{"id":26625,"date":"2025-08-08T08:44:48","date_gmt":"2025-08-08T06:44:48","guid":{"rendered":"https:\/\/www.amg-informatique.fr\/w2\/?p=26625"},"modified":"2025-08-22T14:52:06","modified_gmt":"2025-08-22T12:52:06","slug":"audit-cybersecurite-accessible-a-tous","status":"publish","type":"post","link":"https:\/\/www.amg-informatique.fr\/w2\/audit-cybersecurite-accessible-a-tous\/","title":{"rendered":"Un Audit Cybers\u00e9curit\u00e9 accessible \u00e0 tous"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><h2 style=\"text-align: justify;\"><strong>L\u2019audit cybers\u00e9curit\u00e9 accessible \u00e0 tous\u00a0!<\/strong><\/h2>\n<h3 class=\"fusion-responsive-typography-calculated\" style=\"text-align: left;\" data-fontsize=\"32\" data-lineheight=\"41.92px\"><strong>Auditez l\u2019ensemble de votre infrastructure informatique en moins de 5 jours<\/strong><\/h3>\n<p style=\"text-align: justify;\">Gr\u00e2ce \u00e0 une technologie de pointe SYLink, issue de d\u00e9veloppement militaire, <a href=\"https:\/\/www.amg-informatique.fr\/w2\/\">AMG Informatique<\/a> r\u00e9alise un audit cybers\u00e9curit\u00e9 complet de vos infrastructures en <strong>moins de 5 jours<\/strong> pour un tarif inf\u00e9rieur \u00e0 <strong>5 000 \u20ac<\/strong>.<\/p>\n<p style=\"text-align: justify;\" data-start=\"751\" data-end=\"957\">Par ailleurs, notre intelligence artificielle est constamment mise \u00e0 jour avec plus de <strong data-start=\"838\" data-end=\"897\">120 milliards de donn\u00e9es sur les menaces en circulation<\/strong>. Cela garantit une <strong data-start=\"917\" data-end=\"956\">analyse fiable, pr\u00e9cise et r\u00e9active<\/strong>.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2\"><h3><strong>Notre service s\u2019\u00e9tend \u00e0 9 audits sp\u00e9cialis\u00e9s<\/strong><\/h3>\n<p style=\"text-align: justify;\" data-start=\"794\" data-end=\"904\">Pour r\u00e9pondre \u00e0 l\u2019ensemble des besoins de s\u00e9curit\u00e9, <strong data-start=\"846\" data-end=\"902\">notre service se d\u00e9cline en 9 audits compl\u00e9mentaires<\/strong> :<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;\"><div class=\"fusion-separator-border sep-single\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#eae8e8;border-top-width:0px;\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-color:#d9d9d9;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:#d9d9d9;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:15px;width:100%;\"><div class=\"fusion-separator-border sep-single\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#eae8e8;border-top-width:0px;\"><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-space-between fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-max-width:200px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"150\" height=\"150\" alt=\"Audit interne\" title=\"audit interne sans fond\" src=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/audit-interne-sans-fond.png\" data-orig-src=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/audit-interne-sans-fond-150x150.png\" class=\"lazyload img-responsive wp-image-26709\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27500%27%20height%3D%27500%27%20viewBox%3D%270%200%20500%20500%27%3E%3Crect%20width%3D%27500%27%20height%3D%27500%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/audit-interne-sans-fond-200x200.png 200w, https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/audit-interne-sans-fond-400x400.png 400w, https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/audit-interne-sans-fond.png 500w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 400px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3\" style=\"--awb-margin-right:20px;\"><h4 style=\"text-align: left;\"><strong>Audit Interne<\/strong><\/h4>\n<p style=\"text-align: justify;\">Tout d&rsquo;abord, nous analysons tous les appareils connect\u00e9s ainsi que le syst\u00e8me de gestion des identit\u00e9s pour d\u00e9tecter les acc\u00e8s \u00e0 risque.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:15px;width:100%;\"><div class=\"fusion-separator-border sep-single\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#eae8e8;border-top-width:0px;\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-color:#d9d9d9;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:#ffffff;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:15px;width:100%;\"><div class=\"fusion-separator-border sep-single\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#eae8e8;border-top-width:0px;\"><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-4\" style=\"--awb-margin-left:20px;\"><h4 style=\"text-align: right;\"><strong>Audit Wifi<\/strong><\/h4>\n<p style=\"text-align: justify;\">Nous identifions les vuln\u00e9rabilit\u00e9s telles que les mots de passe faibles tout en \u00e9valuant les performances de votre r\u00e9seau sans fil afin de limiter les risques de fuite d\u2019informations.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-max-width:200px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"150\" height=\"150\" alt=\"Audit wifi\" title=\"wifi\" src=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/wifi.png\" data-orig-src=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/wifi-150x150.png\" class=\"lazyload img-responsive wp-image-26687\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27500%27%20height%3D%27500%27%20viewBox%3D%270%200%20500%20500%27%3E%3Crect%20width%3D%27500%27%20height%3D%27500%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/wifi-200x200.png 200w, https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/wifi-400x400.png 400w, https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/wifi.png 500w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 400px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:15px;width:100%;\"><div class=\"fusion-separator-border sep-single\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#eae8e8;border-top-width:0px;\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:#d9d9d9;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:15px;width:100%;\"><div class=\"fusion-separator-border sep-single\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#eae8e8;border-top-width:0px;\"><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-space-between fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-max-width:200px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\"><img decoding=\"async\" width=\"150\" height=\"150\" alt=\"\u00c9vitez la r\u00e9utilisation des mots de passe\" title=\"audit internet sans fond\" src=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/audit-internet-sans-fond.png\" data-orig-src=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/audit-internet-sans-fond-150x150.png\" class=\"lazyload img-responsive wp-image-26711\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27500%27%20height%3D%27500%27%20viewBox%3D%270%200%20500%20500%27%3E%3Crect%20width%3D%27500%27%20height%3D%27500%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/audit-internet-sans-fond-200x200.png 200w, https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/audit-internet-sans-fond-400x400.png 400w, https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/audit-internet-sans-fond.png 500w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 400px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-5\" style=\"--awb-margin-right:20px;\"><h4 style=\"text-align: left;\"><strong>Audit Internet<\/strong><\/h4>\n<p style=\"text-align: justify;\">Une simple erreur de navigation ou une activit\u00e9 web ill\u00e9gale par un salari\u00e9 peut entrainer la saisie de tout votre parc informatique. Cet audit\u00a0inspecte les failles de vos pares-feux, analyse le trafic et assure un contr\u00f4le total de l\u2019usage internet de votre organisation.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-13 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:15px;width:100%;\"><div class=\"fusion-separator-border sep-single\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#eae8e8;border-top-width:0px;\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:#ffffff;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-14 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:15px;width:100%;\"><div class=\"fusion-separator-border sep-single\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#eae8e8;border-top-width:0px;\"><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-15 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-6\" style=\"--awb-margin-left:20px;\"><h4 style=\"text-align: right;\"><strong>Audit des Mots de passe<\/strong><\/h4>\n<p style=\"text-align: justify;\">De plus, nous testons la robustesse des mots de passe face aux attaques. Nous v\u00e9rifions aussi leur conformit\u00e9 aux normes en vigueur pour rep\u00e9rer les mauvaises pratiques.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-16 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-right:20px;--awb-padding-left:37px;--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-max-width:150px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-4 hover-type-none\"><img decoding=\"async\" width=\"150\" height=\"150\" alt=\"S\u00e9curiser donn\u00e9es mots de passe\" title=\"icone mot de passe\" src=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/icone-mot-de-passe.png\" data-orig-src=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/icone-mot-de-passe-150x150.png\" class=\"lazyload img-responsive wp-image-26598\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27500%27%20height%3D%27500%27%20viewBox%3D%270%200%20500%20500%27%3E%3Crect%20width%3D%27500%27%20height%3D%27500%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/icone-mot-de-passe-200x200.png 200w, https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/icone-mot-de-passe-400x400.png 400w, https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/icone-mot-de-passe.png 500w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 400px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-17 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:15px;width:100%;\"><div class=\"fusion-separator-border sep-single\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#eae8e8;border-top-width:0px;\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:#d9d9d9;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-18 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:15px;width:100%;\"><div class=\"fusion-separator-border sep-single\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#eae8e8;border-top-width:0px;\"><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-19 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-space-between fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-max-width:180px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-5 hover-type-none\"><img decoding=\"async\" width=\"150\" height=\"150\" alt=\"S\u00e9curiser ses donn\u00e9es en changeant r\u00e9guli\u00e8rement ses mots de passe\" title=\"microsoft 365 audit\" src=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/microsoft-365-audit.png\" data-orig-src=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/microsoft-365-audit-150x150.png\" class=\"lazyload img-responsive wp-image-26689\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27500%27%20height%3D%27500%27%20viewBox%3D%270%200%20500%20500%27%3E%3Crect%20width%3D%27500%27%20height%3D%27500%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/microsoft-365-audit-200x200.png 200w, https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/microsoft-365-audit-400x400.png 400w, https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/microsoft-365-audit.png 500w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 400px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-20 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-7\" style=\"--awb-margin-right:20px;\"><h4 style=\"text-align: left;\"><strong>Audit Microsoft 365<\/strong><\/h4>\n<p style=\"text-align: justify;\">Par ailleurs, une configuration d\u00e9faillante de Microsoft 365 peut aussi exposer vos donn\u00e9es sensibles. Nous examinons les acc\u00e8s, les partages et les configurations des options de s\u00e9curit\u00e9 pour \u00e9liminer les failles et renforcer votre protection.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-21 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:15px;width:100%;\"><div class=\"fusion-separator-border sep-single\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#eae8e8;border-top-width:0px;\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:#ffffff;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-22 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:15px;width:100%;\"><div class=\"fusion-separator-border sep-single\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#eae8e8;border-top-width:0px;\"><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-23 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-8\" style=\"--awb-margin-left:20px;\"><h4 style=\"text-align: right;\"><strong>Audit M\u00e9dias<\/strong><\/h4>\n<p style=\"text-align: justify;\">Les cl\u00e9s USB ou les disques externes peuvent contenir des virus dormants ou des ransomwares. Nous identifions ces menaces invisibles pour pr\u00e9venir toute infection silencieuse.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-24 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-max-width:180px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-6 hover-type-none\"><img decoding=\"async\" width=\"150\" height=\"150\" alt=\"Sensibilisez en entreprise\" title=\"icone Sauvegarde de donn\u00e9es\" src=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/icone-Sauvegarde-de-donnees.png\" data-orig-src=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/icone-Sauvegarde-de-donnees-150x150.png\" class=\"lazyload img-responsive wp-image-26602\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27500%27%20height%3D%27500%27%20viewBox%3D%270%200%20500%20500%27%3E%3Crect%20width%3D%27500%27%20height%3D%27500%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/icone-Sauvegarde-de-donnees-200x200.png 200w, https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/icone-Sauvegarde-de-donnees-400x400.png 400w, https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/icone-Sauvegarde-de-donnees.png 500w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 400px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-25 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:15px;width:100%;\"><div class=\"fusion-separator-border sep-single\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#eae8e8;border-top-width:0px;\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-8 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:#d9d9d9;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-26 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:15px;width:100%;\"><div class=\"fusion-separator-border sep-single\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#eae8e8;border-top-width:0px;\"><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-27 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-space-between fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-max-width:180px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-7 hover-type-none\"><img decoding=\"async\" width=\"150\" height=\"150\" alt=\"S\u00e9curiser ses donn\u00e9es en changeant r\u00e9guli\u00e8rement ses mots de passe\" title=\"audit fuite de donn\u00e9e\" src=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/audit-fuite-de-donnee.png\" data-orig-src=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/audit-fuite-de-donnee-150x150.png\" class=\"lazyload img-responsive wp-image-26561\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27500%27%20height%3D%27500%27%20viewBox%3D%270%200%20500%20500%27%3E%3Crect%20width%3D%27500%27%20height%3D%27500%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/audit-fuite-de-donnee-200x200.png 200w, https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/audit-fuite-de-donnee-400x400.png 400w, https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/audit-fuite-de-donnee.png 500w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 400px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-28 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-9\" style=\"--awb-margin-right:20px;\"><h4 style=\"text-align: left;\"><strong>Audit de Fuite de donn\u00e9es<\/strong><\/h4>\n<p style=\"text-align: justify;\">De mani\u00e8re pr\u00e9ventive, cet audit permet d\u2019identifier les donn\u00e9es qui circulent sur le darkweb. Vous pouvez ainsi agir rapidement avant qu\u2019elles ne soient exploit\u00e9es \u00e0 des fins malveillantes.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-29 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:15px;width:100%;\"><div class=\"fusion-separator-border sep-single\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#eae8e8;border-top-width:0px;\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-9 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:#ffffff;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-30 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:15px;width:100%;\"><div class=\"fusion-separator-border sep-single\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#eae8e8;border-top-width:0px;\"><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-31 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-10\" style=\"--awb-margin-left:20px;\"><h4 style=\"text-align: right;\"><strong>Audit Externe<\/strong><\/h4>\n<p style=\"text-align: justify;\">Vos sites web, applications et services marchands sont constamment cibl\u00e9s en ligne par des robots malveillants \u00e0 la recherche de faille. Cet audit identifie, analyse, \u00e9value et vous recommande les correctifs adapt\u00e9s.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-32 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-max-width:180px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-8 hover-type-none\"><img decoding=\"async\" width=\"150\" height=\"150\" alt=\"Sensibilisez en entreprise\" title=\"audit externe\" src=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/audit-externe-1.png\" data-orig-src=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/audit-externe-1-150x150.png\" class=\"lazyload img-responsive wp-image-26597\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27500%27%20height%3D%27500%27%20viewBox%3D%270%200%20500%20500%27%3E%3Crect%20width%3D%27500%27%20height%3D%27500%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/audit-externe-1-200x200.png 200w, https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/audit-externe-1-400x400.png 400w, https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/audit-externe-1.png 500w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 400px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-33 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:15px;width:100%;\"><div class=\"fusion-separator-border sep-single\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#eae8e8;border-top-width:0px;\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:#d9d9d9;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-34 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:15px;width:100%;\"><div class=\"fusion-separator-border sep-single\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#eae8e8;border-top-width:0px;\"><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-35 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-space-between fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-max-width:180px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-9 hover-type-none\"><img decoding=\"async\" width=\"150\" height=\"150\" alt=\"S\u00e9curiser ses donn\u00e9es en changeant r\u00e9guli\u00e8rement ses mots de passe\" title=\"RGPD sans fond\" src=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/RGPD-sans-fond.png\" data-orig-src=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/RGPD-sans-fond-150x150.png\" class=\"lazyload img-responsive wp-image-26712\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27500%27%20height%3D%27500%27%20viewBox%3D%270%200%20500%20500%27%3E%3Crect%20width%3D%27500%27%20height%3D%27500%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/RGPD-sans-fond-200x200.png 200w, https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/RGPD-sans-fond-400x400.png 400w, https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/RGPD-sans-fond.png 500w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 400px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-36 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-11\" style=\"--awb-margin-right:20px;\"><h4 style=\"text-align: left;\"><strong>Audit RGPD<\/strong><\/h4>\n<p style=\"text-align: justify;\">Enfin, respecter le RGPD est crucial pour \u00e9viter sanction et fuite de donn\u00e9e. L\u2019audit RGPD \u00e9value vos pratiques de gestion de donn\u00e9es personnelles, d\u00e9tecte les non-conformit\u00e9s et attribue un cyber score \u00e0 votre site.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-37 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:15px;width:100%;\"><div class=\"fusion-separator-border sep-single\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#eae8e8;border-top-width:0px;\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-11 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-38 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-12\"><h3><strong>Un accompagnement personnalis\u00e9<\/strong><\/h3>\n<p style=\"text-align: justify;\" data-start=\"3339\" data-end=\"3437\">\u00c0 l\u2019issue de l\u2019\u00e9valuation, nous vous remettons une <strong data-start=\"3390\" data-end=\"3423\">synth\u00e8se claire et structur\u00e9e<\/strong>, comprenant :<\/p>\n<ul style=\"text-align: justify;\" data-start=\"3438\" data-end=\"3591\">\n<li data-start=\"3438\" data-end=\"3465\">\n<p data-start=\"3440\" data-end=\"3465\">les objectifs de l\u2019audit,<\/p>\n<\/li>\n<li data-start=\"3466\" data-end=\"3496\">\n<p data-start=\"3468\" data-end=\"3496\">les m\u00e9thodologies utilis\u00e9es,<\/p>\n<\/li>\n<li data-start=\"3497\" data-end=\"3546\">\n<p data-start=\"3499\" data-end=\"3546\">les constats cl\u00e9s sur vos forces et faiblesses,<\/p>\n<\/li>\n<li data-start=\"3547\" data-end=\"3591\">\n<p data-start=\"3549\" data-end=\"3591\">des recommandations class\u00e9es par priorit\u00e9.<\/p>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\" data-start=\"3593\" data-end=\"3804\">De plus, nous joignons <strong data-start=\"3617\" data-end=\"3656\">une feuille de route op\u00e9rationnelle<\/strong> pour la mise en \u0153uvre des correctifs. Elle vous permettra de <strong data-start=\"3703\" data-end=\"3804\">vous guider dans vos d\u00e9cisions strat\u00e9giques et renforcer durablement votre s\u00e9curit\u00e9 informatique.<\/strong><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-12 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-39 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-13\"><p><strong>Pr\u00eat \u00e0 transformer vos risques en avantage concurrentiel ? <\/strong><\/p>\n<\/div><div style=\"text-align:left;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/www.amg-informatique.fr\/w2\/solutions\/cybersecurite-audit\/audit-cybersecurite.html\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">B\u00e9n\u00e9ficiez d\u2019un audit cybers\u00e9curit\u00e9<\/span><\/a><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:10px;width:100%;\"><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":14,"featured_media":26675,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[254],"tags":[],"class_list":["post-26625","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Un Audit Cybers\u00e9curit\u00e9 accessible \u00e0 tous - AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez comment un audit complet de cybers\u00e9curit\u00e9 en moins de 5 jours peut s\u00e9curiser votre infrastructure informatique.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.amg-informatique.fr\/w2\/audit-cybersecurite-accessible-a-tous\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Un Audit Cybers\u00e9curit\u00e9 accessible \u00e0 tous - AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez comment un audit complet de cybers\u00e9curit\u00e9 en moins de 5 jours peut s\u00e9curiser votre infrastructure informatique.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.amg-informatique.fr\/w2\/audit-cybersecurite-accessible-a-tous\/\" \/>\n<meta property=\"og:site_name\" content=\"AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/AMG.INFORMATIQUE\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-08T06:44:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-22T12:52:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/audit-cybersecurite-amg-informatique-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1433\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"AMG-INFORMATIQUE\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AMGINFORMATIQUE\" \/>\n<meta name=\"twitter:site\" content=\"@AMGINFORMATIQUE\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"AMG-INFORMATIQUE\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/audit-cybersecurite-accessible-a-tous\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/audit-cybersecurite-accessible-a-tous\\\/\"},\"author\":{\"name\":\"AMG-INFORMATIQUE\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#\\\/schema\\\/person\\\/cafd835a1337d64707610bbc3a2397e0\"},\"headline\":\"Un Audit Cybers\u00e9curit\u00e9 accessible \u00e0 tous\",\"datePublished\":\"2025-08-08T06:44:48+00:00\",\"dateModified\":\"2025-08-22T12:52:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/audit-cybersecurite-accessible-a-tous\\\/\"},\"wordCount\":23872,\"publisher\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/audit-cybersecurite-accessible-a-tous\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/wp-content\\\/uploads\\\/audit-cybersecurite-amg-informatique-2.png\",\"articleSection\":[\"Cybers\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/audit-cybersecurite-accessible-a-tous\\\/\",\"url\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/audit-cybersecurite-accessible-a-tous\\\/\",\"name\":\"Un Audit Cybers\u00e9curit\u00e9 accessible \u00e0 tous - AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/audit-cybersecurite-accessible-a-tous\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/audit-cybersecurite-accessible-a-tous\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/wp-content\\\/uploads\\\/audit-cybersecurite-amg-informatique-2.png\",\"datePublished\":\"2025-08-08T06:44:48+00:00\",\"dateModified\":\"2025-08-22T12:52:06+00:00\",\"description\":\"D\u00e9couvrez comment un audit complet de cybers\u00e9curit\u00e9 en moins de 5 jours peut s\u00e9curiser votre infrastructure informatique.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/audit-cybersecurite-accessible-a-tous\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/audit-cybersecurite-accessible-a-tous\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/audit-cybersecurite-accessible-a-tous\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/wp-content\\\/uploads\\\/audit-cybersecurite-amg-informatique-2.png\",\"contentUrl\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/wp-content\\\/uploads\\\/audit-cybersecurite-amg-informatique-2.png\",\"width\":2048,\"height\":1433},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/audit-cybersecurite-accessible-a-tous\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Un Audit Cybers\u00e9curit\u00e9 accessible \u00e0 tous\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#website\",\"url\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/\",\"name\":\"AMG INFORMATIQUE - Cybers\u00e9curit\u00e9\",\"description\":\"Cybers\u00e9curit\u00e9 et Solutions informatiques pour les professionnels \u00e0 Dijon (21) et au Creusot (71)\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#organization\",\"name\":\"AMG INFORMATIQUE - Expert Cybers\u00e9curit\u00e9 Bourgogne Franche-Comt\u00e9\",\"url\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/wp-content\\\/uploads\\\/logoAMG-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/wp-content\\\/uploads\\\/logoAMG-1.jpg\",\"width\":2139,\"height\":747,\"caption\":\"AMG INFORMATIQUE - Expert Cybers\u00e9curit\u00e9 Bourgogne Franche-Comt\u00e9\"},\"image\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/AMG.INFORMATIQUE\\\/\",\"https:\\\/\\\/x.com\\\/AMGINFORMATIQUE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/amg-informatique\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#\\\/schema\\\/person\\\/cafd835a1337d64707610bbc3a2397e0\",\"name\":\"AMG-INFORMATIQUE\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ef31a349669ed293bd0f770a2fa1ba353cd9cad8a1e359d203afaa8ea63e1b95?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ef31a349669ed293bd0f770a2fa1ba353cd9cad8a1e359d203afaa8ea63e1b95?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ef31a349669ed293bd0f770a2fa1ba353cd9cad8a1e359d203afaa8ea63e1b95?s=96&d=mm&r=g\",\"caption\":\"AMG-INFORMATIQUE\"},\"url\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/author\\\/amg-informatique-2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Un Audit Cybers\u00e9curit\u00e9 accessible \u00e0 tous - AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9","description":"D\u00e9couvrez comment un audit complet de cybers\u00e9curit\u00e9 en moins de 5 jours peut s\u00e9curiser votre infrastructure informatique.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.amg-informatique.fr\/w2\/audit-cybersecurite-accessible-a-tous\/","og_locale":"fr_FR","og_type":"article","og_title":"Un Audit Cybers\u00e9curit\u00e9 accessible \u00e0 tous - AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9","og_description":"D\u00e9couvrez comment un audit complet de cybers\u00e9curit\u00e9 en moins de 5 jours peut s\u00e9curiser votre infrastructure informatique.","og_url":"https:\/\/www.amg-informatique.fr\/w2\/audit-cybersecurite-accessible-a-tous\/","og_site_name":"AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9","article_publisher":"https:\/\/www.facebook.com\/AMG.INFORMATIQUE\/","article_published_time":"2025-08-08T06:44:48+00:00","article_modified_time":"2025-08-22T12:52:06+00:00","og_image":[{"url":"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/audit-cybersecurite-amg-informatique-2.png","width":2048,"height":1433,"type":"image\/png"}],"author":"AMG-INFORMATIQUE","twitter_card":"summary_large_image","twitter_creator":"@AMGINFORMATIQUE","twitter_site":"@AMGINFORMATIQUE","twitter_misc":{"\u00c9crit par":"AMG-INFORMATIQUE","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.amg-informatique.fr\/w2\/audit-cybersecurite-accessible-a-tous\/#article","isPartOf":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/audit-cybersecurite-accessible-a-tous\/"},"author":{"name":"AMG-INFORMATIQUE","@id":"https:\/\/www.amg-informatique.fr\/w2\/#\/schema\/person\/cafd835a1337d64707610bbc3a2397e0"},"headline":"Un Audit Cybers\u00e9curit\u00e9 accessible \u00e0 tous","datePublished":"2025-08-08T06:44:48+00:00","dateModified":"2025-08-22T12:52:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/audit-cybersecurite-accessible-a-tous\/"},"wordCount":23872,"publisher":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/#organization"},"image":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/audit-cybersecurite-accessible-a-tous\/#primaryimage"},"thumbnailUrl":"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/audit-cybersecurite-amg-informatique-2.png","articleSection":["Cybers\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.amg-informatique.fr\/w2\/audit-cybersecurite-accessible-a-tous\/","url":"https:\/\/www.amg-informatique.fr\/w2\/audit-cybersecurite-accessible-a-tous\/","name":"Un Audit Cybers\u00e9curit\u00e9 accessible \u00e0 tous - AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9","isPartOf":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/audit-cybersecurite-accessible-a-tous\/#primaryimage"},"image":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/audit-cybersecurite-accessible-a-tous\/#primaryimage"},"thumbnailUrl":"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/audit-cybersecurite-amg-informatique-2.png","datePublished":"2025-08-08T06:44:48+00:00","dateModified":"2025-08-22T12:52:06+00:00","description":"D\u00e9couvrez comment un audit complet de cybers\u00e9curit\u00e9 en moins de 5 jours peut s\u00e9curiser votre infrastructure informatique.","breadcrumb":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/audit-cybersecurite-accessible-a-tous\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.amg-informatique.fr\/w2\/audit-cybersecurite-accessible-a-tous\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.amg-informatique.fr\/w2\/audit-cybersecurite-accessible-a-tous\/#primaryimage","url":"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/audit-cybersecurite-amg-informatique-2.png","contentUrl":"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/audit-cybersecurite-amg-informatique-2.png","width":2048,"height":1433},{"@type":"BreadcrumbList","@id":"https:\/\/www.amg-informatique.fr\/w2\/audit-cybersecurite-accessible-a-tous\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.amg-informatique.fr\/w2\/"},{"@type":"ListItem","position":2,"name":"Un Audit Cybers\u00e9curit\u00e9 accessible \u00e0 tous"}]},{"@type":"WebSite","@id":"https:\/\/www.amg-informatique.fr\/w2\/#website","url":"https:\/\/www.amg-informatique.fr\/w2\/","name":"AMG INFORMATIQUE - Cybers\u00e9curit\u00e9","description":"Cybers\u00e9curit\u00e9 et Solutions informatiques pour les professionnels \u00e0 Dijon (21) et au Creusot (71)","publisher":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.amg-informatique.fr\/w2\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.amg-informatique.fr\/w2\/#organization","name":"AMG INFORMATIQUE - Expert Cybers\u00e9curit\u00e9 Bourgogne Franche-Comt\u00e9","url":"https:\/\/www.amg-informatique.fr\/w2\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.amg-informatique.fr\/w2\/#\/schema\/logo\/image\/","url":"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/logoAMG-1.jpg","contentUrl":"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/logoAMG-1.jpg","width":2139,"height":747,"caption":"AMG INFORMATIQUE - Expert Cybers\u00e9curit\u00e9 Bourgogne Franche-Comt\u00e9"},"image":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/AMG.INFORMATIQUE\/","https:\/\/x.com\/AMGINFORMATIQUE","https:\/\/www.linkedin.com\/company\/amg-informatique\/"]},{"@type":"Person","@id":"https:\/\/www.amg-informatique.fr\/w2\/#\/schema\/person\/cafd835a1337d64707610bbc3a2397e0","name":"AMG-INFORMATIQUE","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ef31a349669ed293bd0f770a2fa1ba353cd9cad8a1e359d203afaa8ea63e1b95?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ef31a349669ed293bd0f770a2fa1ba353cd9cad8a1e359d203afaa8ea63e1b95?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ef31a349669ed293bd0f770a2fa1ba353cd9cad8a1e359d203afaa8ea63e1b95?s=96&d=mm&r=g","caption":"AMG-INFORMATIQUE"},"url":"https:\/\/www.amg-informatique.fr\/w2\/author\/amg-informatique-2\/"}]}},"_links":{"self":[{"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/posts\/26625","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/comments?post=26625"}],"version-history":[{"count":79,"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/posts\/26625\/revisions"}],"predecessor-version":[{"id":26750,"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/posts\/26625\/revisions\/26750"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/media\/26675"}],"wp:attachment":[{"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/media?parent=26625"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/categories?post=26625"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/tags?post=26625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}