{"id":934,"date":"2023-01-19T15:56:48","date_gmt":"2023-01-19T15:56:48","guid":{"rendered":"https:\/\/guide.trustvalley.swiss\/?post_type=chapter&#038;p=934"},"modified":"2023-05-28T06:53:46","modified_gmt":"2023-05-28T06:53:46","slug":"solutions-et-technologies-adaptees-aux-pme","status":"publish","type":"chapter","link":"https:\/\/guide.trustvalley.swiss\/fr\/chapitre\/solutions-et-technologies-adaptees-aux-pme\/","title":{"rendered":"Solutions et technologies adapt\u00e9es aux PME"},"content":{"rendered":"\n<p>Ce chapitre vise \u00e0 fournir des pistes concr\u00e8tes sur les technologies et solutions \u00e0 utiliser en mati\u00e8re de cybers\u00e9curit\u00e9 pour les PMEs. Il propose une r\u00e9flexion sur les sc\u00e9narios d\u2019attaques et s\u2019int\u00e9resse ensuite aux outils et solutions \u00e0 utiliser dans deux phases communes aux cyberattaques : la phase d\u2019acc\u00e8s initial et la phase d\u2019exploitation.<\/p>\n","protected":false},"featured_media":0,"template":"","categories":[],"searchablecategory":[],"class_list":["post-934","chapter","type-chapter","status-publish","hentry"],"taxonomy_info":[],"featured_image_src_large":false,"author_info":[],"comment_info":"","_links":{"self":[{"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/chapter\/934","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/chapter"}],"about":[{"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/types\/chapter"}],"wp:attachment":[{"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/media?parent=934"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/categories?post=934"},{"taxonomy":"searchablecategory","embeddable":true,"href":"https:\/\/guide.trustvalley.swiss\/fr\/wp-json\/wp\/v2\/searchablecategory?post=934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}