{"id":1851,"date":"2024-02-29T20:03:12","date_gmt":"2024-03-01T01:03:12","guid":{"rendered":"https:\/\/miguelcastelo.ca\/?page_id=1851"},"modified":"2024-03-01T20:04:34","modified_gmt":"2024-03-02T01:04:34","slug":"blog","status":"publish","type":"page","link":"https:\/\/miguelcastelo.ca\/fr\/blog\/","title":{"rendered":"Blog"},"content":{"rendered":"<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\">\n<h1 class=\"wp-block-heading has-text-align-center\">Actualit\u00e9s et articles de blog<\/h1>\n\n\n\n<p>Vous trouverez ici divers articles de blog r\u00e9dig\u00e9s par mes coll\u00e8gues et moi-m\u00eame. Mes publications portent sur la conception de sites web, la cybers\u00e9curit\u00e9 et le monde technologique dans lequel nous vivons. Tenez-vous au courant des derni\u00e8res tendances et probl\u00e9matiques et, surtout, restez inform\u00e9s et en s\u00e9curit\u00e9.<\/p>\n\n\n<nav class=\"has-text-color has-ast-global-color-0-color is-responsive items-justified-center wp-block-navigation is-content-justification-center is-layout-flex wp-container-core-navigation-is-layout-a89b3969 wp-block-navigation-is-layout-flex\" aria-label=\"Blog_Categories\" \n\t\t data-wp-interactive=\"core\/navigation\" data-wp-context='{\"overlayOpenedBy\":{\"click\":false,\"hover\":false,\"focus\":false},\"type\":\"overlay\",\"roleAttribute\":\"\",\"ariaLabel\":\"Menu\"}'><button aria-haspopup=\"dialog\" aria-label=\"Ouvrir le menu\" class=\"wp-block-navigation__responsive-container-open\" \n\t\t\t\tdata-wp-on--click=\"actions.openMenuOnClick\"\n\t\t\t\tdata-wp-on--keydown=\"actions.handleMenuKeydown\"\n\t\t\t><svg width=\"24\" height=\"24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 24 24\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M4 7.5h16v1.5H4z\"><\/path><path d=\"M4 15h16v1.5H4z\"><\/path><\/svg><\/button>\n\t\t\t\t<div class=\"wp-block-navigation__responsive-container\"  id=\"modal-1\" \n\t\t\t\tdata-wp-class--has-modal-open=\"state.isMenuOpen\"\n\t\t\t\tdata-wp-class--is-menu-open=\"state.isMenuOpen\"\n\t\t\t\tdata-wp-watch=\"callbacks.initMenu\"\n\t\t\t\tdata-wp-on--keydown=\"actions.handleMenuKeydown\"\n\t\t\t\tdata-wp-on--focusout=\"actions.handleMenuFocusout\"\n\t\t\t\ttabindex=\"-1\"\n\t\t\t>\n\t\t\t\t\t<div class=\"wp-block-navigation__responsive-close\" tabindex=\"-1\">\n\t\t\t\t\t\t<div class=\"wp-block-navigation__responsive-dialog\" \n\t\t\t\tdata-wp-bind--aria-modal=\"state.ariaModal\"\n\t\t\t\tdata-wp-bind--aria-label=\"state.ariaLabel\"\n\t\t\t\tdata-wp-bind--role=\"state.roleAttribute\"\n\t\t\t>\n\t\t\t\t\t\t\t<button aria-label=\"Fermer le menu\" class=\"wp-block-navigation__responsive-container-close\" \n\t\t\t\tdata-wp-on--click=\"actions.closeMenuOnClick\"\n\t\t\t><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 24 24\" width=\"24\" height=\"24\" aria-hidden=\"true\" focusable=\"false\"><path d=\"m13.06 12 6.47-6.47-1.06-1.06L12 10.94 5.53 4.47 4.47 5.53 10.94 12l-6.47 6.47 1.06 1.06L12 13.06l6.47 6.47 1.06-1.06L13.06 12Z\"><\/path><\/svg><\/button>\n\t\t\t\t\t\t\t<div class=\"wp-block-navigation__responsive-container-content\" \n\t\t\t\tdata-wp-watch=\"callbacks.focusFirstElement\"\n\t\t\t id=\"modal-1-content\">\n\t\t\t\t\t\t\t\t<ul class=\"wp-block-navigation__container has-text-color has-ast-global-color-0-color is-responsive items-justified-center wp-block-navigation\"><li class=\"wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"https:\/\/miguelcastelo.ca\/fr\/tag\/best-practices\/\"><span class=\"wp-block-navigation-item__label\">Meilleures pratiques<\/span><\/a><\/li><li class=\"wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"https:\/\/miguelcastelo.ca\/fr\/tag\/cms\/\"><span class=\"wp-block-navigation-item__label\">CMS<\/span><\/a><\/li><li class=\"wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"https:\/\/miguelcastelo.ca\/fr\/category\/cybersecurity\/\"><span class=\"wp-block-navigation-item__label\">Cybers\u00e9curit\u00e9<\/span><\/a><\/li><li class=\"wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"https:\/\/miguelcastelo.ca\/fr\/tag\/design\/\"><span class=\"wp-block-navigation-item__label\">Design<\/span><\/a><\/li><li class=\"wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"https:\/\/miguelcastelo.ca\/fr\/tag\/social-engineering\/\"><span class=\"wp-block-navigation-item__label\">Ing\u00e9nierie sociale<\/span><\/a><\/li><li class=\"wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"https:\/\/miguelcastelo.ca\/fr\/category\/web-design\/\"><span class=\"wp-block-navigation-item__label\">Conception de sites web<\/span><\/a><\/li><\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/nav>\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<div class=\"wp-block-query is-layout-flow wp-block-query-is-layout-flow\"><ul class=\"wp-block-post-template is-layout-flow wp-block-post-template-is-layout-flow\"><li class=\"wp-block-post post-1957 post type-post status-publish format-standard has-post-thumbnail hentry category-web-design tag-best-practices tag-design tag-web-design tag-web-development\">\n<figure style=\"aspect-ratio:auto;\" class=\"wp-block-post-featured-image\"><a href=\"https:\/\/miguelcastelo.ca\/fr\/responsive-web-design-101-tips-tricks-and-tools\/\" target=\"_self\"  ><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/ec529ce6-9c5d-4eb4-9589-317aba8be4e9.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Responsive Web Design 101: Tips, Tricks, and Tools\" style=\"border-radius:25px;width:100%;height:100%;object-fit:cover;\" srcset=\"https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/ec529ce6-9c5d-4eb4-9589-317aba8be4e9.jpg 1024w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/ec529ce6-9c5d-4eb4-9589-317aba8be4e9-300x300.jpg 300w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/ec529ce6-9c5d-4eb4-9589-317aba8be4e9-150x150.jpg 150w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/ec529ce6-9c5d-4eb4-9589-317aba8be4e9-768x768.jpg 768w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/ec529ce6-9c5d-4eb4-9589-317aba8be4e9-12x12.jpg 12w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n<h2 class=\"wp-block-post-title\">Conception Web adaptative 101 : conseils, astuces et outils<\/h2>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2024-03-19T10:29:00-04:00\">mars 19, 2024<\/time><\/div>\n\n<div class=\"wp-block-post-author-name\"><a href=\"https:\/\/miguelcastelo.ca\/fr\/author\/m-castelooutlook-com\/\" target=\"_self\" class=\"wp-block-post-author-name__link\">Miguel Castelo<\/a><\/div>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Designing responsive websites is a skill that every web developer should master. Responsive websites are websites that adapt to different screen sizes and devices, ensuring a consistent and optimal user experience. In this blog post, I will share some tips and best practices for designing responsive websites, as well as some tools and resources that&hellip; <\/p><\/div>\n\n<a style=\"border-radius:5px;border-width:1px; padding-top:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--40);\" class=\"wp-elements-df0ee7a7248eeda778afd4e62c7c1be1 wp-block-read-more has-text-color has-white-color has-background has-ast-global-color-0-background-color\" href=\"https:\/\/miguelcastelo.ca\/fr\/responsive-web-design-101-tips-tricks-and-tools\/\" target=\"_self\">Continuer la lecture<span class=\"screen-reader-text\">\u00a0: Responsive Web Design 101: Tips, Tricks, and Tools<\/span><\/a>\n\n\n<div style=\"height:200px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<\/li><li class=\"wp-block-post post-1953 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity tag-cyber-safe tag-cybersecurity-awareness tag-information-security tag-phishing tag-social-engineering\">\n<figure style=\"aspect-ratio:auto;\" class=\"wp-block-post-featured-image\"><a href=\"https:\/\/miguelcastelo.ca\/fr\/unmasking-the-shadows-a-deep-dive-into-apt-cybersecurity-threats\/\" target=\"_self\"  ><img decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/9bfbe38c-d58e-4d4a-a66d-35aac002e6ca.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Unmasking the Shadows: A Deep Dive into APT Cybersecurity Threats\" style=\"border-radius:25px;width:100%;height:100%;object-fit:cover;\" srcset=\"https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/9bfbe38c-d58e-4d4a-a66d-35aac002e6ca.jpg 1024w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/9bfbe38c-d58e-4d4a-a66d-35aac002e6ca-300x300.jpg 300w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/9bfbe38c-d58e-4d4a-a66d-35aac002e6ca-150x150.jpg 150w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/9bfbe38c-d58e-4d4a-a66d-35aac002e6ca-768x768.jpg 768w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/9bfbe38c-d58e-4d4a-a66d-35aac002e6ca-12x12.jpg 12w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n<h2 class=\"wp-block-post-title\">D\u00e9masquer les ombres : Une plong\u00e9e en profondeur dans les menaces de cybers\u00e9curit\u00e9 APT<\/h2>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2024-03-15T10:30:00-04:00\">mars 15, 2024<\/time><\/div>\n\n<div class=\"wp-block-post-author-name\"><a href=\"https:\/\/miguelcastelo.ca\/fr\/author\/m-castelooutlook-com\/\" target=\"_self\" class=\"wp-block-post-author-name__link\">Miguel Castelo<\/a><\/div>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">La cybers\u00e9curit\u00e9 est un domaine en constante \u00e9volution qui nous oblige \u00e0 rester vigilants et inform\u00e9s des menaces et des d\u00e9fis les plus r\u00e9cents. Dans cet article de blog, nous aborderons quelques-unes des menaces les plus r\u00e9centes et les plus pertinentes en mati\u00e8re de cybers\u00e9curit\u00e9 provenant de groupes de menaces persistantes avanc\u00e9es (APT) et d'autres acteurs malveillants pour lesquels nous devons \u00eatre vigilants. <\/p><\/div>\n\n<a style=\"border-radius:5px;border-width:1px; padding-top:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--40);\" class=\"wp-elements-df0ee7a7248eeda778afd4e62c7c1be1 wp-block-read-more has-text-color has-white-color has-background has-ast-global-color-0-background-color\" href=\"https:\/\/miguelcastelo.ca\/fr\/unmasking-the-shadows-a-deep-dive-into-apt-cybersecurity-threats\/\" target=\"_self\">Continuer la lecture<span class=\"screen-reader-text\">\u00a0: Unmasking the Shadows: A Deep Dive into APT Cybersecurity Threats<\/span><\/a>\n\n\n<div style=\"height:200px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<\/li><li class=\"wp-block-post post-1949 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity tag-cybersecurity tag-cybersecurity-rd tag-information-security tag-research-and-development\">\n<figure style=\"aspect-ratio:auto;\" class=\"wp-block-post-featured-image\"><a href=\"https:\/\/miguelcastelo.ca\/fr\/safeguarding-our-digital-future-a-deep-dive-into-cybersecurity-rd\/\" target=\"_self\"  ><img decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/0ea0e710-68fd-47c2-ac27-189cd24f6f3c.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Safeguarding Our Digital Future: A Deep Dive into Cybersecurity R&#038;D\" style=\"border-radius:25px;width:100%;height:100%;object-fit:cover;\" srcset=\"https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/0ea0e710-68fd-47c2-ac27-189cd24f6f3c.jpg 1024w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/0ea0e710-68fd-47c2-ac27-189cd24f6f3c-300x300.jpg 300w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/0ea0e710-68fd-47c2-ac27-189cd24f6f3c-150x150.jpg 150w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/0ea0e710-68fd-47c2-ac27-189cd24f6f3c-768x768.jpg 768w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/0ea0e710-68fd-47c2-ac27-189cd24f6f3c-12x12.jpg 12w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n<h2 class=\"wp-block-post-title\">Pr\u00e9server notre avenir num\u00e9rique : Une plong\u00e9e en profondeur dans la R&amp;D en mati\u00e8re de cybers\u00e9curit\u00e9<\/h2>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2024-03-12T23:33:52-04:00\">mars 12, 2024<\/time><\/div>\n\n<div class=\"wp-block-post-author-name\"><a href=\"https:\/\/miguelcastelo.ca\/fr\/author\/m-castelooutlook-com\/\" target=\"_self\" class=\"wp-block-post-author-name__link\">Miguel Castelo<\/a><\/div>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">The digital age has ushered in a new era of interconnectedness, but it has also opened doors to a relentless stream of cyber threats. As malicious actors develop ever-more sophisticated tools and techniques, the need for robust cybersecurity solutions becomes even more critical. Research and development (R&#038;D) plays a pivotal role in this ongoing battle,&hellip; <\/p><\/div>\n\n<a style=\"border-radius:5px;border-width:1px; padding-top:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--40);\" class=\"wp-elements-df0ee7a7248eeda778afd4e62c7c1be1 wp-block-read-more has-text-color has-white-color has-background has-ast-global-color-0-background-color\" href=\"https:\/\/miguelcastelo.ca\/fr\/safeguarding-our-digital-future-a-deep-dive-into-cybersecurity-rd\/\" target=\"_self\">Continuer la lecture<span class=\"screen-reader-text\">\u00a0: Safeguarding Our Digital Future: A Deep Dive into Cybersecurity R&#038;D<\/span><\/a>\n\n\n<div style=\"height:200px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<\/li><li class=\"wp-block-post post-1943 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity tag-cyber-safe tag-cybersecurity-awareness tag-information-security tag-social-engineering tag-social-engineering-awareness\">\n<figure style=\"aspect-ratio:auto;\" class=\"wp-block-post-featured-image\"><a href=\"https:\/\/miguelcastelo.ca\/fr\/be-vigilant-your-guide-to-preventing-social-engineering-attacks\/\" target=\"_self\"  ><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/9d7234fd-b062-41d8-a3cc-4188cb317b21.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Be Vigilant: Your Guide to Preventing Social Engineering Attacks\" style=\"border-radius:25px;width:100%;height:100%;object-fit:cover;\" srcset=\"https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/9d7234fd-b062-41d8-a3cc-4188cb317b21.jpg 1024w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/9d7234fd-b062-41d8-a3cc-4188cb317b21-300x300.jpg 300w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/9d7234fd-b062-41d8-a3cc-4188cb317b21-150x150.jpg 150w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/9d7234fd-b062-41d8-a3cc-4188cb317b21-768x768.jpg 768w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/9d7234fd-b062-41d8-a3cc-4188cb317b21-12x12.jpg 12w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n<h2 class=\"wp-block-post-title\">Soyez vigilant : Votre guide pour pr\u00e9venir les attaques d'ing\u00e9nierie sociale<\/h2>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2024-03-08T12:30:00-05:00\">mars 8, 2024<\/time><\/div>\n\n<div class=\"wp-block-post-author-name\"><a href=\"https:\/\/miguelcastelo.ca\/fr\/author\/m-castelooutlook-com\/\" target=\"_self\" class=\"wp-block-post-author-name__link\">Miguel Castelo<\/a><\/div>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">L'internet offre une commodit\u00e9 et une connexion incroyables, mais il cr\u00e9e \u00e9galement des opportunit\u00e9s pour les acteurs malveillants. Les attaques par ing\u00e9nierie sociale exploitent les vuln\u00e9rabilit\u00e9s humaines pour manipuler les individus afin qu'ils r\u00e9v\u00e8lent des informations sensibles ou entreprennent des actions qui profitent \u00e0 l'attaquant. <\/p><\/div>\n\n<a style=\"border-radius:5px;border-width:1px; padding-top:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--40);\" class=\"wp-elements-df0ee7a7248eeda778afd4e62c7c1be1 wp-block-read-more has-text-color has-white-color has-background has-ast-global-color-0-background-color\" href=\"https:\/\/miguelcastelo.ca\/fr\/be-vigilant-your-guide-to-preventing-social-engineering-attacks\/\" target=\"_self\">Continuer la lecture<span class=\"screen-reader-text\">\u00a0: Be Vigilant: Your Guide to Preventing Social Engineering Attacks<\/span><\/a>\n\n\n<div style=\"height:200px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<\/li><li class=\"wp-block-post post-1892 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity tag-best-practices tag-cyber-safe tag-cybersecurity-awareness tag-information-security tag-password-policies tag-secure-passwords\">\n<figure style=\"aspect-ratio:auto;\" class=\"wp-block-post-featured-image\"><a href=\"https:\/\/miguelcastelo.ca\/fr\/the-key-to-your-digital-kingdom-why-unique-secure-passwords-matter\/\" target=\"_self\"  ><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/4d435813-a140-4467-8b7e-193331b8eb5f.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"The Key to Your Digital Kingdom: Why Unique, Secure Passwords Matter\" style=\"border-radius:25px;width:100%;height:100%;object-fit:cover;\" srcset=\"https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/4d435813-a140-4467-8b7e-193331b8eb5f.jpg 1024w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/4d435813-a140-4467-8b7e-193331b8eb5f-300x300.jpg 300w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/4d435813-a140-4467-8b7e-193331b8eb5f-150x150.jpg 150w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/4d435813-a140-4467-8b7e-193331b8eb5f-768x768.jpg 768w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/4d435813-a140-4467-8b7e-193331b8eb5f-12x12.jpg 12w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n<h2 class=\"wp-block-post-title\">La cl\u00e9 de votre royaume num\u00e9rique : L'importance des mots de passe uniques et s\u00e9curis\u00e9s<\/h2>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2024-03-05T14:30:00-05:00\">mars 5, 2024<\/time><\/div>\n\n<div class=\"wp-block-post-author-name\"><a href=\"https:\/\/miguelcastelo.ca\/fr\/author\/m-castelooutlook-com\/\" target=\"_self\" class=\"wp-block-post-author-name__link\">Miguel Castelo<\/a><\/div>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">In today&#8217;s digital world, our online accounts hold a treasure trove of information: personal details, financial data, communication records, and more. Protecting these digital vaults requires a strong line of defense, and the first line is often the most crucial \u2013 your password. <\/p><\/div>\n\n<a style=\"border-radius:5px;border-width:1px; padding-top:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--40);\" class=\"wp-elements-df0ee7a7248eeda778afd4e62c7c1be1 wp-block-read-more has-text-color has-white-color has-background has-ast-global-color-0-background-color\" href=\"https:\/\/miguelcastelo.ca\/fr\/the-key-to-your-digital-kingdom-why-unique-secure-passwords-matter\/\" target=\"_self\">Continuer la lecture<span class=\"screen-reader-text\">\u00a0: The Key to Your Digital Kingdom: Why Unique, Secure Passwords Matter<\/span><\/a>\n\n\n<div style=\"height:200px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<\/li><li class=\"wp-block-post post-1821 post type-post status-publish format-standard has-post-thumbnail hentry category-web-design tag-best-practices tag-design tag-web-design tag-web-design-strategy tag-web-design-tools tag-web-development\">\n<figure style=\"aspect-ratio:auto;\" class=\"wp-block-post-featured-image\"><a href=\"https:\/\/miguelcastelo.ca\/fr\/web-design-tools-methodologies\/\" target=\"_self\"  ><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/3c5bc5d4-e3df-4876-908d-d0becbe4048f.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Web Design Tools &#038; Methodologies\" style=\"border-radius:25px;width:100%;height:100%;object-fit:cover;\" srcset=\"https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/3c5bc5d4-e3df-4876-908d-d0becbe4048f.jpg 1024w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/3c5bc5d4-e3df-4876-908d-d0becbe4048f-300x300.jpg 300w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/3c5bc5d4-e3df-4876-908d-d0becbe4048f-150x150.jpg 150w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/3c5bc5d4-e3df-4876-908d-d0becbe4048f-768x768.jpg 768w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/3c5bc5d4-e3df-4876-908d-d0becbe4048f-12x12.jpg 12w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n<h2 class=\"wp-block-post-title\">Outils et m\u00e9thodologies de conception de sites web<\/h2>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2024-03-01T17:00:00-05:00\">mars 1, 2024<\/time><\/div>\n\n<div class=\"wp-block-post-author-name\"><a href=\"https:\/\/miguelcastelo.ca\/fr\/author\/m-castelooutlook-com\/\" target=\"_self\" class=\"wp-block-post-author-name__link\">Miguel Castelo<\/a><\/div>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Je suis passionn\u00e9 par mon travail, ce qui signifie que je m'efforce de cr\u00e9er des sites web beaux et modernes. Pour cr\u00e9er des exp\u00e9riences num\u00e9riques exceptionnelles, il est essentiel de se tenir au courant des outils, des technologies et des m\u00e9thodes de conception de sites web. Permettez-moi de partager avec vous quelques id\u00e9es et ressources qui peuvent vous aider \u00e0 rester \u00e0 la pointe de la conception de sites web. <\/p><\/div>\n\n<a style=\"border-radius:5px;border-width:1px; padding-top:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--40);\" class=\"wp-elements-df0ee7a7248eeda778afd4e62c7c1be1 wp-block-read-more has-text-color has-white-color has-background has-ast-global-color-0-background-color\" href=\"https:\/\/miguelcastelo.ca\/fr\/web-design-tools-methodologies\/\" target=\"_self\">Continuer la lecture<span class=\"screen-reader-text\">\u00a0: Web Design Tools &#038; Methodologies<\/span><\/a>\n\n\n<div style=\"height:200px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<\/li><li class=\"wp-block-post post-1841 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity tag-cyber-safe tag-cybersecurity tag-cybersecurity-awareness tag-information-security tag-phishing tag-social-engineering tag-social-engineering-awareness\">\n<figure style=\"aspect-ratio:auto;\" class=\"wp-block-post-featured-image\"><a href=\"https:\/\/miguelcastelo.ca\/fr\/dont-get-hooked-a-guide-to-phishing-scam-awareness\/\" target=\"_self\"  ><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/47432428-3a36-45d9-a817-9dcf7085fa77.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Don&#8217;t Get Hooked: A Guide to Phishing Scam Awareness\" style=\"border-radius:25px;width:100%;height:100%;object-fit:cover;\" srcset=\"https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/47432428-3a36-45d9-a817-9dcf7085fa77.jpg 1024w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/47432428-3a36-45d9-a817-9dcf7085fa77-300x300.jpg 300w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/47432428-3a36-45d9-a817-9dcf7085fa77-150x150.jpg 150w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/47432428-3a36-45d9-a817-9dcf7085fa77-768x768.jpg 768w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/47432428-3a36-45d9-a817-9dcf7085fa77-12x12.jpg 12w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n<h2 class=\"wp-block-post-title\">Ne vous laissez pas pi\u00e9ger : Un guide de sensibilisation \u00e0 l'hame\u00e7onnage<\/h2>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2024-02-29T12:00:00-05:00\">f\u00e9vrier 29, 2024<\/time><\/div>\n\n<div class=\"wp-block-post-author-name\"><a href=\"https:\/\/miguelcastelo.ca\/fr\/author\/m-castelooutlook-com\/\" target=\"_self\" class=\"wp-block-post-author-name__link\">Miguel Castelo<\/a><\/div>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Les escroqueries par hame\u00e7onnage constituent une menace constante \u00e0 l'\u00e8re num\u00e9rique. Ces tentatives trompeuses visent \u00e0 voler vos informations personnelles, vos donn\u00e9es financi\u00e8res ou vos identifiants de connexion en imitant des sources l\u00e9gitimes telles que des banques, des plateformes de m\u00e9dias sociaux ou m\u00eame des personnes de confiance. <\/p><\/div>\n\n<a style=\"border-radius:5px;border-width:1px; padding-top:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--40);\" class=\"wp-elements-df0ee7a7248eeda778afd4e62c7c1be1 wp-block-read-more has-text-color has-white-color has-background has-ast-global-color-0-background-color\" href=\"https:\/\/miguelcastelo.ca\/fr\/dont-get-hooked-a-guide-to-phishing-scam-awareness\/\" target=\"_self\">Continuer la lecture<span class=\"screen-reader-text\">\u00a0: Don&#8217;t Get Hooked: A Guide to Phishing Scam Awareness<\/span><\/a>\n\n\n<div style=\"height:200px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<\/li><li class=\"wp-block-post post-1815 post type-post status-publish format-standard has-post-thumbnail hentry category-web-design tag-best-practices tag-cms tag-content-management-systems tag-design tag-web-design tag-web-design-strategy tag-web-development\">\n<figure style=\"aspect-ratio:auto;\" class=\"wp-block-post-featured-image\"><a href=\"https:\/\/miguelcastelo.ca\/fr\/choosing-the-best-cms-for-your-business-website\/\" target=\"_self\"  ><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/79b5037a-1726-4935-83a7-a4c34f4f2fd2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Choosing the Best CMS For Your Business Website\" style=\"border-radius:25px;width:100%;height:100%;object-fit:cover;\" srcset=\"https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/79b5037a-1726-4935-83a7-a4c34f4f2fd2.jpg 1024w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/79b5037a-1726-4935-83a7-a4c34f4f2fd2-300x300.jpg 300w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/79b5037a-1726-4935-83a7-a4c34f4f2fd2-150x150.jpg 150w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/79b5037a-1726-4935-83a7-a4c34f4f2fd2-768x768.jpg 768w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/79b5037a-1726-4935-83a7-a4c34f4f2fd2-12x12.jpg 12w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n<h2 class=\"wp-block-post-title\">Choisir le meilleur CMS pour le site web de votre entreprise<\/h2>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2024-02-23T17:00:00-05:00\">f\u00e9vrier 23, 2024<\/time><\/div>\n\n<div class=\"wp-block-post-author-name\"><a href=\"https:\/\/miguelcastelo.ca\/fr\/author\/m-castelooutlook-com\/\" target=\"_self\" class=\"wp-block-post-author-name__link\">Miguel Castelo<\/a><\/div>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Le choix du bon syst\u00e8me de gestion de contenu (SGC ou CMS en anglais) pour un site web d'entreprise est crucial. Il a un impact sur la fonctionnalit\u00e9, l'\u00e9volutivit\u00e9 et la facilit\u00e9 de gestion de votre site. Examinons les dix principales plateformes CMS, leurs avantages et leurs inconv\u00e9nients, les mod\u00e8les de tarification et les courbes d'apprentissage. <\/p><\/div>\n\n<a style=\"border-radius:5px;border-width:1px; padding-top:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--40);\" class=\"wp-elements-df0ee7a7248eeda778afd4e62c7c1be1 wp-block-read-more has-text-color has-white-color has-background has-ast-global-color-0-background-color\" href=\"https:\/\/miguelcastelo.ca\/fr\/choosing-the-best-cms-for-your-business-website\/\" target=\"_self\">Continuer la lecture<span class=\"screen-reader-text\">\u00a0: Choosing the Best CMS For Your Business Website<\/span><\/a>\n\n\n<div style=\"height:200px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<\/li><li class=\"wp-block-post post-1799 post type-post status-publish format-standard has-post-thumbnail hentry category-web-design tag-best-practices tag-design tag-web-design tag-web-design-strategy tag-web-development\">\n<figure style=\"aspect-ratio:auto;\" class=\"wp-block-post-featured-image\"><a href=\"https:\/\/miguelcastelo.ca\/fr\/the-art-and-science-of-web-design-a-journey-through-pixels-and-code\/\" target=\"_self\"  ><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/db869f46-6ed0-4c10-b51e-212c6a50e353.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"The Art and Science of Web Design: A Journey Through Pixels and Code\" style=\"border-radius:25px;width:100%;height:100%;object-fit:cover;\" srcset=\"https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/db869f46-6ed0-4c10-b51e-212c6a50e353.jpg 1024w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/db869f46-6ed0-4c10-b51e-212c6a50e353-300x300.jpg 300w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/db869f46-6ed0-4c10-b51e-212c6a50e353-150x150.jpg 150w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/db869f46-6ed0-4c10-b51e-212c6a50e353-768x768.jpg 768w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/db869f46-6ed0-4c10-b51e-212c6a50e353-12x12.jpg 12w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n<h2 class=\"wp-block-post-title\">L'art et la science de la conception Web : Un voyage \u00e0 travers les pixels et le code<\/h2>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2024-02-16T06:01:49-05:00\">f\u00e9vrier 16, 2024<\/time><\/div>\n\n<div class=\"wp-block-post-author-name\"><a href=\"https:\/\/miguelcastelo.ca\/fr\/author\/m-castelooutlook-com\/\" target=\"_self\" class=\"wp-block-post-author-name__link\">Miguel Castelo<\/a><\/div>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Welcome to a thrilling journey through the digital cosmos, where pixels transform into art, functionality melds with aesthetics, and the web evolves into a masterpiece of 2024. In this blog post, we\u2019ll explore the ever-changing landscape of web design and delve into the trends that will shape the online world. Whether you\u2019re a seasoned designer&hellip; <\/p><\/div>\n\n<a style=\"border-radius:5px;border-width:1px; padding-top:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--40);\" class=\"wp-elements-df0ee7a7248eeda778afd4e62c7c1be1 wp-block-read-more has-text-color has-white-color has-background has-ast-global-color-0-background-color\" href=\"https:\/\/miguelcastelo.ca\/fr\/the-art-and-science-of-web-design-a-journey-through-pixels-and-code\/\" target=\"_self\">Continuer la lecture<span class=\"screen-reader-text\">\u00a0: The Art and Science of Web Design: A Journey Through Pixels and Code<\/span><\/a>\n\n\n<div style=\"height:200px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<\/li><\/ul><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<div class=\"wp-block-query is-layout-flow wp-block-query-is-layout-flow\"><ul class=\"wp-block-post-template is-layout-flow wp-block-post-template-is-layout-flow\"><li class=\"wp-block-post post-1949 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity tag-cybersecurity tag-cybersecurity-rd tag-information-security tag-research-and-development\">\n\n<div style=\"height:200px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<figure class=\"wp-block-post-featured-image\"><a href=\"https:\/\/miguelcastelo.ca\/fr\/safeguarding-our-digital-future-a-deep-dive-into-cybersecurity-rd\/\" target=\"_self\"  ><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/0ea0e710-68fd-47c2-ac27-189cd24f6f3c.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Safeguarding Our Digital Future: A Deep Dive into Cybersecurity R&#038;D\" style=\"border-radius:25px;object-fit:cover;\" srcset=\"https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/0ea0e710-68fd-47c2-ac27-189cd24f6f3c.jpg 1024w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/0ea0e710-68fd-47c2-ac27-189cd24f6f3c-300x300.jpg 300w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/0ea0e710-68fd-47c2-ac27-189cd24f6f3c-150x150.jpg 150w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/0ea0e710-68fd-47c2-ac27-189cd24f6f3c-768x768.jpg 768w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/0ea0e710-68fd-47c2-ac27-189cd24f6f3c-12x12.jpg 12w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n<h2 class=\"wp-block-post-title\">Pr\u00e9server notre avenir num\u00e9rique : Une plong\u00e9e en profondeur dans la R&amp;D en mati\u00e8re de cybers\u00e9curit\u00e9<\/h2>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2024-03-12T23:33:52-04:00\">mars 12, 2024<\/time><\/div>\n\n<div class=\"wp-block-post-author-name\"><a href=\"https:\/\/miguelcastelo.ca\/fr\/author\/m-castelooutlook-com\/\" target=\"_self\" class=\"wp-block-post-author-name__link\">Miguel Castelo<\/a><\/div>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">The digital age has ushered in a new era of interconnectedness, but it has also opened doors to a relentless stream of cyber threats. As malicious actors develop ever-more sophisticated tools and techniques, the need for robust cybersecurity solutions becomes even more critical. Research and development (R&#038;D) plays a pivotal role in this ongoing battle,&hellip; <\/p><\/div>\n\n<a style=\"border-color:#0693e3;border-radius:5px;border-width:1px; padding-top:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--40);\" class=\"wp-elements-834e4fc94bddde0b9c5fd4bae7b66f75 wp-block-read-more has-text-color has-white-color has-background has-ast-global-color-0-background-color has-border-color\" href=\"https:\/\/miguelcastelo.ca\/fr\/safeguarding-our-digital-future-a-deep-dive-into-cybersecurity-rd\/\" target=\"_self\">Continuer la lecture<span class=\"screen-reader-text\">\u00a0: Safeguarding Our Digital Future: A Deep Dive into Cybersecurity R&#038;D<\/span><\/a>\n<\/li><li class=\"wp-block-post post-1943 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity tag-cyber-safe tag-cybersecurity-awareness tag-information-security tag-social-engineering tag-social-engineering-awareness\">\n\n<div style=\"height:200px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<figure class=\"wp-block-post-featured-image\"><a href=\"https:\/\/miguelcastelo.ca\/fr\/be-vigilant-your-guide-to-preventing-social-engineering-attacks\/\" target=\"_self\"  ><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/9d7234fd-b062-41d8-a3cc-4188cb317b21.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Be Vigilant: Your Guide to Preventing Social Engineering Attacks\" style=\"border-radius:25px;object-fit:cover;\" srcset=\"https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/9d7234fd-b062-41d8-a3cc-4188cb317b21.jpg 1024w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/9d7234fd-b062-41d8-a3cc-4188cb317b21-300x300.jpg 300w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/9d7234fd-b062-41d8-a3cc-4188cb317b21-150x150.jpg 150w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/9d7234fd-b062-41d8-a3cc-4188cb317b21-768x768.jpg 768w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/9d7234fd-b062-41d8-a3cc-4188cb317b21-12x12.jpg 12w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n<h2 class=\"wp-block-post-title\">Soyez vigilant : Votre guide pour pr\u00e9venir les attaques d'ing\u00e9nierie sociale<\/h2>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2024-03-08T12:30:00-05:00\">mars 8, 2024<\/time><\/div>\n\n<div class=\"wp-block-post-author-name\"><a href=\"https:\/\/miguelcastelo.ca\/fr\/author\/m-castelooutlook-com\/\" target=\"_self\" class=\"wp-block-post-author-name__link\">Miguel Castelo<\/a><\/div>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">L'internet offre une commodit\u00e9 et une connexion incroyables, mais il cr\u00e9e \u00e9galement des opportunit\u00e9s pour les acteurs malveillants. Les attaques par ing\u00e9nierie sociale exploitent les vuln\u00e9rabilit\u00e9s humaines pour manipuler les individus afin qu'ils r\u00e9v\u00e8lent des informations sensibles ou entreprennent des actions qui profitent \u00e0 l'attaquant. <\/p><\/div>\n\n<a style=\"border-color:#0693e3;border-radius:5px;border-width:1px; padding-top:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--40);\" class=\"wp-elements-834e4fc94bddde0b9c5fd4bae7b66f75 wp-block-read-more has-text-color has-white-color has-background has-ast-global-color-0-background-color has-border-color\" href=\"https:\/\/miguelcastelo.ca\/fr\/be-vigilant-your-guide-to-preventing-social-engineering-attacks\/\" target=\"_self\">Continuer la lecture<span class=\"screen-reader-text\">\u00a0: Be Vigilant: Your Guide to Preventing Social Engineering Attacks<\/span><\/a>\n<\/li><\/ul><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\"><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Latest News and Blog Articles Here you can find various blog articles written by my colleagues and me. My publications are related to web design, cybersecurity and the technological world we live in. Stay up to date with the latest trends, issues, and, most of all, stay informed and cyber-safe.<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_eb_attr":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-1851","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/pages\/1851","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/comments?post=1851"}],"version-history":[{"count":19,"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/pages\/1851\/revisions"}],"predecessor-version":[{"id":1913,"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/pages\/1851\/revisions\/1913"}],"wp:attachment":[{"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/media?parent=1851"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}