{"id":20091,"date":"2024-02-09T14:57:17","date_gmt":"2024-02-09T14:57:17","guid":{"rendered":"https:\/\/www.novotek.com\/ch\/insight\/cybersecurite-pour-les-entreprises-industrielles\/"},"modified":"2024-02-12T15:27:54","modified_gmt":"2024-02-12T15:27:54","slug":"cybersecurite-pour-les-entreprises-industrielles","status":"publish","type":"insights","link":"https:\/\/www.novotek.com\/ch\/fr\/insight\/cybersecurite-pour-les-entreprises-industrielles\/","title":{"rendered":"Cybers\u00e9curit\u00e9 pour les entreprises industrielles"},"content":{"rendered":"<div class=\"container-md paragraph  \">\n<p>Les cyberattaques cibl\u00e9es sur les installations industrielles continuent de se multiplier, tout comme les co\u00fbts qu&#8217;elles engendrent. Ces derni\u00e8res ann\u00e9es, de nombreuses entreprises de renom ont \u00e9t\u00e9 victimes de chevaux de Troie d&#8217;extorsion et de cyberattaques contre des installations de production. La num\u00e9risation croissante a am\u00e9lior\u00e9 la flexibilit\u00e9 et l&#8217;efficacit\u00e9 de la production comme on l&#8217;esp\u00e9rait, mais elle a en m\u00eame temps augment\u00e9 la complexit\u00e9 et cr\u00e9\u00e9 de nouveaux points d&#8217;attaque et risques de perturbation.<\/p>\n<\/div><div class=\"container-md image  \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1788\" height=\"1005\" src=\"https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/OT-Cybersicherheit-edited.jpg\" alt=\"\" class=\"wp-image-17746\" title=\"Les mesures de s&#xE9;curit&#xE9; IT sont encore difficilement transf&#xE9;rables &#xE0; l'OT\" srcset=\"https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/OT-Cybersicherheit-edited.jpg 1788w, https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/OT-Cybersicherheit-edited-300x169.jpg 300w, https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/OT-Cybersicherheit-edited-1024x576.jpg 1024w, https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/OT-Cybersicherheit-edited-768x432.jpg 768w, https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/OT-Cybersicherheit-edited-1536x863.jpg 1536w\" sizes=\"auto, (max-width: 1788px) 100vw, 1788px\" \/><\/figure>\n<\/div><div class=\"container-md spacer  \">\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><div class=\"container-md heading  \">\n<h4 class=\"wp-block-heading\" id=\"e73b20db6d45c3399d82b2bc332f309c3\">M\u00e9canismes de s\u00e9curit\u00e9 informatique pour l&#8217;OT ?<\/h4>\n<\/div><div class=\"container-md paragraph  \">\n<p>Bien que l&#8217;informatique et la technique d&#8217;exploitation (OT) fusionnent peu \u00e0 peu, l&#8217;OT est encore tr\u00e8s diff\u00e9rente de l&#8217;informatique et les m\u00e9canismes de s\u00e9curit\u00e9 informatique connus ne sont pas encore transposables \u00e0 l&#8217;OT. Dans la plupart des entreprises, le processus d&#8217;abstraction de diff\u00e9rentes installations et solutions logicielles en un syst\u00e8me global homog\u00e8ne a encore des ann\u00e9es de retard sur les configurations informatiques actuelles. C&#8217;est pourquoi les syst\u00e8mes OT sont une cible facile pour les attaquants professionnels.<\/p>\n<\/div><div class=\"container-md paragraph  \">\n<p>Le d\u00e9fi consiste maintenant \u00e0 atteindre dans l&#8217;OT le m\u00eame niveau d&#8217;abstraction, la m\u00eame transparence gr\u00e2ce au monitoring et la m\u00eame r\u00e9silience gr\u00e2ce \u00e0 la protection contre les menaces et \u00e0 la restauration imm\u00e9diate, comme c&#8217;est le cas depuis longtemps dans l&#8217;IT.<\/p>\n<\/div><div class=\"container-md spacer  \">\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><div class=\"container-md heading  \">\n<h4 class=\"wp-block-heading\" id=\"e80af0dc0ad369855e1392a06d25e5dc8\">La pierre d&#8217;achoppement : la d\u00e9finition des objectifs<\/h4>\n<\/div><div class=\"container-md paragraph  \">\n<p>Actuellement, la m\u00e9thode la plus courante pour assurer la s\u00e9curit\u00e9 et la protection de l&#8217;OT consiste \u00e0 utiliser des protocoles, des sauvegardes et des restaurations. Les solutions telles que les pare-feu et la protection contre les logiciels malveillants ne sont pas encore tr\u00e8s r\u00e9pandues. La raison principale en est que les deux disciplines mettent l&#8217;accent sur des objectifs de protection diff\u00e9rents : Dans l&#8217;IT, la confidentialit\u00e9 des donn\u00e9es est au premier plan, dans l&#8217;OT, c&#8217;est la disponibilit\u00e9.<\/p>\n<\/div><div class=\"container-md spacer  \">\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><div class=\"container-md heading  \">\n<h4 class=\"wp-block-heading\" id=\"edd83c520a37b2e3990cbe2d1b7682fb3\">Disaster-Recovery<\/h4>\n<\/div><div class=\"container-md paragraph  \">\n<p>Dans la plupart des cas, apr\u00e8s une cyberattaque, ce n&#8217;est pas seulement la panne ou le dysfonctionnement lui-m\u00eame auquel les responsables sont confront\u00e9s.  C&#8217;est plut\u00f4t la question de la d\u00e9termination et de la restauration du dernier \u00e9tat d&#8217;un syst\u00e8me, par exemple de toutes les donn\u00e9es d&#8217;un projet. Car le diagnostic et la gestion des donn\u00e9es se font souvent encore comme il y a 30 ans, m\u00eame dans les environnements automatis\u00e9s : Manuellement. Il manque des m\u00e9thodes courantes pour, par exemple<\/p>\n<\/div><div class=\"container-md list  \">\n<ul class=\"wp-block-list\"><div class=\"container-md list-item  \">\n<li>surveiller les changements<\/li>\n<\/div>\n\n<div class=\"container-md list-item  \">\n<li>de consigner l&#8217;ordre des modifications<\/li>\n<\/div>\n\n<div class=\"container-md list-item  \">\n<li>l&#8217;autorisation de modifications uniquement pour des personnes s\u00e9lectionn\u00e9es<\/li>\n<\/div><\/ul>\n<\/div><div class=\"container-md spacer  \">\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><div class=\"container-md image  \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"387\" src=\"https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/\/ot-cybersicherheit-devices-assets-1024x387.jpg\" alt=\"\" class=\"wp-image-17760\" title=\"le diagnostic et la gestion des donn&#xE9;es se font encore souvent manuellement dans l'OT\" srcset=\"https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/ot-cybersicherheit-devices-assets-1024x387.jpg 1024w, https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/ot-cybersicherheit-devices-assets-300x114.jpg 300w, https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/ot-cybersicherheit-devices-assets-768x291.jpg 768w, https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/ot-cybersicherheit-devices-assets.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><div class=\"container-md spacer  \">\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><div class=\"container-md paragraph  \">\n<p>Les responsables techniques, d&#8217;infrastructure et d&#8217;exploitation sont donc \u00e0 la recherche d&#8217;une solution facile \u00e0 mettre en \u0153uvre et uniforme pour tous les appareils d&#8217;automatisation, les commandes et m\u00eame les sites. Comme celles-ci font largement d\u00e9faut, des solutions individuelles sont souvent assembl\u00e9es dans la pratique pour former des syst\u00e8mes patchwork complexes. Or, ceux-ci d\u00e9pendent \u00e0 leur tour d&#8217;adaptations et de &#8220;workarounds&#8221; permanents. Elles deviennent elles-m\u00eames des sources d&#8217;erreurs, qui sont \u00e0 leur tour li\u00e9es \u00e0 des interventions de diagnostic co\u00fbteuses.<\/p>\n<\/div><div class=\"container-md spacer  \">\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><div class=\"container-md heading  \">\n<h4 class=\"wp-block-heading\">\u00c9valuer les risques &amp; prendre des mesures<\/h4>\n<\/div><div class=\"container-md paragraph  \">\n<p>Les entreprises peuvent am\u00e9liorer consid\u00e9rablement la cybers\u00e9curit\u00e9 de leurs installations industrielles en \u00e9valuant leurs propres risques, en prenant des mesures de protection efficaces et en se pr\u00e9parant aux attaques. Cela implique notamment l&#8217;utilisation de solutions logicielles pour la gestion des versions et des sauvegardes, afin de garantir une gestion de la conformit\u00e9 sans faille et un plan de reprise apr\u00e8s sinistre.<\/p>\n<\/div><div class=\"container-md spacer  \">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>  <div class=\"slider-column-parent\">\n    <div class=\"container\">\n      <div class=\"slider-column-title\">Massnahmen f\u00fcr mehr Sicherheit<\/div>\n\n      <div class=\"slider-column\">\n        <div class=\"slider-cell carousel-cell large\"><div class=\"column-box\">\n      <div class=\"icon \">\n      <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/Ikon-speedometer_-150x150-1.png.webp\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" \/>    <\/div>\n  \n      <div class=\"title\">\n      Risiken beurteilen    <\/div>\n  \n      <div class=\"text\">\n      <ul>\n<li style=\"text-align: left\">Eigene Cybersyicherheit bewerten<\/li>\n<li style=\"text-align: left\">Cyber-Business-Metriken entwickeln &amp; \u00fcberwachen<\/li>\n<\/ul>\n    <\/div>\n  \n  \n  <\/div>\n\n<\/div><div class=\"slider-cell carousel-cell large\"><div class=\"column-box\">\n      <div class=\"icon \">\n      <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/icon-cybersecurity2-150x150.png.webp\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" srcset=\"https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/icon-cybersecurity2-150x150.png.webp 150w, https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/icon-cybersecurity2-300x300.png.webp 300w, https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/icon-cybersecurity2.png.webp 500w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>    <\/div>\n  \n      <div class=\"title\">\n      Vor Angriffen sch\u00fctzen    <\/div>\n  \n      <div class=\"text\">\n      <ul>\n<li style=\"text-align: left\">Sicherheitsprozess einrichten<\/li>\n<li style=\"text-align: left\">detaillierte Inventar der OT-Anlage erstellen<\/li>\n<li style=\"text-align: left\">alle Ger\u00e4te automatisch sichern<\/li>\n<\/ul>\n    <\/div>\n  \n  \n  <\/div>\n\n<\/div><div class=\"slider-cell carousel-cell large\"><div class=\"column-box\">\n      <div class=\"icon \">\n      <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/icon-lupe2-150x150.png.webp\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" \/>    <\/div>\n  \n      <div class=\"title\">\n      Risiken minimieren    <\/div>\n  \n      <div class=\"text\">\n      <ul>\n<li style=\"text-align: left\">Sicherheitsstatus \u00fcberwachen (CVE: common velnerabilities and exposures)<\/li>\n<li style=\"text-align: left\">Sicherheitsl\u00fccken erkennen und schliessen<\/li>\n<li style=\"text-align: left\">Anderungen dokumentieren<\/li>\n<\/ul>\n    <\/div>\n  \n  \n  <\/div>\n\n<\/div><div class=\"slider-cell carousel-cell large\"><div class=\"column-box\">\n      <div class=\"icon \">\n      <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/Icon-Newsletter-150x150.png.webp\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" srcset=\"https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/Icon-Newsletter-150x150.png.webp 150w, https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/Icon-Newsletter-300x300.png.webp 300w, https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/Icon-Newsletter.png 420w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>    <\/div>\n  \n      <div class=\"title\">\n      schnelle Reaktion    <\/div>\n  \n      <div class=\"text\">\n      <ul>\n<li style=\"text-align: left\">Ver\u00e4nderungen schnell erkennen; Alarme ausl\u00f6sen<\/li>\n<li style=\"text-align: left\">letzte Version vor Angriff schnell wiederherstellen<\/li>\n<\/ul>\n    <\/div>\n  \n  \n  <\/div>\n\n<\/div>      <\/div>\n    <\/div>\n  <\/div>\n<div class=\"container-md paragraph  \">\n<p><strong>De mani\u00e8re g\u00e9n\u00e9rale<\/strong>, la s\u00e9curit\u00e9 est un processus continu qui n\u00e9cessite des contr\u00f4les et des ajustements r\u00e9guliers.<\/p>\n<\/div><div class=\"container-md spacer  \">\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><div class=\"container-md heading  \">\n<h4 class=\"wp-block-heading\" id=\"e17430607b043b380b247c35e60f7536e\">octoplant<\/h4>\n<\/div><div class=\"container-md paragraph  \">\n<p>Les managers ont besoin des bons outils pour garantir une production efficace, robuste et transparente qui<\/p>\n<\/div><div class=\"container-md list  \">\n<ul class=\"wp-block-list\"><div class=\"container-md list-item  \">\n<li>permettre des d\u00e9cisions rapides, bas\u00e9es sur des faits<\/li>\n<\/div>\n\n<div class=\"container-md list-item  \">\n<li>sont faciles \u00e0 utiliser et \u00e0 mettre en \u0153uvre<\/li>\n<\/div><\/ul>\n<\/div><div class=\"container-md image  \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"478\" src=\"https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/DE_Grundgrafik_quer-800x478-1.jpg\" alt=\"\" class=\"wp-image-7699\" srcset=\"https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/DE_Grundgrafik_quer-800x478-1.jpg 800w, https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/DE_Grundgrafik_quer-800x478-1-300x179.jpg 300w, https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/DE_Grundgrafik_quer-800x478-1-768x459.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><figcaption class=\"wp-element-caption\">Les 8 fonctions de l&#8217;octoplant d&#8217;AUVESY-MDT<\/figcaption><\/figure>\n<\/div><div class=\"container-md spacer  \">\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><div class=\"container-md paragraph  \">\n<p>Des solutions comme octoplant d&#8217;AUVESY-MDT offrent une vue \u00e0 360 degr\u00e9s de l&#8217;ensemble des installations industrielles, ind\u00e9pendamment des normes du secteur. Elles compl\u00e8tent une strat\u00e9gie de cybers\u00e9curit\u00e9 bien pens\u00e9e \u00e0 chaque \u00e9tape : pr\u00e9vention des attaques, d\u00e9tection pr\u00e9coce d&#8217;une attaque et minimisation des dommages gr\u00e2ce \u00e0 une restauration rapide et \u00e0 la compatibilit\u00e9 avec un grand nombre de syst\u00e8mes d&#8217;automatisation.<\/p>\n<\/div><div class=\"container-md paragraph  \">\n<p>L&#8217;inventaire des actifs d&#8217;octoplant permet une autre identification fiable des points faibles. Pour ce faire, l&#8217;inventaire est compar\u00e9 aux bases de donn\u00e9es CVE publiques et l&#8217;\u00e9tat des appareils et des syst\u00e8mes est v\u00e9rifi\u00e9, ainsi que le moment o\u00f9 le mat\u00e9riel et les appareils obsol\u00e8tes doivent \u00eatre remplac\u00e9s.<\/p>\n<\/div><div class=\"container-md spacer  \">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><div class=\"container-md heading  \">\n<h2 class=\"wp-block-heading\">octoplant est-il \u00e9galement adapt\u00e9 \u00e0 votre entreprise ?<\/h2>\n<\/div><div class=\"container-md paragraph  \">\n<p>Profitez de l&#8217;occasion pour clarifier vos questions et vous informer en d\u00e9tail sur la &#8220;cybers\u00e9curit\u00e9 pour les entreprises industrielles&#8221; &#8211; prenez tout de suite rendez-vous avec Patrik Zeder.<\/p>\n<\/div><div class=\"container-md hubspot-meeting-block  \">\n<div class=\"wp-block-leadin-hubspot-meeting-block\">\n\t\t<div class=\"meetings-iframe-container\" data-src=\"https:\/\/meetings.hubspot.com\/patrik-zeder?embed=true\"><\/div>\n\t\t<script>\n\t\t\tif(window.hbspt && window.hbspt.meetings){\n\t\t\t\twindow.hbspt.meetings.create(\".meetings-iframe-container\");\n\t\t\t}\n\t\t\t<\/script>\n\t\ta\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Les cyber-attaques cibl\u00e9es sur les installations industrielles continuent d&#8217;augmenter, tout comme les co\u00fbts qu&#8217;elles engendrent. D\u00e9couvrez comment vous prot\u00e9ger.<\/p>\n","protected":false},"featured_media":0,"template":"","insight_category":[],"class_list":["post-20091","insights","type-insights","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybers\u00e9curit\u00e9 pour les entreprises industrielles - Novotek CH<\/title>\n<meta name=\"description\" content=\"Les cyberattaques contre les installations industrielles sont en augmentation, tout comme les co\u00fbts qu&#039;elles engendrent. Que pouvez-vous faire pour y rem\u00e9dier?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.novotek.com\/ch\/fr\/insight\/cybersecurite-pour-les-entreprises-industrielles\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybers\u00e9curit\u00e9 pour les entreprises industrielles - Novotek CH\" \/>\n<meta property=\"og:description\" content=\"Les cyberattaques contre les installations industrielles sont en augmentation, tout comme les co\u00fbts qu&#039;elles engendrent. Que pouvez-vous faire pour y rem\u00e9dier?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.novotek.com\/ch\/fr\/insight\/cybersecurite-pour-les-entreprises-industrielles\/\" \/>\n<meta property=\"og:site_name\" content=\"Novotek CH\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-12T15:27:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/OT-Cybersicherheit-edited.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.novotek.com\\\/ch\\\/fr\\\/insight\\\/cybersecurite-pour-les-entreprises-industrielles\\\/\",\"url\":\"https:\\\/\\\/www.novotek.com\\\/ch\\\/fr\\\/insight\\\/cybersecurite-pour-les-entreprises-industrielles\\\/\",\"name\":\"Cybers\u00e9curit\u00e9 pour les entreprises industrielles - Novotek CH\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.novotek.com\\\/ch\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.novotek.com\\\/ch\\\/fr\\\/insight\\\/cybersecurite-pour-les-entreprises-industrielles\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.novotek.com\\\/ch\\\/fr\\\/insight\\\/cybersecurite-pour-les-entreprises-industrielles\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.novotek.com\\\/ch\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/OT-Cybersicherheit-edited.jpg\",\"datePublished\":\"2024-02-09T14:57:17+00:00\",\"dateModified\":\"2024-02-12T15:27:54+00:00\",\"description\":\"Les cyberattaques contre les installations industrielles sont en augmentation, tout comme les co\u00fbts qu'elles engendrent. Que pouvez-vous faire pour y rem\u00e9dier?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.novotek.com\\\/ch\\\/fr\\\/insight\\\/cybersecurite-pour-les-entreprises-industrielles\\\/#breadcrumb\"},\"inLanguage\":\"fr-CH\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.novotek.com\\\/ch\\\/fr\\\/insight\\\/cybersecurite-pour-les-entreprises-industrielles\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CH\",\"@id\":\"https:\\\/\\\/www.novotek.com\\\/ch\\\/fr\\\/insight\\\/cybersecurite-pour-les-entreprises-industrielles\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.novotek.com\\\/ch\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/OT-Cybersicherheit-edited.jpg\",\"contentUrl\":\"https:\\\/\\\/www.novotek.com\\\/ch\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/OT-Cybersicherheit-edited.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.novotek.com\\\/ch\\\/fr\\\/insight\\\/cybersecurite-pour-les-entreprises-industrielles\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.novotek.com\\\/ch\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybers\u00e9curit\u00e9 pour les entreprises industrielles\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.novotek.com\\\/ch\\\/#website\",\"url\":\"https:\\\/\\\/www.novotek.com\\\/ch\\\/\",\"name\":\"Novotek Switzerland AG\",\"description\":\"Connect - Digitalize - Optimize\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.novotek.com\\\/ch\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.novotek.com\\\/ch\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CH\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.novotek.com\\\/ch\\\/#organization\",\"name\":\"Novotek Switzerland AG\",\"url\":\"https:\\\/\\\/www.novotek.com\\\/ch\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CH\",\"@id\":\"https:\\\/\\\/www.novotek.com\\\/ch\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.novotek.com\\\/ch\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/novotek-symbol-rgb-pos-white-border-512x512-1.png\",\"contentUrl\":\"https:\\\/\\\/www.novotek.com\\\/ch\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/novotek-symbol-rgb-pos-white-border-512x512-1.png\",\"width\":512,\"height\":512,\"caption\":\"Novotek Switzerland AG\"},\"image\":{\"@id\":\"https:\\\/\\\/www.novotek.com\\\/ch\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybers\u00e9curit\u00e9 pour les entreprises industrielles - Novotek CH","description":"Les cyberattaques contre les installations industrielles sont en augmentation, tout comme les co\u00fbts qu'elles engendrent. Que pouvez-vous faire pour y rem\u00e9dier?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.novotek.com\/ch\/fr\/insight\/cybersecurite-pour-les-entreprises-industrielles\/","og_locale":"fr_FR","og_type":"article","og_title":"Cybers\u00e9curit\u00e9 pour les entreprises industrielles - Novotek CH","og_description":"Les cyberattaques contre les installations industrielles sont en augmentation, tout comme les co\u00fbts qu'elles engendrent. Que pouvez-vous faire pour y rem\u00e9dier?","og_url":"https:\/\/www.novotek.com\/ch\/fr\/insight\/cybersecurite-pour-les-entreprises-industrielles\/","og_site_name":"Novotek CH","article_modified_time":"2024-02-12T15:27:54+00:00","og_image":[{"url":"https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/OT-Cybersicherheit-edited.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.novotek.com\/ch\/fr\/insight\/cybersecurite-pour-les-entreprises-industrielles\/","url":"https:\/\/www.novotek.com\/ch\/fr\/insight\/cybersecurite-pour-les-entreprises-industrielles\/","name":"Cybers\u00e9curit\u00e9 pour les entreprises industrielles - Novotek CH","isPartOf":{"@id":"https:\/\/www.novotek.com\/ch\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.novotek.com\/ch\/fr\/insight\/cybersecurite-pour-les-entreprises-industrielles\/#primaryimage"},"image":{"@id":"https:\/\/www.novotek.com\/ch\/fr\/insight\/cybersecurite-pour-les-entreprises-industrielles\/#primaryimage"},"thumbnailUrl":"https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/OT-Cybersicherheit-edited.jpg","datePublished":"2024-02-09T14:57:17+00:00","dateModified":"2024-02-12T15:27:54+00:00","description":"Les cyberattaques contre les installations industrielles sont en augmentation, tout comme les co\u00fbts qu'elles engendrent. Que pouvez-vous faire pour y rem\u00e9dier?","breadcrumb":{"@id":"https:\/\/www.novotek.com\/ch\/fr\/insight\/cybersecurite-pour-les-entreprises-industrielles\/#breadcrumb"},"inLanguage":"fr-CH","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.novotek.com\/ch\/fr\/insight\/cybersecurite-pour-les-entreprises-industrielles\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CH","@id":"https:\/\/www.novotek.com\/ch\/fr\/insight\/cybersecurite-pour-les-entreprises-industrielles\/#primaryimage","url":"https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/OT-Cybersicherheit-edited.jpg","contentUrl":"https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/OT-Cybersicherheit-edited.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.novotek.com\/ch\/fr\/insight\/cybersecurite-pour-les-entreprises-industrielles\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.novotek.com\/ch\/fr\/"},{"@type":"ListItem","position":2,"name":"Cybers\u00e9curit\u00e9 pour les entreprises industrielles"}]},{"@type":"WebSite","@id":"https:\/\/www.novotek.com\/ch\/#website","url":"https:\/\/www.novotek.com\/ch\/","name":"Novotek Switzerland AG","description":"Connect - Digitalize - Optimize","publisher":{"@id":"https:\/\/www.novotek.com\/ch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.novotek.com\/ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CH"},{"@type":"Organization","@id":"https:\/\/www.novotek.com\/ch\/#organization","name":"Novotek Switzerland AG","url":"https:\/\/www.novotek.com\/ch\/","logo":{"@type":"ImageObject","inLanguage":"fr-CH","@id":"https:\/\/www.novotek.com\/ch\/#\/schema\/logo\/image\/","url":"https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/novotek-symbol-rgb-pos-white-border-512x512-1.png","contentUrl":"https:\/\/www.novotek.com\/ch\/wp-content\/uploads\/sites\/3\/novotek-symbol-rgb-pos-white-border-512x512-1.png","width":512,"height":512,"caption":"Novotek Switzerland AG"},"image":{"@id":"https:\/\/www.novotek.com\/ch\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.novotek.com\/ch\/fr\/wp-json\/wp\/v2\/insights\/20091","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.novotek.com\/ch\/fr\/wp-json\/wp\/v2\/insights"}],"about":[{"href":"https:\/\/www.novotek.com\/ch\/fr\/wp-json\/wp\/v2\/types\/insights"}],"wp:attachment":[{"href":"https:\/\/www.novotek.com\/ch\/fr\/wp-json\/wp\/v2\/media?parent=20091"}],"wp:term":[{"taxonomy":"insight_category","embeddable":true,"href":"https:\/\/www.novotek.com\/ch\/fr\/wp-json\/wp\/v2\/insight_category?post=20091"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}