{"id":7169,"date":"2022-02-09T11:03:46","date_gmt":"2022-02-09T11:03:46","guid":{"rendered":"https:\/\/edsoris.com\/?page_id=7169"},"modified":"2022-02-22T15:22:17","modified_gmt":"2022-02-22T15:22:17","slug":"network-and-cybersecurity","status":"publish","type":"page","link":"https:\/\/edsoris.com\/en\/network-and-cybersecurity","title":{"rendered":"Network And Cybersecurity"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"7169\" class=\"elementor elementor-7169\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-852fdd1 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"852fdd1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2e2cc8f ot-flex-column-vertical\" data-id=\"2e2cc8f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eacf528 elementor-widget elementor-widget-iheading\" data-id=\"eacf528\" data-element_type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ Make digital security your priority<\/span>\r\n\t        <h2 class=\"main-heading\">Cybersecurity at the center of your business strategy\n<\/h2>\t    <\/div>\r\n\t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e7d0a04 elementor-widget elementor-widget-text-editor\" data-id=\"e7d0a04\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.17.0 - 25-10-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>Cybersecurity has become an essential subject for all companies trying to prevent the invasion and theft of data, which could compromise their operations and strategic positioning.<\/p><p><em class=\"text-dark\"><b>At Edsoris, we take your company's cybersecurity very seriously at all levels.<\/b><\/em><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-0711f61 ot-flex-column-vertical\" data-id=\"0711f61\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f251ce2 elementor-widget elementor-widget-image\" data-id=\"f251ce2\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.17.0 - 25-10-2023 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"684\" src=\"https:\/\/edsoris.com\/content\/uploads\/2021\/05\/pexels-christina-morillo-1181341-scaled-1024x684.jpg\" class=\"attachment-large size-large wp-image-1854\" alt=\"\" srcset=\"https:\/\/edsoris.com\/content\/uploads\/2021\/05\/pexels-christina-morillo-1181341-scaled-1024x684.jpg 1024w, https:\/\/edsoris.com\/content\/uploads\/2021\/05\/pexels-christina-morillo-1181341-scaled-300x200.jpg 300w, https:\/\/edsoris.com\/content\/uploads\/2021\/05\/pexels-christina-morillo-1181341-scaled-768x513.jpg 768w, https:\/\/edsoris.com\/content\/uploads\/2021\/05\/pexels-christina-morillo-1181341-scaled-1536x1025.jpg 1536w, https:\/\/edsoris.com\/content\/uploads\/2021\/05\/pexels-christina-morillo-1181341-scaled-2048x1367.jpg 2048w, https:\/\/edsoris.com\/content\/uploads\/2021\/05\/pexels-christina-morillo-1181341-scaled-720x481.jpg 720w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-50f8be2 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"50f8be2\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ad4f9d3 ot-flex-column-vertical\" data-id=\"ad4f9d3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a79fe3a elementor-widget elementor-widget-iheading\" data-id=\"a79fe3a\" data-element_type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        <h2 class=\"main-heading\">Anyone is vulnerable to digital attacks. For this reason, our employees are trained in all aspects of digital security.<\/h2>\t    <\/div>\r\n\t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f61a7c9 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f61a7c9\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-39946d1 ot-flex-column-vertical\" data-id=\"39946d1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-65c63bd elementor-widget elementor-widget-image\" data-id=\"65c63bd\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/edsoris.com\/content\/uploads\/2021\/05\/https___specials-images.forbesimg.com_imageserve_5f70e712d4b4f36245cfbefb_0x0-1024x683.jpg\" class=\"attachment-large size-large wp-image-2097\" alt=\"\" srcset=\"https:\/\/edsoris.com\/content\/uploads\/2021\/05\/https___specials-images.forbesimg.com_imageserve_5f70e712d4b4f36245cfbefb_0x0-1024x683.jpg 1024w, https:\/\/edsoris.com\/content\/uploads\/2021\/05\/https___specials-images.forbesimg.com_imageserve_5f70e712d4b4f36245cfbefb_0x0-300x200.jpg 300w, https:\/\/edsoris.com\/content\/uploads\/2021\/05\/https___specials-images.forbesimg.com_imageserve_5f70e712d4b4f36245cfbefb_0x0-768x512.jpg 768w, https:\/\/edsoris.com\/content\/uploads\/2021\/05\/https___specials-images.forbesimg.com_imageserve_5f70e712d4b4f36245cfbefb_0x0-720x480.jpg 720w, https:\/\/edsoris.com\/content\/uploads\/2021\/05\/https___specials-images.forbesimg.com_imageserve_5f70e712d4b4f36245cfbefb_0x0.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-21ab07d ot-flex-column-vertical\" data-id=\"21ab07d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4556a42 elementor-widget elementor-widget-iheading\" data-id=\"4556a42\" data-element_type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        <h3 class=\"main-heading\">Our approach<\/h3>\t    <\/div>\r\n\t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eacf9e9 elementor-widget elementor-widget-text-editor\" data-id=\"eacf9e9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul><li>Performing tests and identifying vulnerabilities in networks and systems<\/li><li>Planning, implementation, management, control and updating of security measures for the protection of data, systems and networks<\/li><li>Assessment of company security requirements and implementation of best practices<\/li><li>Troubleshoot security and network issues<\/li><li>Monitoring of all network devices and security systems to protect the integrity of company data<\/li><li>Promoting an organizational culture for data management and protection<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-651b3c3 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"651b3c3\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-38b2248 ot-flex-column-vertical\" data-id=\"38b2248\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-aeb9378 elementor-widget elementor-widget-text-editor\" data-id=\"aeb9378\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<blockquote><p>Protecting yourself against attacks requires educating your employees and also adopting new technologies.<\/p><\/blockquote>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b87e50c elementor-widget elementor-widget-text-editor\" data-id=\"b87e50c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Our teams support you in protecting your information systems by setting up prevention plans against threats in order to promote the adoption of digital security rules within your company and also by setting up new technologies such as AI, which makes it possible to anticipate flaws and detect abnormal behavior.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ed9c476 ot-flex-column-vertical\" data-id=\"ed9c476\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f314edf elementor-widget elementor-widget-image\" data-id=\"f314edf\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/edsoris.com\/content\/uploads\/2021\/05\/pexels-pixabay-60504-scaled-1024x683.jpg\" class=\"attachment-large size-large wp-image-2509\" alt=\"\" srcset=\"https:\/\/edsoris.com\/content\/uploads\/2021\/05\/pexels-pixabay-60504-scaled-1024x683.jpg 1024w, https:\/\/edsoris.com\/content\/uploads\/2021\/05\/pexels-pixabay-60504-scaled-300x200.jpg 300w, https:\/\/edsoris.com\/content\/uploads\/2021\/05\/pexels-pixabay-60504-scaled-768x512.jpg 768w, https:\/\/edsoris.com\/content\/uploads\/2021\/05\/pexels-pixabay-60504-scaled-1536x1024.jpg 1536w, https:\/\/edsoris.com\/content\/uploads\/2021\/05\/pexels-pixabay-60504-scaled-2048x1366.jpg 2048w, https:\/\/edsoris.com\/content\/uploads\/2021\/05\/pexels-pixabay-60504-scaled-720x480.jpg 720w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e7eeddc ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e7eeddc\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-457ee47 ot-flex-column-vertical\" data-id=\"457ee47\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bbbb2f5 elementor-widget elementor-widget-iheading\" data-id=\"bbbb2f5\" data-element_type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        <h3 class=\"main-heading\">Some figures<\/h3>\t    <\/div>\r\n\t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e31284b elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"e31284b\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-ec063be ot-flex-column-vertical\" data-id=\"ec063be\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e5450bd elementor-widget elementor-widget-icounter\" data-id=\"e5450bd\" data-element_type=\"widget\" data-widget_type=\"icounter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t    \t<div class=\"icounter ot-counter\">\r\n\t\t        \t<div>\r\n\t\t        \t\t<span class=\"num\" data-to=\"50\" data-time= \"2000\"><\/span>\r\n\t\t        \t\t<span>%<\/span>\r\n\t\t        \t<\/div>\r\n\t\t        \t      \t\t\t\t        \r\n\t\t\t    <\/div>\r\n\t\t    \t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc368c6 elementor-widget elementor-widget-text-editor\" data-id=\"cc368c6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>Business computers infected in 2019 were re-infected the same year.<\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-1da48e2 ot-flex-column-vertical\" data-id=\"1da48e2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5f3c034 elementor-widget elementor-widget-icounter\" data-id=\"5f3c034\" data-element_type=\"widget\" data-widget_type=\"icounter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t    \t<div class=\"icounter ot-counter\">\r\n\t\t        \t<div>\r\n\t\t        \t\t<span class=\"num\" data-to=\"3\" data-time= \"2000\"><\/span>\r\n\t\t        \t\t<span>M<\/span>\r\n\t\t        \t<\/div>\r\n\t\t        \t      \t\t\t\t        \r\n\t\t\t    <\/div>\r\n\t\t    \t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b901018 elementor-widget elementor-widget-text-editor\" data-id=\"b901018\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<strong>Every minute, approximately $3 million is lost due to cybercrime.<\/strong>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-f303a36 ot-flex-column-vertical\" data-id=\"f303a36\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a6dbf41 elementor-widget elementor-widget-icounter\" data-id=\"a6dbf41\" data-element_type=\"widget\" data-widget_type=\"icounter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t    \t<div class=\"icounter ot-counter\">\r\n\t\t        \t<div>\r\n\t\t        \t\t<span class=\"num\" data-to=\"10500\" data-time= \"2000\"><\/span>\r\n\t\t        \t\t<span><\/span>\r\n\t\t        \t<\/div>\r\n\t\t        \t      \t\t\t\t        \r\n\t\t\t    <\/div>\r\n\t\t    \t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4237042 elementor-widget elementor-widget-text-editor\" data-id=\"4237042\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<strong>Cybercrime is expected to cost the world $10.5 trillion a year by 2025.<\/strong>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-01aae2a ot-flex-column-vertical\" data-id=\"01aae2a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-335b052 elementor-widget elementor-widget-icounter\" data-id=\"335b052\" data-element_type=\"widget\" data-widget_type=\"icounter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t    \t<div class=\"icounter ot-counter\">\r\n\t\t        \t<div>\r\n\t\t        \t\t<span class=\"num\" data-to=\"95\" data-time= \"2000\"><\/span>\r\n\t\t        \t\t<span>%<\/span>\r\n\t\t        \t<\/div>\r\n\t\t        \t      \t\t\t\t        \r\n\t\t\t    <\/div>\r\n\t\t    \t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c645c62 elementor-widget elementor-widget-text-editor\" data-id=\"c645c62\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>Cybersecurity vulnerabilities are caused by human error. <\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6fdad98 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6fdad98\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-22890da ot-flex-column-vertical\" data-id=\"22890da\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-99d0cd9 elementor-widget elementor-widget-text-editor\" data-id=\"99d0cd9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p id=\"h-sources\">Sources<\/p>\nForbes:\u00a0<a href=\"https:\/\/www.forbes.com\/sites\/chuckbrooks\/2021\/03\/02\/alarming-cybersecurity-stats-------what-you-need-to-know-for-2021\/?sh=1fa235e358d3\"><em>Alarming Cybersecurity Stats<\/em><\/a><em>: What You Need To Know For 2021<\/em>\u00a0by Chuck Brooks \/ CSO:\u00a0<a href=\"https:\/\/www.csoonline.com\/article\/3153707\/top-cybersecurity-facts-figures-and-statistics.html\"><em>Top cybersecurity facts, figures and statistics<\/em><\/a>\u00a0by Josh Fruhlinger . \/ Comparitech:\u00a0<a href=\"https:\/\/www.comparitech.com\/vpn\/cybersecurity-cyber-crime-statistics-facts-trends\/\"><em>300+ Terrifying Cybercrime and Cybersecurity Statistics &amp; Trends<\/em><\/a>\u00a0by Andra Zaharia \/ IBM Security:\u00a0<a href=\"https:\/\/www.capita.com\/sites\/g\/files\/nginej291\/files\/2020-08\/Ponemon-Global-Cost-of-Data-Breach-Study-2020.pdf\"><em>Cost of a Data Breach Report 2020 \/<\/em><\/a>Verizon:\u00a0<a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/2020-data-breach-investigations-report.pdf\"><em>Data Breach Investigations Report 2020<\/em><\/a> \/\n<\/a>Security Facts:\u00a0<a href=\"https:\/\/www.cybintsolutions.com\/cyber-security-facts-stats\/\"><em>Cybint<\/em><\/a>\n\n&nbsp;\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>\/\/ Faites de la s\u00e9curit\u00e9 num\u00e9rique votre priorit\u00e9 La cybers\u00e9curit\u00e9 au centre de votre strat\u00e9gie d\u2019entreprise La cybers\u00e9curit\u00e9 est devenue un sujet incontournable pour toutes les entreprises qui tentent de pr\u00e9venir l\u2019invasion et le vol de donn\u00e9es, susceptibles de compromettre leurs fonctionnements et positionnements strat\u00e9giques. Chez Edsoris, nous abordons la cybers\u00e9curit\u00e9 de votre entreprise tr\u00e8s [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-7169","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/edsoris.com\/en\/wp-json\/wp\/v2\/pages\/7169","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/edsoris.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/edsoris.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/edsoris.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/edsoris.com\/en\/wp-json\/wp\/v2\/comments?post=7169"}],"version-history":[{"count":229,"href":"https:\/\/edsoris.com\/en\/wp-json\/wp\/v2\/pages\/7169\/revisions"}],"predecessor-version":[{"id":9569,"href":"https:\/\/edsoris.com\/en\/wp-json\/wp\/v2\/pages\/7169\/revisions\/9569"}],"wp:attachment":[{"href":"https:\/\/edsoris.com\/en\/wp-json\/wp\/v2\/media?parent=7169"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}