{"id":26238,"date":"2016-07-01T16:28:26","date_gmt":"2016-07-01T14:28:26","guid":{"rendered":"http:\/\/e3mag.com\/?p=26238"},"modified":"2019-04-01T09:39:13","modified_gmt":"2019-04-01T07:39:13","slug":"une-incertitude-couteuse","status":"publish","type":"post","link":"https:\/\/e3mag.com\/fr\/teure-unsicherheit\/","title":{"rendered":"Incertitude co\u00fbteuse"},"content":{"rendered":"<p>Selon le rapport \"2015 Cost of Cyber Crime Study : Germany\" de l'institut am\u00e9ricain Ponemon (Michigan), les co\u00fbts par incident se situent entre 450.000 euros et 21 millions d'euros.<\/p>\n<p>L'Allemagne se trouve ainsi en t\u00eate de la comparaison internationale - derri\u00e8re les Etats-Unis. Un sondage de l'institut d'\u00e9tudes de march\u00e9 Bitkom Research montre en outre que la moiti\u00e9 des entreprises interrog\u00e9es ont \u00e9t\u00e9 victimes d'une cyberattaque en 2015.<\/p>\n<p>En outre, 28 % indiquent qu'ils ont peut-\u00eatre \u00e9t\u00e9 attaqu\u00e9s. Il devient de plus en plus difficile de se d\u00e9fendre contre les cyber-attaques et pratiquement toutes les entreprises courent le risque d'\u00eatre attaqu\u00e9es.<\/p>\n<p>La question essentielle est de savoir comment communiquer dans une telle situation. Everbridge, l'un des leaders mondiaux en mati\u00e8re de communication critique unifi\u00e9e en cas d'urgence, d'incident ou de crise, donne les conseils suivants dans ce contexte :<\/p>\n<p>Les risques pour la continuit\u00e9 des activit\u00e9s sont de plus en plus importants. Il est donc d'autant plus important pour les entreprises de d\u00e9velopper un plan fiable de communication de crise en cas d'urgence.<\/p>\n<p>En 2015, le temps n\u00e9cessaire pour r\u00e9soudre avec succ\u00e8s une cyberattaque et la surmonter compl\u00e8tement \u00e9tait en moyenne de 23 jours. Les entreprises devraient avoir un plan concernant les possibilit\u00e9s de communication pendant cette p\u00e9riode.<\/p>\n<p>La communication par e-mail n'est pas une option fiable en cas de panne, car elle pourrait \u00eatre compromise. Le risque de cyberattaques pour la continuit\u00e9 des activit\u00e9s d\u00e9passe de loin la probabilit\u00e9 de catastrophes naturelles, de pannes d'\u00e9lectricit\u00e9 ou de pannes informatiques.<\/p>","protected":false},"excerpt":{"rendered":"<p>En 2015, le co\u00fbt des cyberattaques contre les entreprises allemandes, tous secteurs confondus, s'est \u00e9lev\u00e9 \u00e0 plus de 6,6 millions d'euros par attaque.<\/p>","protected":false},"author":38,"featured_media":26239,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[2,1609],"tags":[15055],"coauthors":[19920],"class_list":["post-26238","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-nachrichten","category-mag1607","tag-cyberattacken","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_365418938.jpg",1000,480,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_365418938-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_365418938.jpg",400,192,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_365418938-768x369.jpg",768,369,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_365418938.jpg",1000,480,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_365418938-100x48.jpg",100,48,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_365418938-480x230.jpg",480,230,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_365418938-640x307.jpg",640,307,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_365418938-720x346.jpg",720,346,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_365418938-960x461.jpg",960,461,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_365418938.jpg",1000,480,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_365418938.jpg",1000,480,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_365418938.jpg",1000,480,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_365418938.jpg",1000,480,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_365418938.jpg",1000,480,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_365418938.jpg",18,9,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_365418938.jpg",1000,480,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_365418938.jpg",1000,480,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_365418938.jpg",1000,480,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_365418938.jpg",600,288,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_365418938.jpg",600,288,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_365418938-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_365418938-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_365418938-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_365418938-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_365418938-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Die Kosten durch Cyberattacken auf deutsche Unternehmen betrugen im Jahr 2015 branchen\u00fcbergreifend mehr als 6,6 Millionen Euro pro Angriff.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/fr\/category\/sap-nachrichten\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/fr\/category\/mag1607\/\" rel=\"category tag\">MAG 16-07<\/a>","author_info_v2":{"name":"Magazine E-3","url":"https:\/\/e3mag.com\/fr\/author\/e-3-magazin\/"},"comments_num_v2":"0 commentaire","_links":{"self":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/26238","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/comments?post=26238"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/26238\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media\/26239"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media?parent=26238"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/categories?post=26238"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/tags?post=26238"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/coauthors?post=26238"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}