{"id":406,"date":"2017-01-04T10:11:36","date_gmt":"2017-01-04T09:11:36","guid":{"rendered":"https:\/\/kermobile.com\/?p=406"},"modified":"2017-01-04T10:11:36","modified_gmt":"2017-01-04T09:11:36","slug":"sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise","status":"publish","type":"post","link":"https:\/\/kermobile.com\/en\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\/","title":{"rendered":"Sur quelle valeur assurer les donn\u00e9es informatiques de l\u2019entreprise\u00a0?"},"content":{"rendered":"\n<p>Pour la grande majorit\u00e9 des entreprises, les&nbsp;<strong>donn\u00e9es<\/strong>&nbsp;<strong>informatiques<\/strong>&nbsp;sont indispensables pour leur bon fonctionnement. Sans elles, l\u2019activit\u00e9 de l\u2019entreprise est paralys\u00e9e et le montant de la perte d\u2019exploitation peut devenir impossible \u00e0 absorber en cas de coup dur.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Cybercriminalit\u00e9, violation de fichiers, mauvaise manipulation<\/strong><\/h2>\n\n\n\n<p>Le nombre de victimes de cybercriminalit\u00e9 et de personnes sujettes \u00e0 la violation de leur r\u00e9seau augmente constamment. Anti-virus et sauvegarde dans le cloud sont cens\u00e9s prot\u00e9ger les fichiers informatique mais vue l\u2019agressivit\u00e9 des nouveaux virus et l\u2019acharnement des hackers \u00e0 infiltrer les r\u00e9seaux professionnels, ces mesures pr\u00e9ventives ne suffisent plus.<\/p>\n\n\n\n<p>Li\u00e9e le plus souvent \u00e0 un virus, une malveillance ou une erreur de manipulation, la perte de<strong>s&nbsp;<\/strong>fichiers informatique est un risque contre lequel les entreprises ne sont pas toujours bien pr\u00e9munies. Pourtant, sans informatique, beaucoup d\u2019entreprises sont en p\u00e9ril. Les archives num\u00e9riques sont bien souvent essentielles pour assurer la productivit\u00e9 de l\u2019entreprise.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Perte de donn\u00e9es, sur quelle valeur assurer l\u2019entreprise&nbsp;?<\/strong><\/h2>\n\n\n\n<p>Les assurances professionnelles comprennent de plus en plus souvent une assurance informatique qui couvre le parc informatique en cas de casse, de vol, ou de sinistre avec une garantie perte de&nbsp;<strong>donn\u00e9es informatiques<\/strong>&nbsp;cens\u00e9e couvrir les frais li\u00e9s \u00e0 leur reconstitution.<\/p>\n\n\n\n<p>La r\u00e9cup\u00e9ration peut couter ch\u00e8re, surtout si elle concerne la partie commerciale de l\u2019entreprise avec le fichier clients et ses donn\u00e9es relatives. Ne pas n\u00e9gliger non plus la partie production avec les secrets de fabrication, les codes sources et les logiciels d\u00e9velopp\u00e9s maison.<\/p>\n\n\n\n<p>La valeur sur laquelle assurer les&nbsp;<strong>donn\u00e9es informatiques<\/strong>&nbsp;d\u00e9pend de leur importance pour le bon fonctionnement de l\u2019entreprise et de la masse de fichiers \u00e0 reconstituer en cas de perte.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pour la grande majorit\u00e9 des entreprises, les&nbsp;donn\u00e9es&nbsp;informatiques&nbsp;sont indispensables pour leur bon fonctionnement. Sans elles, l\u2019activit\u00e9 de l\u2019entreprise est paralys\u00e9e et le montant de la perte d\u2019exploitation peut devenir impossible \u00e0 absorber en cas de coup dur. Cybercriminalit\u00e9, violation de fichiers, mauvaise manipulation Le nombre de victimes de cybercriminalit\u00e9 et de personnes sujettes \u00e0 la violation [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":228,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,17],"tags":[108,109,110],"class_list":["post-406","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-francais","tag-donnees","tag-informatique","tag-tagsassurance"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sur quelle valeur assurer les donn\u00e9es informatiques de l\u2019entreprise\u00a0? - KerMobile<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kermobile.com\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sur quelle valeur assurer les donn\u00e9es informatiques de l\u2019entreprise\u00a0? - KerMobile\" \/>\n<meta property=\"og:description\" content=\"Pour la grande majorit\u00e9 des entreprises, les&nbsp;donn\u00e9es&nbsp;informatiques&nbsp;sont indispensables pour leur bon fonctionnement. Sans elles, l\u2019activit\u00e9 de l\u2019entreprise est paralys\u00e9e et le montant de la perte d\u2019exploitation peut devenir impossible \u00e0 absorber en cas de coup dur. Cybercriminalit\u00e9, violation de fichiers, mauvaise manipulation Le nombre de victimes de cybercriminalit\u00e9 et de personnes sujettes \u00e0 la violation [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kermobile.com\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\/\" \/>\n<meta property=\"og:site_name\" content=\"KerMobile\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-04T09:11:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kermobile.com\/wp-content\/uploads\/2022\/03\/K_P3_10_Sur-quelle-valeur-assurer-les-donnees-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"848\" \/>\n\t<meta property=\"og:image:height\" content=\"565\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bruno de Terline\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bruno de Terline\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/kermobile.com\\\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kermobile.com\\\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\\\/\"},\"author\":{\"name\":\"Bruno de Terline\",\"@id\":\"https:\\\/\\\/kermobile.com\\\/#\\\/schema\\\/person\\\/21e214820521217b41a8b9a3ff818da9\"},\"headline\":\"Sur quelle valeur assurer les donn\u00e9es informatiques de l\u2019entreprise\u00a0?\",\"datePublished\":\"2017-01-04T09:11:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/kermobile.com\\\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\\\/\"},\"wordCount\":319,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/kermobile.com\\\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/kermobile.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/K_P3_10_Sur-quelle-valeur-assurer-les-donnees-1.jpg\",\"keywords\":[\"DONN\u00c9ES\",\"INFORMATIQUE\",\"TAGSASSURANCE\"],\"articleSection\":[\"Blog\",\"Fran\u00e7ais\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/kermobile.com\\\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/kermobile.com\\\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\\\/\",\"url\":\"https:\\\/\\\/kermobile.com\\\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\\\/\",\"name\":\"Sur quelle valeur assurer les donn\u00e9es informatiques de l\u2019entreprise\u00a0? - KerMobile\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kermobile.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/kermobile.com\\\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/kermobile.com\\\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/kermobile.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/K_P3_10_Sur-quelle-valeur-assurer-les-donnees-1.jpg\",\"datePublished\":\"2017-01-04T09:11:36+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/kermobile.com\\\/#\\\/schema\\\/person\\\/21e214820521217b41a8b9a3ff818da9\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/kermobile.com\\\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/kermobile.com\\\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/kermobile.com\\\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\\\/#primaryimage\",\"url\":\"https:\\\/\\\/kermobile.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/K_P3_10_Sur-quelle-valeur-assurer-les-donnees-1.jpg\",\"contentUrl\":\"https:\\\/\\\/kermobile.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/K_P3_10_Sur-quelle-valeur-assurer-les-donnees-1.jpg\",\"width\":848,\"height\":565,\"caption\":\"internet presentation\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/kermobile.com\\\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/kermobile.com\\\/en\\\/home\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sur quelle valeur assurer les donn\u00e9es informatiques de l\u2019entreprise\u00a0?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/kermobile.com\\\/#website\",\"url\":\"https:\\\/\\\/kermobile.com\\\/\",\"name\":\"KerMobile\",\"description\":\"KerMobile Solutions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/kermobile.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/kermobile.com\\\/#\\\/schema\\\/person\\\/21e214820521217b41a8b9a3ff818da9\",\"name\":\"Bruno de Terline\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e4d8e17951b6e45c3b864d5ec241218ccb0277712c2518ea0e6cd1dc20067bfa?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e4d8e17951b6e45c3b864d5ec241218ccb0277712c2518ea0e6cd1dc20067bfa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e4d8e17951b6e45c3b864d5ec241218ccb0277712c2518ea0e6cd1dc20067bfa?s=96&d=mm&r=g\",\"caption\":\"Bruno de Terline\"},\"url\":\"https:\\\/\\\/kermobile.com\\\/en\\\/author\\\/bruno\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sur quelle valeur assurer les donn\u00e9es informatiques de l\u2019entreprise\u00a0? - KerMobile","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kermobile.com\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\/","og_locale":"en_US","og_type":"article","og_title":"Sur quelle valeur assurer les donn\u00e9es informatiques de l\u2019entreprise\u00a0? - KerMobile","og_description":"Pour la grande majorit\u00e9 des entreprises, les&nbsp;donn\u00e9es&nbsp;informatiques&nbsp;sont indispensables pour leur bon fonctionnement. Sans elles, l\u2019activit\u00e9 de l\u2019entreprise est paralys\u00e9e et le montant de la perte d\u2019exploitation peut devenir impossible \u00e0 absorber en cas de coup dur. Cybercriminalit\u00e9, violation de fichiers, mauvaise manipulation Le nombre de victimes de cybercriminalit\u00e9 et de personnes sujettes \u00e0 la violation [&hellip;]","og_url":"https:\/\/kermobile.com\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\/","og_site_name":"KerMobile","article_published_time":"2017-01-04T09:11:36+00:00","og_image":[{"width":848,"height":565,"url":"https:\/\/kermobile.com\/wp-content\/uploads\/2022\/03\/K_P3_10_Sur-quelle-valeur-assurer-les-donnees-1.jpg","type":"image\/jpeg"}],"author":"Bruno de Terline","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bruno de Terline","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kermobile.com\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\/#article","isPartOf":{"@id":"https:\/\/kermobile.com\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\/"},"author":{"name":"Bruno de Terline","@id":"https:\/\/kermobile.com\/#\/schema\/person\/21e214820521217b41a8b9a3ff818da9"},"headline":"Sur quelle valeur assurer les donn\u00e9es informatiques de l\u2019entreprise\u00a0?","datePublished":"2017-01-04T09:11:36+00:00","mainEntityOfPage":{"@id":"https:\/\/kermobile.com\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\/"},"wordCount":319,"commentCount":0,"image":{"@id":"https:\/\/kermobile.com\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\/#primaryimage"},"thumbnailUrl":"https:\/\/kermobile.com\/wp-content\/uploads\/2022\/03\/K_P3_10_Sur-quelle-valeur-assurer-les-donnees-1.jpg","keywords":["DONN\u00c9ES","INFORMATIQUE","TAGSASSURANCE"],"articleSection":["Blog","Fran\u00e7ais"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kermobile.com\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kermobile.com\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\/","url":"https:\/\/kermobile.com\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\/","name":"Sur quelle valeur assurer les donn\u00e9es informatiques de l\u2019entreprise\u00a0? - KerMobile","isPartOf":{"@id":"https:\/\/kermobile.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kermobile.com\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\/#primaryimage"},"image":{"@id":"https:\/\/kermobile.com\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\/#primaryimage"},"thumbnailUrl":"https:\/\/kermobile.com\/wp-content\/uploads\/2022\/03\/K_P3_10_Sur-quelle-valeur-assurer-les-donnees-1.jpg","datePublished":"2017-01-04T09:11:36+00:00","author":{"@id":"https:\/\/kermobile.com\/#\/schema\/person\/21e214820521217b41a8b9a3ff818da9"},"breadcrumb":{"@id":"https:\/\/kermobile.com\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kermobile.com\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kermobile.com\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\/#primaryimage","url":"https:\/\/kermobile.com\/wp-content\/uploads\/2022\/03\/K_P3_10_Sur-quelle-valeur-assurer-les-donnees-1.jpg","contentUrl":"https:\/\/kermobile.com\/wp-content\/uploads\/2022\/03\/K_P3_10_Sur-quelle-valeur-assurer-les-donnees-1.jpg","width":848,"height":565,"caption":"internet presentation"},{"@type":"BreadcrumbList","@id":"https:\/\/kermobile.com\/sur-quelle-valeur-assurer-les-donnees-informatiques-de-lentreprise\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/kermobile.com\/en\/home\/"},{"@type":"ListItem","position":2,"name":"Sur quelle valeur assurer les donn\u00e9es informatiques de l\u2019entreprise\u00a0?"}]},{"@type":"WebSite","@id":"https:\/\/kermobile.com\/#website","url":"https:\/\/kermobile.com\/","name":"KerMobile","description":"KerMobile Solutions","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kermobile.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/kermobile.com\/#\/schema\/person\/21e214820521217b41a8b9a3ff818da9","name":"Bruno de Terline","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e4d8e17951b6e45c3b864d5ec241218ccb0277712c2518ea0e6cd1dc20067bfa?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e4d8e17951b6e45c3b864d5ec241218ccb0277712c2518ea0e6cd1dc20067bfa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4d8e17951b6e45c3b864d5ec241218ccb0277712c2518ea0e6cd1dc20067bfa?s=96&d=mm&r=g","caption":"Bruno de Terline"},"url":"https:\/\/kermobile.com\/en\/author\/bruno\/"}]}},"_links":{"self":[{"href":"https:\/\/kermobile.com\/en\/wp-json\/wp\/v2\/posts\/406","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kermobile.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kermobile.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kermobile.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/kermobile.com\/en\/wp-json\/wp\/v2\/comments?post=406"}],"version-history":[{"count":1,"href":"https:\/\/kermobile.com\/en\/wp-json\/wp\/v2\/posts\/406\/revisions"}],"predecessor-version":[{"id":1232,"href":"https:\/\/kermobile.com\/en\/wp-json\/wp\/v2\/posts\/406\/revisions\/1232"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kermobile.com\/en\/wp-json\/wp\/v2\/media\/228"}],"wp:attachment":[{"href":"https:\/\/kermobile.com\/en\/wp-json\/wp\/v2\/media?parent=406"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kermobile.com\/en\/wp-json\/wp\/v2\/categories?post=406"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kermobile.com\/en\/wp-json\/wp\/v2\/tags?post=406"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}