{"id":169,"date":"2020-09-12T14:37:31","date_gmt":"2020-09-12T03:37:31","guid":{"rendered":"https:\/\/www.ima.nc\/?page_id=169"},"modified":"2023-09-14T15:07:17","modified_gmt":"2023-09-14T04:07:17","slug":"ima-informatique","status":"publish","type":"page","link":"https:\/\/www.ima.nc\/","title":{"rendered":"IMA Informatique"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"169\" class=\"elementor elementor-169\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fb7a5e7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fb7a5e7\" data-element_type=\"section\" id=\"accueil\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0d56329\" data-id=\"0d56329\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8b077ef elementor-widget elementor-widget-slider_revolution\" data-id=\"8b077ef\" data-element_type=\"widget\" data-widget_type=\"slider_revolution.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class=\"wp-block-themepunch-revslider\">\n\t\t\t<!-- START IMA INFORMATIQUE REVOLUTION SLIDER 6.5.19 --><p class=\"rs-p-wp-fix\"><\/p>\n\t\t\t<rs-module-wrap id=\"rev_slider_1_1_wrapper\" data-source=\"gallery\" style=\"visibility:hidden;background:transparent;padding:0;\">\n\t\t\t\t<rs-module id=\"rev_slider_1_1\" style=\"\" data-version=\"6.5.19\">\n\t\t\t\t\t<rs-slides>\n\t\t\t\t\t\t<rs-slide style=\"position: absolute;\" data-key=\"rs-1\" data-title=\"Slide\" data-anim=\"ms:500;d:10;f:slidebased;\" data-in=\"o:0;y:(-50%);sx:0.7;sy:0.7;m:true;e:power4.inOut;row:5;\" data-out=\"a:false;\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" src=\"\/\/www.ima.nc\/wp-content\/plugins\/revslider\/public\/assets\/assets\/dummy.png\" alt=\"\" title=\"IMA INFORMATIQUE\" width=\"1920\" height=\"1200\" class=\"rev-slidebg tp-rs-img rs-lazyload\" data-lazyload=\"\/\/www.ima.nc\/wp-content\/uploads\/2020\/09\/IMA-INFORMATIQUE.jpg\" data-no-retina>\n<!--\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-1-slide-1-layer-2\" \n\t\t\t\t\t\t\t\tclass=\"tp-shape tp-shapewrapper\"\n\t\t\t\t\t\t\t\tdata-type=\"shape\"\n\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:c;yo:375px,295px,295px,245px;\"\n\t\t\t\t\t\t\t\tdata-text=\"fw:600;a:inherit;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:360px;h:3px;\"\n\t\t\t\t\t\t\t\tdata-frame_0=\"bri:100%;blu:10px;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"rZ:45;e:back.inOut;st:700;sp:2000;sR:700;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;rZ:-45deg;e:back.inOut;st:w;sp:600;sR:6300;blu:10px;\"\n\t\t\t\t\t\t\t\tdata-loop_0=\"y:10;\"\n\t\t\t\t\t\t\t\tdata-loop_999=\"y:-10;sp:10000;yym:t;yys:t;yyf:t;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:6;background-color:#ffffff;\"\n\t\t\t\t\t\t\t> \n\t\t\t\t\t\t\t<\/rs-layer><!--\n\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-1-slide-1-layer-11\" \n\t\t\t\t\t\t\t\tclass=\"tp-shape tp-shapewrapper\"\n\t\t\t\t\t\t\t\tdata-type=\"shape\"\n\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:c;yo:375px,295px,295px,245px;\"\n\t\t\t\t\t\t\t\tdata-text=\"fw:600;a:inherit;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:360px;h:3px;\"\n\t\t\t\t\t\t\t\tdata-frame_0=\"bri:100%;blu:10px;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"rZ:-45;e:back.inOut;st:300;sp:2000;sR:300;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;rZ:0deg;e:back.inOut;st:w;sp:600;sR:6700;blu:10px;\"\n\t\t\t\t\t\t\t\tdata-loop_0=\"y:-10;\"\n\t\t\t\t\t\t\t\tdata-loop_999=\"y:10;sp:10000;yym:t;yys:t;yyf:t;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:5;background-color:#ffffff;\"\n\t\t\t\t\t\t\t> \n\t\t\t\t\t\t\t<\/rs-layer><!--\n-->\t\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t\t<rs-slide style=\"position: absolute;\" data-key=\"rs-8\" data-title=\"Slide\" data-anim=\"ms:500;d:10;f:slidebased;\" data-in=\"o:0;y:(-50%);sx:0.7;sy:0.7;m:true;e:power4.inOut;row:5;\" data-out=\"a:false;\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" src=\"\/\/www.ima.nc\/wp-content\/plugins\/revslider\/public\/assets\/assets\/dummy.png\" alt=\"\" title=\"IMA INFORMATIQUE\" width=\"1920\" height=\"1200\" class=\"rev-slidebg tp-rs-img rs-lazyload\" data-lazyload=\"\/\/www.ima.nc\/wp-content\/uploads\/2020\/09\/IMA-INFORMATIQUE.jpg\" data-no-retina>\n<!--\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-1-slide-8-layer-2\" \n\t\t\t\t\t\t\t\tclass=\"tp-shape tp-shapewrapper\"\n\t\t\t\t\t\t\t\tdata-type=\"shape\"\n\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:c;yo:375px,295px,295px,245px;\"\n\t\t\t\t\t\t\t\tdata-text=\"fw:600;a:inherit;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:360px;h:3px;\"\n\t\t\t\t\t\t\t\tdata-frame_0=\"bri:100%;blu:10px;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"rZ:45;e:back.inOut;st:700;sp:2000;sR:700;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;rZ:-45deg;e:back.inOut;st:w;sp:600;sR:6300;blu:10px;\"\n\t\t\t\t\t\t\t\tdata-loop_0=\"y:10;\"\n\t\t\t\t\t\t\t\tdata-loop_999=\"y:-10;sp:10000;yym:t;yys:t;yyf:t;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:6;background-color:#ffffff;\"\n\t\t\t\t\t\t\t> \n\t\t\t\t\t\t\t<\/rs-layer><!--\n\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-1-slide-8-layer-11\" \n\t\t\t\t\t\t\t\tclass=\"tp-shape tp-shapewrapper\"\n\t\t\t\t\t\t\t\tdata-type=\"shape\"\n\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:c;yo:375px,295px,295px,245px;\"\n\t\t\t\t\t\t\t\tdata-text=\"fw:600;a:inherit;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:360px;h:3px;\"\n\t\t\t\t\t\t\t\tdata-frame_0=\"bri:100%;blu:10px;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"rZ:-45;e:back.inOut;st:300;sp:2000;sR:300;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;rZ:0deg;e:back.inOut;st:w;sp:600;sR:6700;blu:10px;\"\n\t\t\t\t\t\t\t\tdata-loop_0=\"y:-10;\"\n\t\t\t\t\t\t\t\tdata-loop_999=\"y:10;sp:10000;yym:t;yys:t;yyf:t;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:5;background-color:#ffffff;\"\n\t\t\t\t\t\t\t> \n\t\t\t\t\t\t\t<\/rs-layer><!--\n-->\t\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t<\/rs-slides>\n\t\t\t\t\t<rs-static-layers class=\"rs-stl-visible\"><!--\n\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-1-slide-1-layer-10\" \n\t\t\t\t\t\t\t\tclass=\"rs-layer-static\"\n\t\t\t\t\t\t\t\tdata-type=\"image\"\n\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:c;yo:79px,65px,49px,30px;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:20,16,12,7;l:0,20,15,9;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:333px,274px,208px,128px;h:202px,166px,126px,77px;\"\n\t\t\t\t\t\t\t\tdata-onslides=\"s:1;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"sp:1280;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;sR:720;\"\n\t\t\t\t\t\t\t\tdata-loop_0=\"x:-550px;\"\n\t\t\t\t\t\t\t\tdata-loop_999=\"x:550px;sp:6500;st:0;e:slow;yym:t;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:11;\"\n\t\t\t\t\t\t\t><img decoding=\"async\" src=\"\/\/www.ima.nc\/wp-content\/plugins\/revslider\/public\/assets\/assets\/dummy.png\" alt=\"\" class=\"tp-rs-img rs-lazyload\" width=\"500\" height=\"304\" data-lazyload=\"\/\/www.ima.nc\/wp-content\/uploads\/2020\/09\/LOGO-IMA-INFORMATIQUE-TEXTE.png\" data-no-retina> \n\t\t\t\t\t\t\t<\/rs-layer><!--\n\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-1-slide-1-layer-20\" \n\t\t\t\t\t\t\t\tclass=\"rs-layer-static\"\n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:c;yo:310px,230px,240px,208px;\"\n\t\t\t\t\t\t\t\tdata-text=\"s:50,50,40,25;l:60,60,50,35;fw:600;a:center;\"\n\t\t\t\t\t\t\t\tdata-onslides=\"s:1;\"\n\t\t\t\t\t\t\t\tdata-corners=\"rs-fcrt;rs-bcrt;\"\n\t\t\t\t\t\t\t\tdata-padding=\"t:5,5,5,2;l:10;\"\n\t\t\t\t\t\t\t\tdata-frame_0=\"x:-150px;rY:-45deg;blu:10px;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"e:back.inOut;st:500;sp:1000;sR:500;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"x:150px;o:0;rY:45deg;st:w;sp:600;sR:500;blu:10px;\"\n\t\t\t\t\t\t\t\tdata-loop_0=\"x:-20;\"\n\t\t\t\t\t\t\t\tdata-loop_999=\"x:20;sp:20000;yym:t;yys:t;yyf:t;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:7;background-color:#931a1a;font-family:'Poppins';\"\n\t\t\t\t\t\t\t>I.M.A. donne de la clart\u00e9  \n\t\t\t\t\t\t\t<\/rs-layer><!--\n\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-1-slide-1-layer-21\" \n\t\t\t\t\t\t\t\tclass=\"rs-layer-static\"\n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:c;yo:378px,298px,298px,248px;\"\n\t\t\t\t\t\t\t\tdata-text=\"s:50,50,40,25;l:60,60,50,35;fw:600;a:center;\"\n\t\t\t\t\t\t\t\tdata-onslides=\"s:1;\"\n\t\t\t\t\t\t\t\tdata-corners=\"rs-fcr;rs-bcr;\"\n\t\t\t\t\t\t\t\tdata-padding=\"t:5,5,5,2;l:10;\"\n\t\t\t\t\t\t\t\tdata-frame_0=\"x:150px;rY:45deg;blu:10px;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"e:back.inOut;st:900;sp:1000;sR:900;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"x:-150px;o:0;rY:-45deg;st:w;sp:600;sR:100;blu:10px;\"\n\t\t\t\t\t\t\t\tdata-loop_0=\"x:20;\"\n\t\t\t\t\t\t\t\tdata-loop_999=\"x:-20;sp:20000;yym:t;yys:t;yyf:t;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:8;background-color:#931a1a;font-family:'Poppins';\"\n\t\t\t\t\t\t\t>\u00e0 votre gestion informatique \n\t\t\t\t\t\t\t<\/rs-layer><!--\n\n\t\t\t\t\t\t\t--><a\n\t\t\t\t\t\t\t\tid=\"slider-1-slide-1-layer-22\" \n\t\t\t\t\t\t\t\tclass=\"rs-layer rs-layer-static\"\n\t\t\t\t\t\t\t\thref=\"#menu\" target=\"_blank\" rel=\"noopener\"\n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:c;yo:730px,650px,650px,570px;\"\n\t\t\t\t\t\t\t\tdata-text=\"l:28;ls:5px;fw:700;a:center;\"\n\t\t\t\t\t\t\t\tdata-onslides=\"s:1;\"\n\t\t\t\t\t\t\t\tdata-padding=\"r:2;l:7;\"\n\t\t\t\t\t\t\t\tdata-border=\"bos:solid;boc:#931a1a;bow:3px,3px,3px,3px;\"\n\t\t\t\t\t\t\t\tdata-frame_0=\"y:100px;rX:-45deg;blu:10px;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"e:back.inOut;st:1700;sp:1000;sR:1700;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"y:50px;o:0;rX:45deg;st:w;sp:600;sR:-700;blu:10px;\"\n\t\t\t\t\t\t\t\tdata-frame_hover=\"sX:1.1;sY:1.1;c:#fff;bgc:transparent;boc:#fff;bos:solid;bow:3px,3px,3px,3px;oX:50;oY:50;sp:200;e:power1.inOut;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:10;background-color:rgba(0,122,255,0.3);font-family:'Poppins';cursor:pointer;\"\n\t\t\t\t\t\t\t>Cliquez ici pour en savoir plus \n\t\t\t\t\t\t\t<\/a><!--\n\t\t\t\t\t--><\/rs-static-layers>\n\t\t\t\t<\/rs-module>\n\t\t\t\t<script>\n\t\t\t\t\tsetREVStartSize({c: 'rev_slider_1_1',rl:[1240,1024,778,480],el:[868,768,960,720],gw:[1240,1024,778,480],gh:[868,768,960,720],type:'standard',justify:'',layout:'fullscreen',offsetContainer:'',offset:'',mh:\"0\"});if (window.RS_MODULES!==undefined && window.RS_MODULES.modules!==undefined && window.RS_MODULES.modules[\"revslider11\"]!==undefined) {window.RS_MODULES.modules[\"revslider11\"].once = false;window.revapi1 = undefined;if (window.RS_MODULES.checkMinimal!==undefined) window.RS_MODULES.checkMinimal()}\n\t\t\t\t<\/script>\n\t\t\t<\/rs-module-wrap>\n\t\t\t<!-- END REVOLUTION SLIDER -->\n<\/div>\r\n\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<header class=\"elementor-section elementor-top-section elementor-element elementor-element-673906db elementor-section-full_width elementor-section-content-middle elementor-section-height-min-height elementor-section-height-default elementor-section-items-middle\" data-id=\"673906db\" data-element_type=\"section\" id=\"menu\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-29432e53\" data-id=\"29432e53\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ce948a0 elementor-widget elementor-widget-image\" data-id=\"ce948a0\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ima.nc\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"600\" height=\"481\" src=\"https:\/\/www.ima.nc\/wp-content\/uploads\/2020\/09\/logo-ima.jpg\" class=\"attachment-large size-large wp-image-179\" alt=\"\" srcset=\"https:\/\/www.ima.nc\/wp-content\/uploads\/2020\/09\/logo-ima.jpg 600w, https:\/\/www.ima.nc\/wp-content\/uploads\/2020\/09\/logo-ima-300x241.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b72c81c\" data-id=\"b72c81c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/header>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1c0f77b2 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1c0f77b2\" data-element_type=\"section\" id=\"actualite\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2862a26\" data-id=\"2862a26\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-28ecdfeb animated-slow elementor-invisible\" data-id=\"28ecdfeb\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInRight&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-184629b5 elementor-widget elementor-widget-heading\" data-id=\"184629b5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Actualit\u00e9 <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f910314 elementor-widget elementor-widget-toggle\" data-id=\"3f910314\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1061\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1061\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Recrudescence des ransomwares<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1061\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1061\"><p>Selon la National Cyber Security Alliance, une petite entreprise sur cinq est victime de la cybercriminalit\u00e9 chaque ann\u00e9e. Parmi les entreprises touch\u00e9es, environ 60 % font faillite dans les six mois qui suivent l\u2019attaque.<\/p><p>Ces chiffres mettent \u00e0 mal l\u2019id\u00e9e selon laquelle les cybercriminels concentrent leurs efforts sur les grandes entreprises. En r\u00e9alit\u00e9, la seule chose qui dicte la conduite des hackers est la vuln\u00e9rabilit\u00e9. La p\u00e9riode de crise li\u00e9e au Coronavirus a r\u00e9v\u00e9l\u00e9 l\u2019importance des aspects humain dans la propagation des attaques informatiques.<\/p><p>Avec la g\u00e9n\u00e9ralisation du t\u00e9l\u00e9travail, l\u2019abandon de l\u2019infrastructure informatique centralis\u00e9e en un seul lieu a pouss\u00e9 certains collaborateurs \u00e0 utiliser de vieux PC personnels, \u00e0 se fier \u00e0 des logiciels vuln\u00e9rables et, en g\u00e9n\u00e9ral, \u00e0 ne pas suivre les pratiques en mati\u00e8re de s\u00e9curit\u00e9, notamment en ce qui concerne leur utilisation du courrier \u00e9lectronique et des m\u00e9dias sociaux.<\/p><p>Selon la start-up britannique Tessian, 52% des collaborateurs pensent pouvoir se permettre des comportements plus risqu\u00e9s lorsqu\u2019ils travaillent \u00e0 domicile, par exemple en partageant des fichiers confidentiels par email.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-507cae59 elementor-section-content-middle elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"507cae59\" data-element_type=\"section\" id=\"teletravail\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4570effd animated-slow elementor-invisible\" data-id=\"4570effd\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;,&quot;animation_delay&quot;:1000}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1e7f7fc5 elementor-widget elementor-widget-heading\" data-id=\"1e7f7fc5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">T\u00e9l\u00e9travail <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51556b84 elementor-widget elementor-widget-text-editor\" data-id=\"51556b84\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Le t\u00e9l\u00e9travail s\u2019inscrit dans une d\u00e9marche d\u2019am\u00e9lioration de l\u2019organisation du travail et s\u2019appuie sur des technologies num\u00e9riques.<br \/><br \/>Il s\u2019agit d\u2019un travail effectu\u00e9 hors des locaux de l\u2019employeur de fa\u00e7on r\u00e9guli\u00e8re et volontaire.<br \/><br \/>Le t\u00e9l\u00e9travail consiste pour le t\u00e9l\u00e9travailleur\u00a0:<\/p><ul><li>\u00e0 exercer, de fa\u00e7on r\u00e9guli\u00e8re et volontaire, un travail qui aurait pu \u00eatre effectu\u00e9 dans les locaux de l\u2019employeur, hors de ces locaux.<\/li><\/ul><ul><li>\u00e0 utiliser les technologies de l\u2019information et de la communication (ordinateurs fixes et portables, Internet, t\u00e9l\u00e9phonie mobile, tablette, fax, etc.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-34eca217\" data-id=\"34eca217\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2d1a9591 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2d1a9591\" data-element_type=\"section\" id=\"messagerie\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-60527968\" data-id=\"60527968\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1682fa26 animated-slow elementor-invisible\" data-id=\"1682fa26\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInRight&quot;,&quot;animation_delay&quot;:1000}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-69402bd1 elementor-widget elementor-widget-heading\" data-id=\"69402bd1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Messagerie d\u00e9di\u00e9e <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-48ce7e61 elementor-widget elementor-widget-text-editor\" data-id=\"48ce7e61\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Obtenez votre nom de domaine, exemple\u00a0: \u00ab\u00a0mon-entreprise.nc\u00a0\u00bb et disposez d\u2019une messagerie fiable.<br \/>H\u00e9bergement de votre messagerie priv\u00e9e sur serveur mutualis\u00e9, avec fonctions collaboratives,<br \/>Disponible en ligne et livr\u00e9 cl\u00e9 en main,<br \/>Acc\u00e8s \u00e0 l\u2019espace d\u2019administration pour cr\u00e9er, modifier, supprimer des comptes,<br \/>Protection par\u00a0anti-virus et anti-spam,<br \/>Vos donn\u00e9es mails sont s\u00e9curis\u00e9es dans un environnement ferm\u00e9,<br \/>La collaboration, les sauvegardes, les acc\u00e8s depuis votre client de messagerie ou votre smartphone sont pris en charge.<br \/>Synchronisation de tous vos appareils.<br \/>Acc\u00e8s international.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-25b225ea elementor-section-content-middle elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"25b225ea\" data-element_type=\"section\" id=\"sauvegardes\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3a65c298 animated-slow elementor-invisible\" data-id=\"3a65c298\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;,&quot;animation_delay&quot;:1000}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5f97cd93 elementor-widget elementor-widget-heading\" data-id=\"5f97cd93\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Sauvegardes<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e6ee694 elementor-widget elementor-widget-text-editor\" data-id=\"1e6ee694\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Pour bien choisir la m\u00e9thode de sauvegarde, diff\u00e9rents facteurs sont retenus : le volume des donn\u00e9es \u00e0 sauvegarder, la taille du r\u00e9seau de l\u2019entreprise, la compatibilit\u00e9 de la solution de sauvegarde avec le SI de l\u2019entreprise, la sensibilit\u00e9 (chaleur, humidit\u00e9) et la s\u00e9curit\u00e9 de l\u2019\u00e9ventuel lieu de stockage, la criticit\u00e9 des donn\u00e9es ou encore, la fr\u00e9quence souhait\u00e9e des sauvegardes, le versioning \u2026.<\/p><p>Il s\u2019agit de choisir entre plusieurs types de sauvegardes possibles, c\u2019est \u00e0 dire, choisir entre des sauvegardes compl\u00e8tes contenant la totalit\u00e9 des fichiers de l\u2019entreprise, ou entre des sauvegardes intelligentes (diff\u00e9rentielles ou incr\u00e9mentielles), qui permettront d\u2019\u00e9conomiser du temps en ne sauvegardant que les fichiers modifi\u00e9s.<\/p><p>Pour le support et la m\u00e9thode de stockage, la m\u00e9thode la plus traditionnelle consiste \u00e0 sauvegarder toutes les donn\u00e9es sur un serveur d\u2019entreprise, en copiant les donn\u00e9es pr\u00e9sentes sur les postes utilisateurs. Puis, dans un second temps, d\u2019externaliser cette sauvegarde sur des serveurs externes s\u00e9curis\u00e9s, afin de disposer d\u2019une double.<\/p><p>Aujourd\u2019hui, avec les derni\u00e8res tendances initi\u00e9es par les Big Data, l\u2019essor de la mobilit\u00e9, on se tournent de plus en plus vers des solutions plus actuelles, de sauvegarde en ligne, synchronisation de fichiers et acc\u00e8s mobiles directement dans le Cloud.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7b16c0cc\" data-id=\"7b16c0cc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2d61ab77 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2d61ab77\" data-element_type=\"section\" id=\"cyber\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-11dcb1e1\" data-id=\"11dcb1e1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5addef98 animated-slow elementor-invisible\" data-id=\"5addef98\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInRight&quot;,&quot;animation_delay&quot;:1000}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6725e9aa elementor-widget elementor-widget-heading\" data-id=\"6725e9aa\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Cyber criminalit\u00e9 <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40046d52 elementor-widget elementor-widget-text-editor\" data-id=\"40046d52\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Un cybercriminel peut utiliser un appareil pour acc\u00e9der aux informations personnelles d\u2019un utilisateur, \u00e0 des informations confidentielles professionnelles, \u00e0 des informations gouvernementales, ou pour d\u00e9sactiver un appareil. Ou encore vendre ou obtenir les informations cit\u00e9es plus haut.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-555da71c elementor-widget elementor-widget-toggle\" data-id=\"555da71c\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1431\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1431\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Les attaques DDoS<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1431\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1431\"><p>Celles-ci servent \u00e0 rendre un service en ligne indisponible et \u00e0 d\u00e9truire le r\u00e9seau en submergeant le site de trafic.<br \/>Le pirate informatique pirate ensuite le syst\u00e8me lorsque le r\u00e9seau est en panne.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1432\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1432\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Les botnets<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1432\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1432\"><p>Les botnets sont des r\u00e9seaux d\u2019ordinateurs compromis contr\u00f4l\u00e9s de mani\u00e8re externe par des pirates informatiques \u00e0 distance. Les pirates envoient ensuite des spams ou attaquent d\u2019autres ordinateurs via ces botnets.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1433\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1433\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Le vol d\u2019identit\u00e9<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1433\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1433\"><p>Ce cybercrime se produit lorsqu\u2019un criminel obtient l\u2019acc\u00e8s aux informations personnelles.<br \/>Ils peuvent aussi ouvrir un compte t\u00e9l\u00e9phonique ou internet \u00e0 votre nom, utiliser votre nom pour planifier une activit\u00e9 criminelle et r\u00e9clamer les aides que vous donne le gouvernement. Pour ce faire, ils piratent les mots de passe de l\u2019utilisateur et r\u00e9cup\u00e8rent des informations personnelles sur les r\u00e9seaux sociaux ou en envoyant des emails de phishing.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1434\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1434\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Le cyber harc\u00e8lement<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1434\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1434\"><p>Ce type de crime implique un harc\u00e8lement en ligne o\u00f9 l\u2019utilisateur est soumis \u00e0 un tr\u00e8s grand nombre de messages en ligne et par email. G\u00e9n\u00e9ralement, les cyber harceleurs utilisent les r\u00e9seaux sociaux pour intimider et inspirer la peur chez une victime souvent identifi\u00e9e.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1435\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-1435\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">L\u2019arnaque au Pr\u00e9sident<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1435\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-1435\"><p>Les criminels vous contactent directement sur votre lieu de travail, habituellement par t\u00e9l\u00e9phone ou par email. Ils veulent gagner votre confiance et se font passer pour un sup\u00e9rieur afin que vous fournissiez les informations dont il a besoin. Il s\u2019agit g\u00e9n\u00e9ralement d\u2019un mot de passe, ou des coordonn\u00e9es bancaires.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1436\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-1436\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Le Phishing<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1436\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-1436\"><p>Ce type d\u2019attaque implique que des pirates informatiques envoient des pi\u00e8ces jointes ou des URL malveillantes pour acc\u00e9der \u00e0 leurs comptes ou \u00e0 leur ordinateur. Les utilisateurs sont pi\u00e9g\u00e9s par des emails affirmant qu\u2019ils doivent changer leur mot de passe ou mettre \u00e0 jour leurs informations.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1437\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"button\" aria-controls=\"elementor-tab-content-1437\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Les escroqueries en ligne<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1437\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"region\" aria-labelledby=\"elementor-tab-title-1437\"><p>Elles se pr\u00e9sentent g\u00e9n\u00e9ralement sous la forme de publicit\u00e9s ou de spams contenant des promesses de gains ou des offres aux montants irr\u00e9alistes. Les escroqueries en ligne incluent des offres all\u00e9chantes \u00ab trop belles pour \u00eatre vraies \u00bb et peuvent, lorsque l\u2019on clique dessus, faire entrer des virus et compromettre vos informations.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1438\" class=\"elementor-tab-title\" data-tab=\"8\" role=\"button\" aria-controls=\"elementor-tab-content-1438\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Les kits d\u2019Exploit<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1438\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"region\" aria-labelledby=\"elementor-tab-title-1438\"><p>Les kits d\u2019Exploit ont besoin d\u2019une vuln\u00e9rabilit\u00e9 (bug dans le code d\u2019un logiciel) pour prendre le contr\u00f4le de l\u2019ordinateur d\u2019un utilisateur. Les kits d\u2019exploit sont mis \u00e0 jour r\u00e9guli\u00e8rement, comme les logiciels normaux, et sont disponibles sur les forums du Dark-Web.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-56cd387d elementor-section-content-middle elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"56cd387d\" data-element_type=\"section\" id=\"qui\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2fcfb501 animated-slow elementor-invisible\" data-id=\"2fcfb501\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;,&quot;animation_delay&quot;:1000}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1f059626 elementor-widget elementor-widget-heading\" data-id=\"1f059626\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Qui sommes nous<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-911b8f1 elementor-widget elementor-widget-text-editor\" data-id=\"911b8f1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Implant\u00e9 \u00e0 Noum\u00e9a depuis plus de vingt ans, nous offrons des solutions professionnelles aux PME afin de r\u00e9pondre aux exigences croissantes des besoins.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f09c62b elementor-widget elementor-widget-toggle\" data-id=\"5f09c62b\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1591\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1591\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">En savoir plus<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1591\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1591\"><p>N\u00e9e dans les ann\u00e9es 80, l\u2019infog\u00e9rance est un service externalis\u00e9 d\u00e9di\u00e9 \u00e0 la gestion et \u00e0 la maintenance du syst\u00e8me d\u2019information. Assur\u00e9e par un expert, cette activit\u00e9 s\u2019effectue de fa\u00e7on r\u00e9guli\u00e8re et est r\u00e9gie par un contrat. Ainsi, le prestataire s\u2019engage \u00e0 assurer une assistance informatique aupr\u00e8s de son client.<\/p><p>Cette prestation informatique rev\u00eat un caract\u00e8re externalis\u00e9, les t\u00e2ches peuvent \u00eatre ex\u00e9cut\u00e9es \u00e0 distance.<\/p><p>Confiez \u00e0 des experts cette gestion de vos infrastructures, et lib\u00e9rez-vous des probl\u00e9matiques techniques.<br \/>Car g\u00e9rer au quotidien une infrastructure demande une expertise et une attention de tous les instants.<\/p><p>Ainsi choisir l\u2019 infog\u00e9rance s\u2019av\u00e8re \u00eatre un choix gagnant pour votre entreprise.<br \/>Surveillance, supervision, gestion, reporting, interventions techniques ou encore accompagnement quotidien selon vos besoins et objectifs, sont autant de missions qui peuvent \u00eatre confi\u00e9es \u00e0 un service d\u2019 infog\u00e9rance, et ainsi vous permettre de mieux ma\u00eetriser vos co\u00fbts et vous recentrer sur votre c\u0153ur de m\u00e9tier.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1592\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1592\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Nos domaines d\u00edntervention<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1592\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1592\"><ul><li>Gestion de la messagerie<\/li><li>Administration des ordinateurs<\/li><li>S\u00e9curisation des donn\u00e9es<\/li><li>Pilotage des serveurs<\/li><li>Mise en place plan de secours<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1593\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1593\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Nos valeurs \u00e9thiques <\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1593\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1593\"><p>Nous travaillons en collaboration et en confiance r\u00e9ciproque,<br \/>Avec application du RGPD, et en toute confidentialit\u00e9.<br \/><br \/><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-402ae3a0\" data-id=\"402ae3a0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<footer class=\"elementor-section elementor-top-section elementor-element elementor-element-3371ab47 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3371ab47\" data-element_type=\"section\" id=\"contact\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-46a7fc14\" data-id=\"46a7fc14\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-74b68b58 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"74b68b58\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-6b127ba\" data-id=\"6b127ba\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10b2c097 elementor-widget elementor-widget-heading\" data-id=\"10b2c097\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Contactez-nous<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-556e660a elementor-align-left elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"556e660a\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-phone-alt\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">75 33 34<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-envelope\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">ima@ima.nc<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-map-marker-alt\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Rue JB Morault -  Val Plaisance - Noum\u00e9a<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-7baf6285\" data-id=\"7baf6285\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-617545ef elementor-widget elementor-widget-heading\" data-id=\"617545ef\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Menu<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-326c2670 elementor-align-left elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"326c2670\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#actualite\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Actualit\u00e9 <\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#teletravail\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">T\u00e9l\u00e9travail <\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#messagerie\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Messagerie d\u00e9di\u00e9e <\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#sauvegardes\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Sauvegardes<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#cyber\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Cyber-criminalit\u00e9 <\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#qui\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Qui Sommes-Nous<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-73fede44\" data-id=\"73fede44\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-449ec691 elementor-widget elementor-widget-heading\" data-id=\"449ec691\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Donn\u00e9es <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e78e0e9 elementor-align-left elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"6e78e0e9\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ima.nc\/index.php\/mentions-legales\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Mentions l\u00e9gales <\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ima.nc\/index.php\/mentions-legales\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Confidentialit\u00e9 des donn\u00e9es <\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/footer>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7a976da elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"7a976da\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b84f70a\" data-id=\"b84f70a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-174d76c elementor-widget elementor-widget-html\" data-id=\"174d76c\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<iframe src=\"https:\/\/www.google.com\/maps\/embed?pb=!1m21!1m12!1m3!1d10866.577340696469!2d166.44389104959882!3d-22.298898261797515!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!4m6!3e2!4m0!4m3!3m2!1d-22.2996029!2d166.44894019999998!5e0!3m2!1sfr!2sfr!4v1694664345154!5m2!1sfr!2sfr\" width=\"800\" height=\"600\" style=\"border:0;\" allowfullscreen=\"\" loading=\"lazy\" referrerpolicy=\"no-referrer-when-downgrade\"><\/iframe>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>actualit\u00e9 r\u00e9seau Actualit\u00e9 Recrudescence des ransomwares Selon la National Cyber Security Alliance, une petite entreprise sur cinq est victime de la cybercriminalit\u00e9 chaque ann\u00e9e. Parmi les entreprises touch\u00e9es, environ 60 % font faillite dans les six mois qui suivent l\u2019attaque. Ces chiffres mettent \u00e0 mal l\u2019id\u00e9e selon laquelle les cybercriminels concentrent leurs efforts sur les [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_canvas","meta":{"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IMA Informatique - IMA-Informatique<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ima.nc\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IMA Informatique - IMA-Informatique\" \/>\n<meta property=\"og:description\" content=\"actualit\u00e9 r\u00e9seau Actualit\u00e9 Recrudescence des ransomwares Selon la National Cyber Security Alliance, une petite entreprise sur cinq est victime de la cybercriminalit\u00e9 chaque ann\u00e9e. Parmi les entreprises touch\u00e9es, environ 60 % font faillite dans les six mois qui suivent l\u2019attaque. Ces chiffres mettent \u00e0 mal l\u2019id\u00e9e selon laquelle les cybercriminels concentrent leurs efforts sur les [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ima.nc\/\" \/>\n<meta property=\"og:site_name\" content=\"IMA-Informatique\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-14T04:07:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ima.nc\/wp-content\/uploads\/2020\/09\/logo-ima.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ima.nc\/\",\"url\":\"https:\/\/www.ima.nc\/\",\"name\":\"IMA Informatique - IMA-Informatique\",\"isPartOf\":{\"@id\":\"https:\/\/www.ima.nc\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ima.nc\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ima.nc\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ima.nc\/wp-content\/uploads\/2020\/09\/logo-ima.jpg\",\"datePublished\":\"2020-09-12T03:37:31+00:00\",\"dateModified\":\"2023-09-14T04:07:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ima.nc\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ima.nc\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.ima.nc\/#primaryimage\",\"url\":\"https:\/\/www.ima.nc\/wp-content\/uploads\/2020\/09\/logo-ima.jpg\",\"contentUrl\":\"https:\/\/www.ima.nc\/wp-content\/uploads\/2020\/09\/logo-ima.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ima.nc\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.ima.nc\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IMA Informatique\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ima.nc\/#website\",\"url\":\"https:\/\/www.ima.nc\/\",\"name\":\"IMA-Informatique\",\"description\":\"Votre partenaire de confiance\",\"publisher\":{\"@id\":\"https:\/\/www.ima.nc\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ima.nc\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ima.nc\/#organization\",\"name\":\"IMA INFORMATIQUE\",\"url\":\"https:\/\/www.ima.nc\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.ima.nc\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ima.nc\/wp-content\/uploads\/revslider\/paintbrush-addon\/logo-ima.jpg\",\"contentUrl\":\"https:\/\/www.ima.nc\/wp-content\/uploads\/revslider\/paintbrush-addon\/logo-ima.jpg\",\"width\":600,\"height\":481,\"caption\":\"IMA INFORMATIQUE\"},\"image\":{\"@id\":\"https:\/\/www.ima.nc\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IMA Informatique - IMA-Informatique","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ima.nc\/","og_locale":"fr_FR","og_type":"article","og_title":"IMA Informatique - IMA-Informatique","og_description":"actualit\u00e9 r\u00e9seau Actualit\u00e9 Recrudescence des ransomwares Selon la National Cyber Security Alliance, une petite entreprise sur cinq est victime de la cybercriminalit\u00e9 chaque ann\u00e9e. Parmi les entreprises touch\u00e9es, environ 60 % font faillite dans les six mois qui suivent l\u2019attaque. Ces chiffres mettent \u00e0 mal l\u2019id\u00e9e selon laquelle les cybercriminels concentrent leurs efforts sur les [&hellip;]","og_url":"https:\/\/www.ima.nc\/","og_site_name":"IMA-Informatique","article_modified_time":"2023-09-14T04:07:17+00:00","og_image":[{"url":"https:\/\/www.ima.nc\/wp-content\/uploads\/2020\/09\/logo-ima.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ima.nc\/","url":"https:\/\/www.ima.nc\/","name":"IMA Informatique - IMA-Informatique","isPartOf":{"@id":"https:\/\/www.ima.nc\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ima.nc\/#primaryimage"},"image":{"@id":"https:\/\/www.ima.nc\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ima.nc\/wp-content\/uploads\/2020\/09\/logo-ima.jpg","datePublished":"2020-09-12T03:37:31+00:00","dateModified":"2023-09-14T04:07:17+00:00","breadcrumb":{"@id":"https:\/\/www.ima.nc\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ima.nc\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.ima.nc\/#primaryimage","url":"https:\/\/www.ima.nc\/wp-content\/uploads\/2020\/09\/logo-ima.jpg","contentUrl":"https:\/\/www.ima.nc\/wp-content\/uploads\/2020\/09\/logo-ima.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ima.nc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.ima.nc\/"},{"@type":"ListItem","position":2,"name":"IMA Informatique"}]},{"@type":"WebSite","@id":"https:\/\/www.ima.nc\/#website","url":"https:\/\/www.ima.nc\/","name":"IMA-Informatique","description":"Votre partenaire de confiance","publisher":{"@id":"https:\/\/www.ima.nc\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ima.nc\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.ima.nc\/#organization","name":"IMA INFORMATIQUE","url":"https:\/\/www.ima.nc\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.ima.nc\/#\/schema\/logo\/image\/","url":"https:\/\/www.ima.nc\/wp-content\/uploads\/revslider\/paintbrush-addon\/logo-ima.jpg","contentUrl":"https:\/\/www.ima.nc\/wp-content\/uploads\/revslider\/paintbrush-addon\/logo-ima.jpg","width":600,"height":481,"caption":"IMA INFORMATIQUE"},"image":{"@id":"https:\/\/www.ima.nc\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.ima.nc\/index.php\/wp-json\/wp\/v2\/pages\/169"}],"collection":[{"href":"https:\/\/www.ima.nc\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ima.nc\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ima.nc\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ima.nc\/index.php\/wp-json\/wp\/v2\/comments?post=169"}],"version-history":[{"count":132,"href":"https:\/\/www.ima.nc\/index.php\/wp-json\/wp\/v2\/pages\/169\/revisions"}],"predecessor-version":[{"id":385,"href":"https:\/\/www.ima.nc\/index.php\/wp-json\/wp\/v2\/pages\/169\/revisions\/385"}],"wp:attachment":[{"href":"https:\/\/www.ima.nc\/index.php\/wp-json\/wp\/v2\/media?parent=169"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}