

{"id":48180,"date":"2024-04-01T11:52:48","date_gmt":"2024-04-01T09:52:48","guid":{"rendered":"https:\/\/gestions-hospitalieres.fr\/?p=48180"},"modified":"2024-05-02T16:59:36","modified_gmt":"2024-05-02T14:59:36","slug":"proteger-les-sih-grace-a-une-cyberhygiene","status":"publish","type":"post","link":"https:\/\/www.ricom-web8.com\/gestions\/proteger-les-sih-grace-a-une-cyberhygiene\/","title":{"rendered":"Prot\u00e9ger les SIH gr\u00e2ce \u00e0 une cyberhygi\u00e8ne"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Temps de lecture\u00a0: <\/span> <span class=\"rt-time\"> 4<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span><p>Le rapport de l\u2019Agence europ\u00e9enne pour la cybers\u00e9curit\u00e9 (ENISA) souligne une croissance des incidents cyber entre les ann\u00e9es 2021 et 2022, avec une projection alarmante pour 2023. La vuln\u00e9rabilit\u00e9 du secteur est illustr\u00e9e par l\u2019augmentation notable de 33% des \u00e9tablissements de sant\u00e9 ayant d\u00e9clar\u00e9 au moins un incident en 2022. Ces incidents se caract\u00e9risent notamment par des attaques visant \u00e0 paralyser les infrastructures ou \u00e0 subtiliser des informations sensibles. En Europe, la France est la principale cible de ces attaques. En premi\u00e8re ligne, les h\u00f4pitaux doivent faire preuve d\u2019une vigilance continue et d\u2019une pr\u00e9paration sans faille.<\/p>\n<p><i>\u00ab\u2009L\u2019approche de la cybers\u00e9curit\u00e9 doit \u00eatre globale et hi\u00e9rarchis\u00e9e, il ne sert \u00e0 rien de fermer la porte d\u2019entr\u00e9e \u00e0 double tour si vous laissez les fen\u00eatres grandes ouvertes\u2009!\u2009\u00bb <\/i>Le directeur de la s\u00e9curit\u00e9 d\u2019un grand groupe au CAC 40<\/p>\n<h1>Mettre en place une strat\u00e9gie globale de gestion des risques<span class=\"Apple-converted-space\">\u00a0<\/span><\/h1>\n<p>Face \u00e0 ces menaces, la gestion des risques en cybers\u00e9curit\u00e9 n\u00e9cessite une approche m\u00e9thodique et stratifi\u00e9e. Elle repose sur une analyse des risques auxquels un \u00e9tablissement de sant\u00e9 ou m\u00e9dico-social est expos\u00e9.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>Cette analyse de risque suit exactement la m\u00eame m\u00e9thodologie que celle des risques associ\u00e9s aux soins, dont les \u00e9tablissements ont l\u2019habitude de longue date dans le cadre de la certification HAS\u2009: cartographie des risques, \u00e9valuation de la gravit\u00e9 potentielle de survenue de ce risque, probabilit\u00e9 de concr\u00e9tisation d\u2019un risque.<\/p>\n<p><i>\u00ab\u2009Il faut organiser ses ressources en fonction des diff\u00e9rents risques de l\u2019\u00e9tablissement et du niveau d\u2019acceptabilit\u00e9 du risque de la gouvernance. Ainsi, ce n\u2019est pas la taille de l\u2019\u00e9tablissement qui constitue le dimensionnement du plan cybers\u00e9curit\u00e9 de l\u2019entit\u00e9.\u2009\u00bb\u00a0<\/i>Le responsable de la s\u00e9curit\u00e9 du syst\u00e8me d\u2019information d\u2019un CHU<\/p>\n<p>Premi\u00e8rement, l\u2019identification pr\u00e9cise des actifs critiques tels que les infrastructures r\u00e9seau essentielles, en les classant en fonction de leur importance pour la continuit\u00e9 des soins et de leur sensibilit\u00e9 en termes de donn\u00e9es manipul\u00e9es. Cela permet notamment de d\u00e9finir un p\u00e9rim\u00e8tre de protection adapt\u00e9 et de prioriser les efforts de s\u00e9curisation selon le degr\u00e9 de sensibilit\u00e9 des donn\u00e9es et services. Les dossiers m\u00e9dicaux informatis\u00e9s (DPI), les syst\u00e8mes de gestion des patients (GAM\/GAP), les syst\u00e8mes de gestion des laboratoires (SGL) et les syst\u00e8mes d\u2019imagerie (RIS et PACS) ainsi que certains \u00e9quipements m\u00e9dicaux cl\u00e9s comme les respirateurs en r\u00e9animation sont typiquement consid\u00e9r\u00e9s comme critiques, notamment au regard de la continuit\u00e9 d\u2019activit\u00e9 de l\u2019\u00e9tablissement.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>Ensuite, l\u2019\u00e9valuation des vuln\u00e9rabilit\u00e9s doit \u00eatre r\u00e9alis\u00e9e afin de d\u00e9tecter et corriger les failles potentielles avant qu\u2019elles ne soient exploit\u00e9es par des acteurs malveillants. Les vuln\u00e9rabilit\u00e9s peuvent provenir de diverses sources<span class=\"Apple-converted-space\">\u00a0 <\/span>telles que des configurations r\u00e9seau inad\u00e9quates, des pratiques de s\u00e9curit\u00e9 obsol\u00e8tes, la non-mise \u00e0 jour des syst\u00e8mes d\u2019op\u00e9ration.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>La planification de la r\u00e9ponse aux incidents est cruciale\u2009: il s\u2019agit de d\u00e9velopper des protocoles d\u2019intervention rapide pour isoler les machines attaqu\u00e9es et minimiser l\u2019impact d\u2019un incident sur les op\u00e9rations hospitali\u00e8res et la s\u00e9curit\u00e9 des patients. Une r\u00e9ponse efficace repose sur la capacit\u00e9 \u00e0 d\u00e9tecter rapidement une intrusion ou une exploitation de vuln\u00e9rabilit\u00e9 et \u00e0 r\u00e9agir de mani\u00e8re coordonn\u00e9e. Les plans de r\u00e9ponse aux incidents doivent inclure des proc\u00e9dures d\u00e9taill\u00e9es de gradation, jusqu\u2019au niveau ultime de coupure des syst\u00e8mes. Ce plan doit inclure les modalit\u00e9s de communication de crise et la gestion de l\u2019apr\u00e8s-crise : restauration des syst\u00e8mes affect\u00e9s, gestion des cons\u00e9quences l\u00e9gales et de r\u00e9putation associ\u00e9e \u00e0 une fuite de donn\u00e9es.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>En int\u00e9grant ces \u00e9tapes dans une strat\u00e9gie globale de gestion des risques, les \u00e9tablissements de sant\u00e9 peuvent non seulement am\u00e9liorer leur capacit\u00e9 \u00e0 pr\u00e9venir les incidents de s\u00e9curit\u00e9, mais aussi y r\u00e9pondre de mani\u00e8re plus efficace, minimisant ainsi les impacts sur la continuit\u00e9 des soins et la protection des donn\u00e9es des patients.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<blockquote><p>La dualit\u00e9 fonctionnelle d\u00e9l\u00e9gu\u00e9 \u00e0 la protection des donn\u00e9es (DPO)\/responsable de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information (RSSI) est essentielle pour maintenir l\u2019int\u00e9grit\u00e9 des donn\u00e9es et la confiance des usagers.<\/p><\/blockquote>\n<h1>Former, accompagner et passer \u00e0 l\u2019action\u2009!<\/h1>\n<p>Au c\u0153ur de la cybers\u00e9curit\u00e9 se trouve \u00ab\u2009l\u2019hygi\u00e8ne informatique\u2009\u00bb au quotidien. \u00c0 l\u2019instar du lavage des mains, du port du masque, de la vaccination, la s\u00e9curit\u00e9 informatique doit devenir un r\u00e9flexe hospitalier\u2009: changer r\u00e9guli\u00e8rement ses mots de passe, utiliser des mots de passe complexes, limiter et filtrer le trafic internet, utiliser des messageries s\u00e9curis\u00e9es de sant\u00e9, segmenter les r\u00e9seaux\u2026<\/p>\n<p>L\u2019Anap recommande une s\u00e9paration claire des r\u00f4les de d\u00e9l\u00e9gu\u00e9 \u00e0 la protection des donn\u00e9es (DPO) et de responsable de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information (RSSI), afin que le premier puisse se concentrer enti\u00e8rement sur la protection des donn\u00e9es personnelles et leur conformit\u00e9 r\u00e9glementaire, tandis que le second pourra se focaliser sur la s\u00e9curisation des infrastructures, ainsi que la r\u00e9ponse aux incidents cyber. Cette dualit\u00e9 fonctionnelle est essentielle pour maintenir l\u2019int\u00e9grit\u00e9 des donn\u00e9es et la confiance des usagers.<\/p>\n<p>La formation continue du personnel, \u00e0 commencer par les dirigeants (dont les pr\u00e9sidents de commission m\u00e9dicale d\u2019\u00e9tablissement ([PCME]), et l\u2019organisation r\u00e9guli\u00e8re d\u2019exercices de simulations d\u2019attaque constituent \u00e9galement un pilier visant \u00e0 \u00e9lever le niveau g\u00e9n\u00e9ral de pr\u00e9paration et de r\u00e9silience des \u00e9tablissements. Ces simulations permettent de tester les syst\u00e8mes en place et de sensibiliser tout le personnel aux proc\u00e9dures \u00e0 suivre, r\u00e9duisant ainsi le temps de r\u00e9action et minimisant les dommages potentiels. La cr\u00e9ation d\u2019ambassadeurs de cybers\u00e9curit\u00e9 dans les services est aussi pr\u00e9f\u00e9rable pour assurer une diffusion efficiente des bonnes pratiques de cybers\u00e9curit\u00e9 au sein de toutes les strates de l\u2019\u00e9tablissement.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p><i>\u00ab\u2009La cybers\u00e9curit\u00e9 est port\u00e9e par tous dans notre \u00e9tablissement. Nous mettons en place des relais \u00e0 chaque \u00e9chelle afin de sensibiliser chacun. Gr\u00e2ce aux ambassadeurs, la cybers\u00e9curit\u00e9 est vue comme un conseil et non comme une contrainte.\u2009\u00bb<\/i> Le directeur du syst\u00e8me d\u2019information d\u2019un CHU<\/p>\n<h1>Conclusion<\/h1>\n<p>La cybers\u00e9curit\u00e9 dans le secteur de la sant\u00e9 est une pr\u00e9occupation croissante qui n\u00e9cessite une action concert\u00e9e et continue de la part des directions des \u00e9tablissements et des pr\u00e9sidents de CME, des responsables de la s\u00e9curit\u00e9 informatique et de l\u2019ensemble des personnels.<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-48182 size-medium\" src=\"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2024\/05\/ANAP_hacker_cyber_securite-300x153.jpg\" alt=\"\" width=\"300\" height=\"153\" srcset=\"https:\/\/www.ricom-web8.com\/gestions\/wp-content\/uploads\/2024\/05\/ANAP_hacker_cyber_securite-300x153.jpg 300w, https:\/\/www.ricom-web8.com\/gestions\/wp-content\/uploads\/2024\/05\/ANAP_hacker_cyber_securite-1024x522.jpg 1024w, https:\/\/www.ricom-web8.com\/gestions\/wp-content\/uploads\/2024\/05\/ANAP_hacker_cyber_securite-768x391.jpg 768w, https:\/\/www.ricom-web8.com\/gestions\/wp-content\/uploads\/2024\/05\/ANAP_hacker_cyber_securite.jpg 1500w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<script>function PlayerjsAsync(){} if(window[\"Playerjs\"]){PlayerjsAsync();}<\/script>","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Temps de lecture\u00a0: <\/span> <span class=\"rt-time\"> 4<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>Le rapport de l\u2019Agence europ\u00e9enne pour la cybers\u00e9curit\u00e9 (ENISA) souligne une croissance des incidents cyber entre les ann\u00e9es 2021 et 2022, avec une projection alarmante pour 2023. La vuln\u00e9rabilit\u00e9 du secteur est illustr\u00e9e par l\u2019augmentation notable de 33% des \u00e9tablissements de sant\u00e9 ayant d\u00e9clar\u00e9 au moins un incident en 2022. Ces incidents se caract\u00e9risent notamment par des attaques visant \u00e0 paralyser les infrastructures ou \u00e0 subtiliser des informations sensibles. En&hellip; <\/p>\n","protected":false},"author":23133,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[26,2],"tags":[601,5456,1752,6519,409,1872,10221],"class_list":["post-48180","post","type-post","status-publish","format-standard","hentry","category-dossier","category-gestions-hospitalieres","tag-anap","tag-cybersecurite","tag-donnees-de-sante","tag-dpo","tag-e-sante","tag-numerique","tag-rssi"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.8.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Prot\u00e9ger les SIH gr\u00e2ce \u00e0 une cyberhygi\u00e8ne - Gestions hospitali\u00e8res<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ricom-web8.com\/gestions\/proteger-les-sih-grace-a-une-cyberhygiene\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Prot\u00e9ger les SIH gr\u00e2ce \u00e0 une cyberhygi\u00e8ne - Gestions hospitali\u00e8res\" \/>\n<meta property=\"og:description\" content=\"Temps de lecture\u00a0:  4 minutesLe rapport de l\u2019Agence europ\u00e9enne pour la cybers\u00e9curit\u00e9 (ENISA) souligne une croissance des incidents cyber entre les ann\u00e9es 2021 et 2022, avec une projection alarmante pour 2023. La vuln\u00e9rabilit\u00e9 du secteur est illustr\u00e9e par l\u2019augmentation notable de 33% des \u00e9tablissements de sant\u00e9 ayant d\u00e9clar\u00e9 au moins un incident en 2022. Ces incidents se caract\u00e9risent notamment par des attaques visant \u00e0 paralyser les infrastructures ou \u00e0 subtiliser des informations sensibles. En&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ricom-web8.com\/gestions\/proteger-les-sih-grace-a-une-cyberhygiene\/\" \/>\n<meta property=\"og:site_name\" content=\"Gestions hospitali\u00e8res\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/gestionshospitalieres\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-01T09:52:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-02T14:59:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2024\/05\/ANAP_hacker_cyber_securite-300x153.jpg\" \/>\n<meta name=\"author\" content=\"Gestions hospitali\u00e8res\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@revue_GH\" \/>\n<meta name=\"twitter:site\" content=\"@revue_GH\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gestions hospitali\u00e8res\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/proteger-les-sih-grace-a-une-cyberhygiene\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/proteger-les-sih-grace-a-une-cyberhygiene\/\"},\"author\":{\"name\":\"Gestions hospitali\u00e8res\",\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/#\/schema\/person\/3ba9fe913190dfe9507feb621e902c1f\"},\"headline\":\"Prot\u00e9ger les SIH gr\u00e2ce \u00e0 une cyberhygi\u00e8ne\",\"datePublished\":\"2024-04-01T09:52:48+00:00\",\"dateModified\":\"2024-05-02T14:59:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/proteger-les-sih-grace-a-une-cyberhygiene\/\"},\"wordCount\":1147,\"publisher\":{\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/proteger-les-sih-grace-a-une-cyberhygiene\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2024\/05\/ANAP_hacker_cyber_securite-300x153.jpg\",\"keywords\":[\"Anap\",\"cybers\u00e9curit\u00e9\",\"donn\u00e9es de sant\u00e9\",\"DPO\",\"e-sant\u00e9\",\"num\u00e9rique\",\"RSSI\"],\"articleSection\":[\"dossier\",\"Gestions Hospitali\u00e8res\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/proteger-les-sih-grace-a-une-cyberhygiene\/\",\"url\":\"https:\/\/www.ricom-web8.com\/gestions\/proteger-les-sih-grace-a-une-cyberhygiene\/\",\"name\":\"Prot\u00e9ger les SIH gr\u00e2ce \u00e0 une cyberhygi\u00e8ne - Gestions hospitali\u00e8res\",\"isPartOf\":{\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/proteger-les-sih-grace-a-une-cyberhygiene\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/proteger-les-sih-grace-a-une-cyberhygiene\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2024\/05\/ANAP_hacker_cyber_securite-300x153.jpg\",\"datePublished\":\"2024-04-01T09:52:48+00:00\",\"dateModified\":\"2024-05-02T14:59:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/proteger-les-sih-grace-a-une-cyberhygiene\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ricom-web8.com\/gestions\/proteger-les-sih-grace-a-une-cyberhygiene\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/proteger-les-sih-grace-a-une-cyberhygiene\/#primaryimage\",\"url\":\"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2024\/05\/ANAP_hacker_cyber_securite-300x153.jpg\",\"contentUrl\":\"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2024\/05\/ANAP_hacker_cyber_securite-300x153.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/proteger-les-sih-grace-a-une-cyberhygiene\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.ricom-web8.com\/gestions\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Prot\u00e9ger les SIH gr\u00e2ce \u00e0 une cyberhygi\u00e8ne\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/#website\",\"url\":\"https:\/\/www.ricom-web8.com\/gestions\/\",\"name\":\"Gestions hospitali\u00e8res\",\"description\":\"la revue des d\u00e9cideurs hospitaliers\",\"publisher\":{\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ricom-web8.com\/gestions\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/#organization\",\"name\":\"Gestions hospitali\u00e8res\",\"url\":\"https:\/\/www.ricom-web8.com\/gestions\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2017\/02\/picto_Gif-GH-trans.png\",\"contentUrl\":\"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2017\/02\/picto_Gif-GH-trans.png\",\"width\":512,\"height\":512,\"caption\":\"Gestions hospitali\u00e8res\"},\"image\":{\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/gestionshospitalieres\/\",\"https:\/\/x.com\/revue_GH\",\"https:\/\/www.linkedin.com\/company\/gestions-hospitalieres?trk=top_nav_home\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/#\/schema\/person\/3ba9fe913190dfe9507feb621e902c1f\",\"name\":\"Gestions hospitali\u00e8res\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1a0d93e6db5dbe7dac96bae4757d256f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1a0d93e6db5dbe7dac96bae4757d256f?s=96&d=mm&r=g\",\"caption\":\"Gestions hospitali\u00e8res\"},\"url\":\"https:\/\/www.ricom-web8.com\/gestions\/author\/benjamin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Prot\u00e9ger les SIH gr\u00e2ce \u00e0 une cyberhygi\u00e8ne - Gestions hospitali\u00e8res","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ricom-web8.com\/gestions\/proteger-les-sih-grace-a-une-cyberhygiene\/","og_locale":"fr_FR","og_type":"article","og_title":"Prot\u00e9ger les SIH gr\u00e2ce \u00e0 une cyberhygi\u00e8ne - Gestions hospitali\u00e8res","og_description":"Temps de lecture\u00a0:  4 minutesLe rapport de l\u2019Agence europ\u00e9enne pour la cybers\u00e9curit\u00e9 (ENISA) souligne une croissance des incidents cyber entre les ann\u00e9es 2021 et 2022, avec une projection alarmante pour 2023. La vuln\u00e9rabilit\u00e9 du secteur est illustr\u00e9e par l\u2019augmentation notable de 33% des \u00e9tablissements de sant\u00e9 ayant d\u00e9clar\u00e9 au moins un incident en 2022. Ces incidents se caract\u00e9risent notamment par des attaques visant \u00e0 paralyser les infrastructures ou \u00e0 subtiliser des informations sensibles. En&hellip;","og_url":"https:\/\/www.ricom-web8.com\/gestions\/proteger-les-sih-grace-a-une-cyberhygiene\/","og_site_name":"Gestions hospitali\u00e8res","article_publisher":"https:\/\/www.facebook.com\/gestionshospitalieres\/","article_published_time":"2024-04-01T09:52:48+00:00","article_modified_time":"2024-05-02T14:59:36+00:00","og_image":[{"url":"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2024\/05\/ANAP_hacker_cyber_securite-300x153.jpg","type":"","width":"","height":""}],"author":"Gestions hospitali\u00e8res","twitter_card":"summary_large_image","twitter_creator":"@revue_GH","twitter_site":"@revue_GH","twitter_misc":{"\u00c9crit par":"Gestions hospitali\u00e8res","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ricom-web8.com\/gestions\/proteger-les-sih-grace-a-une-cyberhygiene\/#article","isPartOf":{"@id":"https:\/\/www.ricom-web8.com\/gestions\/proteger-les-sih-grace-a-une-cyberhygiene\/"},"author":{"name":"Gestions hospitali\u00e8res","@id":"https:\/\/www.ricom-web8.com\/gestions\/#\/schema\/person\/3ba9fe913190dfe9507feb621e902c1f"},"headline":"Prot\u00e9ger les SIH gr\u00e2ce \u00e0 une cyberhygi\u00e8ne","datePublished":"2024-04-01T09:52:48+00:00","dateModified":"2024-05-02T14:59:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ricom-web8.com\/gestions\/proteger-les-sih-grace-a-une-cyberhygiene\/"},"wordCount":1147,"publisher":{"@id":"https:\/\/www.ricom-web8.com\/gestions\/#organization"},"image":{"@id":"https:\/\/www.ricom-web8.com\/gestions\/proteger-les-sih-grace-a-une-cyberhygiene\/#primaryimage"},"thumbnailUrl":"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2024\/05\/ANAP_hacker_cyber_securite-300x153.jpg","keywords":["Anap","cybers\u00e9curit\u00e9","donn\u00e9es de sant\u00e9","DPO","e-sant\u00e9","num\u00e9rique","RSSI"],"articleSection":["dossier","Gestions Hospitali\u00e8res"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.ricom-web8.com\/gestions\/proteger-les-sih-grace-a-une-cyberhygiene\/","url":"https:\/\/www.ricom-web8.com\/gestions\/proteger-les-sih-grace-a-une-cyberhygiene\/","name":"Prot\u00e9ger les SIH gr\u00e2ce \u00e0 une cyberhygi\u00e8ne - Gestions hospitali\u00e8res","isPartOf":{"@id":"https:\/\/www.ricom-web8.com\/gestions\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ricom-web8.com\/gestions\/proteger-les-sih-grace-a-une-cyberhygiene\/#primaryimage"},"image":{"@id":"https:\/\/www.ricom-web8.com\/gestions\/proteger-les-sih-grace-a-une-cyberhygiene\/#primaryimage"},"thumbnailUrl":"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2024\/05\/ANAP_hacker_cyber_securite-300x153.jpg","datePublished":"2024-04-01T09:52:48+00:00","dateModified":"2024-05-02T14:59:36+00:00","breadcrumb":{"@id":"https:\/\/www.ricom-web8.com\/gestions\/proteger-les-sih-grace-a-une-cyberhygiene\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ricom-web8.com\/gestions\/proteger-les-sih-grace-a-une-cyberhygiene\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.ricom-web8.com\/gestions\/proteger-les-sih-grace-a-une-cyberhygiene\/#primaryimage","url":"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2024\/05\/ANAP_hacker_cyber_securite-300x153.jpg","contentUrl":"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2024\/05\/ANAP_hacker_cyber_securite-300x153.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ricom-web8.com\/gestions\/proteger-les-sih-grace-a-une-cyberhygiene\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.ricom-web8.com\/gestions\/"},{"@type":"ListItem","position":2,"name":"Prot\u00e9ger les SIH gr\u00e2ce \u00e0 une cyberhygi\u00e8ne"}]},{"@type":"WebSite","@id":"https:\/\/www.ricom-web8.com\/gestions\/#website","url":"https:\/\/www.ricom-web8.com\/gestions\/","name":"Gestions hospitali\u00e8res","description":"la revue des d\u00e9cideurs hospitaliers","publisher":{"@id":"https:\/\/www.ricom-web8.com\/gestions\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ricom-web8.com\/gestions\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.ricom-web8.com\/gestions\/#organization","name":"Gestions hospitali\u00e8res","url":"https:\/\/www.ricom-web8.com\/gestions\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.ricom-web8.com\/gestions\/#\/schema\/logo\/image\/","url":"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2017\/02\/picto_Gif-GH-trans.png","contentUrl":"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2017\/02\/picto_Gif-GH-trans.png","width":512,"height":512,"caption":"Gestions hospitali\u00e8res"},"image":{"@id":"https:\/\/www.ricom-web8.com\/gestions\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/gestionshospitalieres\/","https:\/\/x.com\/revue_GH","https:\/\/www.linkedin.com\/company\/gestions-hospitalieres?trk=top_nav_home"]},{"@type":"Person","@id":"https:\/\/www.ricom-web8.com\/gestions\/#\/schema\/person\/3ba9fe913190dfe9507feb621e902c1f","name":"Gestions hospitali\u00e8res","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.ricom-web8.com\/gestions\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1a0d93e6db5dbe7dac96bae4757d256f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1a0d93e6db5dbe7dac96bae4757d256f?s=96&d=mm&r=g","caption":"Gestions hospitali\u00e8res"},"url":"https:\/\/www.ricom-web8.com\/gestions\/author\/benjamin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.ricom-web8.com\/gestions\/wp-json\/wp\/v2\/posts\/48180","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ricom-web8.com\/gestions\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ricom-web8.com\/gestions\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ricom-web8.com\/gestions\/wp-json\/wp\/v2\/users\/23133"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ricom-web8.com\/gestions\/wp-json\/wp\/v2\/comments?post=48180"}],"version-history":[{"count":1,"href":"https:\/\/www.ricom-web8.com\/gestions\/wp-json\/wp\/v2\/posts\/48180\/revisions"}],"predecessor-version":[{"id":48183,"href":"https:\/\/www.ricom-web8.com\/gestions\/wp-json\/wp\/v2\/posts\/48180\/revisions\/48183"}],"wp:attachment":[{"href":"https:\/\/www.ricom-web8.com\/gestions\/wp-json\/wp\/v2\/media?parent=48180"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ricom-web8.com\/gestions\/wp-json\/wp\/v2\/categories?post=48180"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ricom-web8.com\/gestions\/wp-json\/wp\/v2\/tags?post=48180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}