{"id":174,"date":"2025-01-27T18:37:06","date_gmt":"2025-01-27T18:37:06","guid":{"rendered":"https:\/\/phishia.fr\/?p=174"},"modified":"2025-11-26T10:08:45","modified_gmt":"2025-11-26T10:08:45","slug":"eti-cybersecurity-guide-2024","status":"publish","type":"post","link":"https:\/\/phishia.fr\/en\/blog\/compliance-management\/eti-cybersecurity-guide-2024\/","title":{"rendered":"ETI: the 2024 cybersecurity guide"},"content":{"rendered":"<p>In today's digital world, cybersecurity has become a major issue for all organizations, and in particular for&nbsp;<strong>Intermediate-sized companies (ETI)<\/strong>. With cyber-attacks on the increase, it is essential for these companies to understand and implement effective security measures.&nbsp;<\/p>\n\n\n\n<p>In 2024, cybersecurity threats have evolved and diversified, making the task of protecting digital assets increasingly complex. Cybercriminals are using increasingly sophisticated techniques to infiltrate networks, steal data and disrupt operations. As a result, small businesses need to be proactive and vigilant in protecting their systems and data.<\/p>\n\n\n\n<p>This guide aims to provide an overview of cybersecurity best practices for ETIs in 2024. It covers a range of topics, from risk assessment to the implementation of security measures, as well as staff training and awareness-raising. It also offers advice on how to react in the event of a security incident, and on the importance of continuous review and improvement.<\/p>\n\n\n\n<p>It's important to note that cybersecurity isn't just about technology. It is also about people and processes. A holistic approach to cybersecurity, which takes all these elements into account, is essential to ensure the security of a company's digital assets.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.c6tlsoyyuzvh_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/eti-cybersecurity-guide-2024\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/eti-cybersecurity-guide-2024\/\"><\/a>Current Threats and the Context of the 2024 Olympics<\/h2>\n\n\n\n<p>The 2024 Olympic Games, a global event, not only attracts athletes and spectators from all over the world, but also the attention of cyber criminals. Major sporting events are often targeted by cyber-attacks due to the mass of sensitive data processed, ranging from participants' personal information to online ticketing systems. Cyber threats to businesses in this context include :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/eti-cybersecurity-guide-2024\/\"><strong>Phishing and Social Engineering:\u00a0<\/strong><\/a>Phishing attacks aimed at stealing sensitive information by posing as legitimate entities are commonplace. Cyber criminals can take advantage of the excitement surrounding JOs to deceive employees and end-users.<\/li>\n\n\n\n<li><strong>Ransomware:<\/strong>\u00a0Ransomware attacks, where hackers encrypt company data and demand a ransom to unlock it, are a growing threat. Companies can be crippled if they don't have adequate backups or incident response plans in place.<\/li>\n\n\n\n<li><strong>DDoS attacks :<\/strong>\u00a0Distributed denial of service (DDoS) attacks can lead to disruption of online services, which can have a devastating impact on businesses that rely heavily on the availability of their systems.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/en\/contact\/\"><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.7nyvnqwkcnuo_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/eti-cybersecurity-guide-2024\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/eti-cybersecurity-guide-2024\/\"><\/a>Safety Measures and Good Practices<\/h2>\n\n\n\n<p>To protect themselves against these threats, companies need to implement a series of robust security measures:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/phishia.fr\/en\/services\/cybersecurity\/prevention\/risk-analysis\/\"><strong>Risk analysis :<\/strong><\/a>\u00a0Start by assessing the company's critical assets and identifying potential threats. This analysis will help prioritize security efforts where they are most needed.<\/li>\n\n\n\n<li><a href=\"https:\/\/phishia.fr\/en\/services\/cybersecurity\/prevention\/safety-policies-internal-charters\/\"><strong>Audit and Implementation of Security Policies :<\/strong><\/a><strong>\u00a0<\/strong>Implement clear, enforceable security policies, covering aspects such as user authentication, access management and protection of sensitive data. Ensure that these policies are regularly audited and updated to remain effective against new threats.<\/li>\n\n\n\n<li><strong>Detection and prevention tools :<\/strong>\u00a0Invest in advanced security solutions such as firewalls, intrusion detection systems and next-generation antivirus software. These tools can help detect and prevent attacks before they cause significant damage.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.h2w1tejxqd0t_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/eti-cybersecurity-guide-2024\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/eti-cybersecurity-guide-2024\/\"><\/a>Raising employee awareness<\/h2>\n\n\n\n<p>In addition to technical measures, raising employee awareness of cybersecurity risks is essential to strengthen the security posture of ETIs. Employees need to be trained in good IT security practices, such as using strong passwords, detecting phishing emails and protecting confidential information. By making security a key part of their corporate culture, ETIs can significantly reduce the risks associated with human error and careless behavior.<\/p>\n\n\n\n<p>There are a number of ways to raise awareness among your employees:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>visit\u00a0<a href=\"https:\/\/phishia.fr\/en\/management-and-compliance\/awareness-training\/phishing\/\">phishing campaigns<\/a>This is an invaluable tool for helping each of your employees to progress through daily practice,<\/li>\n\n\n\n<li>visit\u00a0<a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/eti-cybersecurity-guide-2024\/\">cyber crisis management exercises<\/a>A team game to learn what a cyber attack is,\u00a0<\/li>\n\n\n\n<li>from\u00a0<a href=\"https:\/\/phishia.fr\/en\/services\/cybersecurity\/prevention\/awareness-training\/\">group workshops<\/a>\u00a0on various topics affecting your organization.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.alil7wch4kzb_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/eti-cybersecurity-guide-2024\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/eti-cybersecurity-guide-2024\/\"><\/a>What is ISO 27001 certification?<\/h2>\n\n\n\n<p>ISO 27001 is an international standard published by the International Organization for Standardization (ISO), which sets out the requirements for the establishment, implementation, maintenance and continual improvement of an information security management system (ISMS). The standard aims to help organizations protect information by putting in place processes and controls tailored to the specific risks they face.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.6w6iho1yohhu_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/eti-cybersecurity-guide-2024\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/eti-cybersecurity-guide-2024\/\"><\/a>Benefits of ISO 27001 certification<\/h2>\n\n\n\n<p>ISO 27001 certification offers many advantages to companies that choose to implement it:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Strengthening Data Security :<\/strong>\u00a0By implementing an ISO 27001-compliant ISMS, companies can proactively identify, assess and manage information security risks, helping to strengthen the protection of their sensitive data.<\/li>\n\n\n\n<li><strong>Customer and partner confidence:<\/strong>\u00a0ISO 27001 certification demonstrates a company's commitment to information security, and inspires confidence among customers, business partners and external stakeholders.<\/li>\n\n\n\n<li><strong>Regulatory Compliance :<\/strong>\u00a0ISO 27001 provides a robust framework for compliance with data protection regulations such as the RGPD (General Data Protection Regulation), helping companies to avoid fines and penalties associated with non-compliance.<\/li>\n\n\n\n<li><strong>Continuous improvement :<\/strong>\u00a0ISO 27001 certification encourages continuous improvement in information security through regular risk assessment, performance monitoring and process review.<\/li>\n<\/ol>\n\n\n\n<p><a href=\"\/en\/contact\/\"><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.77zoq1oqtz3b_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/eti-cybersecurity-guide-2024\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/eti-cybersecurity-guide-2024\/\"><\/a>ISO 27001 Certification Implementation Process<\/h2>\n\n\n\n<p>ISO 27001 certification is implemented in several stages:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Current State Analysis:<\/strong>\u00a0Assess the company's current information security situation, identify gaps and potential risks.<\/li>\n\n\n\n<li><strong>Planning :<\/strong>\u00a0Draw up an ISO 27001 implementation plan, defining security objectives and the measures to be taken to achieve them.<\/li>\n\n\n\n<li><strong>Implementation :<\/strong>\u00a0Implement the controls and processes needed to meet ISO 27001 requirements, involving the whole organization.<\/li>\n\n\n\n<li><strong>Internal Audit :\u00a0<\/strong>Carry out regular internal audits to assess the effectiveness of the ISMS and identify areas for improvement.<\/li>\n\n\n\n<li><strong>External Certification :<\/strong>\u00a0Engage a third-party certification body to carry out a formal assessment of the ISMS and issue ISO 27001 certification if all requirements are met.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.pt7kiyef91ud_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/eti-cybersecurity-guide-2024\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/eti-cybersecurity-guide-2024\/\"><\/a>ISO 27001 Certification Implementation Process<\/h2>\n\n\n\n<p>Once ISO 27001 certified, a company can expect to see a significant impact on its information security:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Cyber-Attack Risk Reduction :<\/strong>\u00a0Implementing effective security controls helps reduce the risk of cyber-attacks such as data breaches, ransomware and phishing attacks.<\/li>\n\n\n\n<li><strong>Protecting sensitive information :<\/strong>\u00a0ISO 27001 certification guarantees that sensitive company information is adequately protected against unauthorized access, alteration and deletion.<\/li>\n\n\n\n<li><strong>Effective Threat Management :<\/strong>\u00a0By adopting a risk-based approach, companies are better prepared to deal with emerging threats and adapt to changes in the IT security landscape.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.7598vuw53ja_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/eti-cybersecurity-guide-2024\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/eti-cybersecurity-guide-2024\/\"><\/a>Get Support<\/h2>\n\n\n\n<p>For small and medium-sized businesses looking to strengthen their cybersecurity posture, it is advisable to enlist the support of IT security experts. Phishia, a consulting firm specializing in cybersecurity, offers solutions tailored to the specific needs of ETIs. Thanks to its expertise and personalized approach, Phishia can help SMEs identify vulnerabilities in their information systems, implement effective security measures and train their employees to adopt good security practices.<\/p>","protected":false},"excerpt":{"rendered":"<p>In today's digital world, cybersecurity has become a major issue for all organizations, and especially for mid-sized companies. With cyber-attacks constantly on the rise, it's essential for these companies to understand and implement effective security measures.  By 2024, cybersecurity threats have [...]<\/p>","protected":false},"author":1,"featured_media":221,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[22],"tags":[],"class_list":["post-174","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-pilotage-conformite"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ETI\u00a0: le guide\u00a0cybers\u00e9curit\u00e9\u00a0en 2024 - Phishia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/phishia.fr\/en\/blog\/compliance-management\/eti-cybersecurity-guide-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ETI\u00a0: le guide\u00a0cybers\u00e9curit\u00e9\u00a0en 2024 - Phishia\" \/>\n<meta property=\"og:description\" content=\"Dans le monde num\u00e9rique d&rsquo;aujourd&rsquo;hui, la cybers\u00e9curit\u00e9 est devenue un enjeu majeur pour toutes les organisations, et en particulier pour les&nbsp;Entreprises de Taille Interm\u00e9diaire (ETI). Avec l&rsquo;augmentation constante des cyberattaques, il est essentiel pour ces entreprises de comprendre et de mettre en \u0153uvre des mesures de s\u00e9curit\u00e9 efficaces.&nbsp; En 2024, les menaces de cybers\u00e9curit\u00e9 ont [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/phishia.fr\/en\/blog\/compliance-management\/eti-cybersecurity-guide-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"Phishia\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-27T18:37:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-26T10:08:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"812\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hugo Lanier\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hugo Lanier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/eti-le-guide-cybersecurite-en-2024\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/eti-le-guide-cybersecurite-en-2024\\\/\"},\"author\":{\"name\":\"Hugo Lanier\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/af585567417266884c2f7f470cb09a6f\"},\"headline\":\"ETI\u00a0: le guide\u00a0cybers\u00e9curit\u00e9\u00a0en 2024\",\"datePublished\":\"2025-01-27T18:37:06+00:00\",\"dateModified\":\"2025-11-26T10:08:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/eti-le-guide-cybersecurite-en-2024\\\/\"},\"wordCount\":1542,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/eti-le-guide-cybersecurite-en-2024\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Untitled-4.jpg\",\"articleSection\":[\"Pilotage et conformit\u00e9\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/eti-le-guide-cybersecurite-en-2024\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/eti-le-guide-cybersecurite-en-2024\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/eti-le-guide-cybersecurite-en-2024\\\/\",\"name\":\"ETI\u00a0: le guide\u00a0cybers\u00e9curit\u00e9\u00a0en 2024 - Phishia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/eti-le-guide-cybersecurite-en-2024\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/eti-le-guide-cybersecurite-en-2024\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Untitled-4.jpg\",\"datePublished\":\"2025-01-27T18:37:06+00:00\",\"dateModified\":\"2025-11-26T10:08:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/eti-le-guide-cybersecurite-en-2024\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/eti-le-guide-cybersecurite-en-2024\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/eti-le-guide-cybersecurite-en-2024\\\/#primaryimage\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Untitled-4.jpg\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Untitled-4.jpg\",\"width\":1280,\"height\":812},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/eti-le-guide-cybersecurite-en-2024\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/phishia.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pilotage et conformit\u00e9\",\"item\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/category\\\/pilotage-conformite\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ETI\u00a0: le guide\u00a0cybers\u00e9curit\u00e9\u00a0en 2024\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"name\":\"Phishia\",\"description\":\"Cabinet de Conseil IT, Cybers\u00e9curit\u00e9, Durabilit\u00e9\",\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/phishia.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\",\"name\":\"Phishia\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"width\":512,\"height\":128,\"caption\":\"Phishia\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/phishia\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/af585567417266884c2f7f470cb09a6f\",\"name\":\"Hugo Lanier\",\"sameAs\":[\"https:\\\/\\\/phishia.fr\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ETI: the cybersecurity guide to 2024 - Phishia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/phishia.fr\/en\/blog\/compliance-management\/eti-cybersecurity-guide-2024\/","og_locale":"en_US","og_type":"article","og_title":"ETI\u00a0: le guide\u00a0cybers\u00e9curit\u00e9\u00a0en 2024 - Phishia","og_description":"Dans le monde num\u00e9rique d&rsquo;aujourd&rsquo;hui, la cybers\u00e9curit\u00e9 est devenue un enjeu majeur pour toutes les organisations, et en particulier pour les&nbsp;Entreprises de Taille Interm\u00e9diaire (ETI). Avec l&rsquo;augmentation constante des cyberattaques, il est essentiel pour ces entreprises de comprendre et de mettre en \u0153uvre des mesures de s\u00e9curit\u00e9 efficaces.&nbsp; En 2024, les menaces de cybers\u00e9curit\u00e9 ont [&hellip;]","og_url":"https:\/\/phishia.fr\/en\/blog\/compliance-management\/eti-cybersecurity-guide-2024\/","og_site_name":"Phishia","article_published_time":"2025-01-27T18:37:06+00:00","article_modified_time":"2025-11-26T10:08:45+00:00","og_image":[{"width":1280,"height":812,"url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-4.jpg","type":"image\/jpeg"}],"author":"Hugo Lanier","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hugo Lanier","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/eti-le-guide-cybersecurite-en-2024\/#article","isPartOf":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/eti-le-guide-cybersecurite-en-2024\/"},"author":{"name":"Hugo Lanier","@id":"https:\/\/phishia.fr\/#\/schema\/person\/af585567417266884c2f7f470cb09a6f"},"headline":"ETI\u00a0: le guide\u00a0cybers\u00e9curit\u00e9\u00a0en 2024","datePublished":"2025-01-27T18:37:06+00:00","dateModified":"2025-11-26T10:08:45+00:00","mainEntityOfPage":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/eti-le-guide-cybersecurite-en-2024\/"},"wordCount":1542,"commentCount":0,"publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"image":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/eti-le-guide-cybersecurite-en-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-4.jpg","articleSection":["Pilotage et conformit\u00e9"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/phishia.fr\/blog\/pilotage-conformite\/eti-le-guide-cybersecurite-en-2024\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/eti-le-guide-cybersecurite-en-2024\/","url":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/eti-le-guide-cybersecurite-en-2024\/","name":"ETI: the cybersecurity guide to 2024 - Phishia","isPartOf":{"@id":"https:\/\/phishia.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/eti-le-guide-cybersecurite-en-2024\/#primaryimage"},"image":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/eti-le-guide-cybersecurite-en-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-4.jpg","datePublished":"2025-01-27T18:37:06+00:00","dateModified":"2025-11-26T10:08:45+00:00","breadcrumb":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/eti-le-guide-cybersecurite-en-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/phishia.fr\/blog\/pilotage-conformite\/eti-le-guide-cybersecurite-en-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/eti-le-guide-cybersecurite-en-2024\/#primaryimage","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-4.jpg","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-4.jpg","width":1280,"height":812},{"@type":"BreadcrumbList","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/eti-le-guide-cybersecurite-en-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/phishia.fr\/"},{"@type":"ListItem","position":2,"name":"Pilotage et conformit\u00e9","item":"https:\/\/phishia.fr\/blog\/category\/pilotage-conformite\/"},{"@type":"ListItem","position":3,"name":"ETI\u00a0: le guide\u00a0cybers\u00e9curit\u00e9\u00a0en 2024"}]},{"@type":"WebSite","@id":"https:\/\/phishia.fr\/#website","url":"https:\/\/phishia.fr\/","name":"Phishia","description":"IT Consulting, Cybersecurity, Sustainability","publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/phishia.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/phishia.fr\/#organization","name":"Phishia","url":"https:\/\/phishia.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","width":512,"height":128,"caption":"Phishia"},"image":{"@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/phishia\/"]},{"@type":"Person","@id":"https:\/\/phishia.fr\/#\/schema\/person\/af585567417266884c2f7f470cb09a6f","name":"Hugo Lanier","sameAs":["https:\/\/phishia.fr"]}]}},"_links":{"self":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/comments?post=174"}],"version-history":[{"count":21,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/174\/revisions"}],"predecessor-version":[{"id":4054,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/174\/revisions\/4054"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media\/221"}],"wp:attachment":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media?parent=174"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/categories?post=174"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/tags?post=174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}