{"id":40585,"date":"2023-01-19T04:39:01","date_gmt":"2023-01-19T09:39:01","guid":{"rendered":"https:\/\/wp266329.wpdns.ca\/la-fonction-%e2%80%afproteger%e2%80%af-de-la-cybersecurite\/"},"modified":"2025-04-07T15:06:39","modified_gmt":"2025-04-07T19:06:39","slug":"the-protect-function-of-cybersecurity","status":"publish","type":"post","link":"https:\/\/eficio.ca\/en\/blog\/the-protect-function-of-cybersecurity\/","title":{"rendered":"The \u201cProtect\u201d function of cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"40585\" class=\"elementor elementor-40585 elementor-39616\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3a66d0e elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3a66d0e\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0eb5465\" data-id=\"0eb5465\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-558ed1b elementor-widget elementor-widget-heading\" data-id=\"558ed1b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-xl\">The \u201cProtect\u201d function of cybersecurity <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-318e040 elementor-widget elementor-widget-image\" data-id=\"318e040\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1732\" height=\"684\" src=\"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/3-1.jpg\" class=\"attachment-full size-full wp-image-40586\" alt=\"The \u201cProtect\u201d function of cybersecurity\" srcset=\"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/3-1.jpg 1732w, https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/3-1-300x118.jpg 300w, https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/3-1-1024x404.jpg 1024w, https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/3-1-768x303.jpg 768w, https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/3-1-1536x607.jpg 1536w, https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/3-1-700x276.jpg 700w\" sizes=\"(max-width: 1732px) 100vw, 1732px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b4c256c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b4c256c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2ecc4d8\" data-id=\"2ecc4d8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5bb7265 elementor-widget elementor-widget-text-editor\" data-id=\"5bb7265\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #000000;\"><span style=\"font-size: 17px;\">Our <a href=\"https:\/\/eficio.ca\/en\/digital-products\/ciso360-cyberrisk-control\/\"><strong>CISO-360 CyberRisk Control<\/strong><\/a> intervention and diagnosis plan enables organizational managers to take control of cybersecurity risk management. In the previous article, I discussed the &#8220;identify&#8221; function, which allows you to create an inventory of assets, assess their criticality and vulnerability. In this article, I will discuss the &#8220;protect&#8221; function, which is the logical continuation of a cybersecurity program.<\/span> <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d1baa70 elementor-widget elementor-widget-testimonial\" data-id=\"d1baa70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"testimonial.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial-wrapper\">\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-testimonial-meta elementor-has-image elementor-testimonial-image-position-aside\">\n\t\t\t\t<div class=\"elementor-testimonial-meta-inner\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-image\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/eficio.ca\/wp-content\/uploads\/2022\/11\/Pierre-F-Eficio.png\" class=\"attachment-full size-full wp-image-39547\" alt=\"\" srcset=\"https:\/\/eficio.ca\/wp-content\/uploads\/2022\/11\/Pierre-F-Eficio.png 500w, https:\/\/eficio.ca\/wp-content\/uploads\/2022\/11\/Pierre-F-Eficio-300x300.png 300w, https:\/\/eficio.ca\/wp-content\/uploads\/2022\/11\/Pierre-F-Eficio-150x150.png 150w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-details\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-name\">Pierre Farley<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-job\">Eficio Partner and CIO<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7244782 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7244782\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7d5ce51\" data-id=\"7d5ce51\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5d9323c elementor-widget elementor-widget-text-editor\" data-id=\"5d9323c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 17px;\">The &#8220;protect&#8221; function includes all measures aimed at preventing and limiting the impacts of a cyberattack. A good understanding of your data, as well as the criticality of your sensitive systems, will guide you towards the protection strategy to be put in place. Several means of protection must be considered:<\/span><\/p><p style=\"text-align: left; padding-left: 40px;\"><span style=\"color: #000000; font-size: 17px;\"><b>\u2022 <\/b><strong>Access control:<\/strong> Limiting access to data and certain systems based on privileges\/roles is one of the controls that should be implemented. Too often we see organizations giving non-essential access to critical or personal data to their employees.<\/span><\/p><p style=\"text-align: left; padding-left: 40px;\"><span style=\"color: #000000; font-size: 17px;\"><strong><b>\u2022<\/b>\u00a0Zone segmentation:<\/strong> A second control to deploy is to limit the impact of a potential cyberattack, for example, by logically segmenting information systems. Thus, a cyberattacker infiltrating a particular segment would only have a limited impact.<\/span><\/p><p style=\"padding-left: 40px;\"><span style=\"color: #000000; font-size: 17px;\"><strong><b>\u2022 <\/b>Information protection processes and procedures:<\/strong> Security policies and procedures should be put in place. This makes it possible to monitor and measure the protection of the organization&#8217;s assets and information systems.<\/span><\/p><p style=\"padding-left: 40px;\"><span style=\"color: #000000; font-size: 17px;\"><strong><b>\u2022 <\/b>Maintenance:<\/strong> Upgrading systems remains essential to keep them up to date and benefit from recent control measures.<\/span><\/p><p style=\"padding-left: 40px;\"><span style=\"color: #000000; font-size: 17px;\"><b>\u2022 <\/b><strong>Protection technology:<\/strong> Automated tools can be used to monitor optimal system security.<\/span><\/p><p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 17px;\">With the implementation of new laws on the protection of personal information, such as Law 25 in Quebec, data protection is no longer an option; it is now an obligation. <\/span><br \/><span style=\"color: #000000; font-size: 17px;\">The finance manager understands the value of financial data very well and ensures that access to information is limited. Financial controls include methodologies and processes to validate the source and accuracy of data. In a cybersecurity context, the &#8220;protect&#8221; function is the application of these measures at the global level in the organization. <\/span><br \/><span style=\"color: #000000; font-size: 17px;\">Eficio&#8217;s executive resources, who perform the <a href=\"https:\/\/eficio.ca\/en\/digital-products\/ciso360-cyberrisk-control\/\"><strong>CISO-360 Cyber Risk Control diagnostic<\/strong><\/a>, will be able to identify the maturity and risks of your organization. Their expertise in cybersecurity and executive experience will bring you significant assets. <\/span><br \/><span style=\"color: #000000; font-size: 17px;\">If you want to react to this article or obtain more information, do not hesitate to <a href=\"\/en\/contact\">contact<\/a> Eficio. <\/span><br \/><span style=\"color: #000000;\"><span style=\"font-size: 17px;\">All articles in our folder are available via the following links:&#8221;<\/span> <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f08519e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f08519e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0947d1a\" data-id=\"0947d1a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e563d30 elementor-widget elementor-widget-text-editor\" data-id=\"e563d30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"padding-left: 40px;\"><span style=\"color: #ff6600;\"><strong><span style=\"font-size: 17px;\"><a style=\"color: #ff6600;\" href=\"https:\/\/eficio.ca\/en\/blog\/a-cyberrisk-control-approach-based-on-a-financial-control-model\/\">\u2022 A Cyber Risk control approach based on a financial control model<\/a><\/span><\/strong><\/span><br \/><span style=\"color: #ff6600;\"><strong><span style=\"font-size: 17px;\"><a style=\"color: #ff6600;\" href=\"https:\/\/eficio.ca\/en\/blog\/the-identify-function-of-cybersecurity\/\">\u2022 The \u201cIdentify\u201d function of cybersecurity<\/a><\/span><\/strong><\/span><br \/><span style=\"color: #ff6600;\"><strong><span style=\"font-size: 17px;\"><a style=\"color: #ff6600;\" href=\"https:\/\/eficio.ca\/en\/blog\/the-protect-function-of-cybersecurity\/\">\u2022 The \u201cProtect\u201d function of cybersecurity<\/a><\/span><\/strong><\/span><br \/><span style=\"color: #ff6600;\"><strong><span style=\"font-size: 17px;\"><a style=\"color: #ff6600;\" href=\"https:\/\/eficio.ca\/en\/blog\/the-detect-function-of-cybersecurity\/\">\u2022 The \u201cDetect\u201d function of cybersecurity<\/a><\/span><\/strong><\/span><br \/><span style=\"color: #ff6600;\"><strong><span style=\"font-size: 17px;\"><a style=\"color: #ff6600;\" href=\"https:\/\/eficio.ca\/en\/blog\/the-response-function-in-cybersecurity\/\">\u2022 The \u201cResponse\u201d function of cybersecurity<\/a><\/span><\/strong><\/span><br \/><span style=\"color: #ff6600;\"><strong><span style=\"font-size: 17px;\"><a style=\"color: #ff6600;\" href=\"https:\/\/eficio.ca\/en\/blog\/the-recover-function-of-cybersecurity\/\">\u2022 The \u201cRecover\u201d function of cybersecurity<\/a><\/span><\/strong><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1c3df4a elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1c3df4a\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-41d59b9\" data-id=\"41d59b9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-427dad4 elementor-widget elementor-widget-text-editor\" data-id=\"427dad4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\"><span style=\"color: #ffffff;\">Subscribe to the Eficio newsletter and be the first to receive our updates!<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-29643a5\" data-id=\"29643a5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5d528fe elementor-align-right elementor-mobile-align-left elementor-widget elementor-widget-button\" data-id=\"5d528fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"https:\/\/nut.sh\/ell\/forms\/201665\/wdp0yC\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Subscribe<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The \u201cProtect\u201d function of cybersecurity Our CISO-360 CyberRisk Control intervention and diagnosis plan enables organizational managers to take control of cybersecurity risk management. In the previous article, I discussed the &#8220;identify&#8221; function, which allows you to create an inventory of assets, assess their criticality and&#8230;<\/p>\n","protected":false},"author":4,"featured_media":40697,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"_acf_changed":false,"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[727],"tags":[292,293,295],"class_list":["post-40585","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite","tag-cyberrisque-en","tag-cybersecurite-en","tag-diagnostic-ti-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The \u201cProtect\u201d function of cybersecurity - Eficio<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eficio.ca\/en\/blog\/the-protect-function-of-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The \u201cProtect\u201d function of cybersecurity\" \/>\n<meta property=\"og:description\" content=\"The \u201cProtect\u201d function of cybersecurity Our CISO-360 CyberRisk Control intervention and diagnosis plan enables organizational managers to take control of cybersecurity risk management. In the previous article, I discussed the &#8220;identify&#8221; function, which allows you to create an inventory of assets, assess their criticality and...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eficio.ca\/en\/blog\/the-protect-function-of-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Eficio\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Eficio.ca\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-19T09:39:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-07T19:06:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/3-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"684\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alain Marchildon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alain Marchildon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-protect-function-of-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-protect-function-of-cybersecurity\\\/\"},\"author\":{\"name\":\"Alain Marchildon\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#\\\/schema\\\/person\\\/87b4a66e70dfd073460fc0962d1d7093\"},\"headline\":\"The \u201cProtect\u201d function of cybersecurity\",\"datePublished\":\"2023-01-19T09:39:01+00:00\",\"dateModified\":\"2025-04-07T19:06:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-protect-function-of-cybersecurity\\\/\"},\"wordCount\":457,\"publisher\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-protect-function-of-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/3-2.jpg\",\"keywords\":[\"cyberrisque\",\"Cybers\u00e9curit\u00e9\",\"diagnostic TI\"],\"articleSection\":[\"Cybers\u00e9curit\u00e9\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-protect-function-of-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-protect-function-of-cybersecurity\\\/\",\"name\":\"The \u201cProtect\u201d function of cybersecurity - Eficio\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-protect-function-of-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-protect-function-of-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/3-2.jpg\",\"datePublished\":\"2023-01-19T09:39:01+00:00\",\"dateModified\":\"2025-04-07T19:06:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-protect-function-of-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-protect-function-of-cybersecurity\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-protect-function-of-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/eficio.ca\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The \u201cProtect\u201d function of cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/eficio.ca\\\/en\\\/\",\"name\":\"Eficio\",\"description\":\"CIO disponibles selon vos besoins\",\"publisher\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/eficio.ca\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#organization\",\"name\":\"Eficio\",\"url\":\"https:\\\/\\\/eficio.ca\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Eficio_logo_blanc_fond_orange@300ppi.jpg\",\"contentUrl\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Eficio_logo_blanc_fond_orange@300ppi.jpg\",\"width\":880,\"height\":361,\"caption\":\"Eficio\"},\"image\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Eficio.ca\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/integra-co\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#\\\/schema\\\/person\\\/87b4a66e70dfd073460fc0962d1d7093\",\"name\":\"Alain Marchildon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/litespeed\\\/avatar\\\/0361efece92f87240fce35cf86e0092e.jpg?ver=1777403568\",\"url\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/litespeed\\\/avatar\\\/0361efece92f87240fce35cf86e0092e.jpg?ver=1777403568\",\"contentUrl\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/litespeed\\\/avatar\\\/0361efece92f87240fce35cf86e0092e.jpg?ver=1777403568\",\"caption\":\"Alain Marchildon\"},\"url\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/author\\\/amarchildon\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The \u201cProtect\u201d function of cybersecurity - Eficio","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eficio.ca\/en\/blog\/the-protect-function-of-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"The \u201cProtect\u201d function of cybersecurity","og_description":"The \u201cProtect\u201d function of cybersecurity Our CISO-360 CyberRisk Control intervention and diagnosis plan enables organizational managers to take control of cybersecurity risk management. In the previous article, I discussed the &#8220;identify&#8221; function, which allows you to create an inventory of assets, assess their criticality and...","og_url":"https:\/\/eficio.ca\/en\/blog\/the-protect-function-of-cybersecurity\/","og_site_name":"Eficio","article_publisher":"https:\/\/www.facebook.com\/Eficio.ca\/","article_published_time":"2023-01-19T09:39:01+00:00","article_modified_time":"2025-04-07T19:06:39+00:00","og_image":[{"width":1000,"height":684,"url":"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/3-2.jpg","type":"image\/jpeg"}],"author":"Alain Marchildon","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alain Marchildon","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eficio.ca\/en\/blog\/the-protect-function-of-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/eficio.ca\/en\/blog\/the-protect-function-of-cybersecurity\/"},"author":{"name":"Alain Marchildon","@id":"https:\/\/eficio.ca\/en\/#\/schema\/person\/87b4a66e70dfd073460fc0962d1d7093"},"headline":"The \u201cProtect\u201d function of cybersecurity","datePublished":"2023-01-19T09:39:01+00:00","dateModified":"2025-04-07T19:06:39+00:00","mainEntityOfPage":{"@id":"https:\/\/eficio.ca\/en\/blog\/the-protect-function-of-cybersecurity\/"},"wordCount":457,"publisher":{"@id":"https:\/\/eficio.ca\/en\/#organization"},"image":{"@id":"https:\/\/eficio.ca\/en\/blog\/the-protect-function-of-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/3-2.jpg","keywords":["cyberrisque","Cybers\u00e9curit\u00e9","diagnostic TI"],"articleSection":["Cybers\u00e9curit\u00e9"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/eficio.ca\/en\/blog\/the-protect-function-of-cybersecurity\/","url":"https:\/\/eficio.ca\/en\/blog\/the-protect-function-of-cybersecurity\/","name":"The \u201cProtect\u201d function of cybersecurity - Eficio","isPartOf":{"@id":"https:\/\/eficio.ca\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eficio.ca\/en\/blog\/the-protect-function-of-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/eficio.ca\/en\/blog\/the-protect-function-of-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/3-2.jpg","datePublished":"2023-01-19T09:39:01+00:00","dateModified":"2025-04-07T19:06:39+00:00","breadcrumb":{"@id":"https:\/\/eficio.ca\/en\/blog\/the-protect-function-of-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eficio.ca\/en\/blog\/the-protect-function-of-cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/eficio.ca\/en\/blog\/the-protect-function-of-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/eficio.ca\/en\/"},{"@type":"ListItem","position":2,"name":"The \u201cProtect\u201d function of cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/eficio.ca\/en\/#website","url":"https:\/\/eficio.ca\/en\/","name":"Eficio","description":"CIO disponibles selon vos besoins","publisher":{"@id":"https:\/\/eficio.ca\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eficio.ca\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/eficio.ca\/en\/#organization","name":"Eficio","url":"https:\/\/eficio.ca\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eficio.ca\/en\/#\/schema\/logo\/image\/","url":"https:\/\/eficio.ca\/wp-content\/uploads\/2024\/12\/Eficio_logo_blanc_fond_orange@300ppi.jpg","contentUrl":"https:\/\/eficio.ca\/wp-content\/uploads\/2024\/12\/Eficio_logo_blanc_fond_orange@300ppi.jpg","width":880,"height":361,"caption":"Eficio"},"image":{"@id":"https:\/\/eficio.ca\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Eficio.ca\/","https:\/\/www.linkedin.com\/company\/integra-co\/"]},{"@type":"Person","@id":"https:\/\/eficio.ca\/en\/#\/schema\/person\/87b4a66e70dfd073460fc0962d1d7093","name":"Alain Marchildon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eficio.ca\/wp-content\/litespeed\/avatar\/0361efece92f87240fce35cf86e0092e.jpg?ver=1777403568","url":"https:\/\/eficio.ca\/wp-content\/litespeed\/avatar\/0361efece92f87240fce35cf86e0092e.jpg?ver=1777403568","contentUrl":"https:\/\/eficio.ca\/wp-content\/litespeed\/avatar\/0361efece92f87240fce35cf86e0092e.jpg?ver=1777403568","caption":"Alain Marchildon"},"url":"https:\/\/eficio.ca\/en\/blog\/author\/amarchildon\/"}]}},"_links":{"self":[{"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/posts\/40585","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/comments?post=40585"}],"version-history":[{"count":14,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/posts\/40585\/revisions"}],"predecessor-version":[{"id":49383,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/posts\/40585\/revisions\/49383"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/media\/40697"}],"wp:attachment":[{"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/media?parent=40585"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/categories?post=40585"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/tags?post=40585"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}