{"id":12099,"date":"2020-11-25T10:00:00","date_gmt":"2020-11-25T10:00:00","guid":{"rendered":"https:\/\/thecloud.group\/?p=12099"},"modified":"2020-12-10T16:20:37","modified_gmt":"2020-12-10T16:20:37","slug":"software-uso-ilegal-impacto-en-la-ciberseguridad","status":"publish","type":"post","link":"https:\/\/thecloud.group\/fr\/software-uso-ilegal-impacto-en-la-ciberseguridad\/","title":{"rendered":"Logiciels : Utilisation ill\u00e9gale dans les entreprises et son impact sur la cybers\u00e9curit\u00e9"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"12099\" class=\"elementor elementor-12099\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-68a330f4 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"68a330f4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-70f54de6\" data-id=\"70f54de6\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-636f298c elementor-widget elementor-widget-image\" data-id=\"636f298c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/thecloud.group\/wp-content\/uploads\/elementor\/thumbs\/LogoHor-osf66wqrs0q6z5scsi4c0cpaz4hmv3cdo16ybda1og.png\" title=\"Image Logo Le Groupe Cloud\" alt=\"Cloud Group est une soci\u00e9t\u00e9 holding sp\u00e9cialis\u00e9e dans la transformation num\u00e9rique mondiale.\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5d59adb1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5d59adb1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-214baab8\" data-id=\"214baab8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-19b26ccc\" data-id=\"19b26ccc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a3eb757 elementor-widget elementor-widget-heading\" data-id=\"a3eb757\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Logiciels : Utilisation ill\u00e9gale dans les entreprises et son impact sur la cybers\u00e9curit\u00e9<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5658f684\" data-id=\"5658f684\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2aee975d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2aee975d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-2ad3f93b\" data-id=\"2ad3f93b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-32e4bfc4\" data-id=\"32e4bfc4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-415caee8\" data-id=\"415caee8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-490f735a\" data-id=\"490f735a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4e1b6a17 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4e1b6a17\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-792a9764\" data-id=\"792a9764\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5755d6b1 elementor-widget elementor-widget-text-editor\" data-id=\"5755d6b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les entreprises sont toujours expos\u00e9es au risque constant d&#039;\u00eatre attaqu\u00e9es par des logiciels malveillants, du phishing, du spam, des ransomwares et des attaques directes. Tous ces \u00e9l\u00e9ments sont li\u00e9s \u00e0 la cybers\u00e9curit\u00e9, dont ils doivent \u00eatre prot\u00e9g\u00e9s efficacement et l&#039;une des grandes raisons \u00e9conomiques. Selon certains experts, en 2015 les cyberattaques ont co\u00fbt\u00e9 aux entreprises plus de $400 milliards de dollars, soit 36% de plus que l&#039;ann\u00e9e pr\u00e9c\u00e9dente. Le site sp\u00e9cialis\u00e9 en la mati\u00e8re <a href=\"https:\/\/globbsecurity.com\/software-ilegal\">Globe S\u00e9curit\u00e9<\/a> explique que ces chiffres \u00e9quivalent \u00e0 une attaque de malware toutes les sept minutes. De plus, les attaques de cybers\u00e9curit\u00e9 nuisent \u00e9galement \u00e0 la r\u00e9putation des entreprises aupr\u00e8s de leurs clients. Cela affecte la confiance et vous pouvez perdre beaucoup d&#039;argent.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5f34f356 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5f34f356\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-55962d\" data-id=\"55962d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-28eb56c1 elementor-widget elementor-widget-heading\" data-id=\"28eb56c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Que faire pour pr\u00e9venir les attaques de logiciels malveillants\u00a0?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-625ca0cd elementor-widget elementor-widget-text-editor\" data-id=\"625ca0cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>De nombreuses mesures peuvent \u00eatre prises pour emp\u00eacher les attaques ind\u00e9sirables via le Web. Par exemple, vous pouvez et devez installer un logiciel de s\u00e9curit\u00e9, tel qu&#039;un antivirus, et former les employ\u00e9s. Une autre action consiste \u00e9galement \u00e0 utiliser des logiciels juridiques.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57f4a606 elementor-widget elementor-widget-text-editor\" data-id=\"57f4a606\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les utilisateurs d&#039;aujourd&#039;hui accordent une grande importance au fait qu&#039;une entreprise est cybers\u00e9curis\u00e9e. C&#039;est pourquoi vous devriez envisager de prendre les mesures minimales n\u00e9cessaires dans le v\u00f4tre si vous souhaitez \u00e9viter les probl\u00e8mes et les pertes d&#039;argent li\u00e9s \u00e0 la s\u00e9curit\u00e9 en ligne. En plus de la s\u00e9curit\u00e9 des r\u00e9seaux et des syst\u00e8mes de l&#039;organisation afin qu&#039;il n&#039;y ait pas de vuln\u00e9rabilit\u00e9s, ils doivent se passer de l&#039;utilisation de logiciels ill\u00e9gaux ou pirat\u00e9s.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2a9413d9\" data-id=\"2a9413d9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-61fed0c8 elementor-widget elementor-widget-image\" data-id=\"61fed0c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"533\" src=\"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/software.jpg\" class=\"elementor-animation-hang attachment-large size-large wp-image-12103\" alt=\"Logiciels et leur utilisation ill\u00e9gale\" srcset=\"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/software.jpg 950w, https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/software-300x200.jpg 300w, https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/software-768x512.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-c257afc elementor-widget elementor-widget-text-editor\" data-id=\"c257afc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les logiciels ill\u00e9gaux ou pirat\u00e9s peuvent cr\u00e9er des vuln\u00e9rabilit\u00e9s dans les ordinateurs o\u00f9 ils sont install\u00e9s et causer de graves probl\u00e8mes dans toute l&#039;organisation. Malheureusement, c&#039;est aussi une pratique r\u00e9pandue \u00e0 travers le monde pour \u00e9viter de payer les sommes d&#039;argent \u00e9lev\u00e9es que co\u00fbtent certains programmes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4dfce979 elementor-widget elementor-widget-text-editor\" data-id=\"4dfce979\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Globb Security affirme que l&#039;une des cons\u00e9quences de l&#039;utilisation de logiciels ill\u00e9gaux est la perte possible d&#039;argent. \u00ab Une augmentation de l&#039;utilisation des logiciels juridiques impacte directement la cybers\u00e9curit\u00e9 des entreprises. Chose \u00e0 prendre en compte, puisque le co\u00fbt d&#039;une cyberattaque r\u00e9ussie dans une organisation repr\u00e9sente un co\u00fbt moyen de 11 millions de dollars pour les entreprises&quot;, pr\u00e9cisent-ils dans un article publi\u00e9 sur leur blog.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3cdd8183 elementor-widget elementor-widget-heading\" data-id=\"3cdd8183\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Autres inconv\u00e9nients de l&#039;utilisation de logiciels ill\u00e9gaux<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-779a5095 elementor-widget elementor-widget-text-editor\" data-id=\"779a5095\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>En plus de courir le risque d&#039;infection par des logiciels malveillants, apr\u00e8s avoir install\u00e9 un logiciel ill\u00e9gal, vous courez le risque de pr\u00e9senter des probl\u00e8mes que vous ne pourrez pas r\u00e9soudre car vous n&#039;avez pas le support technique des d\u00e9veloppeurs du programme. Les licences officielles prot\u00e8gent g\u00e9n\u00e9ralement contre les pannes et si le logiciel est pirat\u00e9, vous n&#039;aurez \u00e9videmment pas cette aide.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d696243 elementor-widget elementor-widget-text-editor\" data-id=\"d696243\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Un autre inconv\u00e9nient est celui d&#039;\u00eatre condamn\u00e9 \u00e0 une amende par la loi. De nombreux pays utilisent les lois sur le droit d&#039;auteur pour prot\u00e9ger les d\u00e9veloppeurs de logiciels. S&#039;il s&#039;av\u00e8re que votre entreprise utilise un logiciel pirat\u00e9, cela peut entra\u00eener des amendes tr\u00e8s \u00e9lev\u00e9es, car la violation du droit d&#039;auteur est consid\u00e9r\u00e9e comme un crime.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-21d45dea elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"21d45dea\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f8c336e\" data-id=\"f8c336e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d696243 elementor-widget elementor-widget-text-editor\" data-id=\"d696243\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Un autre inconv\u00e9nient est celui d&#039;\u00eatre condamn\u00e9 \u00e0 une amende par la loi. De nombreux pays utilisent les lois sur le droit d&#039;auteur pour prot\u00e9ger les d\u00e9veloppeurs de logiciels. S&#039;il s&#039;av\u00e8re que votre entreprise utilise un logiciel pirat\u00e9, cela peut entra\u00eener des amendes tr\u00e8s \u00e9lev\u00e9es, car la violation du droit d&#039;auteur est consid\u00e9r\u00e9e comme un crime.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-19d3cf29 elementor-widget elementor-widget-text-editor\" data-id=\"19d3cf29\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Il est important pour les entreprises de s&#039;assurer qu&#039;aucun logiciel ill\u00e9gal n&#039;est install\u00e9 sur les ordinateurs de leurs employ\u00e9s. Comme nous l&#039;avons d\u00e9j\u00e0 mentionn\u00e9, il peut y avoir des amendes tr\u00e8s \u00e9lev\u00e9es, mais selon la l\u00e9gislation du pays, il peut \u00eatre ordonn\u00e9 de suspendre les activit\u00e9s, de fermer les locaux, d&#039;emprisonner et m\u00eame de dissoudre l&#039;entreprise.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4913cdef elementor-widget elementor-widget-text-editor\" data-id=\"4913cdef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Est-ce que \u00e7a en vaut la peine? Les amendes impos\u00e9es sont parfois jusqu&#039;\u00e0 quatre fois ce qu&#039;il en co\u00fbterait pour payer la licence l\u00e9gale du programme informatique.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d92998 elementor-widget elementor-widget-heading\" data-id=\"8d92998\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Sensibiliser<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d707b7 elementor-widget elementor-widget-text-editor\" data-id=\"7d707b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Une action importante que les entreprises peuvent entreprendre pour emp\u00eacher leurs employ\u00e9s d&#039;installer des logiciels ill\u00e9gaux sur les ordinateurs consiste \u00e0 mener des campagnes internes de sensibilisation. Ils peuvent ne pas \u00eatre conscients des cons\u00e9quences juridiques possibles de l&#039;utilisation de logiciels pirat\u00e9s et de ce que cela peut signifier pour eux : fermeture forc\u00e9e et perte d&#039;emploi, par exemple.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6ef827b1\" data-id=\"6ef827b1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6d302ca3 elementor-widget elementor-widget-image\" data-id=\"6d302ca3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"757\" height=\"951\" src=\"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/softwareIlegal.jpg\" class=\"elementor-animation-hang attachment-large size-large wp-image-12116\" alt=\"El uso del software ilegal en las empresas\" srcset=\"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/softwareIlegal.jpg 757w, https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/softwareIlegal-239x300.jpg 239w\" sizes=\"(max-width: 757px) 100vw, 757px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-14648e3b elementor-widget elementor-widget-text-editor\" data-id=\"14648e3b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nous vous invitons \u00e0 en savoir plus sur les sujets connexes \u00e0 <a href=\"https:\/\/thecloud.group\/fr\/blog\/\">notre blog<\/a> Et si vous avez besoin de conseils pour le d\u00e9veloppement de logiciels, le marketing num\u00e9rique, les r\u00e9seaux sociaux et plus encore,<a href=\"https:\/\/thecloud.group\/fr\/contact\/\">vous pouvez nous contacter<\/a>!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-41ee7eba elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"41ee7eba\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2342ef3e\" data-id=\"2342ef3e\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Les entreprises sont constamment expos\u00e9es aux risques d&#039;attaques par logiciels malveillants, hame\u00e7onnage, spam, ran\u00e7ongiciels et attaques directes. Tous ces fl\u00e9aux rel\u00e8vent de la cybers\u00e9curit\u00e9, contre laquelle elles doivent se prot\u00e9ger efficacement, ce qui repr\u00e9sente un enjeu \u00e9conomique majeur. Selon certains experts, les cyberattaques ont co\u00fbt\u00e9 aux entreprises plus de 1,4 milliard de dollars en 2015, soit 361,3 milliards de dollars de plus que l&#039;ann\u00e9e pr\u00e9c\u00e9dente. Le site web Globb Security, sp\u00e9cialis\u00e9 dans ce domaine, explique que cela \u00e9quivaut \u00e0 une attaque par logiciel malveillant toutes les sept minutes. Par ailleurs, les cyberattaques nuisent \u00e0 la r\u00e9putation d&#039;une entreprise aupr\u00e8s de ses clients. Elles \u00e9rodent la confiance et peuvent engendrer des pertes financi\u00e8res consid\u00e9rables.<\/p>","protected":false},"author":1,"featured_media":12103,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"footnotes":""},"categories":[162],"tags":[],"class_list":["post-12099","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sin-categorizar"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Software: Uso ilegal en empresas y su impacto en la ciberseguridad | The Cloud Group<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/thecloud.group\/fr\/software-uso-ilegal-impacto-en-la-ciberseguridad\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Software: Uso ilegal en empresas y su impacto en la ciberseguridad | The Cloud Group\" \/>\n<meta property=\"og:description\" content=\"Las empresas siempre est\u00e1n en constante riesgo de ser atacadas por alg\u00fan malware, phishing, spam, ransomware y ataques directos. Todos estos est\u00e1n relacionados con la ciberseguridad, de la cual se tienen que proteger eficientemente y una de las grandes razones econ\u00f3mica. Seg\u00fan algunos expertos, en 2015 los ataques cibern\u00e9ticos costaron a las empresas m\u00e1s de $400 mil millones de d\u00f3lares, 36% m\u00e1s que el a\u00f1o anterior. El sitio web especializado en el tema Globb Security explica que estas cifras equivalen a un ataque de malware cada siete minutos. Adicionalmente, los ataques a la ciberseguridad tambi\u00e9n da\u00f1an la reputaci\u00f3n de las empresas frente a sus clientes. Afecta la confianza y se puede perder mucho dinero.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/thecloud.group\/fr\/software-uso-ilegal-impacto-en-la-ciberseguridad\/\" \/>\n<meta property=\"og:site_name\" content=\"The Cloud Group\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/thecloudgroupglobal\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-25T10:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-10T16:20:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/software.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"950\" \/>\n\t<meta property=\"og:image:height\" content=\"633\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/thecloud.group\/#\/schema\/person\/96af9c910256c8762bee808ba76fc3b3\"},\"headline\":\"Software: Uso ilegal en empresas y su impacto en la ciberseguridad\",\"datePublished\":\"2020-11-25T10:00:00+00:00\",\"dateModified\":\"2020-12-10T16:20:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/\"},\"wordCount\":755,\"publisher\":{\"@id\":\"https:\/\/thecloud.group\/#organization\"},\"image\":{\"@id\":\"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/software.jpg\",\"articleSection\":[\"Sin categorizar\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/\",\"url\":\"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/\",\"name\":\"Software: Uso ilegal en empresas y su impacto en la ciberseguridad | The Cloud Group\",\"isPartOf\":{\"@id\":\"https:\/\/thecloud.group\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/software.jpg\",\"datePublished\":\"2020-11-25T10:00:00+00:00\",\"dateModified\":\"2020-12-10T16:20:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/#primaryimage\",\"url\":\"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/software.jpg\",\"contentUrl\":\"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/software.jpg\",\"width\":950,\"height\":633,\"caption\":\"Las empresas siempre est\u00e1n en constante riesgo de ser atacadas por alg\u00fan malware, phishing, spam, ransomware y ataques directos.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/thecloud.group\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Software: Uso ilegal en empresas y su impacto en la ciberseguridad\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/thecloud.group\/#website\",\"url\":\"https:\/\/thecloud.group\/\",\"name\":\"The Cloud Group\",\"description\":\"|\u00a0Holding Internacional de Servicios\",\"publisher\":{\"@id\":\"https:\/\/thecloud.group\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/thecloud.group\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/thecloud.group\/#organization\",\"name\":\"The Cloud Group - Holding International de Servicios\",\"url\":\"https:\/\/thecloud.group\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/thecloud.group\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/05\/logoSmallFirmaCorreo.png\",\"contentUrl\":\"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/05\/logoSmallFirmaCorreo.png\",\"width\":300,\"height\":190,\"caption\":\"The Cloud Group - Holding International de Servicios\"},\"image\":{\"@id\":\"https:\/\/thecloud.group\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/thecloudgroupglobal\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/thecloud.group\/#\/schema\/person\/96af9c910256c8762bee808ba76fc3b3\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/thecloud.group\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4907ac288f1c97f319a5c5097e9024eb489ee94179b3b92b6fa7716b303cdc86?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4907ac288f1c97f319a5c5097e9024eb489ee94179b3b92b6fa7716b303cdc86?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/thecloud.group\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Software: Uso ilegal en empresas y su impacto en la ciberseguridad | The Cloud Group","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/thecloud.group\/fr\/software-uso-ilegal-impacto-en-la-ciberseguridad\/","og_locale":"fr_FR","og_type":"article","og_title":"Software: Uso ilegal en empresas y su impacto en la ciberseguridad | The Cloud Group","og_description":"Las empresas siempre est\u00e1n en constante riesgo de ser atacadas por alg\u00fan malware, phishing, spam, ransomware y ataques directos. Todos estos est\u00e1n relacionados con la ciberseguridad, de la cual se tienen que proteger eficientemente y una de las grandes razones econ\u00f3mica. Seg\u00fan algunos expertos, en 2015 los ataques cibern\u00e9ticos costaron a las empresas m\u00e1s de $400 mil millones de d\u00f3lares, 36% m\u00e1s que el a\u00f1o anterior. El sitio web especializado en el tema Globb Security explica que estas cifras equivalen a un ataque de malware cada siete minutos. Adicionalmente, los ataques a la ciberseguridad tambi\u00e9n da\u00f1an la reputaci\u00f3n de las empresas frente a sus clientes. Afecta la confianza y se puede perder mucho dinero.","og_url":"https:\/\/thecloud.group\/fr\/software-uso-ilegal-impacto-en-la-ciberseguridad\/","og_site_name":"The Cloud Group","article_publisher":"https:\/\/www.facebook.com\/thecloudgroupglobal","article_published_time":"2020-11-25T10:00:00+00:00","article_modified_time":"2020-12-10T16:20:37+00:00","og_image":[{"width":950,"height":633,"url":"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/software.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/#article","isPartOf":{"@id":"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/"},"author":{"name":"admin","@id":"https:\/\/thecloud.group\/#\/schema\/person\/96af9c910256c8762bee808ba76fc3b3"},"headline":"Software: Uso ilegal en empresas y su impacto en la ciberseguridad","datePublished":"2020-11-25T10:00:00+00:00","dateModified":"2020-12-10T16:20:37+00:00","mainEntityOfPage":{"@id":"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/"},"wordCount":755,"publisher":{"@id":"https:\/\/thecloud.group\/#organization"},"image":{"@id":"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/#primaryimage"},"thumbnailUrl":"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/software.jpg","articleSection":["Sin categorizar"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/","url":"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/","name":"Software: Uso ilegal en empresas y su impacto en la ciberseguridad | The Cloud Group","isPartOf":{"@id":"https:\/\/thecloud.group\/#website"},"primaryImageOfPage":{"@id":"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/#primaryimage"},"image":{"@id":"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/#primaryimage"},"thumbnailUrl":"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/software.jpg","datePublished":"2020-11-25T10:00:00+00:00","dateModified":"2020-12-10T16:20:37+00:00","breadcrumb":{"@id":"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/#primaryimage","url":"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/software.jpg","contentUrl":"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/software.jpg","width":950,"height":633,"caption":"Las empresas siempre est\u00e1n en constante riesgo de ser atacadas por alg\u00fan malware, phishing, spam, ransomware y ataques directos."},{"@type":"BreadcrumbList","@id":"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/thecloud.group\/"},{"@type":"ListItem","position":2,"name":"Software: Uso ilegal en empresas y su impacto en la ciberseguridad"}]},{"@type":"WebSite","@id":"https:\/\/thecloud.group\/#website","url":"https:\/\/thecloud.group\/","name":"Le groupe Cloud","description":"| Soci\u00e9t\u00e9 de services internationaux","publisher":{"@id":"https:\/\/thecloud.group\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/thecloud.group\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/thecloud.group\/#organization","name":"The Cloud Group - Soci\u00e9t\u00e9 de services internationaux","url":"https:\/\/thecloud.group\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/thecloud.group\/#\/schema\/logo\/image\/","url":"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/05\/logoSmallFirmaCorreo.png","contentUrl":"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/05\/logoSmallFirmaCorreo.png","width":300,"height":190,"caption":"The Cloud Group - Holding International de Servicios"},"image":{"@id":"https:\/\/thecloud.group\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/thecloudgroupglobal"]},{"@type":"Person","@id":"https:\/\/thecloud.group\/#\/schema\/person\/96af9c910256c8762bee808ba76fc3b3","name":"administrateur","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/thecloud.group\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4907ac288f1c97f319a5c5097e9024eb489ee94179b3b92b6fa7716b303cdc86?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4907ac288f1c97f319a5c5097e9024eb489ee94179b3b92b6fa7716b303cdc86?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/thecloud.group"]}]}},"_links":{"self":[{"href":"https:\/\/thecloud.group\/fr\/wp-json\/wp\/v2\/posts\/12099","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thecloud.group\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thecloud.group\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thecloud.group\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thecloud.group\/fr\/wp-json\/wp\/v2\/comments?post=12099"}],"version-history":[{"count":12,"href":"https:\/\/thecloud.group\/fr\/wp-json\/wp\/v2\/posts\/12099\/revisions"}],"predecessor-version":[{"id":13214,"href":"https:\/\/thecloud.group\/fr\/wp-json\/wp\/v2\/posts\/12099\/revisions\/13214"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thecloud.group\/fr\/wp-json\/wp\/v2\/media\/12103"}],"wp:attachment":[{"href":"https:\/\/thecloud.group\/fr\/wp-json\/wp\/v2\/media?parent=12099"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thecloud.group\/fr\/wp-json\/wp\/v2\/categories?post=12099"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thecloud.group\/fr\/wp-json\/wp\/v2\/tags?post=12099"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}