{"id":2122,"date":"2022-10-26T14:34:40","date_gmt":"2022-10-26T18:34:40","guid":{"rendered":"https:\/\/groupeti.ca\/cybersecurite-2\/"},"modified":"2023-05-23T18:26:28","modified_gmt":"2023-05-23T22:26:28","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/groupeti.ca\/en\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<div class=\"nicepage-container\"><div class=\"\" style=\"\" >        <script>\n            (function ($) {\n                var ResponsiveCms = window.ResponsiveCms;\n                if (!ResponsiveCms) {\n                    return;\n                }\n                ResponsiveCms.contentDom = $('script:last').parent();\n                ResponsiveCms.prevMode = \"XL\";\n\n                if (typeof ResponsiveCms.recalcClasses === 'function') {\n                    ResponsiveCms.recalcClasses();\n                }\n            })(jQuery);\n        <\/script>\n        \n    \n    <section class=\"u-align-center u-clearfix u-image u-shading u-section-2\" src=\"\" data-image-width=\"1280\" data-image-height=\"985\" id=\"sec-9581\" style=\"background-image: linear-gradient(0deg, rgba(0, 0, 0, 0.35), rgba(0, 0, 0, 0.35)), url(&quot;https:\/\/groupeti.ca\/wp-content\/uploads\/2022\/10\/114a1c9afdb0ad645f87e7c75e4e2cfea5c0d0236104597712c4a93b1850e70175897c763116d8c459f26dc1439082378a2f315d0c881b9ff8e9f2_1280.jpg&quot;);\">\n      <div class=\"u-clearfix u-sheet u-sheet-1\">\n        <h1 class=\"u-align-center u-text u-title u-text-1\"> Cybersecurity <\/h1>\n        <p class=\"u-align-center u-custom-font u-font-open-sans u-text u-text-2\"> Computer security is much more than detecting and eliminating computer viruses,&nbsp;<br>malware, or ransomware.&nbsp;\n        <\/p>\n      <\/div>\n    <\/section>\n    <section class=\"u-align-center u-clearfix u-section-3\" id=\"sec-dd19\">\n      <div class=\"u-clearfix u-sheet u-valign-middle-lg u-valign-middle-md u-valign-middle-sm u-valign-middle-xs u-sheet-1\"><span class=\"u-align-center u-file-icon u-icon u-text-palette-1-base u-icon-1\" data-animation-name=\"customAnimationIn\" data-animation-duration=\"1000\"><img decoding=\"async\" src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAYAAADDPmHLAAAAAXNSR0IArs4c6QAAE5xJREFUeF7tnX2cm1WVx783kw7UAkqhggooqCwCCxbayZOhwFZwxfJqJ08sLQLyJi+tvNmW8tpWEQq6vPpxeasItkCSVlikrG+wvE2eDIVdXIog2BUEZKEUXAoDbZK7n5MwTPLMM3l58iR5MpP758w95557zi\/Pvffcc89RjLYWi3UQ2Ok4NHOAHUDfhwouJjJ57WhThcxXjapJJ5IHo9WVwJdt896E4meo4EJ6Jv1tNOlkdAAg0bcH2ewVKKaVMe67oK4n2Hk535j49mgAwsgGwB19OzImeyGaE4GOKgy6HvQVaH0t0e7+KuharuvIBMCyR7ams3M+6DOBzWuwystovs+E\/qVMnZqugY9vSUcWAFat2ox3x88GzgfGl9B6P4pryGYfgsAlKIySFlL8kay6ALPrbpTSvrWmC8FGBgC0ViT6IqAvB3YpoYcssIK0nsfR4b981C+\/OfwxsFcZHfah1QKioQdc6NqXJK0PgFjqK6CvRLFPSQ1rfgeBuUS7\/sux30IdYI++ngpABMKrQ8+nJ\/ykL61ahVCtC4A7k1+iQy0CzDLzXYNW84mG7qtIL7GnO2HD8SgWA9uVoJGlIIHiAiLG8xXx9mGn1gNArPczBAIXV7Czz2\/geOkWotFM1bqPPbgFavMzQMl+YqsS9C3tQ2gdANz21DjGvjcb1AXAliUMsgH0j9F6iSdHuOWrt2VM5nvAWaA3KzHue6CuazUfgv8BcMPqMWyd\/nYFn+T8LzGQuYjp+71e9S++HEFs9U4E0hdU8OVpKR+CvwGQSB7+4e78i2XX4kxmATP2+3M5O9b8\/5i1O4qFFew9WsKH4E8AJJKhD332+5cxWJKAnktP+LGaDVstg1gqjOIy0AeWIX0O1EVEuhJ+9CH4CwB3pnalQ\/8AiJS5qHoW1MWYoXi1dvO8v\/gQsupHKPYufQzVj6M6FmB2\/d5zGWpg6A8AfLTR0mcDncPPR72B1pcyof8nvnLNVutDgPOIGk\/UYDfPSJsLgHtXf4z3N82p4KiVv6Xr3HQpR055x7PZe82oBX0IzQFA\/hdzDOjLgE+XsEMaxVKygUuIdr3mtb3qxm\/wyLoA+HhZH8Km9CKOnvJq3eQpwbjxAKjU7y7u1mDH2Uyf\/HQzFOPJmCtT25BhbgW3kk3zITQOAInUJLJagjKmllFuH4HAXHq6HvbECH5g4mMfQv0BMDj5k4BACXs8n\/Py+fS45AmOKvchvIJmcSPiEOoHgFjveFTHvAo+f2\/mbvPGvXU106Z94Imi\/c5khWWQFR8C\/9RsH4L3AMjvhE\/70Fv2iRITzK97uuMyopP+7neb1UW+4YNUi4fT9fMheAeAwaCMJcDOJRSWD8oIZObSs9+LdVFsKzEd8CGIV1Hrz5d2JvE7AmoBkdBqr6boDQBySA5cAXpi2QkE1feYHnrKqwmMGD6Dl14S47B9iXnl4xAy6kJmhP5U6\/xrA8DK1N6k9RIUXysjyBNoNW8khVLVqvhh6SUOgbHnoJAr6FLX3hKkegvp9OJafAjuARC3ZgC3A8FhJ6P4C1pfSMRY7seLkLoZ0QvGsYcnoDrPB3VamTiEt9GBqcOGupWRpRYA\/BHYbRj+bwGXMm799aNmZ++F0Z14rHjss2QDi0AdM\/zbBrUMMyT\/r7rVAoD1wNa2ETeiuJXsxguJHvBG1dK0CYbXwGAMpMNNqf49ZvhgN+rzEgCvk9ahonBrNxK1aUprYIU1lSy2sHR\/AOB5TGPXtv3qrIF7Ht2SjcH\/Kx6lDYA6a91H7NsA8JExmiFKGwDN0LqPxmwDwEfGaIYobQA0Q+s+GrMNAB8ZoxmitAHQDK37aMw2AHxkjGaI0gZAM7TuozHbAPCRMZohShsAzdC6j8ZsA8BHxmiGKG0ANEPrPhqzDQAfGaMZorQB0Ayt+2jMNgB8ZIxmiNIGQDO07qMx2wDwkTGaIUobAM3Quo\/GbAPAR8awiyLvItWGHwKnAX9H6bOIhGOeStwGgKfq9I7Zcms7gqxAsV8B0346Mp\/zNG9hGwDe2cwzTjFrXxR352sQ2ZrSBpFwyrOx2gDwTJXeMIonZ4G6CRg7lKF+iXFv7erp66g2ALyxW81c8tXHLkNLDiDHthbN4USNZ2oeq5BBGwCeqtMds7wRfgEc4chA8zDBjOnp2j8wUBsA7mzmGVXCkrzF96D5kiNPxY28GZzNdyZt8mzM9hegLqqsnmms9xBU4A7AIfWN+gClTydiLK2ecRUU7S9AFcrysmvMOhOF1BVyKD8nKWwzJtHuh7wc0pHXqAVALDUXssei1F\/RHWcTnfxc3ZUtA+TS2aZvASQhhlPrQ2enE+1+pSHyjEoAxFIzUXpZgYIb8xRdchyqzN3D5j5S3M47\/afw7anvN8T4MoiPAPCmrTbfC5hGqcIO7nUUT\/4U1Kk2Bs+gg911SzEXT+0POgF80kFwqUE0H9OQJaGxLZd+Vq+zDXo\/plGuLO4we1a34sctSW78qQLylzGNHd2yK0kXTx0L+ucOfX7L+uChnu+446nvgL52mNT1kv5mBqbxm7rMtRzT3FcpbU+vl8A0ylVP8xgAidQLtrx26zGNbcrJ7+r\/uVx6qZXAkQ70N2Eap7jiayeSVG3jN13r8LUZ6PkMiqOaWiYu0bsbOiD5mQabLEUR41g3OnCfIiaW\/G+U2rNg0H5M42NuhKiIJtY7FhX4D6DLof9cTONHFfEZrpN8WtM6Pmwya80qCM6s25JTqfArkvuQVfZiEzdgGvYlsiKO7gEQt+SCo9AYmjWhIAuVZAKtT1ux+lPodAqNfanJolWEaOiXrgaWfIdZfTeazznQa1BXsKbr\/LrOrVLBY9YUFI\/Yul+NaUi1laqbewDErAeG\/Fp08BN1\/4Uk+vZAZ6VIlL0QQz9KT6365i2RjKKVOG\/GOWjvfRQnEzHE7euPFrMiKGy1kvRFmGGptVR1cw+AuLUcOLpoRM0enl9+OE0pnvw6qH9zSFL5GjoYIjrppbKayOU2tuaBkqzdTnp4GaW+4WVe3rIyVdIhljwHlSt0XdDUcZih2yoht\/epAQDJJaDmFcuhDiES+rUbQaqmSSS\/i1bXONCVPx7KWfqD4G25DZ1ze5RNRJhp\/G\/VctWbIG5dla9iWtC0OshtGl73AIilZqP0dTZBTiIaEq9ZY1o8dS3oOUMG0\/yaCf2HOVYWi\/V+ARW4B9jdUUi5zMluMYfonhsbM4kqR4lZUrC6p\/iHx65uTybuAZBIHYXWtk2XXoQZlqqajWlyJ692kuOh07Xs0ONhIvU1tJbLHHuGU5E3DfoczHAxqBszk8pHiSX7UGpyEcHmwXEcPum9ypkM9nQPAOfjyB2Yxkw3grimyWfXftSxcKPmLKJGfpmIWaeg+Mkwya3XgTYxw3LM9G\/LA16SRBYet1\/FND7jVmj3AMify6WGX+Ht2DOYxh5uhXFNd0ffjgSzlkMJugxKz0QHjgA9y5G\/5kkygaM4uuuvrsdvFGH+BGSvonYfpnGYWxHcA0BGjFv2jOEZNg9u5fZz5HYSObr8F0kqjTkd55xZK+5is+AJTZHXzWTz8Yf2I+kPMI2L3LATmloBIOtp8TWpzoaIdve5FagmuljqUJSWDZ7DnX0RZw16MRFjUUvVMYhbV0KukMRg05hEDbm0ctVqA0DMOi9fQbuwqVMxQze4ksYLorh1LlDKLSzL1rcwDQFKa7W4JR7AKcUAyH6RaPcLbidSGwDyu+p\/tw1+J6ZR7CByK51burglm73THcifR3NUQ5xVbmUfji4fByBX8GMKuqxjTWi7WlzUtQHAWajXiYS2b+qn9cEHg7wx9le2Wkb3o4NH191V7bXhB\/jFU4eBvrf4Y8tdRIzhIpUqkqQ2AMgQMUuOYIXPoWRnsTcR4w8VSVCvTqtWbca746Vw5URU4DdkX7yJaFQCOVqzOXkAlT6FSFgepbhutQMgnlwI6pLidUmfSzT8L66lahMO1UDckuNf8RFbq12Ihv6nFnV5AIBc6JS90PMDmMZBtQjWpi3QQL5ekP2F0VpMo3ShyQqUWDsA8k+ipUDUVgXjZdCBHYh2vVaBDO0u5TSQsBahudi2\/l9DxCi+FCrHx+H\/tQNAmCas29B8q3gZUHOIhq53IVObxK6BhPUcmuJ6TB75W7wBQN4B8yub3I9iGvu3rVmjBhKpSUjx6OK2lkjoC16ctDwCQG4Z+JstTDxLILNLu0B0jQCIW\/IVPaOYi\/4hZviCGjnnyL0BQG4ZSN6MVifa1qnLiRgLvBB0VPKIrf44Kv0ysEXR\/Ds6\/pHpk+2XQq5U5B0AVvQdQDZrfxu3jg39Ozb05YwrNfiUKG7JJk8igAqa6sUMFftdahDfOwCIEHFLysLvZZPnBEzjZzXIODpJ5S3Enn1\/sr29AK1nEA3f5ZVSvAVAInkyWt1YfBrgSaLGvl4JPGr4OEZc8Qrrgzt7+RLKWwDkg0QksKL4hZDiUCLGqlFjvFonKr\/+3VNPDoly0vpCouFLa2VftKB4ySzHy+nOGp4gEprsxbHFc3n9yDBuyQWPxFoUtnfRG3f2uiq7t18AETfWtz0q+2db3BofxthLKrV2K6WBfNyf7PB3K977UZcTlfcAGP4r8AfWhCbWcnc9KpDjtI+SrKM6uwvR7vVe66A+AFi+elvGpNcCWxYLrE\/GDN\/s9SRGDL9Y73hUx7OgJ9jmdDGm8f16zLM+AMh9BZKXgjrfJvSbbAruxsxJ9gQH9Zhb6\/GMW3KCOtkm+Do607tw5BQJZfO81Q8Ayx7Zms4xzw7NsKFuxgzZJ+n5xFqOYSwVRulHgUDx2l970EcpXdQPALkNYfJ4lLI7geQp9xSioWTLGaleAuev1OXCx+5ES7ImNKWe+6b6AiD3ArfvQdAH2nT3Arp\/ItGpG+ql05biG7ckilmimQtbBpWdTKT7P+s5l\/oCQCRf+fieZDJP2qJZ5T+us1rUUyEN5x23\/hm4f8inH30VZvicestTfwDkNoQODxrk71ofSTQs7\/xHZ1v52CfJdMj9yfZDvpCd6X3qtfErHKsxAMhH6MprIdsal8uwObFhSRb9BLO8w0fc4\/IFKGybCAT2o6fLHgRSF+kbA4DchtDaHcXqIXn15XHm2OD+LfM+zyszxC15tfzdoez0eZjhJV4NU45P4wCQB4Hk2716qFBqGWbomHLCjpj\/J6wT0Dgk0lAPoV88qJHvFxoLgNypICWvWw51AMF8zNAVI8bIw00klvoKKvecrvCJl\/R+hUBwMj2TJLSuYa2xAMh9BXJhTvKWv\/iyAzJoPcvLYIeGabHSgWK9XajAb20h9EL9HpoDiBr2\/H+Vcnbdr\/EAyIEgtTMqF+lqzyy6CdR0zJA9wtj1BH1DmLD2QvOgLXBWxNPATEzjzmbI2hwA5PcDX0VJ9k2CtolvRKkjGpZtrBFajz3+D6iMxEtuN2Q4zSVEjcWNEMNpjOYBQKSJW\/KEW55y29sGUNMwQ\/aMmM3Sk\/txY31fRmXF0WM\/60tM9o30hE5tZqBMcwEgak2kzkZrh4ekuRIss4gYK9xrv8mUK6ypZJFMavaspmL823k6dHw9\/fyVzL75AMh\/CaTcqtP7gQzoU1syhiCenA5Kilxs7mCIlWzb\/03HPIaVWM3DPv4AQO5LkLwOrWY7zE2jOZ+ocbmH864fq\/xR9zxAcvcWX+3mRtW\/ZP2Yb3oZ2VvLZPwDgHzu3kuG5BoYnN09fMCxHGNInjx\/tl9YW9HJ0iGZPAekVdzKNv0n++GXPyiS31SZzwEsr2Ecfj08S0ZPZ0a4uGCCH+Ygm72ATgx5yPGRbGoJZki+DL5q\/vkCFKolkToOrSV20H5ElF5vgz4RMywpYpvf8i94zkRr2cc4rfcZlJpNJPSvzRd2qAT+BIDImS\/SKCnpnfL6yrvWZWzcOIdZ+0sNn+a03Pk+uxR09zACSOzjrKbVF6pAK\/4FgAh\/52Ofp6NDfun2UKmBqb0K+iTMsJyzG9ckC9m6sfJwUxw4DlXDc6KkSAdMv6eg9TcARI23PTWOsf2SCWu43INS0mU5AX0ePYY8pa5vyxerkBAu53TzMrrS15Pd8lzfppwv0JD\/ATAgbMI6A43cFg5XmOrd\/P+zVxLt7vccBVJXKKMlVetXS\/B+Da1Od127yHOhyzNsHQDIXKRyt1a3llhz5Zz9EgQuYtv3lnty3MoVlMrOQyt5r+d0MvlQy2oZHZzJ9JBk82yZ1loAELXmQqk+KxG0i0FvVkLTa9EsYYv1P2fatA+qtkis90BUYD5wSJlMKq+i9KlEwsVZPKsesDkErQeAAT3lc+dJdJE9ps6uyVdyRZbe17eUdSLlCkempRyLbPBCZUzSj0TudmYub0TwZr3g0boA+GhvkDwYnQNCuUIV76DkyXX2KiLd8mJpsMUenoAac0I+wbTaqYyy5f4+gVbza83SWS+jVsO39QGQWxZyL2skwFIulMaXUYAUtryXANeQCbyFygqdnDCcnDiFrKTGwH1otbAZkTvVGLWaviMDAAMzztcPOhGFlLP7dDWKKNE3C3rVSDP8wHxHFgA+AkLvWAJK8hXNBXZwCQRZMpaiMleN5FyHIxMAAxbPbeoyUhzyrNJHxyKIrAV9IxvTNzbVzewStdWSjWwAFG30rH0JcCY6V+PIHpItoZmPodQ16BdXNjIuv1qDed1\/9ABgQHO5EnP6DNACBNn43Y0KXEeka43Xym0Ffv8PMOQt6gHwStoAAAAASUVORK5CYII=\" alt=\"\"><\/span>\n        <p class=\"u-text u-text-1\" data-animation-name=\"customAnimationIn\" data-animation-duration=\"1000\"> With next-generation protection tools, it is now possible to protect yourself against these attacks and detect the methods used to prevent any intrusion, even before your organization is compromised. Beyond the tools, implementing cybersecurity best practices keep your data safe in case of an attack or human error. According to a recent survey of local businesses, most IT security risks come from the organization\u2019s employees! The vulnerability of companies is, therefore, as external as internal.&nbsp; &nbsp; &nbsp;<\/p>\n      <\/div>\n    <\/section>\n    <section class=\"u-align-center u-clearfix u-section-4\" id=\"sec-ebaf\">\n      <div class=\"u-clearfix u-expanded-width u-gutter-0 u-layout-wrap u-layout-wrap-1\">\n        <div class=\"u-layout\" style=\"\">\n          <div class=\"u-layout-row\" style=\"\">\n            <div class=\"u-align-left u-container-style u-image u-layout-cell u-left-cell u-size-30 u-size-xs-60 u-image-1\" src=\"\" data-image-width=\"1200\" data-image-height=\"948\" style=\"background-image: url(&quot;https:\/\/groupeti.ca\/wp-content\/uploads\/2022\/10\/designer-working-on-cloud-service-app-2022-01-30-01-26-09-utc.jpg&quot;);\">\n              <div class=\"u-container-layout u-valign-middle u-container-layout-1\" src=\"\"><\/div>\n            <\/div>\n            <div class=\"u-align-left u-container-style u-layout-cell u-palette-1-base u-right-cell u-size-30 u-size-xs-60 u-layout-cell-2\">\n              <div class=\"u-container-layout u-container-layout-2\">\n                <h2 class=\"u-text u-text-default u-text-1\" data-animation-name=\"customAnimationIn\" data-animation-duration=\"1000\"><b>Strengthen your defense levels<\/b>\n                <\/h2>\n                <p class=\"u-text u-text-2\" data-animation-name=\"customAnimationIn\" data-animation-duration=\"1000\"> In addition to a complete suite of IT tools designed to protect you against various threats, Groupe TI offers two simple services that allow you to increase your defense level quickly. Contact us today to learn more about phishing simulation, security auditing (or other services listed here). <br>\n                <\/p>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/section>\n    <section class=\"u-align-center u-black u-clearfix u-section-5\" src=\"\" id=\"sec-ad52\">\n      <div class=\"u-clearfix u-sheet u-valign-middle-lg u-valign-middle-md u-valign-middle-sm u-valign-middle-xs u-sheet-1\">\n        <h1 class=\"u-text u-title u-text-1\" data-animation-name=\"customAnimationIn\" data-animation-duration=\"1000\"> Contact us today to learn more<\/h1>\n        <ul class=\"u-align-left u-custom-list u-text u-text-2\" data-animation-name=\"customAnimationIn\" data-animation-duration=\"1000\">\n          <li>\n            <div class=\"u-list-icon u-text-palette-1-base\">\n              <div>\u276f<\/div>\n            <\/div>\n          <\/li>\n          <li>\n            <div class=\"u-list-icon u-text-palette-1-base\">\n              <div>\u276f<\/div>\n            <\/div>\n          <\/li>\n          <li>\n            <div class=\"u-list-icon u-text-palette-1-base\">\n              <div>\u276f<\/div>\n            <\/div>\n          <\/li>\n          <li>\n            <div class=\"u-list-icon u-text-palette-1-base\">\n              <div>\u276f<\/div>\n            <\/div>Phishing simulation\n          <\/li>\n          <li>\n            <div class=\"u-list-icon u-text-palette-1-base\">\n              <div>\u276f<\/div>\n            <\/div>Access rights management\n          <\/li>\n          <li>\n            <div class=\"u-list-icon u-text-palette-1-base\">\n              <div>\u276f<\/div>\n            <\/div>Anti-malware management\n          <\/li>\n          <li>\n            <div class=\"u-list-icon u-text-palette-1-base\">\n              <div>\u276f<\/div>\n            <\/div>&nbsp;Antivirus management\n          <\/li>\n          <li>\n            <div class=\"u-list-icon u-text-palette-1-base\">\n              <div>\u276f<\/div>\n            <\/div>Firewall management\n          <\/li>\n          <li>\n            <div class=\"u-list-icon u-text-palette-1-base\">\n              <div>\u276f<\/div>\n            <\/div>Password management\n          <\/li>\n          <li>\n            <div class=\"u-list-icon u-text-palette-1-base\">\n              <div>\u276f<\/div>\n            <\/div>Spam filtering\n          <\/li>\n          <li>\n            <div class=\"u-list-icon u-text-palette-1-base\">\n              <div>\u276f<\/div>\n            <\/div>Cybersecurity \/ Security Training\n          <\/li>\n          <li>\n            <div class=\"u-list-icon u-text-palette-1-base\">\n              <div>\u276f<\/div>\n            <\/div>Vulnerability Scanning\n          <\/li>\n          <li>\n            <div class=\"u-list-icon u-text-palette-1-base\">\n              <div>\u276f<\/div>\n            <\/div>Managed Security Operations Center (SOC)\n          <\/li>\n          <li>\n            <div class=\"u-list-icon u-text-palette-1-base\">\n              <div>\u276f<\/div>\n            <\/div>Security Audit&nbsp;<br>\n          <\/li>\n        <\/ul>\n        <a href=\"https:\/\/groupeti.ca\/en\/contact\/\" class=\"u-border-none u-btn u-button-style u-palette-1-base u-btn-1\" data-animation-name=\"customAnimationIn\" data-animation-duration=\"1000\">CONTACT US<\/a>\n      <\/div>\n    <\/section>\n    \n    \n    \n  \n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Computer security is much more than detecting and eliminating computer viruses,&nbsp;malware, or ransomware.&nbsp; With next-generation protection tools, it is now possible to protect yourself against these attacks and detect the methods used to prevent any intrusion, even before your [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-2122","page","type-page","status-publish","hentry"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"Martin Ouzilleau","author_link":"https:\/\/groupeti.ca\/en\/blogue\/author\/martin-ouzilleau\/"},"uagb_comment_info":0,"uagb_excerpt":"Cybersecurity Computer security is much more than detecting and eliminating computer viruses,&nbsp;malware, or ransomware.&nbsp; With next-generation protection tools, it is now possible to protect yourself against these attacks and detect the methods used to prevent any intrusion, even before your [&hellip;]","_links":{"self":[{"href":"https:\/\/groupeti.ca\/en\/wp-json\/wp\/v2\/pages\/2122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/groupeti.ca\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/groupeti.ca\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/groupeti.ca\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/groupeti.ca\/en\/wp-json\/wp\/v2\/comments?post=2122"}],"version-history":[{"count":0,"href":"https:\/\/groupeti.ca\/en\/wp-json\/wp\/v2\/pages\/2122\/revisions"}],"wp:attachment":[{"href":"https:\/\/groupeti.ca\/en\/wp-json\/wp\/v2\/media?parent=2122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}