{"id":10,"date":"2020-09-15T06:48:15","date_gmt":"2020-09-15T06:48:15","guid":{"rendered":"https:\/\/cyberassur.io\/index.php\/home\/"},"modified":"2024-02-15T11:48:20","modified_gmt":"2024-02-15T10:48:20","slug":"blog-cyberassur","status":"publish","type":"page","link":"https:\/\/cyberassur.io\/index.php\/blog-cyberassur\/","title":{"rendered":"Blog"},"content":{"rendered":"\n<div data-aos= \"zoom-out\" data-aos-duration=\"400\" data-aos-delay=\"0\" data-aos-easing=\"ease\" data-aos-once=\"true\" class=\"wp-block-uagb-container uagb-block-ae54ad60 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-b7c0c3ab uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><span class=\"uagb-ifb-title-prefix\">Bienvenue dans l&rsquo;espace blog de Cyberassur<\/span><div class=\"uagb-ifb-separator\"><\/div><h1 class=\"uagb-ifb-title\">Assurance cyber pour tous<gwmw style=\"display:none;\"><gwmw style=\"display:none;\"><\/gwmw><\/gwmw><\/h1><\/div><div class=\"uagb-ifb-button-wrapper wp-block-button\"><a href=\"\/\/journey.seyna.eu\/633237aa-21b6-4b0d-bfc7-86f3a7c7345f\" class=\"uagb-infobox-cta-link wp-block-button__link\" target=\"_self\" rel=\"noopener noreferrer\" onclick=\"return true;\" alt=\"\"><span class=\"uagb-inline-editing\">je d\u00e9couvre<\/span><\/a><\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-e4df4784 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-34caacdc\">\n<div class=\"wp-block-uagb-image uagb-block-ffc08f16 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-none\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/cyberassur.io\/wp-content\/uploads\/2022\/08\/quote-1.png ,https:\/\/cyberassur.io\/wp-content\/uploads\/2022\/08\/quote-1.png 780w\" sizes=\"auto, (max-width: 480px) 150px\" src=\"https:\/\/cyberassur.io\/wp-content\/uploads\/2022\/08\/quote-1.png\" alt=\"\" class=\"uag-image-322\" width=\"94\" height=\"72\" title=\"\" loading=\"lazy\"\/><\/figure><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-32b26372\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-52ec3ad4\"><p class=\"uagb-heading-text\">Cyberassur : \u201cParce que votre s\u00e9curit\u00e9 est notre priorit\u00e9 .\u201d<\/p><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-3105c77b default uagb-is-root-container\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-1ab8ddf6\"><h2 class=\"uagb-heading-text\">lES DERNIERS ARTICLES de blog<\/h2><div class=\"uagb-separator\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-query is-layout-flow wp-block-query-is-layout-flow\"><ul class=\"wp-block-post-template is-layout-flow wp-block-post-template-is-layout-flow\"><li class=\"wp-block-post post-768 post type-post status-publish format-standard has-post-thumbnail hentry category-non-classe\">\n<h3 class=\"has-text-align-center wp-block-post-title\"><a href=\"https:\/\/cyberassur.io\/index.php\/2024\/06\/11\/guide-complet-de-la-cyberassurance\/\" target=\"_self\" >Guide Complet de la Cyberassurance by cyberassur<\/a><\/h3>\n\n<figure style=\"width:500px;height:300px;\" class=\"alignfull wp-block-post-featured-image\"><a href=\"https:\/\/cyberassur.io\/index.php\/2024\/06\/11\/guide-complet-de-la-cyberassurance\/\" target=\"_self\"  style=\"height:300px\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1517\" src=\"https:\/\/cyberassur.io\/wp-content\/uploads\/2024\/06\/AdobeStock_337081875-scaled.jpeg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Guide Complet de la Cyberassurance by cyberassur\" style=\"height:300px;object-fit:cover;\" srcset=\"https:\/\/cyberassur.io\/wp-content\/uploads\/2024\/06\/AdobeStock_337081875-scaled.jpeg 2560w, https:\/\/cyberassur.io\/wp-content\/uploads\/2024\/06\/AdobeStock_337081875-300x178.jpeg 300w, https:\/\/cyberassur.io\/wp-content\/uploads\/2024\/06\/AdobeStock_337081875-1024x607.jpeg 1024w, https:\/\/cyberassur.io\/wp-content\/uploads\/2024\/06\/AdobeStock_337081875-768x455.jpeg 768w, https:\/\/cyberassur.io\/wp-content\/uploads\/2024\/06\/AdobeStock_337081875-1536x910.jpeg 1536w, https:\/\/cyberassur.io\/wp-content\/uploads\/2024\/06\/AdobeStock_337081875-2048x1214.jpeg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure>\n\n<div class=\"has-text-align-center wp-block-post-excerpt has-text-color has-black-color\"><p class=\"wp-block-post-excerpt__excerpt\">Introduction \u00e0 la Cyberassurance La cyberassurance est une forme sp\u00e9cifique d&rsquo;assurance. Elle prot\u00e8ge les entreprises contre les risques li\u00e9s \u00e0 la cybers\u00e9curit\u00e9. Avec l&rsquo;augmentation des cyberattaques, elle devient essentielle. La cyberassurance aide \u00e0 g\u00e9rer les risques informatiques. Elle att\u00e9nue les pertes financi\u00e8res associ\u00e9es aux incidents de cybers\u00e9curit\u00e9. Le Contexte de la Cyberassurance Avec l&rsquo;av\u00e8nement de\u2026<\/p><p class=\"wp-block-post-excerpt__more-text\"><a class=\"wp-block-post-excerpt__more-link\" href=\"https:\/\/cyberassur.io\/index.php\/2024\/06\/11\/guide-complet-de-la-cyberassurance\/\">Lire la suite &#8230;<\/a><\/p><\/div>\n<\/li><li class=\"wp-block-post post-762 post type-post status-publish format-standard has-post-thumbnail hentry category-non-classe\">\n<h3 class=\"has-text-align-center wp-block-post-title\"><a href=\"https:\/\/cyberassur.io\/index.php\/2024\/04\/11\/demystifier-les-mythes-courants-sur-la-cyberassurance\/\" target=\"_self\" >D\u00e9mystifier les Mythes Courants sur la Cyberassurance<\/a><\/h3>\n\n<figure style=\"width:500px;height:300px;\" class=\"alignfull wp-block-post-featured-image\"><a href=\"https:\/\/cyberassur.io\/index.php\/2024\/04\/11\/demystifier-les-mythes-courants-sur-la-cyberassurance\/\" target=\"_self\"  style=\"height:300px\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberassur.io\/wp-content\/uploads\/2024\/04\/AdobeStock_625979046-scaled.jpeg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"D\u00e9mystifier les Mythes Courants sur la Cyberassurance\" style=\"height:300px;object-fit:cover;\" srcset=\"https:\/\/cyberassur.io\/wp-content\/uploads\/2024\/04\/AdobeStock_625979046-scaled.jpeg 2560w, https:\/\/cyberassur.io\/wp-content\/uploads\/2024\/04\/AdobeStock_625979046-300x200.jpeg 300w, https:\/\/cyberassur.io\/wp-content\/uploads\/2024\/04\/AdobeStock_625979046-1024x683.jpeg 1024w, https:\/\/cyberassur.io\/wp-content\/uploads\/2024\/04\/AdobeStock_625979046-768x512.jpeg 768w, https:\/\/cyberassur.io\/wp-content\/uploads\/2024\/04\/AdobeStock_625979046-1536x1024.jpeg 1536w, https:\/\/cyberassur.io\/wp-content\/uploads\/2024\/04\/AdobeStock_625979046-2048x1365.jpeg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure>\n\n<div class=\"has-text-align-center wp-block-post-excerpt has-text-color has-black-color\"><p class=\"wp-block-post-excerpt__excerpt\">La cyberassurance est devenue un sujet crucial dans le monde des affaires moderne, o\u00f9 les entreprises sont de plus en plus confront\u00e9es \u00e0 des menaces informatiques sophistiqu\u00e9es. Cependant, malgr\u00e9 son importance croissante, la cyberassurance reste souvent mal comprise, entour\u00e9e de nombreux mythes et id\u00e9es fausses. Il est imp\u00e9ratif de clarifier ces malentendus pour permettre aux\u2026<\/p><p class=\"wp-block-post-excerpt__more-text\"><a class=\"wp-block-post-excerpt__more-link\" href=\"https:\/\/cyberassur.io\/index.php\/2024\/04\/11\/demystifier-les-mythes-courants-sur-la-cyberassurance\/\">Lire la suite &#8230;<\/a><\/p><\/div>\n<\/li><li class=\"wp-block-post post-753 post type-post status-publish format-standard has-post-thumbnail hentry category-non-classe\">\n<h3 class=\"has-text-align-center wp-block-post-title\"><a href=\"https:\/\/cyberassur.io\/index.php\/2024\/03\/26\/cyberattaques-les-tendances-emergentes-et-les-solutions\/\" target=\"_self\" >Cyberattaques : Les tendances \u00e9mergentes et les solutions<\/a><\/h3>\n\n<figure style=\"width:500px;height:300px;\" class=\"alignfull wp-block-post-featured-image\"><a href=\"https:\/\/cyberassur.io\/index.php\/2024\/03\/26\/cyberattaques-les-tendances-emergentes-et-les-solutions\/\" target=\"_self\"  style=\"height:300px\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1463\" src=\"https:\/\/cyberassur.io\/wp-content\/uploads\/2024\/03\/AdobeStock_714931606-scaled.jpeg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Cyberattaques : Les tendances \u00e9mergentes et les solutions\" style=\"height:300px;object-fit:cover;\" srcset=\"https:\/\/cyberassur.io\/wp-content\/uploads\/2024\/03\/AdobeStock_714931606-scaled.jpeg 2560w, https:\/\/cyberassur.io\/wp-content\/uploads\/2024\/03\/AdobeStock_714931606-300x171.jpeg 300w, https:\/\/cyberassur.io\/wp-content\/uploads\/2024\/03\/AdobeStock_714931606-1024x585.jpeg 1024w, https:\/\/cyberassur.io\/wp-content\/uploads\/2024\/03\/AdobeStock_714931606-768x439.jpeg 768w, https:\/\/cyberassur.io\/wp-content\/uploads\/2024\/03\/AdobeStock_714931606-1536x878.jpeg 1536w, https:\/\/cyberassur.io\/wp-content\/uploads\/2024\/03\/AdobeStock_714931606-2048x1170.jpeg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure>\n\n<div class=\"has-text-align-center wp-block-post-excerpt has-text-color has-black-color\"><p class=\"wp-block-post-excerpt__excerpt\">Les cyberattaques Dans un monde de plus en plus connect\u00e9, les entreprises sont de plus en plus expos\u00e9es aux cyberattaques. Ces attaques \u00e9voluent rapidement, prenant de nouvelles formes et exploitant les failles de s\u00e9curit\u00e9 les plus r\u00e9centes. Face \u00e0 cette menace croissante, de nombreuses entreprises se tournent vers la cyberassurance pour se prot\u00e9ger. Dans cet\u2026<\/p><p class=\"wp-block-post-excerpt__more-text\"><a class=\"wp-block-post-excerpt__more-link\" href=\"https:\/\/cyberassur.io\/index.php\/2024\/03\/26\/cyberattaques-les-tendances-emergentes-et-les-solutions\/\">Lire la suite &#8230;<\/a><\/p><\/div>\n<\/li><\/ul><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><ul class=\"wp-block-latest-posts__list has-link-color wp-elements-4b25961732fbb962fc616ee925dd2d09 wp-block-latest-posts has-text-color has-ast-global-color-6-color\"><li><div class=\"wp-block-latest-posts__featured-image alignleft\"><a href=\"https:\/\/cyberassur.io\/index.php\/2023\/06\/20\/quest-ce-que-la-cyber-assurance\/\" aria-label=\"Qu&rsquo;est ce que la cyberassurance ?\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/cyberassur.io\/wp-content\/uploads\/2023\/06\/AdobeStock_581315733-150x150.jpeg\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"\" style=\"max-width:150px;max-height:150px;\" \/><\/a><\/div><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/cyberassur.io\/index.php\/2023\/06\/20\/quest-ce-que-la-cyber-assurance\/\">Qu&rsquo;est ce que la cyberassurance ?<\/a><div class=\"wp-block-latest-posts__post-excerpt\">\u00c0 une \u00e9poque o\u00f9 la technologie joue un r\u00f4le de plus en plus central dans nos vies personnelles et professionnelles, les menaces de cybercriminalit\u00e9 se multiplient rapidement<\/div><\/li>\n<li><div class=\"wp-block-latest-posts__featured-image alignleft\"><a href=\"https:\/\/cyberassur.io\/index.php\/2023\/12\/06\/lere-des-ransomwares-comment-faire-face-aux-attaques\/\" aria-label=\"L&rsquo;\u00c8re des Ransomwares : Comment faire face aux attaques\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/cyberassur.io\/wp-content\/uploads\/2023\/12\/istockphoto-1331944718-612x612-1-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"\" style=\"max-width:150px;max-height:150px;\" \/><\/a><\/div><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/cyberassur.io\/index.php\/2023\/12\/06\/lere-des-ransomwares-comment-faire-face-aux-attaques\/\">L&rsquo;\u00c8re des Ransomwares : Comment faire face aux attaques<\/a><div class=\"wp-block-latest-posts__post-excerpt\">Dans le paysage num\u00e9rique moderne, les attaques par ransomwares et l&rsquo;extorsion de fonds repr\u00e9sentent une menace croissante pour &hellip;<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/cyberassur.io\/index.php\/2023\/12\/06\/lere-des-ransomwares-comment-faire-face-aux-attaques\/\"> <span class=\"screen-reader-text\">L&rsquo;\u00c8re des Ransomwares : Comment faire face aux attaques<\/span> Lire la suite\u00a0\u00bb<\/a><\/p><\/div><\/li>\n<li><div class=\"wp-block-latest-posts__featured-image alignleft\"><a href=\"https:\/\/cyberassur.io\/index.php\/2024\/02\/06\/violations-de-donnees\/\" aria-label=\"Qu&rsquo;est ce que  les Violations de Donn\u00e9es\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/cyberassur.io\/wp-content\/uploads\/2024\/02\/AdobeStock_632932138-150x150.jpeg\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"\" style=\"max-width:150px;max-height:150px;\" \/><\/a><\/div><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/cyberassur.io\/index.php\/2024\/02\/06\/violations-de-donnees\/\">Qu&rsquo;est ce que  les Violations de Donn\u00e9es<\/a><div class=\"wp-block-latest-posts__post-excerpt\">Dans le monde professionnel d&rsquo;aujourd&rsquo;hui, les donn\u00e9es sont le nerf de la guerre. Qu&rsquo;il s&rsquo;agisse d&rsquo;informations sur les &hellip;<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/cyberassur.io\/index.php\/2024\/02\/06\/violations-de-donnees\/\"> <span class=\"screen-reader-text\">Qu&rsquo;est ce que  les Violations de Donn\u00e9es<\/span> Lire la suite\u00a0\u00bb<\/a><\/p><\/div><\/li>\n<li><div class=\"wp-block-latest-posts__featured-image alignleft\"><a href=\"https:\/\/cyberassur.io\/index.php\/2024\/03\/26\/cyberattaques-les-tendances-emergentes-et-les-solutions\/\" aria-label=\"Cyberattaques : Les tendances \u00e9mergentes et les solutions\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/cyberassur.io\/wp-content\/uploads\/2024\/03\/AdobeStock_714931606-150x150.jpeg\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"\" style=\"max-width:150px;max-height:150px;\" \/><\/a><\/div><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/cyberassur.io\/index.php\/2024\/03\/26\/cyberattaques-les-tendances-emergentes-et-les-solutions\/\">Cyberattaques : Les tendances \u00e9mergentes et les solutions<\/a><div class=\"wp-block-latest-posts__post-excerpt\">Les cyberattaques Dans un monde de plus en plus connect\u00e9, les entreprises sont de plus en plus expos\u00e9es &hellip;<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/cyberassur.io\/index.php\/2024\/03\/26\/cyberattaques-les-tendances-emergentes-et-les-solutions\/\"> <span class=\"screen-reader-text\">Cyberattaques : Les tendances \u00e9mergentes et les solutions<\/span> Lire la suite\u00a0\u00bb<\/a><\/p><\/div><\/li>\n<li><div class=\"wp-block-latest-posts__featured-image alignleft\"><a href=\"https:\/\/cyberassur.io\/index.php\/2024\/04\/11\/demystifier-les-mythes-courants-sur-la-cyberassurance\/\" aria-label=\"D\u00e9mystifier les Mythes Courants sur la Cyberassurance\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/cyberassur.io\/wp-content\/uploads\/2024\/04\/AdobeStock_625979046-150x150.jpeg\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"\" style=\"max-width:150px;max-height:150px;\" \/><\/a><\/div><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/cyberassur.io\/index.php\/2024\/04\/11\/demystifier-les-mythes-courants-sur-la-cyberassurance\/\">D\u00e9mystifier les Mythes Courants sur la Cyberassurance<\/a><div class=\"wp-block-latest-posts__post-excerpt\">La cyberassurance est devenue un sujet crucial dans le monde des affaires moderne, o\u00f9 les entreprises sont de &hellip;<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/cyberassur.io\/index.php\/2024\/04\/11\/demystifier-les-mythes-courants-sur-la-cyberassurance\/\"> <span class=\"screen-reader-text\">D\u00e9mystifier les Mythes Courants sur la Cyberassurance<\/span> Lire la suite\u00a0\u00bb<\/a><\/p><\/div><\/li>\n<\/ul><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-968ec285 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-c3f25c3a\">\n<div class=\"wp-block-uagb-info-box uagb-block-74752277 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h2 class=\"uagb-ifb-title\">cyberassur, l&rsquo;assurance <br><br>cyber en 7 clics <\/h2><\/div><div class=\"uagb-ifb-separator\"><\/div><p class=\"uagb-ifb-desc\">Les cybercriminels n&rsquo;attendent qu&rsquo;une seule chose : que vous soyez sans d\u00e9fense. Prot\u00e9gez-vous avec une cyber assurance<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><a href=\"\/\/journey.seyna.eu\/633237aa-21b6-4b0d-bfc7-86f3a7c7345f\" class=\"uagb-infobox-cta-link wp-block-button__link\" target=\"_self\" rel=\"noopener noreferrer\" onclick=\"return true;\" alt=\"\"><span class=\"uagb-inline-editing\">je d\u00e9couvre<\/span><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M256 64C256 46.33 270.3 32 288 32H415.1C415.1 32 415.1 32 415.1 32C420.3 32 424.5 32.86 428.2 34.43C431.1 35.98 435.5 38.27 438.6 41.3C438.6 41.35 438.6 41.4 438.7 41.44C444.9 47.66 447.1 55.78 448 63.9C448 63.94 448 63.97 448 64V192C448 209.7 433.7 224 416 224C398.3 224 384 209.7 384 192V141.3L214.6 310.6C202.1 323.1 181.9 323.1 169.4 310.6C156.9 298.1 156.9 277.9 169.4 265.4L338.7 96H288C270.3 96 256 81.67 256 64V64zM0 128C0 92.65 28.65 64 64 64H160C177.7 64 192 78.33 192 96C192 113.7 177.7 128 160 128H64V416H352V320C352 302.3 366.3 288 384 288C401.7 288 416 302.3 416 320V416C416 451.3 387.3 480 352 480H64C28.65 480 0 451.3 0 416V128z\"><\/path><\/svg><\/a><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-b0f6d6aa default uagb-is-root-container\">\n<div class=\"wp-block-uagb-container uagb-block-e778fbdd\">\n<h3 class=\"wp-block-heading has-text-align-center has-ast-global-color-5-color has-ast-global-color-0-background-color has-text-color has-background has-link-color has-medium-font-size wp-elements-df1f6bd8fd1bb2f30ee066f9ba6a0839\">Protection financi\u00e8re contre les pertes li\u00e9es \u00e0 la cybercriminalit\u00e9<\/h3>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch is-layout-flow wp-block-column-is-layout-flow\">\n<p>La <a href=\"https:\/\/cyberassur.io\/index.php\/2023\/06\/20\/quest-ce-que-la-cyber-assurance\/\">cyberassurance <\/a>vise \u00e0 att\u00e9nuer les cons\u00e9quences financi\u00e8res des attaques informatiques, telles que les violations de donn\u00e9es, les <a href=\"https:\/\/www.cybermalveillance.gouv.fr\/tous-nos-contenus\/fiches-reflexes\/rancongiciels-ransomwares\">ransomwares<\/a>, et d&rsquo;autres formes de cyberattaques. Elle peut couvrir les co\u00fbts de r\u00e9cup\u00e9ration des donn\u00e9es, les frais de notification des victimes, les pertes financi\u00e8res et bien d&rsquo;autres.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-efa4ec08\">\n<h3 class=\"wp-block-heading has-text-align-center has-ast-global-color-5-color has-ast-global-color-0-background-color has-text-color has-background has-link-color has-medium-font-size wp-elements-3beaf6bb24c2d02f9df6e93f9399115f\" style=\"font-style:normal;font-weight:100\">Gestion des risques et renforcement de la s\u00e9curit\u00e9<\/h3>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-left\">La <a href=\"https:\/\/cyberassur.io\/index.php\/2023\/06\/20\/quest-ce-que-la-cyber-assurance\/\">cyberassurance <\/a>encourage les entreprises \u00e0 mettre en place des mesures de s\u00e9curit\u00e9 robustes. Les assureurs peuvent exiger des \u00e9valuations de la cybers\u00e9curit\u00e9 avant de fournir une couverture. Les politiques incitent ainsi les organisations \u00e0 mettre en \u0153uvre des pratiques de s\u00e9curit\u00e9 informatique efficaces pour r\u00e9duire les risques et les vuln\u00e9rabilit\u00e9s.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-db22ed53\">\n<h3 class=\"wp-block-heading has-text-align-center has-ast-global-color-5-color has-ast-global-color-0-background-color has-text-color has-background has-link-color has-medium-font-size wp-elements-6dcd7f2584f48f218d58cd58d86f4467\">Aide \u00e0 la reprise d&rsquo;activit\u00e9 apr\u00e8s une cyber attaque<\/h3>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch is-layout-constrained wp-container-core-column-is-layout-55a0b918 wp-block-column-is-layout-constrained\">\n<p class=\"has-text-align-left\" style=\"margin-top:0;margin-right:0;margin-bottom:0;margin-left:0;padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">En cas de cyberattaque, la <a href=\"https:\/\/cyberassur.io\/index.php\/2023\/06\/20\/quest-ce-que-la-cyber-assurance\/\">cyberassurance <\/a>peut jouer un r\u00f4le essentiel dans la restauration rapide des op\u00e9rations normales. Cela inclut le financement des efforts de r\u00e9paration, la r\u00e9cup\u00e9ration des donn\u00e9es, et la mise en place de mesures pour minimiser l&rsquo;impact sur la r\u00e9putation de l&rsquo;entreprise. La rapidit\u00e9 de la r\u00e9ponse \u00e0 une attaque est cruciale.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-background is-layout-constrained wp-container-core-group-is-layout-cfcca693 wp-block-group-is-layout-constrained\" id=\"contact\" style=\"background:linear-gradient(35deg,rgb(6,0,151) 0%,rgb(130,4,255) 64%,rgb(193,15,255) 98%);padding-top:104px;padding-bottom:104px\">\n<h2 class=\"wp-block-heading has-text-align-center has-text-color\" style=\"color:#ffffff\">Souscrivez en quelques <\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-text-color\" style=\"color:#ffffff\">clics<\/h2>\n\n\n\n<div class=\"wp-block-buttons alignwide is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-bba8380a wp-block-buttons-is-layout-flex\" style=\"margin-top:50px\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-background wp-element-button\" href=\"https:\/\/journey.seyna.eu\/start\/6cad8c0c-c212-40e9-8fa6-c46b6e737ee9\" style=\"background-color:#db3269\">Mon assurance Cyber personnalis\u00e9e<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-992d7b0c\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-21f91301 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" href=\"https:\/\/cyberassur.io\/index.php\/mention-legales\/\" onclick=\"return true;\" rel=\"follow noopener\" target=\"_self\"><div class=\"uagb-button__link\">Mention l\u00e9gales<\/div><span class=\"uagb-button__icon uagb-button__icon-position-after\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 278.6l-160 160C272.4 444.9 264.2 448 256 448s-16.38-3.125-22.62-9.375c-12.5-12.5-12.5-32.75 0-45.25L338.8 288H32C14.33 288 .0016 273.7 .0016 256S14.33 224 32 224h306.8l-105.4-105.4c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l160 160C451.1 245.9 451.1 266.1 438.6 278.6z\"><\/path><\/svg><\/span><\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-21f91301 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" href=\"https:\/\/cyberassur.io\/index.php\/politique-de-confidentialite\/\" onclick=\"return true;\" rel=\"follow noopener\" target=\"_self\"><div class=\"uagb-button__link\">Politique de confidentialit\u00e9<\/div><span class=\"uagb-button__icon uagb-button__icon-position-after\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 278.6l-160 160C272.4 444.9 264.2 448 256 448s-16.38-3.125-22.62-9.375c-12.5-12.5-12.5-32.75 0-45.25L338.8 288H32C14.33 288 .0016 273.7 .0016 256S14.33 224 32 224h306.8l-105.4-105.4c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l160 160C451.1 245.9 451.1 266.1 438.6 278.6z\"><\/path><\/svg><\/span><\/a><\/div><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyberassur : \u201cParce que votre s\u00e9curit\u00e9 est notre priorit\u00e9 .\u201d lES DERNIERS ARTICLES de blog Protection financi\u00e8re contre les pertes li\u00e9es \u00e0 la cybercriminalit\u00e9 La cyberassurance vise \u00e0 att\u00e9nuer les cons\u00e9quences financi\u00e8res des attaques informatiques, telles que les violations de donn\u00e9es, les ransomwares, et d&rsquo;autres formes de cyberattaques. Elle peut couvrir les co\u00fbts de r\u00e9cup\u00e9ration &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/cyberassur.io\/index.php\/blog-cyberassur\/\"> <span class=\"screen-reader-text\">Blog<\/span> Lire la suite\u00a0\u00bb<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"plain-container","ast-site-content-layout":"normal-width-container","site-content-style":"unboxed","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-10","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Blog - Cyberassur<\/title>\n<meta name=\"description\" content=\"Bienvenu dans la section blog de Cyberassur. Vous retrouverez toutes les actualit\u00e9s de l&#039;entreprise et de la cyber assurance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberassur.io\/index.php\/blog-cyberassur\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blog - Cyberassur\" \/>\n<meta property=\"og:description\" content=\"Bienvenu dans la section blog de Cyberassur. Vous retrouverez toutes les actualit\u00e9s de l&#039;entreprise et de la cyber assurance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberassur.io\/index.php\/blog-cyberassur\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberassur\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-15T10:48:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberassur.io\/wp-content\/uploads\/2022\/08\/quote-1.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberassur.io\\\/index.php\\\/blog-cyberassur\\\/\",\"url\":\"https:\\\/\\\/cyberassur.io\\\/index.php\\\/blog-cyberassur\\\/\",\"name\":\"Blog - Cyberassur\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberassur.io\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberassur.io\\\/index.php\\\/blog-cyberassur\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberassur.io\\\/index.php\\\/blog-cyberassur\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cyberassur.io\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/quote-1.png\",\"datePublished\":\"2020-09-15T06:48:15+00:00\",\"dateModified\":\"2024-02-15T10:48:20+00:00\",\"description\":\"Bienvenu dans la section blog de Cyberassur. Vous retrouverez toutes les actualit\u00e9s de l'entreprise et de la cyber assurance.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberassur.io\\\/index.php\\\/blog-cyberassur\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cyberassur.io\\\/index.php\\\/blog-cyberassur\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/cyberassur.io\\\/index.php\\\/blog-cyberassur\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cyberassur.io\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/quote-1.png\",\"contentUrl\":\"https:\\\/\\\/cyberassur.io\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/quote-1.png\",\"width\":200,\"height\":154},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberassur.io\\\/index.php\\\/blog-cyberassur\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/cyberassur.io\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberassur.io\\\/#website\",\"url\":\"https:\\\/\\\/cyberassur.io\\\/\",\"name\":\"Cyberassur\",\"description\":\"Votre s\u00e9curit\u00e9 est notre priorit\u00e9\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberassur.io\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cyberassur.io\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberassur.io\\\/#organization\",\"name\":\"Cyberassur\",\"url\":\"https:\\\/\\\/cyberassur.io\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/cyberassur.io\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cyberassur.io\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/cropped-cropped-CYBERASSUR.png\",\"contentUrl\":\"https:\\\/\\\/cyberassur.io\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/cropped-cropped-CYBERASSUR.png\",\"width\":511,\"height\":484,\"caption\":\"Cyberassur\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberassur.io\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Blog - Cyberassur","description":"Bienvenu dans la section blog de Cyberassur. Vous retrouverez toutes les actualit\u00e9s de l'entreprise et de la cyber assurance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberassur.io\/index.php\/blog-cyberassur\/","og_locale":"fr_FR","og_type":"article","og_title":"Blog - Cyberassur","og_description":"Bienvenu dans la section blog de Cyberassur. Vous retrouverez toutes les actualit\u00e9s de l'entreprise et de la cyber assurance.","og_url":"https:\/\/cyberassur.io\/index.php\/blog-cyberassur\/","og_site_name":"Cyberassur","article_modified_time":"2024-02-15T10:48:20+00:00","og_image":[{"url":"https:\/\/cyberassur.io\/wp-content\/uploads\/2022\/08\/quote-1.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberassur.io\/index.php\/blog-cyberassur\/","url":"https:\/\/cyberassur.io\/index.php\/blog-cyberassur\/","name":"Blog - Cyberassur","isPartOf":{"@id":"https:\/\/cyberassur.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberassur.io\/index.php\/blog-cyberassur\/#primaryimage"},"image":{"@id":"https:\/\/cyberassur.io\/index.php\/blog-cyberassur\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberassur.io\/wp-content\/uploads\/2022\/08\/quote-1.png","datePublished":"2020-09-15T06:48:15+00:00","dateModified":"2024-02-15T10:48:20+00:00","description":"Bienvenu dans la section blog de Cyberassur. Vous retrouverez toutes les actualit\u00e9s de l'entreprise et de la cyber assurance.","breadcrumb":{"@id":"https:\/\/cyberassur.io\/index.php\/blog-cyberassur\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberassur.io\/index.php\/blog-cyberassur\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/cyberassur.io\/index.php\/blog-cyberassur\/#primaryimage","url":"https:\/\/cyberassur.io\/wp-content\/uploads\/2022\/08\/quote-1.png","contentUrl":"https:\/\/cyberassur.io\/wp-content\/uploads\/2022\/08\/quote-1.png","width":200,"height":154},{"@type":"BreadcrumbList","@id":"https:\/\/cyberassur.io\/index.php\/blog-cyberassur\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/cyberassur.io\/"},{"@type":"ListItem","position":2,"name":"Blog"}]},{"@type":"WebSite","@id":"https:\/\/cyberassur.io\/#website","url":"https:\/\/cyberassur.io\/","name":"Cyberassur","description":"Votre s\u00e9curit\u00e9 est notre priorit\u00e9","publisher":{"@id":"https:\/\/cyberassur.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberassur.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/cyberassur.io\/#organization","name":"Cyberassur","url":"https:\/\/cyberassur.io\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/cyberassur.io\/#\/schema\/logo\/image\/","url":"https:\/\/cyberassur.io\/wp-content\/uploads\/2023\/11\/cropped-cropped-CYBERASSUR.png","contentUrl":"https:\/\/cyberassur.io\/wp-content\/uploads\/2023\/11\/cropped-cropped-CYBERASSUR.png","width":511,"height":484,"caption":"Cyberassur"},"image":{"@id":"https:\/\/cyberassur.io\/#\/schema\/logo\/image\/"}}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"Ma\u00ebl","author_link":"https:\/\/cyberassur.io\/index.php\/author\/admin6014\/"},"uagb_comment_info":0,"uagb_excerpt":"Cyberassur : \u201cParce que votre s\u00e9curit\u00e9 est notre priorit\u00e9 .\u201d lES DERNIERS ARTICLES de blog Protection financi\u00e8re contre les pertes li\u00e9es \u00e0 la cybercriminalit\u00e9 La cyberassurance vise \u00e0 att\u00e9nuer les cons\u00e9quences financi\u00e8res des attaques informatiques, telles que les violations de donn\u00e9es, les ransomwares, et d&rsquo;autres formes de cyberattaques. Elle peut couvrir les co\u00fbts de r\u00e9cup\u00e9ration\u2026","_links":{"self":[{"href":"https:\/\/cyberassur.io\/index.php\/wp-json\/wp\/v2\/pages\/10","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberassur.io\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberassur.io\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberassur.io\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberassur.io\/index.php\/wp-json\/wp\/v2\/comments?post=10"}],"version-history":[{"count":39,"href":"https:\/\/cyberassur.io\/index.php\/wp-json\/wp\/v2\/pages\/10\/revisions"}],"predecessor-version":[{"id":769,"href":"https:\/\/cyberassur.io\/index.php\/wp-json\/wp\/v2\/pages\/10\/revisions\/769"}],"wp:attachment":[{"href":"https:\/\/cyberassur.io\/index.php\/wp-json\/wp\/v2\/media?parent=10"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}