt=\"\" srcset=\"https:\/\/cyberespacehome.com\/wp-content\/uploads\/2021\/10\/intr-300x150.jpg 300w, https:\/\/cyberespacehome.com\/wp-content\/uploads\/2021\/10\/intr-1024x512.jpg 1024w, https:\/\/cyberespacehome.com\/wp-content\/uploads\/2021\/10\/intr-768x384.jpg 768w, https:\/\/cyberespacehome.com\/wp-content\/uploads\/2021\/10\/intr-1536x768.jpg 1536w, https:\/\/cyberespacehome.com\/wp-content\/uploads\/2021\/10\/intr-1320x660.jpg 1320w, https:\/\/cyberespacehome.com\/wp-content\/uploads\/2021\/10\/intr.jpg 1834w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0520ff4 elementor-widget elementor-widget-heading\" data-id=\"0520ff4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Contr\u00f4lez votre entreprise avec des tests d'intrusion<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dfa21af elementor-widget elementor-widget-text-editor\" data-id=\"dfa21af\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><!-- wp:heading --><\/p><p><!-- \/wp:heading --><\/p><p><!-- wp:heading {\"level\":3} --><\/p><p><!-- \/wp:heading --><\/p><p><!-- wp:paragraph --><\/p><p><strong>N&#8217;attendez pas d&#8217;\u00eatre victime d&#8217;une cyber-attaque pour conna\u00eetre les faiblesses de votre syst\u00e8me informatique. Effectuez en amont un test d&#8217;intrusion pour d\u00e9celer ses vuln\u00e9rabilit\u00e9s, avant que celles-ci ne soient exploit\u00e9es par des personnes malveillantes.<\/strong><\/p><p><strong><!-- \/wp:paragraph --><\/strong><\/p><p><strong><!-- wp:paragraph --><\/strong><\/p><p><strong>Le test d&#8217;intrusion, aussi appel\u00e9 pentest en anglais, simule les r\u00e9elles conditions d&#8217;attaque en reproduisant la d\u00e9marche et les techniques d&#8217;un fraudeur potentiel.<\/strong><\/p><p><strong><!-- \/wp:paragraph --><\/strong><\/p><p><strong><!-- wp:paragraph --><\/strong><\/p><p><strong>A la diff\u00e9rence d\u2019un audit de s\u00e9curit\u00e9 qui analyse l&#8217;architecture et la configuration du syst\u00e8me d&#8217;information au niveau de la s\u00e9curit\u00e9, les tests d&#8217;intrusion permettent de d\u00e9terminer la r\u00e9sistance effective de votre syst\u00e8me informatique face \u00e0 des attaques venant de l&#8217;int\u00e9rieur ou de l&#8217;ext\u00e9rieur de votre r\u00e9seau.<\/strong><\/p><p><strong><!-- \/wp:paragraph --><\/strong><\/p><p><strong><!-- wp:paragraph --><\/strong><\/p><p><strong>Durant la phase de \u00abPentest\u00bb, l&#8217;auditeur va ainsi essayer d\u2019exploiter l&#8217;ensemble des failles d\u00e9couvertes et d\u2019\u00e9valuer pr\u00e9cis\u00e9ment le degr\u00e9 de risque associ\u00e9 \u00e0 chacune de ces vuln\u00e9rabilit\u00e9s.<\/strong><\/p><p><!-- \/wp:paragraph --><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6cae9ab elementor-align-center elementor-widget elementor-widget-button\" data-id=\"6cae9ab\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"https:\/\/cyberespacehome.com\/index.php\/demander-un-devis\/\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">DEMANDER UN DEVIS<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7da1e58 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7da1e58\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a725f6e\" data-id=\"a725f6e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-468a1f3 elementor-widget elementor-widget-heading\" data-id=\"468a1f3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">3- ANALYSE FORENSIQUE <\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f928e24 elementor-widget elementor-widget-image\" data-id=\"f928e24\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"172\" src=\"https:\/\/cyberespacehome.com\/wp-content\/uploads\/2021\/10\/investigation-forensic-cover-300x172.jpg\" class=\"attachment-medium size-medium\" alt=\"\" srcset=\"https:\/\/cyberespacehome.com\/wp-content\/uploads\/2021\/10\/investigation-forensic-cover-300x172.jpg 300w, https:\/\/cyberespacehome.com\/wp-content\/uploads\/2021\/10\/investigation-forensic-cover-768x441.jpg 768w, https:\/\/cyberespacehome.com\/wp-content\/uploads\/2021\/10\/investigation-forensic-cover.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7672395 elementor-widget elementor-widget-heading\" data-id=\"7672395\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Nos consultants interviennent suite \u00e0 un incident de s\u00e9curit\u00e9 via des procedures vous permettant d'entreprendre des actions en justice <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-083ddde elementor-widget elementor-widget-text-editor\" data-id=\"083ddde\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"row\">\n<div class=\"col-12\">\n<p><strong>L&#8217;analyse forensic est une science qui s&#8217;int\u00e9resse \u00e0 la recherche de preuves sur des supports num\u00e9riques pour comprendre un comportement, rem\u00e9dier \u00e0 un incident et aider \u00e0 prendre des d\u00e9cisions \u00e9clair\u00e9es. Ces preuves sont des traces, des art\u00e9facts num\u00e9riques qui fournissent des informations qui, mises bout-\u00e0-bout, permettent de d\u00e9gager un sc\u00e9nario factuel d&#8217;\u00e9v\u00e8nements et d&#8217;apporter des r\u00e9ponses aux questions que peut se poser le demandeur. L&#8217;analyse forensique est encore appel\u00e9e investigation num\u00e9rique, <em>digital forensics<\/em>, inforensique ou informatique l\u00e9gale.<\/strong><\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-6\">\n<p><strong>Vous avez \u00e9t\u00e9 victime d&#8217;une intrusion ou de tout autre incident de s\u00e9curit\u00e9 informatique au sein de votre SI : poste de travail, serveur, site web, t\u00e9l\u00e9phone portable, standard t\u00e9l\u00e9phonique IPBX&#8230; Vous suspectez une usurpation d&#8217;identit\u00e9, ou un potentiel vol d&#8217;informations confidentielles.<\/strong><\/p>\n<p><strong>CYBER ESPACE HOME peut vous aider \u00e0 retrouver des preuves num\u00e9riques en respectant les proc\u00e9dures l\u00e9gales afin que ces preuves soient recevables par un jury et donc utilisables dans le cadre d&#8217;une enqu\u00eate judiciaire ou d&#8217;un proc\u00e8s.<\/strong><\/p>\n<p><strong>Afin de ne pas d\u00e9naturer les preuves, la rapidit\u00e9 d&#8217;intervention et le respect d&#8217;un certain protocole sont primordiaux. Alors, ne tardez pas \u00e0 nous contacter !<\/strong><\/p>\n<\/div>\n<\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1eca4ff elementor-align-center elementor-widget elementor-widget-button\" data-id=\"1eca4ff\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"https:\/\/cyberespacehome.com\/index.php\/demander-un-devis\/\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">DEMANDER UN DEVIS<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8ae492e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8ae492e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f52dc3a\" data-id=\"f52dc3a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4a278e6 elementor-widget elementor-widget-heading\" data-id=\"4a278e6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">4- FORMATION CYBERSECUTITE<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fa81e10 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fa81e10\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-55e08ed\" data-id=\"55e08ed\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e3fc1be elementor-widget elementor-widget-heading\" data-id=\"e3fc1be\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Modules de formation E-learning pour vos salari\u00e9s\n<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-577b15f elementor-widget elementor-widget-text-editor\" data-id=\"577b15f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>CYBER ESPACE HOME dispose d\u2019une plateforme e-learning intuitive, d\u00e9di\u00e9e \u00e0 la formation sur les syst\u00e8mes de paiement \u00e9lectronique (mon\u00e9tique) et la s\u00e9curit\u00e9. En effet CYBER ESPACE HOME est egalement holding des services financier digitaux : Distributeur agreer des cartes VISA, Representant commercial de WESTERN UNION, MONEY GRAM, RIA, MONEY TRANS, SIGUE et SMALL WORLD.,\u00a0<\/strong><\/p>\n<p><strong>Avec plus de 60 modules repr\u00e9sentant 30 heures de diffusion, CYBER ESPACE HOME permet la mise en place de formations individuelles mais \u00e9galement la formation d\u2019un grand nombre de collaborateurs de mani\u00e8re simultan\u00e9e.<\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e967f3 elementor-widget elementor-widget-image\" data-id=\"2e967f3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"980\" height=\"116\" src=\"https:\/\/cyberespacehome.com\/wp-content\/uploads\/2021\/10\/cropped-ceh-1024x121.png\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/cyberespacehome.com\/wp-content\/uploads\/2021\/10\/cropped-ceh-1024x121.png 1024w, https:\/\/cyberespacehome.com\/wp-content\/uploads\/2021\/10\/cropped-ceh-300x36.png 300w, https:\/\/cyberespacehome.com\/wp-content\/uploads\/2021\/10\/cropped-ceh-768x91.png 768w, https:\/\/cyberespacehome.com\/wp-content\/uploads\/2021\/10\/cropped-ceh-1320x157.png 1320w, https:\/\/cyberespacehome.com\/wp-content\/uploads\/2021\/10\/cropped-ceh.png 1400w\" sizes=\"auto, (max-width: 980px) 100vw, 980px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06c9248 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"06c9248\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"https:\/\/cyberespacehome.com\/index.php\/demander-un-devis\/\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">DEMANDER UN DEVIS<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>1- CYBER-ASSURANCE : L&#8217;ULTIME PROTECTION FACE A LA CYBERCRIMINALITE 1- a: Assurance Cyber pour les entreprises Dans un monde de plus en plus digitalis\u00e9, le \u00ab risque num\u00e9rique \u00bb ou \u00ab risque cyber\u00bb, est devenu en quelques ann\u00e9es incontournable et difficile \u00e0 maitriser pour nos entreprises. Ces nouvelles menaces p\u00e8sent sur les entreprises qui doivent [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-29","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberespacehome.com\/index.php\/wp-json\/wp\/v2\/pages\/29","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberespacehome.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberespacehome.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberespacehome.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberespacehome.com\/index.php\/wp-json\/wp\/v2\/comments?post=29"}],"version-history":[{"count":80,"href":"https:\/\/cyberespacehome.com\/index.php\/wp-json\/wp\/v2\/pages\/29\/revisions"}],"predecessor-version":[{"id":344,"href":"https:\/\/cyberespacehome.com\/index.php\/wp-json\/wp\/v2\/pages\/29\/revisions\/344"}],"wp:attachment":[{"href":"https:\/\/cyberespacehome.com\/index.php\/wp-json\/wp\/v2\/media?parent=29"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}