{"id":35915,"date":"2018-10-25T14:07:50","date_gmt":"2018-10-25T12:07:50","guid":{"rendered":"https:\/\/www.tranquil.it\/?p=35915"},"modified":"2025-07-18T11:06:52","modified_gmt":"2025-07-18T09:06:52","slug":"know-the-information-system-cybersecmonth-2","status":"publish","type":"post","link":"https:\/\/www.tranquil.it\/en\/know-the-information-system-cybersecmonth-2\/","title":{"rendered":"Know the information system #CyberSecMonth"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; background_color=&#8221;#009EBD&#8221; custom_margin=&#8221;0px||&#8221; custom_padding=&#8221;25px||19px||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; background_enable_image=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_row _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;40px|0px|39px|0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_post_title featured_image=&#8221;off&#8221; text_color=&#8221;light&#8221; _builder_version=&#8221;4.27.4&#8243; text_orientation=&#8221;center&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; meta=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_post_title][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;0px|0px|0px|0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_padding=&#8221;40px||0px|&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;]As ANSSI enters its second phase of awareness, we continue our Cyber Advices program as part of CyberSecMonth with our second computer graphics dedicated to the importance of knowing your information system.[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;0|0px|0|0px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;40px|0px|0px|0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>The importance of an efficient and secure information system<\/h2>\n<p>The field of information systems has expanded considerably with the democratization of new technologies. The multiplication of solutions and tools has therefore transformed the information system into a real challenge for organizations. Nowadays, the information system is made up of so many elements (hardware, software, processes&#8230;) that each organization has its own information system. It is therefore essential to have an effective <strong>information system<\/strong>. And to optimize your information system, you must already know it.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;40px||0px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/www.tranquil.it\/wp-content\/uploads\/cybersecmonth_infographie_2_HD.jpg&#8221; alt=&#8221;Infographie %22Connaitre le syst\u00e8me d&#8217;information%22&#8243; title_text=&#8221;Infographie %22Connaitre le syst\u00e8me d&#8217;information%22&#8243; align_tablet=&#8221;center&#8221; align_phone=&#8221;&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;40px|0px|0px|0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;]As you can tell, the performance of an information system lies in its <strong>regular maintenance<\/strong>. The more &#8220;healthy&#8221; this system is, the more secure and therefore effective it is.<\/p>\n<h3>Good practices:<\/h3>\n<h4>Know your Information System and map it<\/h4>\n<p>A good knowledge of the information system (IS) makes it possible to<strong> locate sensitive data<\/strong> (specific to the company&#8217;s activity) and therefore to take appropriate <strong>security measures<\/strong>. Mapping your information system makes it possible to<strong> simplify and locate interventions<\/strong>. The advantage of such a scheme is to quickly identify sensitive data and secure it.<\/p>\n<h4>Inventor regularly your Information System<\/h4>\n<p>Once your Information system has been mapped, you can start working on its regular inventory. Your schema should not remain <em>ad vitam eternam<\/em> at the bottom of your wiki.<\/p>\n<p><strong> A regular inventory of the organization&#8217;s privileged accounts<\/strong> is essential to protect its sensitive data. This inventory must include all users as well as the various administrative rights. This inventory offers more vigilance regarding <strong> intrusion detection<\/strong> and <strong> removal of obsolete access<\/strong>.<\/p>\n<p>If you have not yet started this process, we advise you to start with <strong>an inventory of accounts<\/strong> on your Active Directory, with on one side administrator and user accounts. Be careful, everyone must have a user account in your information system, even the park administrators. Admin accounts should only be used to perform administration actions and not to work on a daily basis.<\/p>\n<h4>The arrival and departure procedure<\/h4>\n<p>Updating your Information System in case of departure can be a ordeal if there is no procedure. You cannot trust your memory to delete access to your Information System. Fortunately, thanks to your diagram, you know the sensitive assets of your Information System and can start developing your arrival and departure procedure.<\/p>\n<p>The arrival and departure procedure facilitates the <strong>maintenance and updating of access to the information system<\/strong>. This procedure makes it possible to act in the event of the creation or deletion of computer accounts, the allocation or modification of rights, the management of physical access, the assignment of mobile equipment and the management of sensitive documents.<\/p>\n<p>Finally, mastering the equipment connecting to the information system is important to reduce <strong>potentially vulnerable entry points<\/strong>. Some of the actions carried out aim at supervised personal or visitor facilities. The implementation of a <strong> Wi-Fi network with dedicated SSID<\/strong> remains a highly recommended practice to reduce this risk of vulnerability. Don&#8217;t let just anyone into your house!<\/p>\n<h3>Recommended tools:<\/h3>\n<p><a href=\"https:\/\/www.draw.io\/\">Draw.io<\/a> is a free, intuitive and easy-to-use tool for creating network diagrams. The tool allows to display <strong>IP zones<\/strong>, <strong>associated addressing plan<\/strong> and <strong>routing and security equipment<\/strong> without too much effort. However, it is recommended to host it on your servers for more security.<\/p>\n<p><strong>Your Active Directory<\/strong> will be your best ally to manage authentications and permissions on your network. Whether with a Microsoft Active Directory or with <strong>its Open Source equivalent Samba-AD<\/strong>, you will be able to manage your users&#8217; rights, manage your employees&#8217; inputs and outputs, all via an easy-to-use management console. Tranquil IT has been a Samba expert for more than 13 years and supports you in your migration to<a href=\"https:\/\/www.tranquil.it\/en\/solutions\/samba-active-directory\/\"> Samba Active Directory<\/a> to free you from your Microsoft licenses.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;40px|0px|0px|0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Samba Active Directory, expertise on a European scale<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Tranquil IT has been using Samba for over 13 years, successfully completing more than <strong>270 projects<\/strong>. This extensive experience has made us the <strong>leading integrator<\/strong> of Samba&#8217;s Active Directory component in France. Our technical team is highly experienced in conducting <a href=\"\/audit-de-parc-informatique\/\">IT infrastructure audits<\/a>, <a href=\"https:\/\/www.tranquil.it\/en\/migration-active-directory-2\/\">Active Directory migrations<\/a>, and <strong>domain mergers<\/strong>. Our close relationship with the Samba Team enables us to facilitate both the development of this software and the <a href=\"\/transfert-competences-samba-active-directory\/\">transfer of skills in Samba Active Directory<\/a> to our clients.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;0px||0px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;40px||0px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_divider _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;40px|0px|0px|0px|false|false&#8221; border_color_all=&#8221;#26518f&#8221; border_style_all=&#8221;dotted&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;||||||||&#8221; header_3_font=&#8221;||||||||&#8221; header_3_line_height=&#8221;3em&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>CyberSecMonth, a four-part event<\/h2>\n<p>For the sixth edition of CyberSecMonth, ANSSI is covering the event by organizing it into thematic weeks. Thus, every week many workshops and conferences are organized and focus un the theme of cybersecurity.<\/p>\n<h3>The four ANSSI themes:<\/h3>\n<ol>\n<li><span style=\"text-decoration: underline;\">To have the basics<\/span> : The first week of October aims to raise awareness among readers about the need to <strong>secure their data<\/strong>\u00a0through <strong>passwords and encrypted messages<\/strong>. There are good IT practices, recommendations, an awareness kit and even <a href=\"https:\/\/www.cigref.fr\/sensibiliser-a-la-cybersecurite-le-serious-game-cigref-dans-les-entreprises\">a serious game on cybersecurity<\/a>.<\/li>\n<li><span style=\"text-decoration: underline;\">Knowing the profession<\/span>\u00a0: This week of October focuses on the <strong> digital security professions<\/strong> and the different <strong>formations<\/strong> in this field. This is an opportunity to review the recent implementation of the General Data Protection Regulations (GDPR).<\/li>\n<li><span style=\"text-decoration: underline;\">Show interest in risks in order to apply good practices <\/span>: This theme focuses on <strong>online banking transactions<\/strong> and the risk of <strong>credit card fraud<\/strong>. The procedure to follow in the event of a cyber attack is also at the center of this weeks theme.<\/li>\n<li><span style=\"text-decoration: underline;\">Understand tomorrow&#8217;s issues<\/span> : ANSSI concludes this CyberSecMonth by trying to anticipate tomorrow&#8217;s cyber threats. This theme highlights the specialists who are working to <strong>integrate<\/strong> <strong>digital security <\/strong> upstream of artificial intelligence projects and connected objects. Thus this approach aims to <strong>reduce the vulnerability of computers and networks<\/strong>. ANSSI will also return to the <strong>ethical and legal aspect <\/strong>of technological development.<\/li>\n<\/ol>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;40px|0px|0px|0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>What you don&#8217;t want to miss :<\/h2>\n<p>What to follow during #CyberSecMonth[\/et_pb_text][et_pb_code _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"fr\"><p>\ud83d\udcfd\ufe0fMes de la ciberseguridad europea \ud83d\udee1\ufe0f- Semana 1: \u00a1los fundamentos! <!\u2013- [et_pb_br_holder] -\u2013>Presentaci\u00f3n fuera de competici\u00f3n de nuestro v\u00eddeo de concienciaci\u00f3n sobre el <a href=\"https:\/\/twitter.com\/hashtag\/phishing?src=hash&#038;ref_src=twsrc%5Etfw\">#phishing<\/a> \ud83c\udfa3en el 2\u00ba <a href=\"https:\/\/twitter.com\/hashtag\/Festival?src=hash&#038;ref_src=twsrc%5Etfw\">#Festival<\/a> de <a href=\"https:\/\/twitter.com\/hashtag\/Cine?src=hash&#038;ref_src=twsrc%5Etfw\">#Cine<\/a> de <a href=\"https:\/\/twitter.com\/EnghienlesBains?ref_src=twsrc%5Etfw\">@EnghienlesBains<\/a><!\u2013- [et_pb_br_holder] -\u2013>Un soporte de nuestro <a href=\"https:\/\/twitter.com\/hashtag\/KitSensiCyber?src=hash&#038;ref_src=twsrc%5Etfw\">#KitSensiCyber<\/a> &#8211; \ud83d\udd03<a href=\"https:\/\/twitter.com\/hashtag\/ECSM?src=hash&#038;ref_src=twsrc%5Etfw\">#ECSM<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/TodosSecNum?src=hash&#038;ref_src=twsrc%5Etfw\">#TodosSecNum<\/a> <a href=\"https:\/\/twitter.com\/FilmSecurite?ref_src=twsrc%5Etfw\">@FilmSecurite<\/a> <a href=\"https:\/\/t.co\/wUoLbgLzcf\">pic.twitter.com\/wUoLbgLzcf<\/a>\u2014 Cybermalveillance.gouv.fr (@cybervictimes) <a href=\"https:\/\/twitter.com\/cybervictimes\/status\/1047077406354415616?ref_src=twsrc%5Etfw\">2 octubre 2018<\/a><\/p><\/blockquote>\n<p><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><!-- [et_pb_line_break_holder] -->[\/et_pb_code][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;40px|0px|0px|0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;]Articles not to be missed:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.cnil.fr\/fr\/5-arguments-pour-adopter-le-gestionnaire-de-mots-de-passe\">5 arguments to adopt the password manager &#8211; CNIL<\/a><\/li>\n<li><a href=\"https:\/\/blogrecherche.wp.imt.fr\/2018\/06\/01\/cyberdefense-initiative\/\"> Cyber defence wants to take the initiative &#8211; IM Tech<\/a><\/li>\n<\/ul>\n<p>Find all our recommendations on <a href=\"https:\/\/twitter.com\/TRANQUIL_IT?lang=en\">Twitter<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/tranquil-it\/\">LinkedIn<\/a> and using the hashtags : <a href=\"https:\/\/twitter.com\/search?f=tweets&amp;q=%23TousSecNum&amp;src=typd\">#TousSecNum<\/a>, <a href=\"https:\/\/twitter.com\/search?f=tweets&amp;q=%23CyberSecMonth&amp;src=typd\">#CyberSecMonth<\/a>, <a href=\"https:\/\/twitter.com\/search?f=tweets&amp;q=%23ECSM2018&amp;src=typd\">#ECSM2018<\/a> and <a href=\"https:\/\/twitter.com\/search?q=%23ECSM&amp;src=typd\">#ECSM<\/a>. Also follow our hashtag <a href=\"https:\/\/twitter.com\/search?f=tweets&amp;q=%23CyberConseil&amp;src=typd\">#CyberConseil<\/a> to follow Tranquil IT&#8217;s advice and discover the future graphics.[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;0|0px|0px|0px|false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;40px||0px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_divider _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row make_equal=&#8221;on&#8221; column_padding_mobile=&#8221;on&#8221; module_class=&#8221;CasClient&#8221; _builder_version=&#8221;4.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;73%&#8221; max_width=&#8221;1381px&#8221; min_height=&#8221;838px&#8221; max_height=&#8221;1000px&#8221; custom_margin=&#8221;-19px||-260px||false|false&#8221; custom_padding=&#8221;84px||46px||false|false&#8221; hover_enabled=&#8221;0&#8243; make_fullwidth=&#8221;off&#8221; use_custom_width=&#8221;off&#8221; width_unit=&#8221;on&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blog fullwidth=&#8221;off&#8221; posts_number=&#8221;3&#8243; include_categories=&#8221;all&#8221; use_manual_excerpt=&#8221;off&#8221; excerpt_length=&#8221;80&#8243; show_author=&#8221;off&#8221; show_date=&#8221;off&#8221; show_excerpt=&#8221;off&#8221; show_pagination=&#8221;off&#8221; module_class=&#8221;Blog&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h3&#8243; width=&#8221;100%&#8221; global_colors_info=&#8221;{}&#8221; min_height__hover_enabled=&#8221;on|desktop&#8221;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Knowing your information system makes it easier to maintain it regularly. Optimize your information system by knowing it by heart!<\/p>\n","protected":false},"author":1,"featured_media":28324,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[43,45,53,44],"tags":[270,48,47,55,46],"class_list":["post-35915","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualites","category-cybersecmonth","category-cybersecmonth-en","category-news-events","tag-cyberconseil-en","tag-cyberconseil","tag-cybersecmonth","tag-cybersecmonth-en","tag-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Know the information system #CyberSecMonth - Blog Tranquil IT<\/title>\n<meta name=\"description\" content=\"Knowing your information system makes it easier to maintain it regularly. Optimize your information system by knowing it by heart!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tranquil.it\/connaitre-le-systeme-dinformation-cybersecmonth-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Know the information system #CyberSecMonth - Blog Tranquil IT\" \/>\n<meta property=\"og:description\" content=\"Knowing your information system makes it easier to maintain it regularly. Optimize your information system by knowing it by heart!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tranquil.it\/connaitre-le-systeme-dinformation-cybersecmonth-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Tranquil IT\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-25T12:07:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-18T09:06:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tranquil.it\/wp-content\/uploads\/cybersecmonth_vignette2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"702\" \/>\n\t<meta property=\"og:image:height\" content=\"498\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin-site\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.tranquil.it\/wp-content\/uploads\/cybersecmonth_vignette2.png\" \/>\n<meta name=\"twitter:creator\" content=\"@TRANQUIL_IT\" \/>\n<meta name=\"twitter:site\" content=\"@TRANQUIL_IT\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/connaitre-le-systeme-dinformation-cybersecmonth-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/connaitre-le-systeme-dinformation-cybersecmonth-2\\\/\"},\"author\":{\"name\":\"admin-site\",\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/#\\\/schema\\\/person\\\/ca2d8c4fc6339e7946b5d62845bb0d70\"},\"headline\":\"Know the information system #CyberSecMonth\",\"datePublished\":\"2018-10-25T12:07:50+00:00\",\"dateModified\":\"2025-07-18T09:06:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/connaitre-le-systeme-dinformation-cybersecmonth-2\\\/\"},\"wordCount\":1932,\"publisher\":{\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/connaitre-le-systeme-dinformation-cybersecmonth-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.tranquil.it\\\/wp-content\\\/uploads\\\/Mockup17.png\",\"keywords\":[\"CyberConseil\",\"CyberConseil\",\"CyberSecMonth\",\"CyberSecMonth\",\"CyberS\u00e9curit\u00e9\"],\"articleSection\":[\"Actualit\u00e9s\",\"CyberSecMonth\",\"CyberSecMonth\",\"News &amp; Events\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/connaitre-le-systeme-dinformation-cybersecmonth-2\\\/\",\"url\":\"https:\\\/\\\/www.tranquil.it\\\/connaitre-le-systeme-dinformation-cybersecmonth-2\\\/\",\"name\":\"Know the information system #CyberSecMonth - Blog Tranquil IT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/connaitre-le-systeme-dinformation-cybersecmonth-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/connaitre-le-systeme-dinformation-cybersecmonth-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.tranquil.it\\\/wp-content\\\/uploads\\\/Mockup17.png\",\"datePublished\":\"2018-10-25T12:07:50+00:00\",\"dateModified\":\"2025-07-18T09:06:52+00:00\",\"description\":\"Knowing your information system makes it easier to maintain it regularly. Optimize your information system by knowing it by heart!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/connaitre-le-systeme-dinformation-cybersecmonth-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.tranquil.it\\\/connaitre-le-systeme-dinformation-cybersecmonth-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/connaitre-le-systeme-dinformation-cybersecmonth-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.tranquil.it\\\/wp-content\\\/uploads\\\/Mockup17.png\",\"contentUrl\":\"https:\\\/\\\/www.tranquil.it\\\/wp-content\\\/uploads\\\/Mockup17.png\",\"width\":423,\"height\":260,\"caption\":\"cadenas s\u00e9curit\u00e9\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/connaitre-le-systeme-dinformation-cybersecmonth-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.tranquil.it\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Know the information system #CyberSecMonth\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/#website\",\"url\":\"https:\\\/\\\/www.tranquil.it\\\/\",\"name\":\"Tranquil IT\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.tranquil.it\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/#organization\",\"name\":\"Tranquil IT\",\"url\":\"https:\\\/\\\/www.tranquil.it\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.tranquil.it\\\/wp-content\\\/uploads\\\/logo-Tranquil-IT-couleurs-RVB.png\",\"contentUrl\":\"https:\\\/\\\/www.tranquil.it\\\/wp-content\\\/uploads\\\/logo-Tranquil-IT-couleurs-RVB.png\",\"width\":600,\"height\":180,\"caption\":\"Tranquil IT\"},\"image\":{\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/TRANQUIL_IT\",\"http:\\\/\\\/linkedin.com\\\/company\\\/tranquil-it\",\"http:\\\/\\\/www.youtube.com\\\/c\\\/TranquilITSystems\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/#\\\/schema\\\/person\\\/ca2d8c4fc6339e7946b5d62845bb0d70\",\"name\":\"admin-site\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Know the information system #CyberSecMonth - Blog Tranquil IT","description":"Knowing your information system makes it easier to maintain it regularly. Optimize your information system by knowing it by heart!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tranquil.it\/connaitre-le-systeme-dinformation-cybersecmonth-2\/","og_locale":"en_US","og_type":"article","og_title":"Know the information system #CyberSecMonth - Blog Tranquil IT","og_description":"Knowing your information system makes it easier to maintain it regularly. Optimize your information system by knowing it by heart!","og_url":"https:\/\/www.tranquil.it\/connaitre-le-systeme-dinformation-cybersecmonth-2\/","og_site_name":"Tranquil IT","article_published_time":"2018-10-25T12:07:50+00:00","article_modified_time":"2025-07-18T09:06:52+00:00","og_image":[{"width":702,"height":498,"url":"https:\/\/www.tranquil.it\/wp-content\/uploads\/cybersecmonth_vignette2.png","type":"image\/png"}],"author":"admin-site","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.tranquil.it\/wp-content\/uploads\/cybersecmonth_vignette2.png","twitter_creator":"@TRANQUIL_IT","twitter_site":"@TRANQUIL_IT","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tranquil.it\/connaitre-le-systeme-dinformation-cybersecmonth-2\/#article","isPartOf":{"@id":"https:\/\/www.tranquil.it\/connaitre-le-systeme-dinformation-cybersecmonth-2\/"},"author":{"name":"admin-site","@id":"https:\/\/www.tranquil.it\/#\/schema\/person\/ca2d8c4fc6339e7946b5d62845bb0d70"},"headline":"Know the information system #CyberSecMonth","datePublished":"2018-10-25T12:07:50+00:00","dateModified":"2025-07-18T09:06:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tranquil.it\/connaitre-le-systeme-dinformation-cybersecmonth-2\/"},"wordCount":1932,"publisher":{"@id":"https:\/\/www.tranquil.it\/#organization"},"image":{"@id":"https:\/\/www.tranquil.it\/connaitre-le-systeme-dinformation-cybersecmonth-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tranquil.it\/wp-content\/uploads\/Mockup17.png","keywords":["CyberConseil","CyberConseil","CyberSecMonth","CyberSecMonth","CyberS\u00e9curit\u00e9"],"articleSection":["Actualit\u00e9s","CyberSecMonth","CyberSecMonth","News &amp; Events"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.tranquil.it\/connaitre-le-systeme-dinformation-cybersecmonth-2\/","url":"https:\/\/www.tranquil.it\/connaitre-le-systeme-dinformation-cybersecmonth-2\/","name":"Know the information system #CyberSecMonth - Blog Tranquil IT","isPartOf":{"@id":"https:\/\/www.tranquil.it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tranquil.it\/connaitre-le-systeme-dinformation-cybersecmonth-2\/#primaryimage"},"image":{"@id":"https:\/\/www.tranquil.it\/connaitre-le-systeme-dinformation-cybersecmonth-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tranquil.it\/wp-content\/uploads\/Mockup17.png","datePublished":"2018-10-25T12:07:50+00:00","dateModified":"2025-07-18T09:06:52+00:00","description":"Knowing your information system makes it easier to maintain it regularly. Optimize your information system by knowing it by heart!","breadcrumb":{"@id":"https:\/\/www.tranquil.it\/connaitre-le-systeme-dinformation-cybersecmonth-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tranquil.it\/connaitre-le-systeme-dinformation-cybersecmonth-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tranquil.it\/connaitre-le-systeme-dinformation-cybersecmonth-2\/#primaryimage","url":"https:\/\/www.tranquil.it\/wp-content\/uploads\/Mockup17.png","contentUrl":"https:\/\/www.tranquil.it\/wp-content\/uploads\/Mockup17.png","width":423,"height":260,"caption":"cadenas s\u00e9curit\u00e9"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tranquil.it\/connaitre-le-systeme-dinformation-cybersecmonth-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.tranquil.it\/"},{"@type":"ListItem","position":2,"name":"Know the information system #CyberSecMonth"}]},{"@type":"WebSite","@id":"https:\/\/www.tranquil.it\/#website","url":"https:\/\/www.tranquil.it\/","name":"Tranquil IT","description":"","publisher":{"@id":"https:\/\/www.tranquil.it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tranquil.it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.tranquil.it\/#organization","name":"Tranquil IT","url":"https:\/\/www.tranquil.it\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tranquil.it\/#\/schema\/logo\/image\/","url":"https:\/\/www.tranquil.it\/wp-content\/uploads\/logo-Tranquil-IT-couleurs-RVB.png","contentUrl":"https:\/\/www.tranquil.it\/wp-content\/uploads\/logo-Tranquil-IT-couleurs-RVB.png","width":600,"height":180,"caption":"Tranquil IT"},"image":{"@id":"https:\/\/www.tranquil.it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/TRANQUIL_IT","http:\/\/linkedin.com\/company\/tranquil-it","http:\/\/www.youtube.com\/c\/TranquilITSystems"]},{"@type":"Person","@id":"https:\/\/www.tranquil.it\/#\/schema\/person\/ca2d8c4fc6339e7946b5d62845bb0d70","name":"admin-site"}]}},"_links":{"self":[{"href":"https:\/\/www.tranquil.it\/en\/wp-json\/wp\/v2\/posts\/35915","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tranquil.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tranquil.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tranquil.it\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tranquil.it\/en\/wp-json\/wp\/v2\/comments?post=35915"}],"version-history":[{"count":2,"href":"https:\/\/www.tranquil.it\/en\/wp-json\/wp\/v2\/posts\/35915\/revisions"}],"predecessor-version":[{"id":39487,"href":"https:\/\/www.tranquil.it\/en\/wp-json\/wp\/v2\/posts\/35915\/revisions\/39487"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tranquil.it\/en\/wp-json\/wp\/v2\/media\/28324"}],"wp:attachment":[{"href":"https:\/\/www.tranquil.it\/en\/wp-json\/wp\/v2\/media?parent=35915"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tranquil.it\/en\/wp-json\/wp\/v2\/categories?post=35915"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tranquil.it\/en\/wp-json\/wp\/v2\/tags?post=35915"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}