{"id":40796,"date":"2023-03-27T18:00:20","date_gmt":"2023-03-27T22:00:20","guid":{"rendered":"https:\/\/wp266329.wpdns.ca\/?p=40796"},"modified":"2024-12-15T08:02:23","modified_gmt":"2024-12-15T13:02:23","slug":"how-to-organize-cyber-security-for-smes","status":"publish","type":"post","link":"https:\/\/eficio.ca\/en\/blog\/how-to-organize-cyber-security-for-smes\/","title":{"rendered":"How to organize Cyber security for SME"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"40796\" class=\"elementor elementor-40796 elementor-38650\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-782b9da elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"782b9da\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f085608\" data-id=\"f085608\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-33ab9ea elementor-widget elementor-widget-text-editor\" data-id=\"33ab9ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\"><span style=\"font-size: 17px; color: #000000;\">&#8220;The executive role of cybersecurity is important for any type of organization. There are cost-effective solutions to ensure good governance of cyber risks for organizations of all sizes. A <a style=\"color: #000000;\" href=\"https:\/\/eficio.ca\/en\/digital-products\/ciso360-cyberrisk-control\/\"><strong>CISO-360 diagnosis<\/strong><\/a> can indicate how to remedy the situation.&#8221;<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4f06166 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4f06166\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-eef8dcf\" data-id=\"eef8dcf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-35c815a elementor-widget elementor-widget-testimonial\" data-id=\"35c815a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"testimonial.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial-wrapper\">\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-testimonial-meta elementor-has-image elementor-testimonial-image-position-aside\">\n\t\t\t\t<div class=\"elementor-testimonial-meta-inner\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-image\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/eficio.ca\/wp-content\/uploads\/2022\/11\/Pierre-F-Eficio.png\" class=\"attachment-full size-full wp-image-39547\" alt=\"\" srcset=\"https:\/\/eficio.ca\/wp-content\/uploads\/2022\/11\/Pierre-F-Eficio.png 500w, https:\/\/eficio.ca\/wp-content\/uploads\/2022\/11\/Pierre-F-Eficio-300x300.png 300w, https:\/\/eficio.ca\/wp-content\/uploads\/2022\/11\/Pierre-F-Eficio-150x150.png 150w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-details\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-name\">Pierre Farley<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-job\">Associate &amp; CISO on demand<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7df017c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7df017c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4038cf8\" data-id=\"4038cf8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c4816a4 elementor-widget elementor-widget-text-editor\" data-id=\"c4816a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-size: 17px; color: #000000;\">Best cybersecurity governance practices dictate that we separate the roles of the security officer (CISO) and the IT manager (CIO). But is this possible for a small organization?<\/span><\/p><p><span style=\"font-size: 17px; color: #000000;\">I have observed how security governance is organized among many clients. The financial and human capacity of smaller organizations forces them to pair these roles, and that is entirely understandable. However, these two roles can be contradictory. The CIO&#8217;s priority is to ensure that systems are available as quickly and easily as possible, while the CISO&#8217;s role is to put controls in place that can make systems more difficult to access. Which action takes priority? Availability. A concrete example: if the technician responsible for daily security control checks receives user requests because a system is unavailable, their priority will be dedicated to addressing it. The IT team will be judged on their responsiveness to users. This is the right behavior to adopt, but at the expense of cybersecurity.<\/span><\/p><p><span style=\"font-size: 17px; color: #000000;\">There are several options to remedy this. One option is to outsource cybersecurity monitoring services. The options are numerous, and organizations will have access to tools and a team with a very high level of knowledge of cyber threats. But this is not enough. A healthy cybersecurity program includes hundreds of controls, both strategic and tactical. Putting them in place and maintaining them requires rigor.<\/span><\/p><p><span style=\"font-size: 17px; color: #000000;\">This is where the CISO comes in on demand. An external, qualified, and neutral security officer. Executives must have a clear way to assess and understand, in clear language, the level of risk of their organization at all times. Attacks are a real risk for organizations, and experiencing one can freeze operations for several weeks. By outsourcing cybersecurity monitoring services or hiring an external security officer, small organizations can access cybersecurity experts to help them implement these security practices. This also allows them to benefit from an independent evaluation of their cybersecurity program to identify risk areas and necessary improvements.<\/span><\/p><p><span style=\"font-size: 17px; color: #000000;\">Companies conduct financial audits to validate the regularity, compliance, and ensure an accurate view of the accounting state. This is precisely what organizations must do with their cybersecurity program.<\/span><\/p><p><span style=\"font-size: 17px; color: #000000;\">We invite you to<a style=\"color: #000000;\" href=\"https:\/\/eficio.ca\/en\/contact\/\"><strong> contact us<\/strong><\/a> if you want more information on this topic and visit the <a style=\"color: #000000;\" href=\"https:\/\/eficio.ca\/en\/\"><strong>Eficio website.<\/strong><\/a> We have a range of strategic solutions that allow organizations to manage their cyberrisks.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fd40d68 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fd40d68\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ed3a804\" data-id=\"ed3a804\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e2d7dfb elementor-widget elementor-widget-text-editor\" data-id=\"e2d7dfb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\"><span style=\"color: #ffffff;\">Subscribe to the Eficio newsletter and be the first to receive our updates!<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4722d88\" data-id=\"4722d88\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8188fe9 elementor-align-right elementor-mobile-align-left elementor-widget elementor-widget-button\" data-id=\"8188fe9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"https:\/\/nut.sh\/ell\/forms\/201665\/wdp0yC\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Subscribe<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>&#8220;The executive role of cybersecurity is important for any type of organization. There are cost-effective solutions to ensure good governance of cyber risks for organizations of all sizes. A CISO-360 diagnosis can indicate how to remedy the situation.&#8221; Pierre Farley Associate &amp; CISO on demand&#8230;<\/p>\n","protected":false},"author":4,"featured_media":40811,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"cybocfi_hide_featured_image":"","footnotes":""},"categories":[244,814],"tags":[274,292,293,306,277,307],"class_list":["post-40796","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles-en","category-cybersecurity","tag-audit-en","tag-cyberrisque-en","tag-cybersecurite-en","tag-gouvernance-en","tag-organization","tag-securite-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to organize Cyber security for SME - Eficio<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eficio.ca\/en\/blog\/how-to-organize-cyber-security-for-smes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to organize Cyber security for SME\" \/>\n<meta property=\"og:description\" content=\"&#8220;The executive role of cybersecurity is important for any type of organization. There are cost-effective solutions to ensure good governance of cyber risks for organizations of all sizes. A CISO-360 diagnosis can indicate how to remedy the situation.&#8221; Pierre Farley Associate &amp; CISO on demand...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eficio.ca\/en\/blog\/how-to-organize-cyber-security-for-smes\/\" \/>\n<meta property=\"og:site_name\" content=\"Eficio\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Eficio.ca\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-27T22:00:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-15T13:02:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/03\/Cybersecurity-best-practices-for-SMEs.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1732\" \/>\n\t<meta property=\"og:image:height\" content=\"684\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alain Marchildon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alain Marchildon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/how-to-organize-cyber-security-for-smes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/how-to-organize-cyber-security-for-smes\\\/\"},\"author\":{\"name\":\"Alain Marchildon\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#\\\/schema\\\/person\\\/87b4a66e70dfd073460fc0962d1d7093\"},\"headline\":\"How to organize Cyber security for SME\",\"datePublished\":\"2023-03-27T22:00:20+00:00\",\"dateModified\":\"2024-12-15T13:02:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/how-to-organize-cyber-security-for-smes\\\/\"},\"wordCount\":451,\"publisher\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/how-to-organize-cyber-security-for-smes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Cybersecurity-best-practices-for-SMEs.jpg\",\"keywords\":[\"audit\",\"cyberrisque\",\"Cybers\u00e9curit\u00e9\",\"Gouvernance\",\"Organization\",\"S\u00e9curit\u00e9\"],\"articleSection\":[\"Articles\",\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/how-to-organize-cyber-security-for-smes\\\/\",\"url\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/how-to-organize-cyber-security-for-smes\\\/\",\"name\":\"How to organize Cyber security for SME - Eficio\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/how-to-organize-cyber-security-for-smes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/how-to-organize-cyber-security-for-smes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Cybersecurity-best-practices-for-SMEs.jpg\",\"datePublished\":\"2023-03-27T22:00:20+00:00\",\"dateModified\":\"2024-12-15T13:02:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/how-to-organize-cyber-security-for-smes\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/how-to-organize-cyber-security-for-smes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/how-to-organize-cyber-security-for-smes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Cybersecurity-best-practices-for-SMEs.jpg\",\"contentUrl\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Cybersecurity-best-practices-for-SMEs.jpg\",\"width\":1732,\"height\":684,\"caption\":\"Cybersecurity best practices for SMEs\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/how-to-organize-cyber-security-for-smes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/eficio.ca\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to organize Cyber security for SME\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/eficio.ca\\\/en\\\/\",\"name\":\"Eficio\",\"description\":\"CIO disponibles selon vos besoins\",\"publisher\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/eficio.ca\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#organization\",\"name\":\"Eficio\",\"url\":\"https:\\\/\\\/eficio.ca\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Eficio_logo_blanc_fond_orange@300ppi.jpg\",\"contentUrl\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Eficio_logo_blanc_fond_orange@300ppi.jpg\",\"width\":880,\"height\":361,\"caption\":\"Eficio\"},\"image\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Eficio.ca\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/integra-co\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#\\\/schema\\\/person\\\/87b4a66e70dfd073460fc0962d1d7093\",\"name\":\"Alain Marchildon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/litespeed\\\/avatar\\\/0361efece92f87240fce35cf86e0092e.jpg?ver=1778008483\",\"url\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/litespeed\\\/avatar\\\/0361efece92f87240fce35cf86e0092e.jpg?ver=1778008483\",\"contentUrl\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/litespeed\\\/avatar\\\/0361efece92f87240fce35cf86e0092e.jpg?ver=1778008483\",\"caption\":\"Alain Marchildon\"},\"url\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/author\\\/amarchildon\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to organize Cyber security for SME - Eficio","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eficio.ca\/en\/blog\/how-to-organize-cyber-security-for-smes\/","og_locale":"en_US","og_type":"article","og_title":"How to organize Cyber security for SME","og_description":"&#8220;The executive role of cybersecurity is important for any type of organization. There are cost-effective solutions to ensure good governance of cyber risks for organizations of all sizes. A CISO-360 diagnosis can indicate how to remedy the situation.&#8221; Pierre Farley Associate &amp; CISO on demand...","og_url":"https:\/\/eficio.ca\/en\/blog\/how-to-organize-cyber-security-for-smes\/","og_site_name":"Eficio","article_publisher":"https:\/\/www.facebook.com\/Eficio.ca\/","article_published_time":"2023-03-27T22:00:20+00:00","article_modified_time":"2024-12-15T13:02:23+00:00","og_image":[{"width":1732,"height":684,"url":"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/03\/Cybersecurity-best-practices-for-SMEs.jpg","type":"image\/jpeg"}],"author":"Alain Marchildon","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alain Marchildon","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eficio.ca\/en\/blog\/how-to-organize-cyber-security-for-smes\/#article","isPartOf":{"@id":"https:\/\/eficio.ca\/en\/blog\/how-to-organize-cyber-security-for-smes\/"},"author":{"name":"Alain Marchildon","@id":"https:\/\/eficio.ca\/en\/#\/schema\/person\/87b4a66e70dfd073460fc0962d1d7093"},"headline":"How to organize Cyber security for SME","datePublished":"2023-03-27T22:00:20+00:00","dateModified":"2024-12-15T13:02:23+00:00","mainEntityOfPage":{"@id":"https:\/\/eficio.ca\/en\/blog\/how-to-organize-cyber-security-for-smes\/"},"wordCount":451,"publisher":{"@id":"https:\/\/eficio.ca\/en\/#organization"},"image":{"@id":"https:\/\/eficio.ca\/en\/blog\/how-to-organize-cyber-security-for-smes\/#primaryimage"},"thumbnailUrl":"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/03\/Cybersecurity-best-practices-for-SMEs.jpg","keywords":["audit","cyberrisque","Cybers\u00e9curit\u00e9","Gouvernance","Organization","S\u00e9curit\u00e9"],"articleSection":["Articles","Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/eficio.ca\/en\/blog\/how-to-organize-cyber-security-for-smes\/","url":"https:\/\/eficio.ca\/en\/blog\/how-to-organize-cyber-security-for-smes\/","name":"How to organize Cyber security for SME - Eficio","isPartOf":{"@id":"https:\/\/eficio.ca\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eficio.ca\/en\/blog\/how-to-organize-cyber-security-for-smes\/#primaryimage"},"image":{"@id":"https:\/\/eficio.ca\/en\/blog\/how-to-organize-cyber-security-for-smes\/#primaryimage"},"thumbnailUrl":"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/03\/Cybersecurity-best-practices-for-SMEs.jpg","datePublished":"2023-03-27T22:00:20+00:00","dateModified":"2024-12-15T13:02:23+00:00","breadcrumb":{"@id":"https:\/\/eficio.ca\/en\/blog\/how-to-organize-cyber-security-for-smes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eficio.ca\/en\/blog\/how-to-organize-cyber-security-for-smes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eficio.ca\/en\/blog\/how-to-organize-cyber-security-for-smes\/#primaryimage","url":"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/03\/Cybersecurity-best-practices-for-SMEs.jpg","contentUrl":"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/03\/Cybersecurity-best-practices-for-SMEs.jpg","width":1732,"height":684,"caption":"Cybersecurity best practices for SMEs"},{"@type":"BreadcrumbList","@id":"https:\/\/eficio.ca\/en\/blog\/how-to-organize-cyber-security-for-smes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/eficio.ca\/en\/"},{"@type":"ListItem","position":2,"name":"How to organize Cyber security for SME"}]},{"@type":"WebSite","@id":"https:\/\/eficio.ca\/en\/#website","url":"https:\/\/eficio.ca\/en\/","name":"Eficio","description":"CIO disponibles selon vos besoins","publisher":{"@id":"https:\/\/eficio.ca\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eficio.ca\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/eficio.ca\/en\/#organization","name":"Eficio","url":"https:\/\/eficio.ca\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eficio.ca\/en\/#\/schema\/logo\/image\/","url":"https:\/\/eficio.ca\/wp-content\/uploads\/2024\/12\/Eficio_logo_blanc_fond_orange@300ppi.jpg","contentUrl":"https:\/\/eficio.ca\/wp-content\/uploads\/2024\/12\/Eficio_logo_blanc_fond_orange@300ppi.jpg","width":880,"height":361,"caption":"Eficio"},"image":{"@id":"https:\/\/eficio.ca\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Eficio.ca\/","https:\/\/www.linkedin.com\/company\/integra-co\/"]},{"@type":"Person","@id":"https:\/\/eficio.ca\/en\/#\/schema\/person\/87b4a66e70dfd073460fc0962d1d7093","name":"Alain Marchildon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eficio.ca\/wp-content\/litespeed\/avatar\/0361efece92f87240fce35cf86e0092e.jpg?ver=1778008483","url":"https:\/\/eficio.ca\/wp-content\/litespeed\/avatar\/0361efece92f87240fce35cf86e0092e.jpg?ver=1778008483","contentUrl":"https:\/\/eficio.ca\/wp-content\/litespeed\/avatar\/0361efece92f87240fce35cf86e0092e.jpg?ver=1778008483","caption":"Alain Marchildon"},"url":"https:\/\/eficio.ca\/en\/blog\/author\/amarchildon\/"}]}},"_links":{"self":[{"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/posts\/40796","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/comments?post=40796"}],"version-history":[{"count":11,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/posts\/40796\/revisions"}],"predecessor-version":[{"id":47807,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/posts\/40796\/revisions\/47807"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/media\/40811"}],"wp:attachment":[{"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/media?parent=40796"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/categories?post=40796"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/tags?post=40796"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}