

{"id":48173,"date":"2024-04-01T11:43:35","date_gmt":"2024-04-01T09:43:35","guid":{"rendered":"https:\/\/gestions-hospitalieres.fr\/?p=48173"},"modified":"2024-05-02T16:59:29","modified_gmt":"2024-05-02T14:59:29","slug":"former-a-la-cybersecurite","status":"publish","type":"post","link":"https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/","title":{"rendered":"Former \u00e0 la cybers\u00e9curit\u00e9"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Temps de lecture\u00a0: <\/span> <span class=\"rt-time\"> 4<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span><p>En 2021, le nombre d\u2019attaques cyber a doubl\u00e9 par rapport \u00e0 l\u2019ann\u00e9e pr\u00e9c\u00e9dente. Dans la plupart des cas, les centres hospitaliers font face \u00e0 des pirates informatiques qui r\u00e9ussissent \u00e0 s\u2019infiltrer dans leur syst\u00e8me informatique pour y voler des donn\u00e9es sensibles et en bloquer l\u2019acc\u00e8s. Une ran\u00e7on est exig\u00e9e en \u00e9change d\u2019un retour \u00e0 la normale. Les \u00e9tablissements attaqu\u00e9s se retrouvent alors souvent totalement paralys\u00e9s et les cons\u00e9quences peuvent \u00eatre lourdes, aussi bien pour les patients pris en charge que pour les agents qui se retrouvent \u00e0 devoir \u0153uvrer en mode d\u00e9grad\u00e9. La politique \u00e9tant bien s\u00fbr de ne jamais payer la ran\u00e7on, le retour \u00e0 la normale n\u2019arrive qu\u2019apr\u00e8s plusieurs mois d\u2019un lourd travail de reconstruction et de s\u00e9curisation du syst\u00e8me informatique.<\/p>\n<p>Organisme paritaire collecteur agr\u00e9\u00e9 (OPCA) de la fonction publique hospitali\u00e8re, l\u2019ANFH collecte et g\u00e8re les fonds consacr\u00e9s \u00e0 la formation. En mati\u00e8re de cybers\u00e9curit\u00e9, elle propose \u00e0 ses \u00e9tablissements adh\u00e9rents et leurs agents une action de formation nationale (AFN)\u2009: \u00ab\u2009Renforcement de la cybervigilance \u2013 Acqu\u00e9rir les bons r\u00e9flexes\u2009\u00bb. Les objectifs de cette formation tout public sont d\u2019appr\u00e9hender la cybercriminalit\u00e9 et les risques inh\u00e9rents aux \u00e9tablissements de sant\u00e9, de prendre conscience du r\u00f4le contributeur de chacun, d\u2019\u00eatre en mesure de d\u00e9tecter les menaces les plus courantes et de r\u00e9agir efficacement, de diffuser les bonnes pratiques num\u00e9riques. \u00c0 ce jour, 18 sessions de formation ont \u00e9t\u00e9 r\u00e9alis\u00e9es et 161 stagiaires ont \u00e9t\u00e9 form\u00e9s. Par ailleurs, 24\u00a0nouvelles actions sont d\u2019ores et d\u00e9j\u00e0 planifi\u00e9es en 2024. Ces offres de formation nationales sont propos\u00e9es \u00e0 titre gratuit aux \u00e9tablissements pour la partie frais p\u00e9dagogiques. <span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>Conjointement \u00e0 cette premi\u00e8re marche, un dispositif interr\u00e9gional \u00ab\u2009Cyberattaque\u2009: conna\u00eetre les risques, r\u00e9agir efficacement en cas de piratage\u2009\u00bb a \u00e9t\u00e9 construit afin de permettre aux \u00e9tablissements de la fonction publique hospitali\u00e8re de se pr\u00e9parer \u00e0 une cyberattaque en se formant, via des mises en situation, \u00e0 la d\u00e9finition de process permettant de poursuivre le travail en mode d\u00e9grad\u00e9. Il s\u2019agit \u00e9galement de contribuer \u00e0 la cybervigilance de tous les agents via la connaissance des bons gestes, de participer \u00e0 la s\u00e9curit\u00e9 informatique de son \u00e9tablissement, d\u2019\u00eatre en mesure de d\u00e9tecter les menaces, de se pr\u00e9parer \u00e0 la gestion de crise et de piloter un plan de continuit\u00e9 d\u2019activit\u00e9.<\/p>\n<p>La porte d\u2019entr\u00e9e de ce dispositif est un webinaire de deux heures, ouvert \u00e0 tous les publics, dont les objectifs sont les m\u00eames que l\u2019action de formation nationale. Il permet dans un temps court d\u2019appr\u00e9hender la cybercriminalit\u00e9 et ses cons\u00e9quences pour les \u00e9tablissements de sant\u00e9, de conna\u00eetre les diff\u00e9rents types d\u2019attaque et de travailler sur les bons gestes num\u00e9riques permettant de limiter le risque d\u2019actes malveillants. \u00c0 ce jour, depuis janvier 2023, plus de 600\u00a0agents ont pu \u00eatre form\u00e9s sur six r\u00e9gions.<\/p>\n<p>Quatre actions de formation de mise en situation d\u2019une cyberattaque ont \u00e9t\u00e9 pr\u00e9vues pour quatre publics diff\u00e9rents\u2009: les agents du bureau des entr\u00e9es, ceux du g\u00e9nie biom\u00e9dical, ceux des services techniques et les \u00e9quipes de direction. Ces formations permettent \u00e0 chacun des publics vis\u00e9s de conna\u00eetre le risque et l\u2019impact d\u2019une attaque cyber sp\u00e9cifiquement \u00e0 leur environnement de travail et \u00e0 leurs fonctions. Il s\u2019agit d\u2019acqu\u00e9rir les bons r\u00e9flexes en cas de cyberattaque et de conna\u00eetre les outils \u00e0 disposition permettant de travailler en mode d\u00e9grad\u00e9, chaque public jouant un r\u00f4le pr\u00e9pond\u00e9rant en cas de mise en d\u00e9faut du syst\u00e8me informatique par une attaque cyber.<\/p>\n<blockquote><p>Dans la gestion de crise, la continuit\u00e9 d\u2019activit\u00e9 occupe une place centrale\u2009: la priorisation des activit\u00e9s essentielles et l\u2019\u00e9laboration d\u2019un plan op\u00e9rationnel sont primordiales pour parvenir \u00e0 mettre en \u0153uvre des solutions.<\/p><\/blockquote>\n<p>Pour compl\u00e9ter ces mises en situation, une formation au pilotage du plan de continuit\u00e9 des activit\u00e9s (PCA) sur le versant syst\u00e8me d\u2019information est pr\u00e9vue pour les agents d\u2019un m\u00eame domaine d\u2019activit\u00e9, de la direction et des services informatiques en charge de l\u2019applicatif du domaine. Dans la gestion de crise, la continuit\u00e9 d\u2019activit\u00e9 occupe une place centrale\u2009: la priorisation des activit\u00e9s essentielles et l\u2019\u00e9laboration d\u2019un plan op\u00e9rationnel sont primordiales pour parvenir \u00e0 mettre en \u0153uvre des solutions. Cette formation vise une connaissance approfondie des outils de continuit\u00e9, de leur articulation ainsi que les cl\u00e9s de compr\u00e9hension de la strat\u00e9gie de continuit\u00e9 et de reprise d\u2019activit\u00e9, notamment gr\u00e2ce \u00e0 de nombreuses activit\u00e9s ludiques et interactives.<\/p>\n<p>Enfin, les professionnels des services informatiques, qui sont au c\u0153ur de la cybers\u00e9curit\u00e9 d\u2019un \u00e9tablissement et qui seront les premiers sollicit\u00e9s en cas d\u2019attaque, peuvent b\u00e9n\u00e9ficier d\u2019une formation de simulation \u00ab\u2009attaque\/d\u00e9fense\u2009\u00bb. Cette action a pour principaux objectifs d\u2019appr\u00e9hender les m\u00e9thodes d\u2019attaques et de pr\u00e9voir les m\u00e9canismes de d\u00e9fense adapt\u00e9s, de mettre en place les premi\u00e8res actions pour limiter les d\u00e9g\u00e2ts, d\u2019informer\/dialoguer efficacement avec la direction, de solliciter les bons acteurs ext\u00e9rieurs, de faciliter le fonctionnement de l\u2019\u00e9tablissement en mode d\u00e9grad\u00e9 et d\u2019assurer et anticiper la reprise. Si beaucoup est d\u00e9j\u00e0 fait sur le travail de renforcement de la s\u00e9curit\u00e9 des syst\u00e8mes, il s\u2019agit ici d\u2019\u00eatre en mesure de r\u00e9agir ou d\u2019agir efficacement lorsque les syst\u00e8mes sont interrompus. \u00c0 l\u2019instar des entra\u00eenements \u00e0 la s\u00e9curit\u00e9 incendie, la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information doit appr\u00e9hender la gestion de crise lorsque le risque survient.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>Le d\u00e9ploiement de cet accompagnement des \u00e9tablissements adh\u00e9rents \u00e0 l\u2019Anfh est \u00e0 l\u2019\u0153uvre depuis 2023 et va conna\u00eetre une mont\u00e9e en charge en 2024. Aujourd\u2019hui, sept\u00a0r\u00e9gions sont engag\u00e9es dans la d\u00e9marche. Cette offre de formation est ouverte \u00e0 l\u2019\u00e9chelle nationale et peut \u00eatre d\u00e9ploy\u00e9e \u00e0 l\u2019\u00e9chelle de l\u2019\u00e9tablissement, du GHT ou de la r\u00e9gion en inter\u00e9tablissements.<\/p>\n<p>L\u2019ANFH a par ailleurs compl\u00e9t\u00e9 cet accompagnement, en juin 2023, par la mise \u00e0 disposition, sur sa plateforme LCMS<span class=\"Apple-converted-space\">\u00a0 <\/span>\u00ab e-formations \u00bb, d\u2019un contenu e-learning de sensibilisation \u00e0 la cybervigilance d\u00e9velopp\u00e9 par Cybermalveillance.gouv, visant \u00e0 pr\u00e9parer au mieux les agents publics au risque cyber. Cette e-sensibilisation est fond\u00e9e sur le triptyque\u2009: conna\u00eetre\/se prot\u00e9ger\/transmettre.<\/p>\n<p>Le programme est compos\u00e9 de trois modules qui r\u00e9pondent \u00e0 trois objectifs\u2009:<\/p>\n<ul>\n<li><strong>comprendre les principes g\u00e9n\u00e9raux<\/strong> des cyberattaques les plus courantes et les risques qu\u2019elles font courir, tant \u00e0 l\u2019individu qu\u2019\u00e0 son administration\u2009;<\/li>\n<li><strong>agir pour valider et s\u2019approprier les bonnes pratiques<\/strong> \u00e9l\u00e9mentaires dans nos usages quotidiens (t\u00e9l\u00e9phones portables, r\u00e9seaux sociaux\u2026) ;<\/li>\n<li><strong>saisir l\u2019int\u00e9r\u00eat et la mani\u00e8re de transmettre ces valeurs<\/strong>, tant dans un cadre priv\u00e9 que professionnel, compte tenu de la porosit\u00e9 des usages.<\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"alignnone wp-image-48178 size-medium\" src=\"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2024\/05\/Capture-decran-2024-05-02-a-11.50.16-212x300.jpg\" alt=\"\" width=\"212\" height=\"300\" srcset=\"https:\/\/www.ricom-web8.com\/gestions\/wp-content\/uploads\/2024\/05\/Capture-decran-2024-05-02-a-11.50.16-212x300.jpg 212w, https:\/\/www.ricom-web8.com\/gestions\/wp-content\/uploads\/2024\/05\/Capture-decran-2024-05-02-a-11.50.16.jpg 708w\" sizes=\"(max-width: 212px) 100vw, 212px\" \/><\/p>\n<script>function PlayerjsAsync(){} if(window[\"Playerjs\"]){PlayerjsAsync();}<\/script>","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Temps de lecture\u00a0: <\/span> <span class=\"rt-time\"> 4<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>En 2021, le nombre d\u2019attaques cyber a doubl\u00e9 par rapport \u00e0 l\u2019ann\u00e9e pr\u00e9c\u00e9dente. Dans la plupart des cas, les centres hospitaliers font face \u00e0 des pirates informatiques qui r\u00e9ussissent \u00e0 s\u2019infiltrer dans leur syst\u00e8me informatique pour y voler des donn\u00e9es sensibles et en bloquer l\u2019acc\u00e8s. Une ran\u00e7on est exig\u00e9e en \u00e9change d\u2019un retour \u00e0 la normale. Les \u00e9tablissements attaqu\u00e9s se retrouvent alors souvent totalement paralys\u00e9s et les cons\u00e9quences peuvent \u00eatre&hellip; <\/p>\n","protected":false},"author":23133,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[26,2],"tags":[2051,5456,1752,469,5480],"class_list":["post-48173","post","type-post","status-publish","format-standard","hentry","category-dossier","category-gestions-hospitalieres","tag-anfh","tag-cybersecurite","tag-donnees-de-sante","tag-formation","tag-si"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.8.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Former \u00e0 la cybers\u00e9curit\u00e9 - Gestions hospitali\u00e8res<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Former \u00e0 la cybers\u00e9curit\u00e9 - Gestions hospitali\u00e8res\" \/>\n<meta property=\"og:description\" content=\"Temps de lecture\u00a0:  4 minutesEn 2021, le nombre d\u2019attaques cyber a doubl\u00e9 par rapport \u00e0 l\u2019ann\u00e9e pr\u00e9c\u00e9dente. Dans la plupart des cas, les centres hospitaliers font face \u00e0 des pirates informatiques qui r\u00e9ussissent \u00e0 s\u2019infiltrer dans leur syst\u00e8me informatique pour y voler des donn\u00e9es sensibles et en bloquer l\u2019acc\u00e8s. Une ran\u00e7on est exig\u00e9e en \u00e9change d\u2019un retour \u00e0 la normale. Les \u00e9tablissements attaqu\u00e9s se retrouvent alors souvent totalement paralys\u00e9s et les cons\u00e9quences peuvent \u00eatre&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/\" \/>\n<meta property=\"og:site_name\" content=\"Gestions hospitali\u00e8res\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/gestionshospitalieres\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-01T09:43:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-02T14:59:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2024\/05\/Capture-decran-2024-05-02-a-11.50.16-212x300.jpg\" \/>\n<meta name=\"author\" content=\"Gestions hospitali\u00e8res\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@revue_GH\" \/>\n<meta name=\"twitter:site\" content=\"@revue_GH\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gestions hospitali\u00e8res\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/\"},\"author\":{\"name\":\"Gestions hospitali\u00e8res\",\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/#\/schema\/person\/3ba9fe913190dfe9507feb621e902c1f\"},\"headline\":\"Former \u00e0 la cybers\u00e9curit\u00e9\",\"datePublished\":\"2024-04-01T09:43:35+00:00\",\"dateModified\":\"2024-05-02T14:59:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/\"},\"wordCount\":1192,\"publisher\":{\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2024\/05\/Capture-decran-2024-05-02-a-11.50.16-212x300.jpg\",\"keywords\":[\"ANFH\",\"cybers\u00e9curit\u00e9\",\"donn\u00e9es de sant\u00e9\",\"formation\",\"SI\"],\"articleSection\":[\"dossier\",\"Gestions Hospitali\u00e8res\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/\",\"url\":\"https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/\",\"name\":\"Former \u00e0 la cybers\u00e9curit\u00e9 - Gestions hospitali\u00e8res\",\"isPartOf\":{\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2024\/05\/Capture-decran-2024-05-02-a-11.50.16-212x300.jpg\",\"datePublished\":\"2024-04-01T09:43:35+00:00\",\"dateModified\":\"2024-05-02T14:59:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/#primaryimage\",\"url\":\"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2024\/05\/Capture-decran-2024-05-02-a-11.50.16-212x300.jpg\",\"contentUrl\":\"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2024\/05\/Capture-decran-2024-05-02-a-11.50.16-212x300.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.ricom-web8.com\/gestions\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Former \u00e0 la cybers\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/#website\",\"url\":\"https:\/\/www.ricom-web8.com\/gestions\/\",\"name\":\"Gestions hospitali\u00e8res\",\"description\":\"la revue des d\u00e9cideurs hospitaliers\",\"publisher\":{\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ricom-web8.com\/gestions\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/#organization\",\"name\":\"Gestions hospitali\u00e8res\",\"url\":\"https:\/\/www.ricom-web8.com\/gestions\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2017\/02\/picto_Gif-GH-trans.png\",\"contentUrl\":\"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2017\/02\/picto_Gif-GH-trans.png\",\"width\":512,\"height\":512,\"caption\":\"Gestions hospitali\u00e8res\"},\"image\":{\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/gestionshospitalieres\/\",\"https:\/\/x.com\/revue_GH\",\"https:\/\/www.linkedin.com\/company\/gestions-hospitalieres?trk=top_nav_home\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/#\/schema\/person\/3ba9fe913190dfe9507feb621e902c1f\",\"name\":\"Gestions hospitali\u00e8res\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1a0d93e6db5dbe7dac96bae4757d256f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1a0d93e6db5dbe7dac96bae4757d256f?s=96&d=mm&r=g\",\"caption\":\"Gestions hospitali\u00e8res\"},\"url\":\"https:\/\/www.ricom-web8.com\/gestions\/author\/benjamin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Former \u00e0 la cybers\u00e9curit\u00e9 - Gestions hospitali\u00e8res","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/","og_locale":"fr_FR","og_type":"article","og_title":"Former \u00e0 la cybers\u00e9curit\u00e9 - Gestions hospitali\u00e8res","og_description":"Temps de lecture\u00a0:  4 minutesEn 2021, le nombre d\u2019attaques cyber a doubl\u00e9 par rapport \u00e0 l\u2019ann\u00e9e pr\u00e9c\u00e9dente. Dans la plupart des cas, les centres hospitaliers font face \u00e0 des pirates informatiques qui r\u00e9ussissent \u00e0 s\u2019infiltrer dans leur syst\u00e8me informatique pour y voler des donn\u00e9es sensibles et en bloquer l\u2019acc\u00e8s. Une ran\u00e7on est exig\u00e9e en \u00e9change d\u2019un retour \u00e0 la normale. Les \u00e9tablissements attaqu\u00e9s se retrouvent alors souvent totalement paralys\u00e9s et les cons\u00e9quences peuvent \u00eatre&hellip;","og_url":"https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/","og_site_name":"Gestions hospitali\u00e8res","article_publisher":"https:\/\/www.facebook.com\/gestionshospitalieres\/","article_published_time":"2024-04-01T09:43:35+00:00","article_modified_time":"2024-05-02T14:59:29+00:00","og_image":[{"url":"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2024\/05\/Capture-decran-2024-05-02-a-11.50.16-212x300.jpg","type":"","width":"","height":""}],"author":"Gestions hospitali\u00e8res","twitter_card":"summary_large_image","twitter_creator":"@revue_GH","twitter_site":"@revue_GH","twitter_misc":{"\u00c9crit par":"Gestions hospitali\u00e8res","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/#article","isPartOf":{"@id":"https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/"},"author":{"name":"Gestions hospitali\u00e8res","@id":"https:\/\/www.ricom-web8.com\/gestions\/#\/schema\/person\/3ba9fe913190dfe9507feb621e902c1f"},"headline":"Former \u00e0 la cybers\u00e9curit\u00e9","datePublished":"2024-04-01T09:43:35+00:00","dateModified":"2024-05-02T14:59:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/"},"wordCount":1192,"publisher":{"@id":"https:\/\/www.ricom-web8.com\/gestions\/#organization"},"image":{"@id":"https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2024\/05\/Capture-decran-2024-05-02-a-11.50.16-212x300.jpg","keywords":["ANFH","cybers\u00e9curit\u00e9","donn\u00e9es de sant\u00e9","formation","SI"],"articleSection":["dossier","Gestions Hospitali\u00e8res"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/","url":"https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/","name":"Former \u00e0 la cybers\u00e9curit\u00e9 - Gestions hospitali\u00e8res","isPartOf":{"@id":"https:\/\/www.ricom-web8.com\/gestions\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/#primaryimage"},"image":{"@id":"https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2024\/05\/Capture-decran-2024-05-02-a-11.50.16-212x300.jpg","datePublished":"2024-04-01T09:43:35+00:00","dateModified":"2024-05-02T14:59:29+00:00","breadcrumb":{"@id":"https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/#primaryimage","url":"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2024\/05\/Capture-decran-2024-05-02-a-11.50.16-212x300.jpg","contentUrl":"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2024\/05\/Capture-decran-2024-05-02-a-11.50.16-212x300.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ricom-web8.com\/gestions\/former-a-la-cybersecurite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.ricom-web8.com\/gestions\/"},{"@type":"ListItem","position":2,"name":"Former \u00e0 la cybers\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/www.ricom-web8.com\/gestions\/#website","url":"https:\/\/www.ricom-web8.com\/gestions\/","name":"Gestions hospitali\u00e8res","description":"la revue des d\u00e9cideurs hospitaliers","publisher":{"@id":"https:\/\/www.ricom-web8.com\/gestions\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ricom-web8.com\/gestions\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.ricom-web8.com\/gestions\/#organization","name":"Gestions hospitali\u00e8res","url":"https:\/\/www.ricom-web8.com\/gestions\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.ricom-web8.com\/gestions\/#\/schema\/logo\/image\/","url":"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2017\/02\/picto_Gif-GH-trans.png","contentUrl":"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2017\/02\/picto_Gif-GH-trans.png","width":512,"height":512,"caption":"Gestions hospitali\u00e8res"},"image":{"@id":"https:\/\/www.ricom-web8.com\/gestions\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/gestionshospitalieres\/","https:\/\/x.com\/revue_GH","https:\/\/www.linkedin.com\/company\/gestions-hospitalieres?trk=top_nav_home"]},{"@type":"Person","@id":"https:\/\/www.ricom-web8.com\/gestions\/#\/schema\/person\/3ba9fe913190dfe9507feb621e902c1f","name":"Gestions hospitali\u00e8res","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.ricom-web8.com\/gestions\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1a0d93e6db5dbe7dac96bae4757d256f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1a0d93e6db5dbe7dac96bae4757d256f?s=96&d=mm&r=g","caption":"Gestions hospitali\u00e8res"},"url":"https:\/\/www.ricom-web8.com\/gestions\/author\/benjamin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.ricom-web8.com\/gestions\/wp-json\/wp\/v2\/posts\/48173","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ricom-web8.com\/gestions\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ricom-web8.com\/gestions\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ricom-web8.com\/gestions\/wp-json\/wp\/v2\/users\/23133"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ricom-web8.com\/gestions\/wp-json\/wp\/v2\/comments?post=48173"}],"version-history":[{"count":1,"href":"https:\/\/www.ricom-web8.com\/gestions\/wp-json\/wp\/v2\/posts\/48173\/revisions"}],"predecessor-version":[{"id":48179,"href":"https:\/\/www.ricom-web8.com\/gestions\/wp-json\/wp\/v2\/posts\/48173\/revisions\/48179"}],"wp:attachment":[{"href":"https:\/\/www.ricom-web8.com\/gestions\/wp-json\/wp\/v2\/media?parent=48173"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ricom-web8.com\/gestions\/wp-json\/wp\/v2\/categories?post=48173"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ricom-web8.com\/gestions\/wp-json\/wp\/v2\/tags?post=48173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}