{"id":12440,"date":"2015-08-06T14:00:52","date_gmt":"2015-08-06T17:00:52","guid":{"rendered":"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=12440"},"modified":"2015-08-06T02:45:30","modified_gmt":"2015-08-06T05:45:30","slug":"under-cyber-attack-eys-global-information-security-survey-2013","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/under-cyber-attack-eys-global-information-security-survey-2013\/","title":{"rendered":"Under cyber attack &#8211; EY\u2019s Global Information &#8211; Security Survey 2013"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-12441\" src=\"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/08\/under-cyber-attack-eys-global-information-security-survey-2013.jpg\" alt=\"Under cyber attack - EY\u2019s Global Information - Security Survey 2013\" width=\"145\" height=\"204\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/08\/under-cyber-attack-eys-global-information-security-survey-2013.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/08\/under-cyber-attack-eys-global-information-security-survey-2013-107x150.jpg 107w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>Maison d&#8217;\u00e9dition Ernst &amp; Young<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>R\u00e9sum\u00e9:<\/strong><\/span> Cybersecurity attacks have increased exponentially in the last few years. Every day, as the rapid-fire evolution of technology marches forward, new, more complex cyber risks emerge, threatening significant harm to an organization\u2019s brand and bottom line. Everyone and every organization is a target.<\/p>\n<p>In the time it takes to review this report, a significant percentage of readers will learn of an attack that will have breached their organizations\u2019 security. The infiltration could have occurred days, weeks or even months ago \u2014 and they don\u2019t even know it. When the knowledge and magnitude of the breach does surface, the associated costs to the organization may be staggering. We need only to think of the high-profile attacks on well-known brands and organizations that appear in the world press daily, and consider the number of data records lost and the financial and reputation costs, to understand the impact.<\/p>\n<p><a href=\"http:\/\/www.bibliotecadeseguranca.com.br\/wp-content\/uploads\/2015\/08\/ey-giss-under-cyber-attack.pdf\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-12143 size-full\" src=\"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/03\/download_fr.gif\" alt=\"T\u00e9l\u00e9charger\" width=\"107\" height=\"25\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Maison d&#8217;\u00e9dition Ernst &amp; Young R\u00e9sum\u00e9: Cybersecurity attacks have increased exponentially in the last few years. Every day, as the rapid-fire evolution of technology marches forward, new, more complex cyber risks emerge, threatening significant harm to an organization\u2019s brand and bottom line. Everyone and every organization is a target. In the time it takes to review this report, a significant percentage of readers will learn of an attack that will&hellip; <\/p>\n","protected":false},"author":3,"featured_media":12441,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26,6,20,112],"tags":[],"class_list":["post-12440","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-outros","category-livros","category-seguranca-da-informacao","category-download"],"views":359,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/12440","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=12440"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/12440\/revisions"}],"predecessor-version":[{"id":12442,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/12440\/revisions\/12442"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/12441"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=12440"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=12440"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=12440"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}