{"id":354,"date":"2024-02-25T14:54:35","date_gmt":"2024-02-25T14:54:35","guid":{"rendered":"https:\/\/cyberpreventionservices.axa.ch\/home\/"},"modified":"2026-03-19T16:44:04","modified_gmt":"2026-03-19T16:44:04","slug":"analyse-de-vulnerabilites","status":"publish","type":"page","link":"https:\/\/cyberpreventionservices.axa.ch\/fr\/kmu\/analyse-de-vulnerabilites\/","title":{"rendered":"Analyse de vuln\u00e9rabilit\u00e9s"},"content":{"rendered":"\n<div class=\"hero-cta-wrapper\"><div class=\"wp-block-silenccio-hero-cta hero-cta\" style=\"background-image:linear-gradient(rgba(0,0,0,0.4), rgba(0,0,0,0.4)), url(\/wp-content\/uploads\/2024\/02\/keyvisual_cyberversicherung_u_frau_brille_computer_web_2880x9601.jpg);background-size:cover;background-position:center\"><h2>S\u00e9curit\u00e9 24h\/24, 7j\/7 pour l&rsquo;infrastructure informatique de votre entreprise<\/h2><h1>L&rsquo;analyse de vuln\u00e9rabilit\u00e9 pour vous prot\u00e9ger contre la cybercriminalit\u00e9<\/h1><div class=\"hero-cta-buttons\">\n<div class=\"wp-block-silenccio-axa-button\"><a class=\"btn btn-accent\" href=\"https:\/\/cyberpreventionservicesapp.axa.ch\/fr\/authentication\/service?is_fresh=true&amp;select_scan=true&amp;paid_scanner=true\">ACHETER MAINTENANT<\/a><\/div>\n\n\n\n<div class=\"wp-block-silenccio-axa-button\"><a class=\"btn btn-outline-white\" href=\"https:\/\/outlook.office.com\/book\/AXA_CH_BKS_CYBERPREVENTIONSERVICES1@axa365.onmicrosoft.com\/s\/ViqwHXah10q2ZROIdRL9ug2\">DISCUTEZ AVEC UN SP\u00c9CIALISTE<\/a><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading has-text-align-center\" style=\"margin-top:var(--wp--preset--spacing--60);margin-bottom:var(--wp--preset--spacing--60)\">Les cyberattaques sont monnaie courante, m\u00eame dans les petites entreprises<\/h4>\n\n\n\n<p class=\"has-text-align-center\">La meilleure protection contre ces attaques est de ne pas \u00eatre vuln\u00e9rable. L&rsquo;analyse de vuln\u00e9rabilit\u00e9 vous prot\u00e8ge:<\/p>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-d2da212e wp-block-group-is-layout-constrained\" style=\"margin-top:var(--wp--preset--spacing--60);margin-bottom:var(--wp--preset--spacing--60)\">\n<div class=\"check-mark-list-wrapper\" style=\"--check-icon-size:2em;--check-icon-valign:0.1em;--check-item-gap:0.5rem;--check-icon-color:currentColor;--check-icon-content:url(&quot;data:image\/svg+xml,%3Csvg%20width%3D%2224%22%20height%3D%2224%22%20viewBox%3D%220%200%2024%2024%22%20fill%3D%22none%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%0A%3Cpath%20fill-rule%3D%22evenodd%22%20clip-rule%3D%22evenodd%22%20d%3D%22M2%2012C2%206.48%206.48%202%2012%202C17.52%202%2022%206.48%2022%2012C22%2017.52%2017.52%2022%2012%2022C6.48%2022%202%2017.52%202%2012ZM10%2014.17L16.59%207.58L18%209L10%2017L6%2013L7.41%2011.59L10%2014.17Z%22%20fill%3D%22%23668980%22%2F%3E%0A%3C%2Fsvg%3E&quot;)\"><ul class=\"wp-block-silenccio-check-mark-list check-mark-list has-medium-font-size\" style=\"font-style:normal;font-weight:600\"><li><strong>Surveillance permanente de votre infrastructure informatique<\/strong><\/li><li><strong>Notifications rapides et simples sur les risques li\u00e9s \u00e0 la s\u00e9curit\u00e9<\/strong><\/li><li><strong>Sensibilisation de votre personnel gr\u00e2ce \u00e0 des simulations de phishing<\/strong><\/li><li><strong>Notifications push en cas de cyberrisques actuels<\/strong><\/li><\/ul><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-silenccio-axa-button\"><a class=\"btn btn-primary\" href=\"https:\/\/cyberpreventionservicesapp.axa.ch\/fr\/authentication\/service?is_fresh=true&amp;select_scan=true&amp;paid_scanner=true\">ACHETER MAINTENANT<\/a><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading has-text-align-center\" style=\"margin-top:var(--wp--preset--spacing--60);margin-bottom:var(--wp--preset--spacing--60)\">Surveillez votre s\u00e9curit\u00e9 et comblez de mani\u00e8re cibl\u00e9e les lacunes de s\u00e9curit\u00e9 &#8211; le tout avec un seul tableau de bord.<\/h4>\n\n\n\n<div class=\"wp-block-silenccio-scan-result scan-result\"><div class=\"scan-header\"><div class=\"scan-icon-lg\"><svg width=\"90\" height=\"90\" viewBox=\"0 0 143 143\" fill=\"none\" aria-hidden=\"true\"><circle cx=\"71.5\" cy=\"71.5\" r=\"66.77\" fill=\"#C91432\"><\/circle><circle cx=\"71.5\" cy=\"71.5\" r=\"71\" stroke=\"#C91432\"><\/circle><path d=\"M66 38C66 34.134 69.134 31 73 31H74C77.866 31 81 34.134 81 38V82.75C81 86.616 77.866 89.75 74 89.75H73C69.134 89.75 66 86.616 66 82.75V38Z\" fill=\"white\"><\/path><circle cx=\"73.5\" cy=\"103.5\" r=\"7.5\" fill=\"white\"><\/circle><\/svg><\/div><div class=\"scan-header-text\"><h3 class=\"scan-title\">Votre s\u00e9curit\u00e9 est menac\u00e9e &#8211; Nous avons constat\u00e9 d&rsquo;importantes faiblesses en mati\u00e8re de s\u00e9curit\u00e9.<\/h3><p class=\"scan-meta\">Dernier scan : 19.03.2026 17:44<\/p><\/div><\/div><div class=\"cat-grid\"><div class=\"cat-card\"><div class=\"cat-icon-wrap\"><div style=\"position:relative;display:inline-flex;align-items:center;justify-content:center\"><svg width=\"52\" height=\"52\" viewBox=\"0 0 57 57\" fill=\"none\" aria-hidden=\"true\"><path d=\"M54 28.5C54 42.58 42.58 54 28.5 54S3 42.58 3 28.5 14.42 3 28.5 3 54 14.42 54 28.5Z\" fill=\"#C91432\"><\/path><circle cx=\"28.5\" cy=\"28.5\" r=\"28\" stroke=\"#C91432\"><\/circle><\/svg><span style=\"position:absolute;display:inline-flex;width:26px;height:26px\"><svg viewBox=\"0 0 24 24\" fill=\"none\" aria-hidden=\"true\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M16.04 16.89C16.56 16.42 17.24 16.12 18 16.12C19.61 16.12 20.92 17.43 20.92 19.04C20.92 20.65 19.61 21.96 18 21.96C16.39 21.96 15.08 20.65 15.08 19.04C15.08 18.82 15.11 18.6 15.16 18.39L8.04 14.23C7.5 14.73 6.79 15.04 6 15.04C4.34 15.04 3 13.7 3 12.04C3 10.38 4.34 9.04004 6 9.04004C6.79 9.04004 7.5 9.35004 8.04 9.85004L15.09 5.74004C15.04 5.51004 15 5.28004 15 5.04004C15 3.38004 16.34 2.04004 18 2.04004C19.66 2.04004 21 3.38004 21 5.04004C21 6.70004 19.66 8.04004 18 8.04004C17.21 8.04004 16.5 7.73004 15.96 7.23004L8.91 11.34C8.96 11.57 9 11.8 9 12.04C9 12.28 8.96 12.51 8.91 12.74L16.04 16.89ZM19 5.04004C19 4.49004 18.55 4.04004 18 4.04004C17.45 4.04004 17 4.49004 17 5.04004C17 5.59004 17.45 6.04004 18 6.04004C18.55 6.04004 19 5.59004 19 5.04004ZM6 13.04C5.45 13.04 5 12.59 5 12.04C5 11.49 5.45 11.04 6 11.04C6.55 11.04 7 11.49 7 12.04C7 12.59 6.55 13.04 6 13.04ZM17 19.06C17 19.61 17.45 20.06 18 20.06C18.55 20.06 19 19.61 19 19.06C19 18.51 18.55 18.06 18 18.06C17.45 18.06 17 18.51 17 19.06Z\" fill=\"white\"><\/path><\/svg><\/span><\/div><\/div><span class=\"cat-label\">Network<\/span><\/div><div class=\"cat-card\"><div class=\"cat-icon-wrap\"><div style=\"position:relative;display:inline-flex;align-items:center;justify-content:center\"><svg width=\"52\" height=\"52\" viewBox=\"0 0 57 57\" fill=\"none\" aria-hidden=\"true\"><path d=\"M54 28.5C54 42.58 42.58 54 28.5 54S3 42.58 3 28.5 14.42 3 28.5 3 54 14.42 54 28.5Z\" fill=\"#C91432\"><\/path><circle cx=\"28.5\" cy=\"28.5\" r=\"28\" stroke=\"#C91432\"><\/circle><\/svg><span style=\"position:absolute;display:inline-flex;width:26px;height:26px\"><svg viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"#fff\" stroke-width=\"2\" aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"><\/circle><line x1=\"2\" y1=\"12\" x2=\"22\" y2=\"12\"><\/line><path d=\"M12 2a15.3 15.3 0 010 20M12 2a15.3 15.3 0 000 20\"><\/path><\/svg><\/span><\/div><\/div><span class=\"cat-label\">Site web<\/span><\/div><div class=\"cat-card\"><div class=\"cat-icon-wrap\"><div style=\"position:relative;display:inline-flex;align-items:center;justify-content:center\"><svg width=\"52\" height=\"52\" viewBox=\"0 0 57 57\" fill=\"none\" aria-hidden=\"true\"><path d=\"M54 28.5C54 42.58 42.58 54 28.5 54S3 42.58 3 28.5 14.42 3 28.5 3 54 14.42 54 28.5Z\" fill=\"#BC9D45\"><\/path><circle cx=\"28.5\" cy=\"28.5\" r=\"28\" stroke=\"#BC9D45\"><\/circle><\/svg><span style=\"position:absolute;display:inline-flex;width:26px;height:26px\"><svg viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"#fff\" stroke-width=\"2\" aria-hidden=\"true\"><path d=\"M4 4h16c1.1 0 2 .9 2 2v12c0 1.1-.9 2-2 2H4c-1.1 0-2-.9-2-2V6c0-1.1.9-2 2-2z\"><\/path><polyline points=\"22,6 12,13 2,6\"><\/polyline><\/svg><\/span><\/div><\/div><span class=\"cat-label\">E-Mail<\/span><\/div><div class=\"cat-card\"><div class=\"cat-icon-wrap\"><div style=\"position:relative;display:inline-flex;align-items:center;justify-content:center\"><svg width=\"52\" height=\"52\" viewBox=\"0 0 57 57\" fill=\"none\" aria-hidden=\"true\"><path d=\"M54 28.5C54 42.58 42.58 54 28.5 54S3 42.58 3 28.5 14.42 3 28.5 3 54 14.42 54 28.5Z\" fill=\"#169E3E\"><\/path><circle cx=\"28.5\" cy=\"28.5\" r=\"28\" stroke=\"#169E3E\"><\/circle><\/svg><span style=\"position:absolute;display:inline-flex;width:26px;height:26px\"><svg viewBox=\"0 0 24 24\" fill=\"none\" aria-hidden=\"true\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12 6H20C21.1 6 22 6.9 22 8V18C22 19.1 21.1 20 20 20H4C2.9 20 2 19.1 2 18L2.01 6C2.01 4.9 2.9 4 4 4H10L12 6ZM4 8V18H20V8H4Z\" fill=\"white\"><\/path><\/svg><\/span><\/div><\/div><span class=\"cat-label\">Fuite de donn\u00e9es<\/span><\/div><div class=\"cat-card\"><div class=\"cat-icon-wrap\"><div style=\"position:relative;display:inline-flex;align-items:center;justify-content:center\"><svg width=\"52\" height=\"52\" viewBox=\"0 0 57 57\" fill=\"none\" aria-hidden=\"true\"><path d=\"M54 28.5C54 42.58 42.58 54 28.5 54S3 42.58 3 28.5 14.42 3 28.5 3 54 14.42 54 28.5Z\" fill=\"#169E3E\"><\/path><circle cx=\"28.5\" cy=\"28.5\" r=\"28\" stroke=\"#169E3E\"><\/circle><\/svg><span style=\"position:absolute;display:inline-flex;width:26px;height:26px\"><svg viewBox=\"0 0 24 24\" fill=\"#fff\" aria-hidden=\"true\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1 21.5L12 2.5L23 21.5H1ZM19.53 19.5L12 6.49L4.47 19.5H19.53ZM11 16.5V18.5H13V16.5H11ZM11 10.5H13V14.5H11V10.5Z\" fill=\"white\"><\/path><\/svg><\/span><\/div><\/div><span class=\"cat-label\">PHISHING-TEST<\/span><\/div><\/div><div class=\"findings\"><div class=\"finding\" data-index=\"0\"><div class=\"finding-header\"><div class=\"finding-icon-strip\" style=\"background-color:#C91432\"><span style=\"display:inline-flex;width:16px;height:16px\"><svg viewBox=\"0 0 24 24\" fill=\"none\" aria-hidden=\"true\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M16.04 16.89C16.56 16.42 17.24 16.12 18 16.12C19.61 16.12 20.92 17.43 20.92 19.04C20.92 20.65 19.61 21.96 18 21.96C16.39 21.96 15.08 20.65 15.08 19.04C15.08 18.82 15.11 18.6 15.16 18.39L8.04 14.23C7.5 14.73 6.79 15.04 6 15.04C4.34 15.04 3 13.7 3 12.04C3 10.38 4.34 9.04004 6 9.04004C6.79 9.04004 7.5 9.35004 8.04 9.85004L15.09 5.74004C15.04 5.51004 15 5.28004 15 5.04004C15 3.38004 16.34 2.04004 18 2.04004C19.66 2.04004 21 3.38004 21 5.04004C21 6.70004 19.66 8.04004 18 8.04004C17.21 8.04004 16.5 7.73004 15.96 7.23004L8.91 11.34C8.96 11.57 9 11.8 9 12.04C9 12.28 8.96 12.51 8.91 12.74L16.04 16.89ZM19 5.04004C19 4.49004 18.55 4.04004 18 4.04004C17.45 4.04004 17 4.49004 17 5.04004C17 5.59004 17.45 6.04004 18 6.04004C18.55 6.04004 19 5.59004 19 5.04004ZM6 13.04C5.45 13.04 5 12.59 5 12.04C5 11.49 5.45 11.04 6 11.04C6.55 11.04 7 11.49 7 12.04C7 12.59 6.55 13.04 6 13.04ZM17 19.06C17 19.61 17.45 20.06 18 20.06C18.55 20.06 19 19.61 19 19.06C19 18.51 18.55 18.06 18 18.06C17.45 18.06 17 18.51 17 19.06Z\" fill=\"white\"><\/path><\/svg><\/span><\/div><div class=\"finding-body\"><h4 class=\"finding-title\">Redirection de http vers https<\/h4><div class=\"chevron\"><svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" aria-hidden=\"true\"><path d=\"M10.59.295L6 4.875 1.41.295 0 1.705l6 6 6-6-1.41-1.41z\" fill=\"#00008F\"><\/path><\/svg><\/div><\/div><\/div><div class=\"finding-detail\"><div class=\"detail-inner\"><p><strong>Description<\/strong><\/p><p>Il n&rsquo;y a pas de redirection de transferts HTTP non crypt\u00e9s vers des transferts HTTPS crypt\u00e9s. Ainsi les donn\u00e9es sensibles ne sont pas prot\u00e9g\u00e9es lors du transfert.<\/p><p><strong>Risques potentiels<\/strong><\/p><p>Les criminels pourraient lire l&rsquo;\u00e9change de donn\u00e9es r\u00e9alis\u00e9 sous une forme non crypt\u00e9e et voler des donn\u00e9es telles que des mots de passe ou des informations de paiement.<\/p><\/div><div class=\"expert-section\"><div class=\"expert-header\"><span class=\"expert-title\">Expertmode<\/span><div class=\"chevron\"><svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" aria-hidden=\"true\"><path d=\"M10.59.295L6 4.875 1.41.295 0 1.705l6 6 6-6-1.41-1.41z\" fill=\"#00008F\"><\/path><\/svg><\/div><\/div><div class=\"expert-body\"><p><strong>Description<\/strong><\/p><p>Le serveur ne r\u00e9achemine pas la demande http \u00e0 https.<\/p><\/div><\/div><\/div><\/div><div class=\"finding\" data-index=\"1\"><div class=\"finding-header\"><div class=\"finding-icon-strip\" style=\"background-color:#C91432\"><span style=\"display:inline-flex;width:16px;height:16px\"><svg viewBox=\"0 0 24 24\" fill=\"none\" aria-hidden=\"true\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M16.04 16.89C16.56 16.42 17.24 16.12 18 16.12C19.61 16.12 20.92 17.43 20.92 19.04C20.92 20.65 19.61 21.96 18 21.96C16.39 21.96 15.08 20.65 15.08 19.04C15.08 18.82 15.11 18.6 15.16 18.39L8.04 14.23C7.5 14.73 6.79 15.04 6 15.04C4.34 15.04 3 13.7 3 12.04C3 10.38 4.34 9.04004 6 9.04004C6.79 9.04004 7.5 9.35004 8.04 9.85004L15.09 5.74004C15.04 5.51004 15 5.28004 15 5.04004C15 3.38004 16.34 2.04004 18 2.04004C19.66 2.04004 21 3.38004 21 5.04004C21 6.70004 19.66 8.04004 18 8.04004C17.21 8.04004 16.5 7.73004 15.96 7.23004L8.91 11.34C8.96 11.57 9 11.8 9 12.04C9 12.28 8.96 12.51 8.91 12.74L16.04 16.89ZM19 5.04004C19 4.49004 18.55 4.04004 18 4.04004C17.45 4.04004 17 4.49004 17 5.04004C17 5.59004 17.45 6.04004 18 6.04004C18.55 6.04004 19 5.59004 19 5.04004ZM6 13.04C5.45 13.04 5 12.59 5 12.04C5 11.49 5.45 11.04 6 11.04C6.55 11.04 7 11.49 7 12.04C7 12.59 6.55 13.04 6 13.04ZM17 19.06C17 19.61 17.45 20.06 18 20.06C18.55 20.06 19 19.61 19 19.06C19 18.51 18.55 18.06 18 18.06C17.45 18.06 17 18.51 17 19.06Z\" fill=\"white\"><\/path><\/svg><\/span><\/div><div class=\"finding-body\"><h4 class=\"finding-title\">Probl\u00e8me de certificat<\/h4><div class=\"chevron\"><svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" aria-hidden=\"true\"><path d=\"M10.59.295L6 4.875 1.41.295 0 1.705l6 6 6-6-1.41-1.41z\" fill=\"#00008F\"><\/path><\/svg><\/div><\/div><\/div><div class=\"finding-detail\"><div class=\"detail-inner\"><p><strong>Description<\/strong><\/p><p>Vos donn\u00e9es ne sont pas convenablement crypt\u00e9es, si bien que le transfert ou le stockage des informations sensibles pourrait \u00eatre expos\u00e9 \u00e0 un acc\u00e8s non autoris\u00e9.<\/p><p><strong>Risques potentiels<\/strong><\/p><p>Les criminels pourraient exploiter cette faille pour intercepter des transmissions de donn\u00e9es et ainsi voler des donn\u00e9es sensibles ou diriger les utilisateurs de votre site internet vers d&rsquo;autres sites. De plus, il est possible que votre site internet ne s&rsquo;ouvre pas correctement dans le navigateur.<\/p><\/div><div class=\"expert-section\"><div class=\"expert-header\"><span class=\"expert-title\">Expertmode<\/span><div class=\"chevron\"><svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" aria-hidden=\"true\"><path d=\"M10.59.295L6 4.875 1.41.295 0 1.705l6 6 6-6-1.41-1.41z\" fill=\"#00008F\"><\/path><\/svg><\/div><\/div><div class=\"expert-body\"><p><strong>Description<\/strong><\/p><p>La validation de l&rsquo;algorithme de chiffrement asym\u00e9trique a \u00e9chou\u00e9.<\/p><\/div><\/div><\/div><\/div><div class=\"finding\" data-index=\"2\"><div class=\"finding-header\"><div class=\"finding-icon-strip\" style=\"background-color:#C91432\"><span style=\"display:inline-flex;width:16px;height:16px\"><svg viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"#fff\" stroke-width=\"2\" aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"><\/circle><line x1=\"2\" y1=\"12\" x2=\"22\" y2=\"12\"><\/line><path d=\"M12 2a15.3 15.3 0 010 20M12 2a15.3 15.3 0 000 20\"><\/path><\/svg><\/span><\/div><div class=\"finding-body\"><h4 class=\"finding-title\">Dossier\/fichier publiquement accessible non pr\u00e9vu d\u00e9tect\u00e9<\/h4><div class=\"chevron\"><svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" aria-hidden=\"true\"><path d=\"M10.59.295L6 4.875 1.41.295 0 1.705l6 6 6-6-1.41-1.41z\" fill=\"#00008F\"><\/path><\/svg><\/div><\/div><\/div><div class=\"finding-detail\"><div class=\"detail-inner\"><p><strong>Description<\/strong><\/p><p>L&rsquo;existence de dossiers et fichiers standard, par exemple des fichiers de configuration, des backups etc. a \u00e9t\u00e9 constat\u00e9e.<\/p><p><strong>Risques potentiels<\/strong><\/p><p>Les criminels pourraient utiliser ces dossiers et fichiers pour s&rsquo;introduire plus profond\u00e9ment dans votre syst\u00e8me, pour le manipuler ou lire des informations confidentielles.<\/p><\/div><div class=\"expert-section\"><div class=\"expert-header\"><span class=\"expert-title\">Expertmode<\/span><div class=\"chevron\"><svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" aria-hidden=\"true\"><path d=\"M10.59.295L6 4.875 1.41.295 0 1.705l6 6 6-6-1.41-1.41z\" fill=\"#00008F\"><\/path><\/svg><\/div><\/div><div class=\"expert-body\"><p><strong>Description<\/strong><\/p><p>D\u00e9couverte d&rsquo;un r\u00e9pertoire\/fichier accessible au public sur le serveur cible, qui devrait \u00eatre inaccessible : \/wp-register.php<\/p><\/div><\/div><\/div><\/div><div class=\"finding\" data-index=\"3\"><div class=\"finding-header\"><div class=\"finding-icon-strip\" style=\"background-color:#C91432\"><span style=\"display:inline-flex;width:16px;height:16px\"><svg viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"#fff\" stroke-width=\"2\" aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"><\/circle><line x1=\"2\" y1=\"12\" x2=\"22\" y2=\"12\"><\/line><path d=\"M12 2a15.3 15.3 0 010 20M12 2a15.3 15.3 0 000 20\"><\/path><\/svg><\/span><\/div><div class=\"finding-body\"><h4 class=\"finding-title\">Content-security-policy (CSP)<\/h4><div class=\"chevron\"><svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" aria-hidden=\"true\"><path d=\"M10.59.295L6 4.875 1.41.295 0 1.705l6 6 6-6-1.41-1.41z\" fill=\"#00008F\"><\/path><\/svg><\/div><\/div><\/div><div class=\"finding-detail\"><div class=\"detail-inner\"><p><strong>Description<\/strong><\/p><p>Le m\u00e9canisme Content Security Policy (CSP) n&rsquo;est pas activ\u00e9, si bien que le navigateur ne re\u00e7oit pas d&rsquo;instructions claires lui indiquant quels contenus potentiellement dangereux, soit des scripts, des ressources ou des contenus, peuvent \u00eatre charg\u00e9s ou pas.<\/p><p><strong>Risques potentiels<\/strong><\/p><p>Les criminels pourraient, gr\u00e2ce \u00e0 ce d\u00e9faut de param\u00e9trage, intercepter les cookies transmis sans \u00eatre crypt\u00e9s et obtenir ainsi l&rsquo;acc\u00e8s aux donn\u00e9es de session, donn\u00e9es \u00e0 caract\u00e8re personnel et informations d&rsquo;authentification.<\/p><\/div><div class=\"expert-section\"><div class=\"expert-header\"><span class=\"expert-title\">Expertmode<\/span><div class=\"chevron\"><svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" aria-hidden=\"true\"><path d=\"M10.59.295L6 4.875 1.41.295 0 1.705l6 6 6-6-1.41-1.41z\" fill=\"#00008F\"><\/path><\/svg><\/div><\/div><div class=\"expert-body\"><p><strong>Description<\/strong><\/p><p>L&rsquo;en-t\u00eate &lsquo;content-security-policy&rsquo; (politique de s\u00e9curit\u00e9 du contenu) n&rsquo;est pas d\u00e9tect\u00e9e dans les en-t\u00eates de r\u00e9ponse ou le corps de la r\u00e9ponse.<\/p><\/div><\/div><\/div><\/div><div class=\"finding\" data-index=\"4\"><div class=\"finding-header\"><div class=\"finding-icon-strip\" style=\"background-color:#C91432\"><span style=\"display:inline-flex;width:16px;height:16px\"><svg viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"#fff\" stroke-width=\"2\" aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"><\/circle><line x1=\"2\" y1=\"12\" x2=\"22\" y2=\"12\"><\/line><path d=\"M12 2a15.3 15.3 0 010 20M12 2a15.3 15.3 0 000 20\"><\/path><\/svg><\/span><\/div><div class=\"finding-body\"><h4 class=\"finding-title\">Les cookies ne sont pas configur\u00e9s correctement<\/h4><div class=\"chevron\"><svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" aria-hidden=\"true\"><path d=\"M10.59.295L6 4.875 1.41.295 0 1.705l6 6 6-6-1.41-1.41z\" fill=\"#00008F\"><\/path><\/svg><\/div><\/div><\/div><div class=\"finding-detail\"><div class=\"detail-inner\"><p><strong>Description<\/strong><\/p><p>Les param\u00e8tres de s\u00e9curit\u00e9 pour les cookies qui enregistrent des valeurs, par exemple les cl\u00e9s de session d&rsquo;une inscription effectu\u00e9e, ne sont pas suffisamment restrictifs et des donn\u00e9es potentiellement sensibles sont insuffisamment prot\u00e9g\u00e9es.<\/p><p><strong>Risques potentiels<\/strong><\/p><p>Les criminels pourraient, gr\u00e2ce \u00e0 ce d\u00e9faut de param\u00e9trage, intercepter les cookies transmis sans \u00eatre crypt\u00e9s et obtenir ainsi l&rsquo;acc\u00e8s aux donn\u00e9es de session, donn\u00e9es \u00e0 caract\u00e8re personnel et informations d&rsquo;authentification.<\/p><\/div><div class=\"expert-section\"><div class=\"expert-header\"><span class=\"expert-title\">Expertmode<\/span><div class=\"chevron\"><svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" aria-hidden=\"true\"><path d=\"M10.59.295L6 4.875 1.41.295 0 1.705l6 6 6-6-1.41-1.41z\" fill=\"#00008F\"><\/path><\/svg><\/div><\/div><div class=\"expert-body\"><p><strong>Description<\/strong><\/p><p>L&rsquo;en-t\u00eate &lsquo;set-cookie&rsquo; a omis l&rsquo;option requise : &lsquo;secure&rsquo;.<\/p><\/div><\/div><\/div><\/div><div class=\"finding\" data-index=\"5\"><div class=\"finding-header\"><div class=\"finding-icon-strip\" style=\"background-color:#BC9D45\"><span style=\"display:inline-flex;width:16px;height:16px\"><svg viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"#fff\" stroke-width=\"2\" aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"><\/circle><line x1=\"2\" y1=\"12\" x2=\"22\" y2=\"12\"><\/line><path d=\"M12 2a15.3 15.3 0 010 20M12 2a15.3 15.3 0 000 20\"><\/path><\/svg><\/span><\/div><div class=\"finding-body\"><h4 class=\"finding-title\">Le serveur autorise les requ\u00eates de m\u00e9thode TRACE<\/h4><div class=\"chevron\"><svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" aria-hidden=\"true\"><path d=\"M10.59.295L6 4.875 1.41.295 0 1.705l6 6 6-6-1.41-1.41z\" fill=\"#00008F\"><\/path><\/svg><\/div><\/div><\/div><div class=\"finding-detail\"><div class=\"detail-inner\"><p><strong>Description<\/strong><\/p><p>HTTP-TRACE est un outil g\u00e9n\u00e9ralement utilis\u00e9 pour le d\u00e9veloppement de sites web afin d&rsquo;identifier et \u00e9liminer les erreurs et il ne doit pas \u00eatre activ\u00e9 sur les syst\u00e8mes d\u00e9j\u00e0 en production car il peut potentiellement divulguer des informations sensibles.<\/p><p><strong>Risques potentiels<\/strong><\/p><p>Les criminels pourraient exploiter cette faille pour lire des donn\u00e9es confidentielles, comme des identifiants de connexion ou d&rsquo;autres donn\u00e9es sensibles, ce qui exposerait \u00e0 des risques de s\u00e9curit\u00e9.<\/p><\/div><div class=\"expert-section\"><div class=\"expert-header\"><span class=\"expert-title\">Expertmode<\/span><div class=\"chevron\"><svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" aria-hidden=\"true\"><path d=\"M10.59.295L6 4.875 1.41.295 0 1.705l6 6 6-6-1.41-1.41z\" fill=\"#00008F\"><\/path><\/svg><\/div><\/div><div class=\"expert-body\"><p><strong>Description<\/strong><\/p><p>Le serveur autorise les requ\u00eates de m\u00e9thode TRACE.<\/p><\/div><\/div><\/div><\/div><div class=\"finding\" data-index=\"6\"><div class=\"finding-header\"><div class=\"finding-icon-strip\" style=\"background-color:#BC9D45\"><span style=\"display:inline-flex;width:16px;height:16px\"><svg viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"#fff\" stroke-width=\"2\" aria-hidden=\"true\"><path d=\"M4 4h16c1.1 0 2 .9 2 2v12c0 1.1-.9 2-2 2H4c-1.1 0-2-.9-2-2V6c0-1.1.9-2 2-2z\"><\/path><polyline points=\"22,6 12,13 2,6\"><\/polyline><\/svg><\/span><\/div><div class=\"finding-body\"><h4 class=\"finding-title\">DMARC<\/h4><div class=\"chevron\"><svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" aria-hidden=\"true\"><path d=\"M10.59.295L6 4.875 1.41.295 0 1.705l6 6 6-6-1.41-1.41z\" fill=\"#00008F\"><\/path><\/svg><\/div><\/div><\/div><div class=\"finding-detail\"><div class=\"detail-inner\"><p><strong>Description<\/strong><\/p><p>Les m\u00e9canismes de s\u00e9curit\u00e9 de votre domaine de messagerie ne sont pas configur\u00e9s ou pas configur\u00e9s de mani\u00e8re suffisamment restrictive et sont donc vuln\u00e9rables \u00e0 une falsification des adresses d&rsquo;exp\u00e9diteur.<\/p><p><strong>Risques potentiels<\/strong><\/p><p>Les m\u00e9canismes de s\u00e9curit\u00e9 de votre domaine de messagerie ne sont pas configur\u00e9s ou pas configur\u00e9s de mani\u00e8re suffisamment restrictive et sont donc vuln\u00e9rables \u00e0 une falsification des adresses d&rsquo;exp\u00e9diteur.<\/p><\/div><div class=\"expert-section\"><div class=\"expert-header\"><span class=\"expert-title\">Expertmode<\/span><div class=\"chevron\"><svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" aria-hidden=\"true\"><path d=\"M10.59.295L6 4.875 1.41.295 0 1.705l6 6 6-6-1.41-1.41z\" fill=\"#00008F\"><\/path><\/svg><\/div><\/div><div class=\"expert-body\"><p><strong>Description<\/strong><\/p><p>Aucun enregistrement DMARC trouv\u00e9 pour le domaine.<\/p><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group has-box-shadow is-layout-grid wp-container-core-group-is-layout-95ea58fd wp-block-group-is-layout-grid\">\n<div class=\"wp-block-group has-white-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-f806ea68 wp-block-group-is-layout-constrained\" style=\"border-top-left-radius:8px;border-top-right-radius:8px;border-bottom-left-radius:8px;border-bottom-right-radius:8px;padding-top:var(--wp--preset--spacing--70);padding-right:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70);padding-left:var(--wp--preset--spacing--70)\">\n<h2 class=\"wp-block-heading has-source-sans-pro-font-family has-x-large-font-size\" style=\"line-height:1.3\">Facile \u00e0 utiliser<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">R\u00e9pondez \u00e0 cinq questions simples afin d&rsquo;obtenir des r\u00e9sultats clairs et des recommandations pour votre cybers\u00e9curit\u00e9. Vous n&rsquo;avez pas besoin de connaissances techniques ni \u00e0 vous occuper des d\u00e9tails complexes.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-white-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-f806ea68 wp-block-group-is-layout-constrained\" style=\"border-top-left-radius:8px;border-top-right-radius:8px;border-bottom-left-radius:8px;border-bottom-right-radius:8px;padding-top:var(--wp--preset--spacing--70);padding-right:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70);padding-left:var(--wp--preset--spacing--70)\">\n<h2 class=\"wp-block-heading has-source-sans-pro-font-family has-x-large-font-size\" style=\"line-height:1.3\">Une protection permanente<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">L&rsquo;analyse s&rsquo;effectue en arri\u00e8re-plan et surveille en permanence votre s\u00e9curit\u00e9 afin que vous puissiez vous concentrer sur votre c\u0153ur de m\u00e9tier. Si une faille est identifi\u00e9e, vous en \u00eates inform\u00e9 imm\u00e9diatement. Vous recevez en outre des notifications push sur les nouvelles failles de s\u00e9curit\u00e9 et escroqueries identifi\u00e9es, afin que vous puissiez vous prot\u00e9ger de mani\u00e8re optimale.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-white-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-f806ea68 wp-block-group-is-layout-constrained\" style=\"border-top-left-radius:8px;border-top-right-radius:8px;border-bottom-left-radius:8px;border-bottom-right-radius:8px;padding-top:var(--wp--preset--spacing--70);padding-right:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70);padding-left:var(--wp--preset--spacing--70)\">\n<h2 class=\"wp-block-heading has-source-sans-pro-font-family has-x-large-font-size\" style=\"line-height:1.3\">Passage \u00e0 la protection compl\u00e8te automatis\u00e9e<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">Vous souhaitez prot\u00e9ger votre entreprise de mani\u00e8re automatis\u00e9e et 24 heures sur 24? Pour seulement CHF 259 par an, vous recevrez des informations claires sur la situation de votre entreprise en mati\u00e8re de s\u00e9curit\u00e9 informatique, des messages d&rsquo;alerte ainsi qu&rsquo;une description des risques li\u00e9s aux failles de s\u00e9curit\u00e9 et aux tentatives d&rsquo;escroquerie. Vous pouvez ainsi r\u00e9agir rapidement et de mani\u00e8re cibl\u00e9e.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading has-text-align-center\" style=\"margin-top:var(--wp--preset--spacing--50);margin-right:var(--wp--preset--spacing--60);margin-bottom:var(--wp--preset--spacing--50);margin-left:var(--wp--preset--spacing--60)\">Analyse de la vuln\u00e9rabilit\u00e9: une vue d&rsquo;ensemble<\/h4>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-d93a0af5 wp-block-group-is-layout-constrained\">\n<p class=\"has-medium-font-size\" style=\"font-style:normal;font-weight:300;line-height:1.8\">Gr\u00e2ce \u00e0 une surveillance continue des risques, notre analyse de la vuln\u00e9rabilit\u00e9 constitue un moyen efficace de prot\u00e9ger votre entreprise des cybermenaces.<\/p>\n\n\n\n<p class=\"has-medium-font-size\" style=\"margin-top:var(--wp--preset--spacing--40);margin-bottom:var(--wp--preset--spacing--40);line-height:1.8\"><strong>R\u00e9seau<\/strong><br>L&rsquo;analyse du r\u00e9seau identifie les failles et les erreurs de configuration de votre infrastructure r\u00e9seau. Celles-ci peuvent \u00eatre exploit\u00e9es par des pirates informatiques pour s&rsquo;introduire dans vos syst\u00e8mes.<\/p>\n\n\n\n<p class=\"has-medium-font-size\" style=\"margin-top:var(--wp--preset--spacing--40);margin-bottom:var(--wp--preset--spacing--40);line-height:1.8\">Vous obtenez des r\u00e9sultats clairs et compr\u00e9hensibles sur les risques potentiels ainsi que des pr\u00e9cisions sur les points faibles identifi\u00e9s.<\/p>\n\n\n\n<p class=\"has-medium-font-size\" style=\"margin-top:var(--wp--preset--spacing--40);margin-bottom:var(--wp--preset--spacing--40);line-height:1.8\"><strong>Site Internet et serveur de messagerie<\/strong><br>L&rsquo;analyse de votre site Web et de votre serveur de messagerie permet de v\u00e9rifier les \u00e9ventuels acc\u00e8s externes, la s\u00e9curit\u00e9 de votre configuration technique et la liste noire de votre site Web. Vous aurez ainsi la certitude que votre site est prot\u00e9g\u00e9 et que vous ne perdrez pas la confiance de votre client\u00e8le.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">Vous obtenez des r\u00e9sultats clairs et compr\u00e9hensibles sur les risques et pouvez corriger rapidement les points faibles identifi\u00e9s.<\/p>\n\n\n\n<p class=\"has-medium-font-size\" style=\"margin-top:var(--wp--preset--spacing--40);margin-bottom:var(--wp--preset--spacing--40);line-height:1.8\"><strong>Vol de donn\u00e9es<\/strong><br>Cette surveillance vous alerte d\u00e8s que vos num\u00e9ros de carte de cr\u00e9dit ou de t\u00e9l\u00e9phone sont publi\u00e9s sur Internet ou sur le darknet. Nous v\u00e9rifions aussi si les comptes d&rsquo;utilisateur bas\u00e9s sur une adresse e-mail de votre entreprise ont \u00e9t\u00e9 pirat\u00e9s. Vous pouvez ainsi r\u00e9agir rapidement pour \u00e9viter des pertes financi\u00e8res.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">Vous obtenez des r\u00e9sultats clairs et compr\u00e9hensibles sur les risques ainsi que des conseils pour prot\u00e9ger vos donn\u00e9es.<\/p>\n\n\n\n<p class=\"has-medium-font-size\" style=\"margin-top:var(--wp--preset--spacing--40);margin-bottom:var(--wp--preset--spacing--40);line-height:1.8\"><strong>Pr\u00e9vention du phishing<\/strong><br>Les e-mails de phishing sont l&rsquo;une des causes les plus fr\u00e9quentes de perte de donn\u00e9es ou d&rsquo;argent. La simulation de cas de phishing vous aide \u00e0 tester la sensibilit\u00e9 de vos collaboratrices et collaborateurs aux attaques de phishing et \u00e0 d\u00e9terminer leurs besoins en formation.<\/p>\n\n\n\n<p class=\"has-medium-font-size\" style=\"margin-top:var(--wp--preset--spacing--40);margin-bottom:var(--wp--preset--spacing--40);line-height:1.8\">Vous obtenez des r\u00e9sultats qui vous aident \u00e0 d\u00e9terminer les besoins en formation de votre personnel.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"padding-top:var(--wp--preset--spacing--60);padding-bottom:var(--wp--preset--spacing--60)\">\n<div class=\"wp-block-silenccio-axa-button\"><a class=\"btn btn-primary\" href=\"https:\/\/cyberpreventionservicesapp.axa.ch\/fr\/authentication\/service?is_fresh=true&amp;select_scan=true&amp;paid_scanner=true\">ACHETER MAINTENANT<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7d2e5d18 wp-block-group-is-layout-constrained\" style=\"margin-bottom:var(--wp--preset--spacing--40)\">\n<h4 class=\"wp-block-heading has-text-align-center\" style=\"padding-top:var(--wp--preset--spacing--60);padding-bottom:var(--wp--preset--spacing--60)\">FAQ<\/h4>\n\n\n\n<details class=\"wp-block-details faq-entry has-axa-blue-color has-text-color has-link-color has-medium-font-size wp-elements-7294b8e55af35e1786b9db2c48cb42e0 is-layout-flow wp-block-details-is-layout-flow\"><summary>Quelles informations dois-je fournir avant de lancer l&rsquo;analyse?<\/summary>\n<p class=\"has-dark-grey-color has-text-color has-link-color wp-elements-3572a0d10ee36d0d75d63f43056e64d7\">Pour lancer l&rsquo;analyse de vuln\u00e9rabilit\u00e9, nous avons uniquement besoin des informations suivantes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"has-dark-grey-color has-text-color has-link-color wp-elements-cd61de8663e0ddac93f4780dee1f8f56\">Votre nom de domaine<\/li>\n\n\n\n<li class=\"has-dark-grey-color has-text-color has-link-color wp-elements-c168059eb9d63e7e54068d7fdaf6fc5b\">Votre adresse e-mail<\/li>\n\n\n\n<li class=\"has-dark-grey-color has-text-color has-link-color wp-elements-8724b0ad8243bf47f577723dbf57a6f3\">Fonction de login disponible<\/li>\n\n\n\n<li class=\"has-dark-grey-color has-text-color has-link-color wp-elements-488c58b9f968a9443eee4c505550132a\">Fonction de paiement disponible<\/li>\n\n\n\n<li class=\"has-dark-grey-color has-text-color has-link-color wp-elements-69b06193fda0164831eb568aa82c2eed\">Formulaire de contact disponible<\/li>\n<\/ul>\n<\/details>\n\n\n\n<details class=\"wp-block-details faq-entry has-axa-blue-color has-text-color has-link-color has-medium-font-size wp-elements-a6cce7f54e6863943e64718b12d7c689 is-layout-flow wp-block-details-is-layout-flow\"><summary>Comment fonctionne l&rsquo;analyse de vuln\u00e9rabilit\u00e9?<\/summary>\n<p class=\"has-dark-grey-color has-text-color has-link-color wp-elements-fa8847b60cbdf99158eb0805b4a1ca4a\">Une fois activ\u00e9e, l&rsquo;analyse de vuln\u00e9rabilit\u00e9 s&rsquo;effectue en continu et<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"has-dark-grey-color has-text-color has-link-color wp-elements-cb0368af0cdf70589205068fb7fa8ffb\">identifie les erreurs de configuration dans votre infrastructure r\u00e9seau<\/li>\n\n\n\n<li class=\"has-dark-grey-color has-text-color has-link-color wp-elements-a5274367ffaa29bee037de43a525eb9a\">v\u00e9rifie la s\u00e9curit\u00e9 des configurations techniques de votre site Web et de votre serveur de messagerie<\/li>\n\n\n\n<li class=\"has-dark-grey-color has-text-color has-link-color wp-elements-12c94b835a792511b7efc08698e54e83\">v\u00e9rifie si des donn\u00e9es sensibles se trouvent sur le darknet.<\/li>\n<\/ul>\n<\/details>\n\n\n\n<details class=\"wp-block-details faq-entry has-axa-blue-color has-text-color has-link-color has-medium-font-size wp-elements-0f9f58042cabaddc87275da9222ebe7a is-layout-flow wp-block-details-is-layout-flow\"><summary>Quelles donn\u00e9es sont utilis\u00e9es pour l&rsquo;analyse de vuln\u00e9rabilit\u00e9?<\/summary>\n<p class=\"has-dark-grey-color has-text-color has-link-color wp-elements-6628adfcb70babfa508a51480759af68\">Seules sont utilis\u00e9es les donn\u00e9es que vous nous transmettez. Il s&rsquo;agit, en plus du nom de domaine, de l&rsquo;adresse e-mail et d&rsquo;autres informations sur votre site Web, ainsi que des num\u00e9ros de carte de cr\u00e9dit et de t\u00e9l\u00e9phone si vous le souhaitez.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details faq-entry has-axa-blue-color has-text-color has-link-color has-medium-font-size wp-elements-2a909e60eb3c308478b32aacf5836ac2 is-layout-flow wp-block-details-is-layout-flow\"><summary>Faut-il installer un logiciel pour utiliser l&rsquo;analyse de vuln\u00e9rabilit\u00e9?<\/summary>\n<p class=\"has-dark-grey-color has-text-color has-link-color wp-elements-86644626f4522e331201d59d8c7791a5\">Non, il n&rsquo;est pas n\u00e9cessaire d&rsquo;installer quoi que ce soit. L&rsquo;analyse de vuln\u00e9rabilit\u00e9 s&rsquo;effectue sur notre plate-forme en ligne.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details faq-entry has-axa-blue-color has-text-color has-link-color has-medium-font-size wp-elements-062f108573a37c2f74ff5ca8828d589a is-layout-flow wp-block-details-is-layout-flow\"><summary>J&rsquo;ai install\u00e9 un antivirus. L&rsquo;analyse de vuln\u00e9rabilit\u00e9 a-t-elle malgr\u00e9 tout un int\u00e9r\u00eat?<\/summary>\n<p class=\"has-dark-grey-color has-text-color has-link-color wp-elements-326b8c95098beea5cdbf4450b0c3bf6f\">Les programmes antivirus v\u00e9rifient la pr\u00e9sence de programmes malveillants tels que virus, chevaux de Troie ou autres sur un terminal (p. ex. ordinateur portable), les bloquent et les suppriment. Ils sont install\u00e9s individuellement sur chaque appareil. L&rsquo;analyse de vuln\u00e9rabilit\u00e9 v\u00e9rifie la pr\u00e9sence de failles de s\u00e9curit\u00e9 dans l&rsquo;infrastructure informatique, c&rsquo;est-\u00e0-dire en dehors de chaque appareil, susceptibles d&rsquo;\u00eatre exploit\u00e9es par des criminels.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details faq-entry has-axa-blue-color has-text-color has-link-color has-medium-font-size wp-elements-caaeb38bfdc49dfc9dd2cae3ad9b81c6 is-layout-flow wp-block-details-is-layout-flow\"><summary>Quelle est la diff\u00e9rence entre l&rsquo;analyse de vuln\u00e9rabilit\u00e9 et un pare-feu (firewall)?<\/summary>\n<p class=\"has-dark-grey-color has-text-color has-link-color wp-elements-f570994abc3d3aae646b05fa431f9e1e\">Un pare-feu est un dispositif de s\u00e9curit\u00e9 qui surveille et filtre le trafic de donn\u00e9es entre un r\u00e9seau interne et les r\u00e9seaux externes. L&rsquo;analyse de vuln\u00e9rabilit\u00e9, quant \u00e0 elle, est un processus automatis\u00e9 qui identifie les failles de s\u00e9curit\u00e9 pouvant \u00eatre exploit\u00e9es par des pirates informatiques. Contrairement au pare-feu, qui surveille le trafic de donn\u00e9es, l&rsquo;analyse de vuln\u00e9rabilit\u00e9 se concentre sur l&rsquo;identification de points faibles dans la configuration.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details faq-entry has-axa-blue-color has-text-color has-link-color has-medium-font-size wp-elements-3826a0d378ddf73cb0e00d275ed10da2 is-layout-flow wp-block-details-is-layout-flow\"><summary>Comment s&rsquo;effectue la notification en cas d&rsquo;identification d&rsquo;une faille de s\u00e9curit\u00e9 ou d&rsquo;un vol de donn\u00e9es?<\/summary>\n<p class=\"has-dark-grey-color has-text-color has-link-color wp-elements-fa8e717bcb305e2a7f595ce5ca238e9f\">Vous recevez un e-mail \u00e0 l&rsquo;adresse que vous avez indiqu\u00e9e, vous demandant de vous connecter \u00e0 la plate-forme afin de consulter les d\u00e9tails. Pour des raisons de s\u00e9curit\u00e9, aucun d\u00e9tail des points faibles n&rsquo;est envoy\u00e9 par e-mail.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details faq-entry has-axa-blue-color has-text-color has-link-color has-medium-font-size wp-elements-b33815abde27b64435ff37f685dc1849 is-layout-flow wp-block-details-is-layout-flow\"><summary>Mon entreprise ne compte que trois collaborateurs. Puis-je tout de m\u00eame utiliser l&rsquo;analyse de vuln\u00e9rabilit\u00e9?<\/summary>\n<p class=\"has-dark-grey-color has-text-color has-link-color wp-elements-046996271d67494e693c80c2e782ac5f\">Bien entendu! Le contr\u00f4le des syst\u00e8mes informatiques est ind\u00e9pendant du nombre de collaborateurs.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details faq-entry has-axa-blue-color has-text-color has-link-color has-medium-font-size wp-elements-888446bf3cd99ce38b752eff8ecbdda2 is-layout-flow wp-block-details-is-layout-flow\"><summary>Quelles possibilit\u00e9s ai-je pour payer?<\/summary>\n<p class=\"has-dark-grey-color has-text-color has-link-color wp-elements-cec8ffb5cd15f0a27b6f5a63292851d1\">Vous pouvez payer en toute simplicit\u00e9 par carte de cr\u00e9dit, Apple Pay ou Twint.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details faq-entry has-axa-blue-color has-text-color has-link-color has-medium-font-size wp-elements-6a6aa7e5e7cd2cf7d2b0fb674304232c is-layout-flow wp-block-details-is-layout-flow\"><summary>Comment fonctionne la formation au phishing?<\/summary>\n<p class=\"has-dark-grey-color has-text-color has-link-color wp-elements-8eb55d801ad3cf3db75a44f457dbc0bf\">Il vous suffit de choisir un mod\u00e8le d&rsquo;e-mail, comme \u00abGoogle Login\u00bb ou \u00abUpdate CG Visa\u00bb, de saisir jusqu&rsquo;\u00e0 30&nbsp;adresses e-mail de collaborateurs ou collaboratrices et de cliquer sur Envoyer. D\u00e8s que votre personnel r\u00e9agit \u00e0 l&rsquo;e-mail en l&rsquo;ouvrant, en cliquant dessus ou en transmettant des donn\u00e9es sensibles, vous avez acc\u00e8s aux statistiques.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details faq-entry has-axa-blue-color has-text-color has-link-color has-medium-font-size wp-elements-2fb62ebdd77ffe6cd2fa940813687149 is-layout-flow wp-block-details-is-layout-flow\"><summary>Quels sont les avantages de la formation au phishing?<\/summary>\n<p class=\"has-dark-grey-color has-text-color has-link-color wp-elements-3460430202de792ed4eb4036fd083c06\">D&rsquo;une part, vous sensibilisez votre personnel \u00e0 \u00eatre prudent avec les e-mails (phishing) dans un environnement prot\u00e9g\u00e9. D&rsquo;autre part, vous pouvez conna\u00eetre le comportement de vos \u00e9quipes et organiser des formations cibl\u00e9es afin de les former \u00e0 bien traiter les e-mails de phishing. Si un collaborateur ou une collaboratrice transmet des donn\u00e9es sensibles dans le cadre d&rsquo;une formation de phishing, une notification lui est imm\u00e9diatement envoy\u00e9e, avec des recommandations sur la mani\u00e8re de traiter les e-mails.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details faq-entry has-axa-blue-color has-text-color has-link-color has-medium-font-size wp-elements-cf88800a7505c30f23c2a5420bdd6d6c is-layout-flow wp-block-details-is-layout-flow\"><summary>\u00c0 quelle fr\u00e9quence faut-il lancer la formation au phishing?<\/summary>\n<p class=\"has-dark-grey-color has-text-color has-link-color wp-elements-83584af1e1a2e33bebe0b16a85bc5fb4\">Vous pouvez lancer la formation jusqu&rsquo;\u00e0 une fois par semaine. Nous vous conseillons d&rsquo;adapter le rythme d&rsquo;envoi de sorte qu&rsquo;il ne soit pas trop pr\u00e9visible pour les collaborateurs.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details faq-entry has-axa-blue-color has-text-color has-link-color has-medium-font-size wp-elements-9869d4bd1524bc156a726c3a36b3dba4 is-layout-flow wp-block-details-is-layout-flow\"><summary>Comment mes collaborateurs et collaboratrices seront-ils inform\u00e9s de la formation au phishing?<\/summary>\n<p class=\"has-dark-grey-color has-text-color has-link-color wp-elements-c986a9350df05d373eab860222144752\">Nous mettons \u00e0 votre disposition sur la plate-forme un mod\u00e8le d&rsquo;e-mail qui vous aidera \u00e0 informer vos collaborateurs et collaboratrices sur le phishing et la protection des donn\u00e9es.<\/p>\n<\/details>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Les cyberattaques sont monnaie courante, m\u00eame dans les petites entreprises La meilleure protection contre ces attaques est de ne pas \u00eatre vuln\u00e9rable. L&rsquo;analyse de vuln\u00e9rabilit\u00e9 vous prot\u00e8ge: Surveillez votre s\u00e9curit\u00e9 et comblez de mani\u00e8re cibl\u00e9e les lacunes de s\u00e9curit\u00e9 &#8211; le tout avec un seul tableau de bord. Facile \u00e0 utiliser R\u00e9pondez \u00e0 cinq questions [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1661,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-354","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Analyse de vuln\u00e9rabilit\u00e9s - Cyberpr\u00e4vention Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberpreventionservices.axa.ch\/fr\/kmu\/analyse-de-vulnerabilites\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Analyse de vuln\u00e9rabilit\u00e9s - Cyberpr\u00e4vention Services\" \/>\n<meta property=\"og:description\" content=\"Les cyberattaques sont monnaie courante, m\u00eame dans les petites entreprises La meilleure protection contre ces attaques est de ne pas \u00eatre vuln\u00e9rable. L&rsquo;analyse de vuln\u00e9rabilit\u00e9 vous prot\u00e8ge: Surveillez votre s\u00e9curit\u00e9 et comblez de mani\u00e8re cibl\u00e9e les lacunes de s\u00e9curit\u00e9 &#8211; le tout avec un seul tableau de bord. Facile \u00e0 utiliser R\u00e9pondez \u00e0 cinq questions [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberpreventionservices.axa.ch\/fr\/kmu\/analyse-de-vulnerabilites\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberpr\u00e4vention Services\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-19T16:44:04+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/fr\\\/kmu\\\/analyse-de-vulnerabilites\\\/\",\"url\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/fr\\\/kmu\\\/analyse-de-vulnerabilites\\\/\",\"name\":\"Analyse de vuln\u00e9rabilit\u00e9s - Cyberpr\u00e4vention Services\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/#website\"},\"datePublished\":\"2024-02-25T14:54:35+00:00\",\"dateModified\":\"2026-03-19T16:44:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/fr\\\/kmu\\\/analyse-de-vulnerabilites\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/fr\\\/kmu\\\/analyse-de-vulnerabilites\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/fr\\\/kmu\\\/analyse-de-vulnerabilites\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CYBERPR\u00c9VENTION POUR PME\",\"item\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Analyse de vuln\u00e9rabilit\u00e9s\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/#website\",\"url\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/\",\"name\":\"Cyber-Pr\u00e4ventionsservice\",\"description\":\"Cyber prevention for Swiss SMEs \u2013 discover tailored services to protect your business from cyber threats quickly and easily.\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/#organization\",\"name\":\"Cyber-Pr\u00e4ventionsservice AXA Schweiz\",\"url\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-img-logo-axa-logo-solid-rgb-copy.png\",\"contentUrl\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-img-logo-axa-logo-solid-rgb-copy.png\",\"width\":512,\"height\":512,\"caption\":\"Cyber-Pr\u00e4ventionsservice AXA Schweiz\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/axacyberalarmschweiz\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Analyse de vuln\u00e9rabilit\u00e9s - Cyberpr\u00e4vention Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberpreventionservices.axa.ch\/fr\/kmu\/analyse-de-vulnerabilites\/","og_locale":"fr_FR","og_type":"article","og_title":"Analyse de vuln\u00e9rabilit\u00e9s - Cyberpr\u00e4vention Services","og_description":"Les cyberattaques sont monnaie courante, m\u00eame dans les petites entreprises La meilleure protection contre ces attaques est de ne pas \u00eatre vuln\u00e9rable. L&rsquo;analyse de vuln\u00e9rabilit\u00e9 vous prot\u00e8ge: Surveillez votre s\u00e9curit\u00e9 et comblez de mani\u00e8re cibl\u00e9e les lacunes de s\u00e9curit\u00e9 &#8211; le tout avec un seul tableau de bord. Facile \u00e0 utiliser R\u00e9pondez \u00e0 cinq questions [&hellip;]","og_url":"https:\/\/cyberpreventionservices.axa.ch\/fr\/kmu\/analyse-de-vulnerabilites\/","og_site_name":"Cyberpr\u00e4vention Services","article_modified_time":"2026-03-19T16:44:04+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberpreventionservices.axa.ch\/fr\/kmu\/analyse-de-vulnerabilites\/","url":"https:\/\/cyberpreventionservices.axa.ch\/fr\/kmu\/analyse-de-vulnerabilites\/","name":"Analyse de vuln\u00e9rabilit\u00e9s - Cyberpr\u00e4vention Services","isPartOf":{"@id":"https:\/\/cyberpreventionservices.axa.ch\/#website"},"datePublished":"2024-02-25T14:54:35+00:00","dateModified":"2026-03-19T16:44:04+00:00","breadcrumb":{"@id":"https:\/\/cyberpreventionservices.axa.ch\/fr\/kmu\/analyse-de-vulnerabilites\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberpreventionservices.axa.ch\/fr\/kmu\/analyse-de-vulnerabilites\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cyberpreventionservices.axa.ch\/fr\/kmu\/analyse-de-vulnerabilites\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyberpreventionservices.axa.ch\/fr\/"},{"@type":"ListItem","position":2,"name":"CYBERPR\u00c9VENTION POUR PME","item":"https:\/\/cyberpreventionservices.axa.ch\/fr\/"},{"@type":"ListItem","position":3,"name":"Analyse de vuln\u00e9rabilit\u00e9s"}]},{"@type":"WebSite","@id":"https:\/\/cyberpreventionservices.axa.ch\/#website","url":"https:\/\/cyberpreventionservices.axa.ch\/","name":"Cyber-Pr\u00e4ventionsservice","description":"Cyber prevention for Swiss SMEs \u2013 discover tailored services to protect your business from cyber threats quickly and easily.","publisher":{"@id":"https:\/\/cyberpreventionservices.axa.ch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberpreventionservices.axa.ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/cyberpreventionservices.axa.ch\/#organization","name":"Cyber-Pr\u00e4ventionsservice AXA Schweiz","url":"https:\/\/cyberpreventionservices.axa.ch\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/cyberpreventionservices.axa.ch\/#\/schema\/logo\/image\/","url":"https:\/\/cyberpreventionservices.axa.ch\/wp-content\/uploads\/2026\/02\/cropped-img-logo-axa-logo-solid-rgb-copy.png","contentUrl":"https:\/\/cyberpreventionservices.axa.ch\/wp-content\/uploads\/2026\/02\/cropped-img-logo-axa-logo-solid-rgb-copy.png","width":512,"height":512,"caption":"Cyber-Pr\u00e4ventionsservice AXA Schweiz"},"image":{"@id":"https:\/\/cyberpreventionservices.axa.ch\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/axacyberalarmschweiz\/"]}]}},"_links":{"self":[{"href":"https:\/\/cyberpreventionservices.axa.ch\/fr\/wp-json\/wp\/v2\/pages\/354","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberpreventionservices.axa.ch\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberpreventionservices.axa.ch\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberpreventionservices.axa.ch\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberpreventionservices.axa.ch\/fr\/wp-json\/wp\/v2\/comments?post=354"}],"version-history":[{"count":44,"href":"https:\/\/cyberpreventionservices.axa.ch\/fr\/wp-json\/wp\/v2\/pages\/354\/revisions"}],"predecessor-version":[{"id":3380,"href":"https:\/\/cyberpreventionservices.axa.ch\/fr\/wp-json\/wp\/v2\/pages\/354\/revisions\/3380"}],"up":[{"embeddable":true,"href":"https:\/\/cyberpreventionservices.axa.ch\/fr\/wp-json\/wp\/v2\/pages\/1661"}],"wp:attachment":[{"href":"https:\/\/cyberpreventionservices.axa.ch\/fr\/wp-json\/wp\/v2\/media?parent=354"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}