{"id":771,"date":"2020-11-14T17:21:26","date_gmt":"2020-11-14T16:21:26","guid":{"rendered":"https:\/\/www.informatique-chambery.fr\/?p=771"},"modified":"2024-05-11T15:06:56","modified_gmt":"2024-05-11T13:06:56","slug":"securisez-vos-systemes-dinformation","status":"publish","type":"post","link":"https:\/\/www.informatique-chambery.fr\/?p=771","title":{"rendered":"Entreprises"},"content":{"rendered":"<div class=\"entry-content\">\r\n<div class=\"pf-content\">\r\n<div class=\"siteorigin-widget-tinymce textwidget\">\r\n<h3 class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-591\" src=\"https:\/\/www.informatique-chambery.fr\/wp-content\/uploads\/2020\/01\/Bandeau-InformatiquePro2.jpg\" alt=\"\" width=\"930\" height=\"169\" \/><\/h3>\r\n<h2><span style=\"font-family: ginger;\"><a href=\"https:\/\/www.alpes-cyber.fr\/\" target=\"_blank\" rel=\"noopener\">S\u00e9curisez VOS syst\u00e8mes d&rsquo;information<\/a>\r\n<\/span><\/h2>\r\nAvec l&rsquo;\u00e9volution de nos soci\u00e9t\u00e9s, les entreprise ont une part digitale de plus en plus importante, sa richesse augmente avec ces donn\u00e9es \u00e0 forte valeur ajout\u00e9es. Il devient primordial de prot\u00e9ger ce patrimoine num\u00e9rique, de trouver un bon compromis entre les moyens allou\u00e9s et ces trois principes\u00a0 :\r\n<ul>\r\n \t<li>L<strong>a confidentialit\u00e9.<\/strong> C&rsquo;est l&rsquo;assurance que les personnes non autoris\u00e9es n&rsquo;acc\u00e8dent pas \u00e0 des informations sensibles<\/li>\r\n \t<li><strong>L&rsquo;int\u00e9grit\u00e9. <\/strong>Elle permet d&rsquo;\u00eatre s\u00fbr que les donn\u00e9es sont fiables et n&rsquo;ont pas \u00e9t\u00e9 modifi\u00e9es par des personnes non autoris\u00e9es<\/li>\r\n \t<li>L<strong>a disponibilit\u00e9.<\/strong>\u00a0C&rsquo;est l\u2019assurance qu&rsquo;il n&rsquo;y a pas de perturbation d&rsquo;un service ou de l&rsquo;accessibilit\u00e9 aux donn\u00e9es<\/li>\r\n<\/ul>\r\n<span style=\"font-family: Arial, Helvetica, sans-serif;\">La mise en \u0153uvre de dispositifs venant renforcer la s\u00e9curit\u00e9 num\u00e9rique est un gage de r\u00e9ussite et de confiance entre entreprises. Ainsi, l&rsquo;impl\u00e9mentation de solutions techniques \u00e9prouv\u00e9es, le respect de processus et protocoles s\u00fbrs augmenteront la fiabilit\u00e9 de votre syst\u00e8me d&rsquo;information et les rendront plus r\u00e9silients. Pour s\u00e9curisez vos syst\u00e8mes d&rsquo;information, il faut : <\/span>\r\n<ul>\r\n \t<li><span style=\"font-family: Arial, Helvetica, sans-serif;\">Avoir une bonne connaissance du syst\u00e8me existant\r\n<\/span><\/li>\r\n \t<li>Recenser les besoins, les ressources<\/li>\r\n \t<li>D\u00e9celer les points forts et points faibles de l&rsquo;infrastructure, des syst\u00e8mes<\/li>\r\n \t<li>Contr\u00f4ler l&rsquo;efficacit\u00e9 des applications et des nouvelles technologies impl\u00e9ment\u00e9es<\/li>\r\n \t<li>Am\u00e9liorer les processus m\u00e9tiers et transversaux (flux op\u00e9rationnels)<\/li>\r\n \t<li><span style=\"font-family: Arial, Helvetica, sans-serif;\">Accompagner les \u00e9quipes, sensibiliser ou former le personnel\r\n<\/span><\/li>\r\n<\/ul>\r\n<h3 class=\"wp-block-image size-large\"><strong><span style=\"font-family: ginger;\">\u00c9TUDE DE LA NORME ISO 27001 : Syst\u00e8mes de management de la s\u00e9curit\u00e9 de l&rsquo;information<\/span>\r\n<\/strong><\/h3>\r\n<iframe loading=\"lazy\" title=\"Post int\u00e9gr\u00e9\" src=\"https:\/\/www.linkedin.com\/embed\/feed\/update\/urn:li:share:6806566129641811968\" width=\"504\" height=\"721\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe>\r\n<div id=\"clipboard-target\"><\/div>\r\n<h3><span style=\"font-family: ginger;\">AUDIT des SYST\u00c8MES d\u2019information :<\/span><\/h3>\r\n<span style=\"font-family: Arial, Helvetica, sans-serif;\">Apr\u00e8s avoir d\u00e9finit un p\u00e9rim\u00e8tres pr\u00e9cis, bien conna\u00eetre le parc informatique est un point important de l&rsquo;audit. Ainsi un inventaire mat\u00e9riel et logiciel (<span style=\"color: #000080;\"><a style=\"color: #000080;\" href=\"https:\/\/demo.glpi-project.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">GLPI<\/a><\/span>) sera n\u00e9cessaire. De m\u00eame, il faudra conna\u00eetre tous les flux d&rsquo;\u00e9changes sur les r\u00e9seaux. Il est essentiel de rep\u00e9rer les donn\u00e9es cruciales de l&rsquo;entreprise et les dangers potentiels d&rsquo;une perte ou compromission de celles-ci. Ce patrimoine num\u00e9rique doit \u00eatre prot\u00e9ger.\r\n<\/span>\r\n\r\n<span style=\"font-family: Arial, Helvetica, sans-serif;\">C&rsquo;est pour cela que nous utiliserons des normes et r\u00e9glementations qui concourent \u00e0 la s\u00e9curit\u00e9 des syst\u00e8mes d&rsquo;information. Elles permettent une mise en \u0153uvre des bonnes pratiques et am\u00e9liorent donc l&rsquo;efficacit\u00e9 des syst\u00e8mes. Les sauvegardes, les PCA\/PRA sont \u00e0 v\u00e9rifier r\u00e9guli\u00e8rement, dans cette logique de modification et d&rsquo;am\u00e9lioration continue.\r\n<\/span>\r\n<h3><strong><span style=\"font-family: ginger;\">INSTALLATION Syst\u00e8mes et services\u00a0 :\u00a0<\/span>\r\n<\/strong><\/h3>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n\r\n<ul>\r\n \t<li><span style=\"font-family: Arial, Helvetica, sans-serif;\">Administration des <strong>services d&rsquo;infrastructure<\/strong> <strong>sur site<\/strong> : DNS, DHCP, AD, SMB, MAIL, TSE, VPN<\/span><\/li>\r\n \t<li><span style=\"font-family: Arial, Helvetica, sans-serif;\">Installation et configuration des serveurs, imprimantes, copieurs, Firewalls ou t\u00e9l\u00e9phonie <strong>sur site\r\n<\/strong><\/span><\/li>\r\n \t<li><span style=\"font-family: Arial, Helvetica, sans-serif;\">Installation de <strong>serveurs d\u00e9di\u00e9s<\/strong> ou <strong>VPS<\/strong> en mode<strong> Cloud<\/strong> : Site web, r\u00e9f\u00e9rencement, h\u00e9bergement en France, serveur <strong>sur mesure<\/strong> (processeurs, m\u00e9moire, espaces disques)<\/span><\/li>\r\n \t<li><span style=\"font-family: Arial, Helvetica, sans-serif;\">Maintenance et configuration des postes de travail et serveurs ou sous <strong>Microsoft, Linux ou Mac<\/strong><\/span><\/li>\r\n \t<li><span style=\"font-family: Arial, Helvetica, sans-serif;\">S\u00e9curisation des syst\u00e8mes et r\u00e9seaux par la mise en place d&rsquo;antivirus, pare-feu <\/span><\/li>\r\n \t<li><span style=\"font-family: Arial, Helvetica, sans-serif;\"><strong>Accompagnement sur l&rsquo;achat de mat\u00e9riels informatiques<\/strong> serveurs (DELL, HP, TERRA), stations de travail, ordinateurs fixes et portables professionnels<\/span><\/li>\r\n<\/ul>\r\n<a href=\"https:\/\/www.informatique-chambery.fr\/wp-content\/uploads\/2020\/11\/FicheInter.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-family: Arial, Helvetica, sans-serif; color: #000080;\"><strong>-&gt; Demande d&rsquo;intervention ICI<\/strong><\/span><\/a>\r\n<h3><span style=\"font-family: ginger;\">Strat\u00e9gie de s\u00e9curisation Syst\u00e8mes et r\u00e9seaux<\/span><\/h3>\r\n<span style=\"font-family: Arial, Helvetica, sans-serif;\">S\u00e9curisez vos syst\u00e8mes d&rsquo;information : Une bonne strat\u00e9gique et politique volontaire donnera une exploitation et installation de l&rsquo;infrastructure et des syst\u00e8mes en coh\u00e9rence avec les objectifs vis\u00e9s et l&rsquo;acceptabilit\u00e9 des risques.\r\n<\/span>\r\n<h3 class=\"wp-block-image size-large\"><strong><span style=\"font-family: ginger;\">INSTALLATION Logiciels PROFESSIONNELS :<\/span>\r\n<\/strong><\/h3>\r\n<h4><span style=\"font-family: ginger;\">LIBREs (pour collectivit\u00e9s, \u00e9tablissements scolaires et centres de formation, associations&#8230;)\r\n<\/span><\/h4>\r\n<ul>\r\n \t<li><span style=\"font-family: Arial, Helvetica, sans-serif;\"><strong><span style=\"color: #000080;\"><a style=\"color: #000080;\" href=\"https:\/\/www.dolibarr.org\/?lang=fr&amp;l=fr\" target=\"_blank\" rel=\"noopener noreferrer\">Dolibarr<\/a><\/span> :\u00a0<\/strong> Logiciel de gestion int\u00e9gr\u00e9 (PGI) d\u2019entreprises ou d\u2019associations. Il poss\u00e8des de nombreux modules pour une gestion commerciale, comptable et de production de l\u2019entreprise.\r\n<\/span><\/li>\r\n \t<li>Ainsi, il fera l\u2019affaire de nombreux ind\u00e9pendants, auto-entrepreneurs, TPE et associations.<\/li>\r\n \t<li><span style=\"font-family: Arial, Helvetica, sans-serif;\"><span style=\"color: #000080;\"><a style=\"color: #000080;\" href=\"https:\/\/owncloud.com\/fr\/produit\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Owncloud <\/strong><\/a><\/span>: Logiciel libre, d\u2019h\u00e9bergement et de partage de fichiers mais aussi plateforme de collaboration. Il synchronise les donn\u00e9es distantes et locales, et permet une sauvegarde automatique des donn\u00e9es via les r\u00e9seaux et Internet -&gt;<em> EX : Ubuntu avec le couple Owncloud\/D\u00e9j\u00e0 Dup = sauvegarde automatique en mode \u00ab\u00a0cloud\u00a0\u00bb + restauration \u00e0 la demande.<\/em>\r\n<\/span><\/li>\r\n \t<li><span style=\"font-family: Arial, Helvetica, sans-serif;\"><span style=\"color: #000080;\"><a style=\"color: #000080;\" href=\"https:\/\/glpi-project.org\/fr\/fonctionnalites\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>GLPI<\/strong> <\/a><\/span>: un logiciel libre d\u2019inventaire complet de parc, ticketing et support (Mat\u00e9riel, logiciel, suivi comptable et investissements&#8230;)\r\n<\/span><\/li>\r\n \t<li><span style=\"font-family: Arial, Helvetica, sans-serif;\"><span style=\"color: #000080;\"><a style=\"color: #000080;\" href=\"https:\/\/fr.libreoffice.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>LibreOffice <\/strong><\/a><\/span>: Suite bureautique Open Source compl\u00e8te (Traitement de texte, tableur, pr\u00e9sentation, base de donn\u00e9es,&#8230;)\r\n<\/span><\/li>\r\n \t<li><span style=\"font-family: Arial, Helvetica, sans-serif;\"><strong><a href=\"https:\/\/veyon.io\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #000080;\">Veyon<\/span><\/a> : <\/strong>Logiciel libre fork d&rsquo;Italc pour le suivi des postes de travail des \u00e9tudiants et le monitoring de classes enti\u00e8res.\r\n<\/span><\/li>\r\n<\/ul>\r\n<h4><\/h4>\r\n<h4>Propri\u00e9taires (pour TPE &#8211; associations&#8230;)<\/h4>\r\n<ul>\r\n \t<li><span style=\"font-family: Arial, Helvetica, sans-serif;\">Suite Microsoft Office, Antivirus Sophos, Bitdefender, Symantec, DAO Solidworkds, Autocad &#8230;\/&#8230;<\/span><\/li>\r\n \t<li><span style=\"font-family: Arial, Helvetica, sans-serif;\">Logiciels m\u00e9tiers : Magnus, NOE,\u00a0<\/span><\/li>\r\n<\/ul>\r\n<a href=\"https:\/\/www.informatique-chambery.fr\/wp-content\/uploads\/2020\/11\/FicheInter.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-family: Arial, Helvetica, sans-serif;\"><strong><span style=\"color: #000080;\">-&gt; Demande d&rsquo;intervention ICI<\/span><\/strong><\/span><\/a>\r\n\r\n&#8230;\/&#8230;\r\n\r\n<!--more-->\r\n<h3 style=\"text-align: center;\"><span style=\"font-family: ginger;\"><strong>Devis par mail : <a href=\"mailto:support@informatique-chambery.fr\">support@informatique-chambery.fr<\/a><\/strong><\/span><\/h3>\r\n<h3 style=\"text-align: center;\"><span style=\"font-family: ginger;\"><strong>T\u00e9l : 09.72.57.79.25 <\/strong><\/span><\/h3>\r\n&nbsp;<!-- \/wp:post-content -->","protected":false},"excerpt":{"rendered":"<p>S\u00e9curisez VOS syst\u00e8mes d&rsquo;information Avec l&rsquo;\u00e9volution de nos soci\u00e9t\u00e9s, les entreprise ont une part digitale de plus en plus importante, sa richesse augmente avec ces donn\u00e9es \u00e0 forte valeur ajout\u00e9es. Il devient primordial de prot\u00e9ger ce patrimoine num\u00e9rique, de trouver un bon compromis entre les moyens allou\u00e9s et ces trois principes\u00a0 : La confidentialit\u00e9. C&rsquo;est [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"gallery","meta":{"footnotes":""},"categories":[13,6],"tags":[],"class_list":["post-771","post","type-post","status-publish","format-gallery","hentry","category-clients","category-maintenance","post_format-post-format-gallery"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Entreprises | S\u00e9curisez vos syst\u00e8mes d&#039;information<\/title>\n<meta name=\"description\" content=\"Entreprises : s\u00e9curisez vos syst\u00e8mes d&#039;information. Accompagnement des TPE\/PME dans la mise en \u0153uvre technique et dans le respect des normes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.informatique-chambery.fr\/?p=771\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Entreprises | S\u00e9curisez vos syst\u00e8mes d&#039;information\" \/>\n<meta name=\"twitter:description\" content=\"Entreprises : s\u00e9curisez vos syst\u00e8mes d&#039;information. Accompagnement des TPE\/PME dans la mise en \u0153uvre technique et dans le respect des normes.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.informatique-chambery.fr\/wp-content\/uploads\/2020\/01\/Bandeau-InformatiquePro2.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@WwwMicrosystem\" \/>\n<meta name=\"twitter:site\" content=\"@WwwMicrosystem\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Miha\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/?p=771#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/?p=771\"},\"author\":{\"name\":\"Miha\",\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/#\\\/schema\\\/person\\\/2ee0c6ed1ff11c482bb05b1f10c5ddbe\"},\"headline\":\"Entreprises\",\"datePublished\":\"2020-11-14T16:21:26+00:00\",\"dateModified\":\"2024-05-11T13:06:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/?p=771\"},\"wordCount\":765,\"publisher\":{\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/?p=771#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/Bandeau-InformatiquePro2.jpg\",\"articleSection\":[\"clients\",\"Maintenance\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/?p=771\",\"url\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/?p=771\",\"name\":\"Entreprises | S\u00e9curisez vos syst\u00e8mes d'information\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/?p=771#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/?p=771#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/Bandeau-InformatiquePro2.jpg\",\"datePublished\":\"2020-11-14T16:21:26+00:00\",\"dateModified\":\"2024-05-11T13:06:56+00:00\",\"description\":\"Entreprises : s\u00e9curisez vos syst\u00e8mes d'information. Accompagnement des TPE\\\/PME dans la mise en \u0153uvre technique et dans le respect des normes.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/?p=771#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.informatique-chambery.fr\\\/?p=771\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/?p=771#primaryimage\",\"url\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/Bandeau-InformatiquePro2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/Bandeau-InformatiquePro2.jpg\",\"width\":1100,\"height\":200,\"caption\":\"Informatique Pro Chamb\u00e9ry\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/?p=771#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Entreprises\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/#website\",\"url\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/\",\"name\":\"Microsystem : Informatique Chamb\u00e9ry\",\"description\":\"Installation | Maintenance  |  S\u00e9curit\u00e9 syst\u00e8mes et r\u00e9seaux | t\u00e9l : 09.72.57.79.25\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/#organization\",\"name\":\"Informatique Pro\",\"url\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/Capture-du-2018-12-29-21-55-59.png\",\"contentUrl\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/Capture-du-2018-12-29-21-55-59.png\",\"width\":747,\"height\":342,\"caption\":\"Informatique Pro\"},\"image\":{\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/WwwMicrosystem\",\"https:\\\/\\\/fr.linkedin.com\\\/in\\\/michel-tepes-596759bb\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/#\\\/schema\\\/person\\\/2ee0c6ed1ff11c482bb05b1f10c5ddbe\",\"name\":\"Miha\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Entreprises | S\u00e9curisez vos syst\u00e8mes d'information","description":"Entreprises : s\u00e9curisez vos syst\u00e8mes d'information. Accompagnement des TPE\/PME dans la mise en \u0153uvre technique et dans le respect des normes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.informatique-chambery.fr\/?p=771","twitter_card":"summary_large_image","twitter_title":"Entreprises | S\u00e9curisez vos syst\u00e8mes d'information","twitter_description":"Entreprises : s\u00e9curisez vos syst\u00e8mes d'information. Accompagnement des TPE\/PME dans la mise en \u0153uvre technique et dans le respect des normes.","twitter_image":"https:\/\/www.informatique-chambery.fr\/wp-content\/uploads\/2020\/01\/Bandeau-InformatiquePro2.jpg","twitter_creator":"@WwwMicrosystem","twitter_site":"@WwwMicrosystem","twitter_misc":{"\u00c9crit par":"Miha","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.informatique-chambery.fr\/?p=771#article","isPartOf":{"@id":"https:\/\/www.informatique-chambery.fr\/?p=771"},"author":{"name":"Miha","@id":"https:\/\/www.informatique-chambery.fr\/#\/schema\/person\/2ee0c6ed1ff11c482bb05b1f10c5ddbe"},"headline":"Entreprises","datePublished":"2020-11-14T16:21:26+00:00","dateModified":"2024-05-11T13:06:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.informatique-chambery.fr\/?p=771"},"wordCount":765,"publisher":{"@id":"https:\/\/www.informatique-chambery.fr\/#organization"},"image":{"@id":"https:\/\/www.informatique-chambery.fr\/?p=771#primaryimage"},"thumbnailUrl":"https:\/\/www.informatique-chambery.fr\/wp-content\/uploads\/2020\/01\/Bandeau-InformatiquePro2.jpg","articleSection":["clients","Maintenance"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.informatique-chambery.fr\/?p=771","url":"https:\/\/www.informatique-chambery.fr\/?p=771","name":"Entreprises | S\u00e9curisez vos syst\u00e8mes d'information","isPartOf":{"@id":"https:\/\/www.informatique-chambery.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.informatique-chambery.fr\/?p=771#primaryimage"},"image":{"@id":"https:\/\/www.informatique-chambery.fr\/?p=771#primaryimage"},"thumbnailUrl":"https:\/\/www.informatique-chambery.fr\/wp-content\/uploads\/2020\/01\/Bandeau-InformatiquePro2.jpg","datePublished":"2020-11-14T16:21:26+00:00","dateModified":"2024-05-11T13:06:56+00:00","description":"Entreprises : s\u00e9curisez vos syst\u00e8mes d'information. Accompagnement des TPE\/PME dans la mise en \u0153uvre technique et dans le respect des normes.","breadcrumb":{"@id":"https:\/\/www.informatique-chambery.fr\/?p=771#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.informatique-chambery.fr\/?p=771"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.informatique-chambery.fr\/?p=771#primaryimage","url":"https:\/\/www.informatique-chambery.fr\/wp-content\/uploads\/2020\/01\/Bandeau-InformatiquePro2.jpg","contentUrl":"https:\/\/www.informatique-chambery.fr\/wp-content\/uploads\/2020\/01\/Bandeau-InformatiquePro2.jpg","width":1100,"height":200,"caption":"Informatique Pro Chamb\u00e9ry"},{"@type":"BreadcrumbList","@id":"https:\/\/www.informatique-chambery.fr\/?p=771#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.informatique-chambery.fr\/"},{"@type":"ListItem","position":2,"name":"Entreprises"}]},{"@type":"WebSite","@id":"https:\/\/www.informatique-chambery.fr\/#website","url":"https:\/\/www.informatique-chambery.fr\/","name":"Microsystem : Informatique Chamb\u00e9ry","description":"Installation | Maintenance  |  S\u00e9curit\u00e9 syst\u00e8mes et r\u00e9seaux | t\u00e9l : 09.72.57.79.25","publisher":{"@id":"https:\/\/www.informatique-chambery.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.informatique-chambery.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.informatique-chambery.fr\/#organization","name":"Informatique Pro","url":"https:\/\/www.informatique-chambery.fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.informatique-chambery.fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.informatique-chambery.fr\/wp-content\/uploads\/2019\/01\/Capture-du-2018-12-29-21-55-59.png","contentUrl":"https:\/\/www.informatique-chambery.fr\/wp-content\/uploads\/2019\/01\/Capture-du-2018-12-29-21-55-59.png","width":747,"height":342,"caption":"Informatique Pro"},"image":{"@id":"https:\/\/www.informatique-chambery.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/WwwMicrosystem","https:\/\/fr.linkedin.com\/in\/michel-tepes-596759bb"]},{"@type":"Person","@id":"https:\/\/www.informatique-chambery.fr\/#\/schema\/person\/2ee0c6ed1ff11c482bb05b1f10c5ddbe","name":"Miha"}]}},"_links":{"self":[{"href":"https:\/\/www.informatique-chambery.fr\/index.php?rest_route=\/wp\/v2\/posts\/771","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.informatique-chambery.fr\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.informatique-chambery.fr\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.informatique-chambery.fr\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.informatique-chambery.fr\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=771"}],"version-history":[{"count":96,"href":"https:\/\/www.informatique-chambery.fr\/index.php?rest_route=\/wp\/v2\/posts\/771\/revisions"}],"predecessor-version":[{"id":1181,"href":"https:\/\/www.informatique-chambery.fr\/index.php?rest_route=\/wp\/v2\/posts\/771\/revisions\/1181"}],"wp:attachment":[{"href":"https:\/\/www.informatique-chambery.fr\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=771"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.informatique-chambery.fr\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=771"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.informatique-chambery.fr\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=771"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}