{"id":5915,"date":"2025-10-02T09:38:43","date_gmt":"2025-10-02T14:38:43","guid":{"rendered":"https:\/\/www.catalyst-ca.net\/blog\/etat-des-lieux-de-la-cybersecurite-dans-lenseignement-superieur"},"modified":"2025-10-02T09:46:43","modified_gmt":"2025-10-02T14:46:43","slug":"etat-des-lieux-de-la-cybersecurite-dans-lenseignement-superieur","status":"publish","type":"post","link":"https:\/\/www.catalyst-ca.net\/fr\/blog\/cyber-security-in-higher-education-must-know-and-must-do","title":{"rendered":"\u00c9tat des lieux de la cybers\u00e9curit\u00e9 dans l&#8217;enseignement sup\u00e9rieur"},"content":{"rendered":"\n<p>On dit souvent que toute publicit\u00e9 est bonne \u00e0 prendre, mais lorsqu&#8217;il s&#8217;agit de violations de donn\u00e9es, aucune organisation ne souhaite faire les gros titres.<\/p>\n\n<p>\u00c0 l&#8217;\u00e9chelle mondiale, les cybermenaces ont augment\u00e9 de 47 % au premier trimestre 2025, le secteur de l&#8217;\u00e9ducation \u00e9tant le plus touch\u00e9. Viennent ensuite les secteurs gouvernemental, des t\u00e9l\u00e9communications et de la sant\u00e9 et des soins m\u00e9dicaux. <\/p>\n\n<p>Les donn\u00e9es publi\u00e9es par <a href=\"https:\/\/blog.checkpoint.com\/research\/q1-2025-global-cyber-attack-report-from-check-point-software-an-almost-50-surge-in-cyber-threats-worldwide-with-a-rise-of-126-in-ransomware-attacks\/\">Check Point Software<\/a> indiquent que l&#8217;\u00e9ducation et la recherche sont la cible de plus de 4 400 attaques par organisation chaque semaine, soit une augmentation stup\u00e9fiante de 73 % par rapport \u00e0 l&#8217;ann\u00e9e pr\u00e9c\u00e9dente.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"575\" src=\"https:\/\/www.catalyst-ca.net\/wp-content\/uploads\/2023\/03\/q1-stats-pic-2.png\" alt=\"\" class=\"wp-image-5893\" srcset=\"https:\/\/www.catalyst-ca.net\/wp-content\/uploads\/2023\/03\/q1-stats-pic-2.png 975w, https:\/\/www.catalyst-ca.net\/wp-content\/uploads\/2023\/03\/q1-stats-pic-2-300x177.png 300w, https:\/\/www.catalyst-ca.net\/wp-content\/uploads\/2023\/03\/q1-stats-pic-2-768x453.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><figcaption class=\"wp-element-caption\">Source: <a href=\"https:\/\/blog.checkpoint.com\/research\/q1-2025-global-cyber-attack-report-from-check-point-software-an-almost-50-surge-in-cyber-threats-worldwide-with-a-rise-of-126-in-ransomware-attacks\/\">Check Point Software<\/a><\/figcaption><\/figure>\n<\/div>\n<p>La <a href=\"https:\/\/macdonaldlaurier.ca\/canadas-schools-are-sitting-ducks-for-cybersecurity-attacks-paul-w-bennett-in-the-hub\/\">cyberattaque contre PowerSchool<\/a> la fin d\u00e9cembre 2024, la <a href=\"https:\/\/www.cbc.ca\/news\/canada\/manitoba\/university-of-winnipeg-cybersecurity-attack-information-stolen-1.7295997\">violation de donn\u00e9es \u00e0 l&#8217;universit\u00e9 de Winnipeg<\/a> en mars 2024, et les <a href=\"https:\/\/www.cbc.ca\/news\/canada\/newfoundland-labrador\/grenfell-cyberattack-update-1.7156011\">attaques par ransomware contre le campus Grenfell de l&#8217;universit\u00e9 Memorial de Terre-Neuve<\/a>, en d\u00e9cembre 2023 sont quelques-uns des exemples les plus notables dans le secteur de l&#8217;\u00e9ducation au Canada, d&#8217;autant plus que des donn\u00e9es sensibles ont \u00e9t\u00e9 vol\u00e9es.<\/p>\n\n<p>Alors que de plus en plus de cas de violation de donn\u00e9es sont signal\u00e9s dans les universit\u00e9s, les coll\u00e8ges et les commissions scolaires du monde entier, on ne peut que se demander combien d&#8217;autres cas ne sont pas signal\u00e9s ou d\u00e9tect\u00e9s.<\/p>\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.catalyst-ca.net\/blog\/feel-secure-with-catalyst-it-canada-managed-service\">Six raisons de se sentir en s\u00e9curit\u00e9 avec le service g\u00e9r\u00e9 de Catalyst IT<\/a><\/div>\n<\/div>\n\n<p><\/p>\n\n<h2 class=\"wp-block-heading\">Pourquoi l&#8217;enseignement sup\u00e9rieur est-il une cible privil\u00e9gi\u00e9e des cyberattaques ?<\/h2>\n\n<p>Plusieurs facteurs expliquent pourquoi les \u00e9tablissements d&#8217;enseignement sont des cibles privil\u00e9gi\u00e9es pour les cybercriminels :<\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Une multitude de donn\u00e9es personnelles pr\u00e9cieuses sur les \u00e9tudiants.<\/strong> Les \u00e9tablissements d&#8217;enseignement sup\u00e9rieur stockent d&#8217;\u00e9normes quantit\u00e9s d&#8217;informations sensibles, notamment des donn\u00e9es m\u00e9dicales et financi\u00e8res, qui peuvent \u00eatre utilis\u00e9es \u00e0 des fins de vol, de fraude et d&#8217;autres activit\u00e9s malveillantes.<\/li>\n\n\n\n<li><strong>Budgets limit\u00e9s pour la cybers\u00e9curit\u00e9 et la formation du personnel.<\/strong> En p\u00e9riode de restrictions budg\u00e9taires, les budgets peuvent \u00eatre limit\u00e9s pour la mise \u00e0 jour des mesures de cybers\u00e9curit\u00e9 et la formation \u00e0 la cybers\u00e9curit\u00e9 \u00e0 l&#8217;\u00e9chelle de l&#8217;\u00e9tablissement.  <\/li>\n\n\n\n<li><strong>Syst\u00e8mes informatiques fragment\u00e9s et d\u00e9centralis\u00e9s<\/strong>. Cela peut \u00e9galement signifier que les \u00e9tablissements utilisent du mat\u00e9riel et des logiciels obsol\u00e8tes, ce qui les rend vuln\u00e9rables aux attaques malveillantes.<\/li>\n\n\n\n<li><strong>Saisonnalit\u00e9<\/strong>. Les \u00e9tablissements d&#8217;enseignement sup\u00e9rieur fonctionnent selon un calendrier pr\u00e9visible, avec des p\u00e9riodes de pointe. Les cybercriminels ont tendance \u00e0 planifier leurs attaques pendant les p\u00e9riodes de pointe, esp\u00e9rant que les \u00e9tablissements seront distraits ou d\u00e9bord\u00e9s. Selon un rapport r\u00e9cent de <a href=\"https:\/\/blog.checkpoint.com\/research\/cyber-attacks-surge-against-education-sector-ahead-of-back-to-school-season\/\">CheckPoint Research<\/a>, le secteur de l&#8217;\u00e9ducation en Am\u00e9rique du Nord a \u00e9t\u00e9 victime de 3 047 cyberattaques en moyenne par semaine.   <\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading\">Prot\u00e9ger votre \u00e9tablissement contre les cyberattaques<\/h2>\n\n<p>Malheureusement, les activit\u00e9s malveillantes sont courantes sur le Web. Aucune organisation n&#8217;est s\u00e9curis\u00e9e \u00e0 100 % et les informations sur le Web seront toujours expos\u00e9es aux cyberattaques. Cependant, la pr\u00e9vention restera toujours essentielle. Voici quelques-unes de nos recommandations pour vous aider \u00e0 prot\u00e9ger votre cybers\u00e9curit\u00e9 :   <\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Investissez dans la cybers\u00e9curit\u00e9.<\/strong> Cela inclut les infrastructures de s\u00e9curit\u00e9 et la formation continue du corps enseignant, du personnel et des \u00e9tudiants. <\/li>\n\n\n\n<li><strong>Pr\u00e9voyez un plan et un soutien appropri\u00e9 <\/strong>en cas de probl\u00e8me, et veillez \u00e0 revoir r\u00e9guli\u00e8rement vos politiques et proc\u00e9dures de s\u00e9curit\u00e9.<\/li>\n\n\n\n<li><strong>Effectuez r\u00e9guli\u00e8rement des <a href=\"https:\/\/www.catalyst-ca.net\/fr\/blog\/upgrading-your-moodle-4-1-to-4-5\">mises \u00e0 jour logicielles<\/a>.<\/strong> Les mises \u00e0 jour logicielles comprennent de nouveaux correctifs pour les vuln\u00e9rabilit\u00e9s, des corrections de bogues et des optimisations de performances, qui vous aident \u00e0 prot\u00e9ger vos donn\u00e9es et vos utilisateurs.<\/li>\n\n\n\n<li>Mettez en place <a href=\"https:\/\/www.catalyst-ca.net\/fr\/blog\/sso-what-it-is-and-benefits\">l&#8217;authentification unique (SSO) <\/a>et <a href=\"https:\/\/www.catalyst-ca.net\/fr\/blog\/mfa-what-it-is-why-needed\">l&#8217;authentification multifactorielle (MFA).<\/a><\/li>\n\n\n\n<li><strong>H\u00e9bergez vos sites dans une infrastructure cloud s\u00e9curis\u00e9e<\/strong> o\u00f9 toutes les mises \u00e0 jour, correctifs et sauvegardes n\u00e9cessaires sont automatis\u00e9s et orchestr\u00e9s. Le mieux est de faire appel \u00e0 un fournisseur d&#8217;h\u00e9bergement et de services informatiques g\u00e9r\u00e9s exp\u00e9riment\u00e9, sp\u00e9cialis\u00e9 dans les syst\u00e8mes informatiques complexes de niveau entreprise, id\u00e9alement avec une assistance 24 heures sur 24, 7 jours sur 7. <\/li>\n<\/ul>\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-background wp-element-button\" href=\"https:\/\/catalyst-ca.net\/wp-content\/uploads\/2023\/03\/Cyber-Security-Checklist-Catalyst-IT-1.pdf\" style=\"background-color:#ba2025\"><strong>T\u00e9l\u00e9chargez votre liste de contr\u00f4le pour la cybers\u00e9curit\u00e9<\/strong><\/a><\/div>\n<\/div>\n\n<p><\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-how-secure-is-moodle\">Moodle, est-il s\u00e9curis\u00e9 ?<\/h2>\n\n<p>Le LMS Moodle est d\u00e9velopp\u00e9 selon une approche <a href=\"https:\/\/docs.moodle.org\/dev\/Security\" target=\"_blank\" rel=\"noreferrer noopener\">\u00ab security by design \u00bb<\/a> et b\u00e9n\u00e9ficie du soutien de sa communaut\u00e9 mondiale de s\u00e9curit\u00e9. Le logiciel est test\u00e9 et surveill\u00e9 en permanence, et respecte toutes les obligations en mati\u00e8re de confidentialit\u00e9. Moodle fournit \u00e9galement des formations et communique en permanence avec ses utilisateurs et partenaires.  <\/p>\n\n<p>Il est toutefois important de noter que le logiciel n&#8217;est qu&#8217;une partie de l&#8217;\u00e9quation. La mani\u00e8re dont il est g\u00e9r\u00e9 et l&#8217;architecture de l&#8217;infrastructure qui l&#8217;h\u00e9berge sont d&#8217;autres \u00e9l\u00e9ments tr\u00e8s importants qui \u00e9chappent souvent au contr\u00f4le du fournisseur du logiciel. <\/p>\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.catalyst-ca.net\/wp-content\/uploads\/2025\/07\/Catalyst-IT-x-Moodle-Security-Whitepaper.pdf\">Livre blanc sur la s\u00e9curit\u00e9 de Moodle<\/a><\/div>\n<\/div>\n\n<p><\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-why-use-a-trusted-certified-moodle-partner\">Pourquoi travaillez avec un partenaire Moodle certifi\u00e9 ?<\/h3>\n\n<p>Bien que personne ne soit prot\u00e9g\u00e9 \u00e0 100 % \u00e0 tout moment, le recours \u00e0 un partenaire Moodle certifi\u00e9 offre de <a href=\"https:\/\/moodle.com\/faq\/why-choose-to-work-with-a-certified-moodle-partner\/\" target=\"_blank\" rel=\"noreferrer noopener\">nombreux avantages<\/a> qui compensent largement les co\u00fbts, en particulier si vous utilisez une instance Moodle plus grande et plus complexe.<\/p>\n\n<p>Catalyst IT a plus de 20 ans d&#8217;exp\u00e9rience avec Moodle. En tant que partenaire certifi\u00e9 ISO27001, nous pouvons vous aider \u00e0 optimiser votre LMS afin d&#8217;am\u00e9liorer la qualit\u00e9, l&#8217;efficacit\u00e9 et de r\u00e9aliser des \u00e9conomies. Sans oublier l&#8217;assistance suppl\u00e9mentaire, les options de personnalisation, la protection contre le spam, les sauvegardes quotidiennes et l&#8217;acc\u00e8s prioritaire aux nouvelles versions et aux correctifs de s\u00e9curit\u00e9, que vous n&#8217;obtiendrez qu&#8217;en investissant dans un partenariat avec un fournisseur de confiance.  <\/p>\n\n<p>En tirant parti de notre infrastructure cloud s\u00e9curis\u00e9e et hautement optimis\u00e9e, ainsi que de notre assistance 24 heures sur 24, 7 jours sur 7, vous serez en mesure d&#8217;avoir l&#8217;esprit tranquille et de vous concentrer sur l&#8217;enseignement, l&#8217;apprentissage, ainsi que sur la formation et le d\u00e9veloppement continus de votre personnel interne.<\/p>\n\n<p>Si les choses tournent mal, ceux qui peuvent compter sur une \u00e9quipe technique comp\u00e9tente et sur une surveillance et une assistance 24 heures sur 24, 7 jours sur 7, sont toujours mieux lotis que ceux qui n&#8217;en disposent pas.<\/p>\n\n<p>Nous sommes fiers de b\u00e9n\u00e9ficier de la confiance des grandes universit\u00e9s, des coll\u00e8ges et autres prestataires de services \u00e9ducatifs, ainsi que des administrations publiques et des grandes organisations des secteurs de la sant\u00e9, \u00e0 but non lucratif et commercial.<\/p>\n\n<p><\/p>\n\n<p class=\"has-text-align-center\">Vous souhaitez am\u00e9liorer les mesures de cybers\u00e9curit\u00e9 de votre \u00e9tablissement pour votre LMS ?<\/p>\n\n<p class=\"has-text-align-center\">Contactez notre \u00e9quipe d\u00e8s aujourd&#8217;hui !<\/p>\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.catalyst-ca.net\/fr\/nous-contacter\">Contactez-nous<\/a><\/div>\n<\/div>\n\n<p><\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"697\" height=\"643\" src=\"https:\/\/www.catalyst-ca.net\/wp-content\/uploads\/2023\/03\/Community-no-background.png\" alt=\"\" class=\"wp-image-5895\" style=\"width:230px;height:auto\" srcset=\"https:\/\/www.catalyst-ca.net\/wp-content\/uploads\/2023\/03\/Community-no-background.png 697w, https:\/\/www.catalyst-ca.net\/wp-content\/uploads\/2023\/03\/Community-no-background-300x277.png 300w\" sizes=\"auto, (max-width: 697px) 100vw, 697px\" \/><\/figure>\n<\/div>\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Selon des donn\u00e9es r\u00e9centes, les cyberattaques ont augment\u00e9 de 47 % rien qu&#8217;au premier trimestre 2025. Pourquoi le secteur de l&#8217;\u00e9ducation est-il autant cibl\u00e9 et que pouvez-vous faire pour prot\u00e9ger votre organisation contre les cybermenaces toujours plus nombreuses ?   [&#8230;]<\/p>\n<p><a class=\"btn btn-secondary understrap-read-more-link\" href=\"https:\/\/www.catalyst-ca.net\/fr\/blog\/cyber-security-in-higher-education-must-know-and-must-do\">Read More&#8230;<span class=\"screen-reader-text\"> from \u00c9tat des lieux de la cybers\u00e9curit\u00e9 dans l&#8217;enseignement sup\u00e9rieur<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":5902,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-5915","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>La cybers\u00e9curit\u00e9 dans l&#039;enseignement sup\u00e9rieur | Catalyst IT Canada<\/title>\n<meta name=\"description\" content=\"Les cyberattaques continuent de se multiplier \u00e0 l&#039;\u00e9chelle mondiale. D\u00e9couvrez la cybers\u00e9curit\u00e9 dans l&#039;enseignement sup\u00e9rieur et ce que vous pouvez faire pour prot\u00e9ger votre organisation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.catalyst-ca.net\/fr\/blog\/cyber-security-in-higher-education-must-know-and-must-do\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00c9tat des lieux de la cybers\u00e9curit\u00e9 dans l&#039;enseignement sup\u00e9rieur\" \/>\n<meta property=\"og:description\" content=\"Les cyberattaques continuent de se multiplier \u00e0 l&#039;\u00e9chelle mondiale. D\u00e9couvrez la cybers\u00e9curit\u00e9 dans l&#039;enseignement sup\u00e9rieur et ce que vous pouvez faire pour prot\u00e9ger votre organisation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.catalyst-ca.net\/fr\/blog\/cyber-security-in-higher-education-must-know-and-must-do\" \/>\n<meta property=\"og:site_name\" content=\"Catalyst IT Canada\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-02T14:38:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-02T14:46:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.catalyst-ca.net\/wp-content\/uploads\/2025\/10\/Catalyst-Education-Blog-Post-Image-v1-1240x827-Edited.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1240\" \/>\n\t<meta property=\"og:image:height\" content=\"827\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Catalyst Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Catalyst Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/blog\\\/cyber-security-in-higher-education-must-know-and-must-do#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/blog\\\/cyber-security-in-higher-education-must-know-and-must-do\"},\"author\":{\"name\":\"Catalyst Admin\",\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/#\\\/schema\\\/person\\\/f7ad7193ea970755cd61d097785b2b0a\"},\"headline\":\"\u00c9tat des lieux de la cybers\u00e9curit\u00e9 dans l&#8217;enseignement sup\u00e9rieur\",\"datePublished\":\"2025-10-02T14:38:43+00:00\",\"dateModified\":\"2025-10-02T14:46:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/blog\\\/cyber-security-in-higher-education-must-know-and-must-do\"},\"wordCount\":1129,\"publisher\":{\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/blog\\\/cyber-security-in-higher-education-must-know-and-must-do#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.catalyst-ca.net\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Catalyst-Education-Blog-Post-Image-v1-1240x827-Edited.png\",\"inLanguage\":\"fr\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/blog\\\/cyber-security-in-higher-education-must-know-and-must-do\",\"url\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/blog\\\/cyber-security-in-higher-education-must-know-and-must-do\",\"name\":\"La cybers\u00e9curit\u00e9 dans l'enseignement sup\u00e9rieur | Catalyst IT Canada\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/blog\\\/cyber-security-in-higher-education-must-know-and-must-do#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/blog\\\/cyber-security-in-higher-education-must-know-and-must-do#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.catalyst-ca.net\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Catalyst-Education-Blog-Post-Image-v1-1240x827-Edited.png\",\"datePublished\":\"2025-10-02T14:38:43+00:00\",\"dateModified\":\"2025-10-02T14:46:43+00:00\",\"description\":\"Les cyberattaques continuent de se multiplier \u00e0 l'\u00e9chelle mondiale. D\u00e9couvrez la cybers\u00e9curit\u00e9 dans l'enseignement sup\u00e9rieur et ce que vous pouvez faire pour prot\u00e9ger votre organisation.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/blog\\\/cyber-security-in-higher-education-must-know-and-must-do#breadcrumb\"},\"inLanguage\":\"fr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/blog\\\/cyber-security-in-higher-education-must-know-and-must-do\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr\",\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/blog\\\/cyber-security-in-higher-education-must-know-and-must-do#primaryimage\",\"url\":\"https:\\\/\\\/www.catalyst-ca.net\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Catalyst-Education-Blog-Post-Image-v1-1240x827-Edited.png\",\"contentUrl\":\"https:\\\/\\\/www.catalyst-ca.net\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Catalyst-Education-Blog-Post-Image-v1-1240x827-Edited.png\",\"width\":1240,\"height\":827},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/blog\\\/cyber-security-in-higher-education-must-know-and-must-do#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00c9tat des lieux de la cybers\u00e9curit\u00e9 dans l&#8217;enseignement sup\u00e9rieur\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/\",\"name\":\"Catalyst IT Canada\",\"description\":\"Open Source Software Services\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/#organization\",\"name\":\"Catalyst IT Canada Ltd\",\"url\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr\",\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.catalyst-ca.net\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/catalyst-expert-open-source-solutions.png\",\"contentUrl\":\"https:\\\/\\\/www.catalyst-ca.net\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/catalyst-expert-open-source-solutions.png\",\"width\":400,\"height\":126,\"caption\":\"Catalyst IT Canada Ltd\"},\"image\":{\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.catalyst-ca.net\\\/fr\\\/#\\\/schema\\\/person\\\/f7ad7193ea970755cd61d097785b2b0a\",\"name\":\"Catalyst Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/565c8164a190a7278203030c2a65b216c6e3c1620cf0ede0d44a11bef679c623?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/565c8164a190a7278203030c2a65b216c6e3c1620cf0ede0d44a11bef679c623?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/565c8164a190a7278203030c2a65b216c6e3c1620cf0ede0d44a11bef679c623?s=96&d=mm&r=g\",\"caption\":\"Catalyst Admin\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"La cybers\u00e9curit\u00e9 dans l'enseignement sup\u00e9rieur | Catalyst IT Canada","description":"Les cyberattaques continuent de se multiplier \u00e0 l'\u00e9chelle mondiale. D\u00e9couvrez la cybers\u00e9curit\u00e9 dans l'enseignement sup\u00e9rieur et ce que vous pouvez faire pour prot\u00e9ger votre organisation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.catalyst-ca.net\/fr\/blog\/cyber-security-in-higher-education-must-know-and-must-do","og_locale":"fr_FR","og_type":"article","og_title":"\u00c9tat des lieux de la cybers\u00e9curit\u00e9 dans l'enseignement sup\u00e9rieur","og_description":"Les cyberattaques continuent de se multiplier \u00e0 l'\u00e9chelle mondiale. D\u00e9couvrez la cybers\u00e9curit\u00e9 dans l'enseignement sup\u00e9rieur et ce que vous pouvez faire pour prot\u00e9ger votre organisation.","og_url":"https:\/\/www.catalyst-ca.net\/fr\/blog\/cyber-security-in-higher-education-must-know-and-must-do","og_site_name":"Catalyst IT Canada","article_published_time":"2025-10-02T14:38:43+00:00","article_modified_time":"2025-10-02T14:46:43+00:00","og_image":[{"width":1240,"height":827,"url":"https:\/\/www.catalyst-ca.net\/wp-content\/uploads\/2025\/10\/Catalyst-Education-Blog-Post-Image-v1-1240x827-Edited.png","type":"image\/png"}],"author":"Catalyst Admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Catalyst Admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.catalyst-ca.net\/fr\/blog\/cyber-security-in-higher-education-must-know-and-must-do#article","isPartOf":{"@id":"https:\/\/www.catalyst-ca.net\/fr\/blog\/cyber-security-in-higher-education-must-know-and-must-do"},"author":{"name":"Catalyst Admin","@id":"https:\/\/www.catalyst-ca.net\/fr\/#\/schema\/person\/f7ad7193ea970755cd61d097785b2b0a"},"headline":"\u00c9tat des lieux de la cybers\u00e9curit\u00e9 dans l&#8217;enseignement sup\u00e9rieur","datePublished":"2025-10-02T14:38:43+00:00","dateModified":"2025-10-02T14:46:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.catalyst-ca.net\/fr\/blog\/cyber-security-in-higher-education-must-know-and-must-do"},"wordCount":1129,"publisher":{"@id":"https:\/\/www.catalyst-ca.net\/fr\/#organization"},"image":{"@id":"https:\/\/www.catalyst-ca.net\/fr\/blog\/cyber-security-in-higher-education-must-know-and-must-do#primaryimage"},"thumbnailUrl":"https:\/\/www.catalyst-ca.net\/wp-content\/uploads\/2025\/10\/Catalyst-Education-Blog-Post-Image-v1-1240x827-Edited.png","inLanguage":"fr"},{"@type":"WebPage","@id":"https:\/\/www.catalyst-ca.net\/fr\/blog\/cyber-security-in-higher-education-must-know-and-must-do","url":"https:\/\/www.catalyst-ca.net\/fr\/blog\/cyber-security-in-higher-education-must-know-and-must-do","name":"La cybers\u00e9curit\u00e9 dans l'enseignement sup\u00e9rieur | Catalyst IT Canada","isPartOf":{"@id":"https:\/\/www.catalyst-ca.net\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.catalyst-ca.net\/fr\/blog\/cyber-security-in-higher-education-must-know-and-must-do#primaryimage"},"image":{"@id":"https:\/\/www.catalyst-ca.net\/fr\/blog\/cyber-security-in-higher-education-must-know-and-must-do#primaryimage"},"thumbnailUrl":"https:\/\/www.catalyst-ca.net\/wp-content\/uploads\/2025\/10\/Catalyst-Education-Blog-Post-Image-v1-1240x827-Edited.png","datePublished":"2025-10-02T14:38:43+00:00","dateModified":"2025-10-02T14:46:43+00:00","description":"Les cyberattaques continuent de se multiplier \u00e0 l'\u00e9chelle mondiale. D\u00e9couvrez la cybers\u00e9curit\u00e9 dans l'enseignement sup\u00e9rieur et ce que vous pouvez faire pour prot\u00e9ger votre organisation.","breadcrumb":{"@id":"https:\/\/www.catalyst-ca.net\/fr\/blog\/cyber-security-in-higher-education-must-know-and-must-do#breadcrumb"},"inLanguage":"fr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.catalyst-ca.net\/fr\/blog\/cyber-security-in-higher-education-must-know-and-must-do"]}]},{"@type":"ImageObject","inLanguage":"fr","@id":"https:\/\/www.catalyst-ca.net\/fr\/blog\/cyber-security-in-higher-education-must-know-and-must-do#primaryimage","url":"https:\/\/www.catalyst-ca.net\/wp-content\/uploads\/2025\/10\/Catalyst-Education-Blog-Post-Image-v1-1240x827-Edited.png","contentUrl":"https:\/\/www.catalyst-ca.net\/wp-content\/uploads\/2025\/10\/Catalyst-Education-Blog-Post-Image-v1-1240x827-Edited.png","width":1240,"height":827},{"@type":"BreadcrumbList","@id":"https:\/\/www.catalyst-ca.net\/fr\/blog\/cyber-security-in-higher-education-must-know-and-must-do#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.catalyst-ca.net\/fr"},{"@type":"ListItem","position":2,"name":"\u00c9tat des lieux de la cybers\u00e9curit\u00e9 dans l&#8217;enseignement sup\u00e9rieur"}]},{"@type":"WebSite","@id":"https:\/\/www.catalyst-ca.net\/fr\/#website","url":"https:\/\/www.catalyst-ca.net\/fr\/","name":"Catalyst IT Canada","description":"Open Source Software Services","publisher":{"@id":"https:\/\/www.catalyst-ca.net\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.catalyst-ca.net\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr"},{"@type":"Organization","@id":"https:\/\/www.catalyst-ca.net\/fr\/#organization","name":"Catalyst IT Canada Ltd","url":"https:\/\/www.catalyst-ca.net\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr","@id":"https:\/\/www.catalyst-ca.net\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.catalyst-ca.net\/wp-content\/uploads\/2022\/03\/catalyst-expert-open-source-solutions.png","contentUrl":"https:\/\/www.catalyst-ca.net\/wp-content\/uploads\/2022\/03\/catalyst-expert-open-source-solutions.png","width":400,"height":126,"caption":"Catalyst IT Canada Ltd"},"image":{"@id":"https:\/\/www.catalyst-ca.net\/fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.catalyst-ca.net\/fr\/#\/schema\/person\/f7ad7193ea970755cd61d097785b2b0a","name":"Catalyst Admin","image":{"@type":"ImageObject","inLanguage":"fr","@id":"https:\/\/secure.gravatar.com\/avatar\/565c8164a190a7278203030c2a65b216c6e3c1620cf0ede0d44a11bef679c623?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/565c8164a190a7278203030c2a65b216c6e3c1620cf0ede0d44a11bef679c623?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/565c8164a190a7278203030c2a65b216c6e3c1620cf0ede0d44a11bef679c623?s=96&d=mm&r=g","caption":"Catalyst Admin"}}]}},"_links":{"self":[{"href":"https:\/\/www.catalyst-ca.net\/fr\/wp-json\/wp\/v2\/posts\/5915","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.catalyst-ca.net\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.catalyst-ca.net\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.catalyst-ca.net\/fr\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.catalyst-ca.net\/fr\/wp-json\/wp\/v2\/comments?post=5915"}],"version-history":[{"count":0,"href":"https:\/\/www.catalyst-ca.net\/fr\/wp-json\/wp\/v2\/posts\/5915\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.catalyst-ca.net\/fr\/wp-json\/wp\/v2\/media\/5902"}],"wp:attachment":[{"href":"https:\/\/www.catalyst-ca.net\/fr\/wp-json\/wp\/v2\/media?parent=5915"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.catalyst-ca.net\/fr\/wp-json\/wp\/v2\/categories?post=5915"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.catalyst-ca.net\/fr\/wp-json\/wp\/v2\/tags?post=5915"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}