{"id":556,"date":"2023-08-15T07:47:47","date_gmt":"2023-08-15T07:47:47","guid":{"rendered":"https:\/\/www.becybersafe.be\/documents\/"},"modified":"2024-03-22T07:04:45","modified_gmt":"2024-03-22T07:04:45","slug":"documents","status":"publish","type":"page","link":"https:\/\/www.becybersafe.be\/fr\/documents\/","title":{"rendered":"Documents"},"content":{"rendered":"\n<div class=\"wp-block-columns are-vertically-aligned-top is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p>Voici quelques documents, mod\u00e8les et plans d&#8217;action. Des directives de s\u00e9curit\u00e9 aux listes de v\u00e9rification pratiques, ces documents servent de guide pour renforcer la s\u00e9curit\u00e9 num\u00e9rique de votre boutique en ligne ou de votre PME, rester \u00e0 jour avec les derni\u00e8res \u00e9volutions et \u00eatre pr\u00eat \u00e0 faire face \u00e0 d&#8217;\u00e9ventuels probl\u00e8mes. Ensemble, construisons un avenir num\u00e9rique plus s\u00fbr pour votre entreprise !<\/p>\n\n\n<div id=\"block-documents-section-block_b733747d5e9f5be2f91052b2a2f31210\" class=\"block-documents-section\">\n    <div class=\"articles-container\">\n        <div class=\"articles-wrapper\">\n                                                \n<article class=\"post-1584 documents type-documents status-publish hentry\">\n    <div class=\"entry-body\">\n        <div class=\"entry-title h2\" >\n            Guide de r\u00e9action \u00e0 une cyberattaque pour webshops        <\/div>\n        <div class=\"entry-size h4\">\n            506.57 kb        <\/div>\n        <a href=\"#\" data-toggle=\"modal\" data-target=\"#downloadModal\" data-download-name=\"Incident-response-guide-FR-WEBSHOP-OWNERS.pdf\" data-download-link=\"https:\/\/www.becybersafe.be\/app\/uploads\/2025\/04\/Incident-response-guide-FR-WEBSHOP-OWNERS.pdf\" class=\"entry-name h3\">\n            Incident-response-guide-FR-WEBSHOP-OWNERS.pdf        <\/a>\n    <\/div>\n<\/article>\n                                    \n<article class=\"post-1579 documents type-documents status-publish hentry\">\n    <div class=\"entry-body\">\n        <div class=\"entry-title h2\" >\n            Guide de r\u00e9action \u00e0 un incident de cybers\u00e9curit\u00e9        <\/div>\n        <div class=\"entry-size h4\">\n            498.57 kb        <\/div>\n        <a href=\"#\" data-toggle=\"modal\" data-target=\"#downloadModal\" data-download-name=\"Incident-response-guide-FR-GENERAL.pdf\" data-download-link=\"https:\/\/www.becybersafe.be\/app\/uploads\/2025\/04\/Incident-response-guide-FR-GENERAL.pdf\" class=\"entry-name h3\">\n            Incident-response-guide-FR-GENERAL.pdf        <\/a>\n    <\/div>\n<\/article>\n                                    \n<article class=\"post-805 documents type-documents status-publish hentry\">\n    <div class=\"entry-body\">\n        <div class=\"entry-title h2\" >\n            Comment OSINT r\u00e9v\u00e8le les risques des donn\u00e9es que vous diffusez        <\/div>\n        <div class=\"entry-size h4\">\n            962.7 kb        <\/div>\n        <a href=\"#\" data-toggle=\"modal\" data-target=\"#downloadModal\" data-download-name=\"Comment-lOSINT-revele-les-risques-des-donnees-que-vous-diffusez.pdf\" data-download-link=\"https:\/\/www.becybersafe.be\/app\/uploads\/2024\/05\/Comment-lOSINT-revele-les-risques-des-donnees-que-vous-diffusez.pdf\" class=\"entry-name h3\">\n            Comment-lOSINT-revele-les-risques-des-donnees-que-vous-diffusez.pdf        <\/a>\n    <\/div>\n<\/article>\n                                    \n<article class=\"post-685 documents type-documents status-publish hentry\">\n    <div class=\"entry-body\">\n        <div class=\"entry-title h2\" >\n            Checklist pour conclure de bons accords avec vos fournisseurs IT        <\/div>\n        <div class=\"entry-size h4\">\n            137.77 kb        <\/div>\n        <a href=\"#\" data-toggle=\"modal\" data-target=\"#downloadModal\" data-download-name=\"Checklist-pour-conclure-de-bons-accords-avec-vos-fournisseurs-IT.pdf\" data-download-link=\"https:\/\/www.becybersafe.be\/app\/uploads\/2024\/03\/Checklist-pour-conclure-de-bons-accords-avec-vos-fournisseurs-IT.pdf\" class=\"entry-name h3\">\n            Checklist-pour-conclure-de-bons-accords-avec-vos-fournisseurs-IT.pdf        <\/a>\n    <\/div>\n<\/article>\n                                    \n<article class=\"post-682 documents type-documents status-publish hentry\">\n    <div class=\"entry-body\">\n        <div class=\"entry-title h2\" >\n            Mettre en place sa propre cybers\u00e9curit\u00e9        <\/div>\n        <div class=\"entry-size h4\">\n            2.83 mb        <\/div>\n        <a href=\"#\" data-toggle=\"modal\" data-target=\"#downloadModal\" data-download-name=\"Mettre-en-place-sa-propre-cybersecurite_FR.pdf\" data-download-link=\"https:\/\/www.becybersafe.be\/app\/uploads\/2024\/03\/Mettre-en-place-sa-propre-cybersecurite_FR.pdf\" class=\"entry-name h3\">\n            Mettre-en-place-sa-propre-cybersecurite_FR.pdf        <\/a>\n    <\/div>\n<\/article>\n                                    \n<article class=\"post-679 documents type-documents status-publish hentry\">\n    <div class=\"entry-body\">\n        <div class=\"entry-title h2\" >\n            Les bases de la cybers\u00e9curit\u00e9 pour l&#8217;e-commerce en langage simple        <\/div>\n        <div class=\"entry-size h4\">\n            373.28 kb        <\/div>\n        <a href=\"#\" data-toggle=\"modal\" data-target=\"#downloadModal\" data-download-name=\"Les-bases-de-la-cybersecurite-pour-le-commerce-en-langage-simple.pdf\" data-download-link=\"https:\/\/www.becybersafe.be\/app\/uploads\/2024\/03\/Les-bases-de-la-cybersecurite-pour-le-commerce-en-langage-simple.pdf\" class=\"entry-name h3\">\n            Les-bases-de-la-cybersecurite-pour-le-commerce-en-langage-simple.pdf        <\/a>\n    <\/div>\n<\/article>\n                                    <\/div>\n    <\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Voici quelques documents, mod\u00e8les et plans d&#8217;action. Des directives de s\u00e9curit\u00e9 aux listes de v\u00e9rification pratiques, ces documents servent de &hellip; <a href=\"https:\/\/www.becybersafe.be\/fr\/documents\/\">Continued<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-556","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Documents - BeCyberSafe<\/title>\n<meta name=\"description\" content=\"Bienvenue chez BeCyberSafe ! Bient\u00f4t, vous trouverez ici des plans d&#039;action et des listes de v\u00e9rification sur comment rendre votre boutique en ligne ou votre entreprise plus s\u00e9curis\u00e9e.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.becybersafe.be\/fr\/documents\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Documents - BeCyberSafe\" \/>\n<meta property=\"og:description\" content=\"Bienvenue chez BeCyberSafe ! Bient\u00f4t, vous trouverez ici des plans d&#039;action et des listes de v\u00e9rification sur comment rendre votre boutique en ligne ou votre entreprise plus s\u00e9curis\u00e9e.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.becybersafe.be\/fr\/documents\/\" \/>\n<meta property=\"og:site_name\" content=\"BeCyberSafe\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-22T07:04:45+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\n\t    \"@context\": \"https:\/\/schema.org\",\n\t    \"@graph\": [\n\t        {\n\t            \"@type\": \"WebPage\",\n\t            \"@id\": \"https:\/\/www.becybersafe.be\/fr\/documents\/\",\n\t            \"url\": \"https:\/\/www.becybersafe.be\/fr\/documents\/\",\n\t            \"name\": \"Documents - BeCyberSafe\",\n\t            \"isPartOf\": {\n\t                \"@id\": \"https:\/\/www.becybersafe.be\/fr\/#website\"\n\t            },\n\t            \"datePublished\": \"2023-08-15T07:47:47+00:00\",\n\t            \"dateModified\": \"2024-03-22T07:04:45+00:00\",\n\t            \"description\": \"Bienvenue chez BeCyberSafe ! Bient\u00f4t, vous trouverez ici des plans d'action et des listes de v\u00e9rification sur comment rendre votre boutique en ligne ou votre entreprise plus s\u00e9curis\u00e9e.\",\n\t            \"breadcrumb\": {\n\t                \"@id\": \"https:\/\/www.becybersafe.be\/fr\/documents\/#breadcrumb\"\n\t            },\n\t            \"inLanguage\": \"fr-FR\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"ReadAction\",\n\t                    \"target\": [\n\t                        \"https:\/\/www.becybersafe.be\/fr\/documents\/\"\n\t                    ]\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"BreadcrumbList\",\n\t            \"@id\": \"https:\/\/www.becybersafe.be\/fr\/documents\/#breadcrumb\",\n\t            \"itemListElement\": [\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 1,\n\t                    \"name\": \"Home\",\n\t                    \"item\": \"https:\/\/www.becybersafe.be\/fr\/\"\n\t                },\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 2,\n\t                    \"name\": \"Documents\"\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"WebSite\",\n\t            \"@id\": \"https:\/\/www.becybersafe.be\/fr\/#website\",\n\t            \"url\": \"https:\/\/www.becybersafe.be\/fr\/\",\n\t            \"name\": \"BeCyberSafe\",\n\t            \"description\": \"\",\n\t            \"publisher\": {\n\t                \"@id\": \"https:\/\/www.becybersafe.be\/fr\/#organization\"\n\t            },\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"SearchAction\",\n\t                    \"target\": {\n\t                        \"@type\": \"EntryPoint\",\n\t                        \"urlTemplate\": \"https:\/\/www.becybersafe.be\/fr\/?s={search_term_string}\"\n\t                    },\n\t                    \"query-input\": {\n\t                        \"@type\": \"PropertyValueSpecification\",\n\t                        \"valueRequired\": true,\n\t                        \"valueName\": \"search_term_string\"\n\t                    }\n\t                }\n\t            ],\n\t            \"inLanguage\": \"fr-FR\"\n\t        },\n\t        {\n\t            \"@type\": \"Organization\",\n\t            \"@id\": \"https:\/\/www.becybersafe.be\/fr\/#organization\",\n\t            \"name\": \"BeCyberSafe\",\n\t            \"url\": \"https:\/\/www.becybersafe.be\/fr\/\",\n\t            \"logo\": {\n\t                \"@type\": \"ImageObject\",\n\t                \"inLanguage\": \"fr-FR\",\n\t                \"@id\": \"https:\/\/www.becybersafe.be\/fr\/#\/schema\/logo\/image\/\",\n\t                \"url\": \"https:\/\/www.becybersafe.be\/app\/uploads\/2023\/08\/BCS_Logo_black@2x-e1693488227698.png\",\n\t                \"contentUrl\": \"https:\/\/www.becybersafe.be\/app\/uploads\/2023\/08\/BCS_Logo_black@2x-e1693488227698.png\",\n\t                \"width\": 1104,\n\t                \"height\": 463,\n\t                \"caption\": \"BeCyberSafe\"\n\t            },\n\t            \"image\": {\n\t                \"@id\": \"https:\/\/www.becybersafe.be\/fr\/#\/schema\/logo\/image\/\"\n\t            }\n\t        }\n\t    ]\n\t}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Documents - BeCyberSafe","description":"Bienvenue chez BeCyberSafe ! Bient\u00f4t, vous trouverez ici des plans d'action et des listes de v\u00e9rification sur comment rendre votre boutique en ligne ou votre entreprise plus s\u00e9curis\u00e9e.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.becybersafe.be\/fr\/documents\/","og_locale":"fr_FR","og_type":"article","og_title":"Documents - BeCyberSafe","og_description":"Bienvenue chez BeCyberSafe ! Bient\u00f4t, vous trouverez ici des plans d'action et des listes de v\u00e9rification sur comment rendre votre boutique en ligne ou votre entreprise plus s\u00e9curis\u00e9e.","og_url":"https:\/\/www.becybersafe.be\/fr\/documents\/","og_site_name":"BeCyberSafe","article_modified_time":"2024-03-22T07:04:45+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.becybersafe.be\/fr\/documents\/","url":"https:\/\/www.becybersafe.be\/fr\/documents\/","name":"Documents - BeCyberSafe","isPartOf":{"@id":"https:\/\/www.becybersafe.be\/fr\/#website"},"datePublished":"2023-08-15T07:47:47+00:00","dateModified":"2024-03-22T07:04:45+00:00","description":"Bienvenue chez BeCyberSafe ! Bient\u00f4t, vous trouverez ici des plans d'action et des listes de v\u00e9rification sur comment rendre votre boutique en ligne ou votre entreprise plus s\u00e9curis\u00e9e.","breadcrumb":{"@id":"https:\/\/www.becybersafe.be\/fr\/documents\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.becybersafe.be\/fr\/documents\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.becybersafe.be\/fr\/documents\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.becybersafe.be\/fr\/"},{"@type":"ListItem","position":2,"name":"Documents"}]},{"@type":"WebSite","@id":"https:\/\/www.becybersafe.be\/fr\/#website","url":"https:\/\/www.becybersafe.be\/fr\/","name":"BeCyberSafe","description":"","publisher":{"@id":"https:\/\/www.becybersafe.be\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.becybersafe.be\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.becybersafe.be\/fr\/#organization","name":"BeCyberSafe","url":"https:\/\/www.becybersafe.be\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.becybersafe.be\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.becybersafe.be\/app\/uploads\/2023\/08\/BCS_Logo_black@2x-e1693488227698.png","contentUrl":"https:\/\/www.becybersafe.be\/app\/uploads\/2023\/08\/BCS_Logo_black@2x-e1693488227698.png","width":1104,"height":463,"caption":"BeCyberSafe"},"image":{"@id":"https:\/\/www.becybersafe.be\/fr\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.becybersafe.be\/fr\/wp-json\/wp\/v2\/pages\/556","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.becybersafe.be\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.becybersafe.be\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.becybersafe.be\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.becybersafe.be\/fr\/wp-json\/wp\/v2\/comments?post=556"}],"version-history":[{"count":4,"href":"https:\/\/www.becybersafe.be\/fr\/wp-json\/wp\/v2\/pages\/556\/revisions"}],"predecessor-version":[{"id":804,"href":"https:\/\/www.becybersafe.be\/fr\/wp-json\/wp\/v2\/pages\/556\/revisions\/804"}],"wp:attachment":[{"href":"https:\/\/www.becybersafe.be\/fr\/wp-json\/wp\/v2\/media?parent=556"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}