{"id":22779,"date":"2023-02-09T08:45:15","date_gmt":"2023-02-09T07:45:15","guid":{"rendered":"https:\/\/www.accuracy.com\/cybercrime-is-on-the-rise-is-your-business-prepared\/"},"modified":"2025-10-23T14:50:48","modified_gmt":"2025-10-23T12:50:48","slug":"la-cybercriminalite-est-en-hausse-votre-entreprise-est-elle-preparee","status":"publish","type":"post","link":"https:\/\/www.accuracy.com\/fr\/cybercrime-is-on-the-rise-is-your-business-prepared\/","title":{"rendered":"La cybercriminalit\u00e9 est en hausse - votre entreprise est-elle pr\u00e9par\u00e9e ?"},"content":{"rendered":"<p>This article examines the meaning of the term \u2018cybercrime\u2019 and what drives the criminals responsible. It describes, in layperson\u2019s terms, some of the more prolific attacks that companies and individuals may suffer and highlights the importance of preparing to respond and investigate effectively.<\/p>\n<p>Cybercrime \u2013 old crimes, new tools? This phrase coined in 2001 by the UK National Hi-Tech Crime Unit [1] is a play on the saying \u2018old wine in a new bottle\u2019. It covers any criminal act defined by law or civil wrongdoing perpetrated using a computer or any electronic device, on or off the internet, such as theft, fraud and blackmail. Today we have \u2018new crimes, new tools\u2019, which can only be committed by or rely upon the availability of a computer or other technology, including the internet. This includes malware and virus attacks, denial of service attacks, hacking offences and identity theft. Hence, we have the term \u2018cybercrime\u2019.<\/p>\n<p>Accord<\/p>\n<p>ing to the US Department of Justice, all cybercrime can be organised into three categories:<br \/>\n\u2022 Crimes that use computers as a weapon \u2013 hacker attacks<br \/>\n\u2022 Crimes that target a computer or another device to gain access to a network<br \/>\n\u2022 Crimes where a computer is neither the facilitator nor the target but still plays an integral part in storing illegally obtained proprietary data. [2]<\/p>\n<p>Relevant statistics are escalating, both in scale and in complexity. [3] Cybercrime can affect everyone, from essential services, such as a French hospital in August 2022, [4] to multinational businesses and private individuals. It causes significant network downtime, financial loss and reputational damage. [5] The rise is confirmed by figures released in August 2022 showing that 25,841 people used the Dubai Police e-crime platform on its website in 2021 to report cybercrimes. [6] The 2021 research figures from the UK technology website Comparitech support these statistics because the UAE saw a 79% rise in cybercrime reporting and a loss of $746 million. [7]<\/p>\n<p>In our post-pandemic digital age, most companies conduct their business online using systems, networks, software and applications that instantly connect them anywhere. While this connectivity enables business operations globally, the increased use of connected platforms presents more significant risks than before. As technology grows and our use of it advances, so does cybercrime and the tactics criminals deploy to exploit exposed security systems and the vulnerability of users.<\/p>\n<p>A key consequence of cybercrime is monetary. Cybercrime can embrace various forms of profit-driven criminal activity, including ransomware attacks, email and internet fraud, and identity fraud, as well as endeavours to misuse financial accounts, credit cards or other payment card information.<\/p>\n<p>Although many law enforcement agencies worldwide have started cracking down on cybercrime, the increasing trend shows no sign of decline, especially in ransomware [8] and business email compromises (BEC). [9] Some cybercriminals now reside in countries with weak cybercrime laws. In addition, they have switched from using dollars to cryptocurrencies to avoid prosecution or having their illicit funds seized.<\/p>\n<p>As cited above, there are numerous diverse types of cybercrime. Most cybercrimes are carried out with the anticipation of financial gain by the perpetrators. Some common varieties of cybercrime include the following:<\/p>\n<h4>Ransomware<\/h4>\n<p>This malicious software locks the victim from their computer or blocks access to the files stored on their hard drive.<br \/>\nSince 2013, ransomware has cost businesses and institutions billions of dollars in lost revenue. Criminals will demand bitcoin or other crypto payments to unlock the computer system.<\/p>\n<p>While the significance of cyber security grows, many are still unaware of measures they can implement and actions they can take to mitigate risk, combat cybercrime and protect their future. The reality is that the best way for businesses to protect themselves against cybercrime is to invest in cyber security and understand how new tools can combat new and old crimes.<\/p>\n<h4>Business email compromise<\/h4>\n<p>BEC is a form of email fraud where employees with access to company finances are tricked into making money<br \/>\ntransfers or sharing information by email pretending to be from the CEO or a trusted customer. This cybercrime can<br \/>\ncause substantial financial damage to a company. Investigators and lawyers must work closely with businesses to<br \/>\nquickly assess the situation and provide solutions.<\/p>\n<h4>Phishing<\/h4>\n<p>This type of cybercrime is prevalent. Email fraud is the intentional deception made for personal gain or damage to<br \/>\nanother individual through email. Almost as soon as email became widely used, it began to be used as a means to<br \/>\ndefraud people. Email solicitations to purchase goods or services may be instances of attempted fraud. The fraudulent offer typically features a popular item or service at a drastically reduced price \u2013 too good to be true\u2026<\/p>\n<h4>Identity theft<\/h4>\n<p>A cybercrime often occurs when an attacker accesses a computer to gather a user\u2019s personal information. They then<br \/>\nuse the information to steal that person\u2019s identity or access their personally identifiable information (PII). Cybercriminals typically buy and sell PII on Darknet [10] markets or use it to facilitate a cybercrime or another intelligence-gathering enterprise.<\/p>\n<p>With the increasing number of online criminal activities, new cybercrime models can be found in the tech news almost daily. Computers and the internet have fundamentally changed how we interconnect, participate in business, act and work with the rest of the world. The benefits of these technologies are substantial, though they also create a range of threats.<\/p>\n<p>The precise effect and cost of cybercrime on companies are challenging to assess. While financial losses due to cybercrime can be noteworthy, businesses can also suffer other collateral consequences because of cybercrime, including but not limited to the following:<\/p>\n<p>\u2022 Anyone can fall victim to cybercrime, and the fact that we are all virtually connected puts us at an even greater risk.<br \/>\n\u2022 Harm to stakeholder perception after a cybercrime can cause a company\u2019s worth to decline.<br \/>\n\u2022 In addition to a drop in share price, businesses that have been victims of cybercrime, particularly when avoidable, may also face higher borrowing charges and greater scrutiny when attempting to raise capital.<br \/>\n\u2022 Loss of confidential and sensitive customer data can result in fines and penalties for companies that have failed to protect their customers\u2019 data.<br \/>\n\u2022 Damaged brand identity and loss of reputation after a cybercrime dents customers\u2019 trust in a company and that company\u2019s capability to keep their data safe. Following a cybercrime, companies lose existing customers and the capacity to gain new customers is often reduced.<br \/>\n\u2022 Companies could also sustain direct outlays from cybercrime, including amplified insurance premium expenditure. Bringing in cybercrime experts to conduct proactive and reactive incident response and remediation, public relation preparation and other services related to cybercrime could make them a target of opportunity and not a target of choice.<\/p>\n<p>Considering the economic sums and insignificant totals recovered from these cases, it is not difficult to see why criminals are surveying the cybercrime marketplace. With such vast gains and reduced risk, it is often advantageous to become a cybercriminal, resulting in a lose-lose situation for the victims.<\/p>\n<p>In conclusion, since multiple forms of cybercrime have been observed for more than 25 years [11], it is unlikely that they will ever cease due to legislative, policing or jurisdictional efforts. Cybercriminals are like businesspeople \u2013 they want to make money. Therefore, is there greater value in considering how their tools and platforms can be controlled or monitored? Or, due to the rise of such cybercrimes happening regularly, should awareness training and campaigns be increased to educate more and more people to be safe from cybercrime? Lt Gen Dhahi Khalfan Tamim of Dubai Police recently stated: \u2018We need to prepare and qualify a generation that is capable of not only detecting these crimes and presenting undisputed evidence but also skilful enough to stop these crimes before they happen.\u2019 [12]<\/p>\n<hr \/>\n<p>Notes<br \/>\n[1] https:\/\/www.cyber-rights.org\/documents\/ncis_1801.htm<br \/>\n[2] https:\/\/www.techtarget.com\/searchsecurity\/definition\/cybercrime<br \/>\n[3] https:\/\/earthweb.com\/cybercrime-statistics\/<br \/>\n[4] https:\/\/www.france24.com\/en\/europe\/20220823-cyber-attackers-disrupt-services-at-french-hospital-demand-10-million-ransom<br \/>\n[5] https:\/\/www.investopedia.com\/financial-edge\/0112\/3-ways-cyber-crime-impacts-business.aspx<br \/>\n[6] https:\/\/www.thenationalnews.com\/uae\/2022\/08\/24\/more-than-25000-cybercrimes-reported-last-year-say-dubai-police\/<br \/>\n[7] https:\/\/www.comparitech.com\/blog\/vpn-privacy\/cybercrime-cost\/<br \/>\n[8] https:\/\/www.expresscomputer.in\/news\/why-are-ransomware-attacks-increasing-these-days\/88768\/<br \/>\n[9] https:\/\/threatpost.com\/fbi-bec-43b\/179539\/<\/p>\n<p>[10] Darknet, a computer network with restricted access that is used chiefly for illegal peer-to-peer file sharing<\/p>\n<p>[11] https:\/\/cybersecurityventures.com\/the-history-of-cybercrime-and-cybersecurity-1940-2020\/<br \/>\n[12] https:\/\/www.thenationalnews.com\/uae\/2022\/10\/27\/dubai-security-chief-warns-of-need-to-tackle-cyber-crime\/<\/p>\n<hr \/>\n<p><strong>Darren Mullins &#8211; Partner &#8211; Accuracy<\/strong><\/p>\n<p><strong>Paul Wright &#8211; Senior Adviser &#8211; Accuracy<\/strong><\/p>\n<p><strong>Arthur Couvreur &#8211; Director &#8211; Accuracy<\/strong><\/p>\n<p><strong>Steve Molloy &#8211; Director &#8211; Accuracy<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article examines the meaning of the term \u2018cybercrime\u2019 and what drives the criminals responsible. It describes, in layperson\u2019s terms, some of the more prolific attacks that companies and individuals may suffer and highlights the importance of preparing to respond and investigate effectively. Cybercrime \u2013 old crimes, new tools? This phrase coined in 2001 by [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":22780,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[212,263,436,122],"tags":[174],"class_list":["post-22779","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-analysis","category-digital-telecommunications-analysis","category-digital-technology-software-analysis","category-perspectives","tag-perspectives"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybercrime is on the rise \u2013 is your business prepared? - Accuracy<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.accuracy.com\/fr\/la-cybercriminalite-est-en-hausse-votre-entreprise-est-elle-preparee\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercrime is on the rise \u2013 is your business prepared?\" \/>\n<meta property=\"og:description\" content=\"This article examines the meaning of the term \u2018cybercrime\u2019 and what drives the criminals responsible. It describes, in layperson\u2019s terms, some of the more prolific attacks that companies and individuals may suffer and highlights the importance of preparing to respond and investigate effectively. Cybercrime \u2013 old crimes, new tools? This phrase coined in 2001 by [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.accuracy.com\/fr\/la-cybercriminalite-est-en-hausse-votre-entreprise-est-elle-preparee\/\" \/>\n<meta property=\"og:site_name\" content=\"Accuracy\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-09T07:45:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-23T12:50:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.accuracy.com\/wp-content\/uploads\/2023\/04\/shutterstock_2174039683.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1170\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"dev\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"dev\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimation du temps de lecture\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/cybercrime-is-on-the-rise-is-your-business-prepared\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/cybercrime-is-on-the-rise-is-your-business-prepared\\\/\"},\"author\":{\"name\":\"dev\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#\\\/schema\\\/person\\\/8cfdef62d7af45536d2b7b45979f72e7\"},\"headline\":\"Cybercrime is on the rise \u2013 is your business prepared?\",\"datePublished\":\"2023-02-09T07:45:15+00:00\",\"dateModified\":\"2025-10-23T12:50:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/cybercrime-is-on-the-rise-is-your-business-prepared\\\/\"},\"wordCount\":1377,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/cybercrime-is-on-the-rise-is-your-business-prepared\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.accuracy.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/shutterstock_2174039683.jpg\",\"keywords\":[\"Perspectives\"],\"articleSection\":[\"Analysis\",\"Digital - Telecommunications\",\"Digital technology &amp; Software\",\"Perspectives\"],\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.accuracy.com\\\/cybercrime-is-on-the-rise-is-your-business-prepared\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/cybercrime-is-on-the-rise-is-your-business-prepared\\\/\",\"url\":\"https:\\\/\\\/www.accuracy.com\\\/cybercrime-is-on-the-rise-is-your-business-prepared\\\/\",\"name\":\"Cybercrime is on the rise \u2013 is your business prepared? - Accuracy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/cybercrime-is-on-the-rise-is-your-business-prepared\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/cybercrime-is-on-the-rise-is-your-business-prepared\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.accuracy.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/shutterstock_2174039683.jpg\",\"datePublished\":\"2023-02-09T07:45:15+00:00\",\"dateModified\":\"2025-10-23T12:50:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/cybercrime-is-on-the-rise-is-your-business-prepared\\\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.accuracy.com\\\/cybercrime-is-on-the-rise-is-your-business-prepared\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/cybercrime-is-on-the-rise-is-your-business-prepared\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.accuracy.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/shutterstock_2174039683.jpg\",\"contentUrl\":\"https:\\\/\\\/www.accuracy.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/shutterstock_2174039683.jpg\",\"width\":1170,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/cybercrime-is-on-the-rise-is-your-business-prepared\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.accuracy.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercrime is on the rise \u2013 is your business prepared?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#website\",\"url\":\"https:\\\/\\\/www.accuracy.com\\\/\",\"name\":\"Accuracy\",\"description\":\"Business Advisers - Financial Consultants\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.accuracy.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#organization\",\"name\":\"Accuracy\",\"url\":\"https:\\\/\\\/www.accuracy.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.accuracy.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/unnamed-3.jpg\",\"contentUrl\":\"https:\\\/\\\/www.accuracy.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/unnamed-3.jpg\",\"width\":512,\"height\":512,\"caption\":\"Accuracy\"},\"image\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/accuracy\\\/?originalSubdomain=fr\",\"https:\\\/\\\/www.instagram.com\\\/accuracycareers\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#\\\/schema\\\/person\\\/8cfdef62d7af45536d2b7b45979f72e7\",\"name\":\"dev\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=blank&r=g\",\"caption\":\"dev\"},\"sameAs\":[\"https:\\\/\\\/www.accuracy.com\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"La cybercriminalit\u00e9 est en hausse - votre entreprise est-elle pr\u00e9par\u00e9e ? - Pr\u00e9cision","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.accuracy.com\/fr\/la-cybercriminalite-est-en-hausse-votre-entreprise-est-elle-preparee\/","og_locale":"fr_CA","og_type":"article","og_title":"Cybercrime is on the rise \u2013 is your business prepared?","og_description":"This article examines the meaning of the term \u2018cybercrime\u2019 and what drives the criminals responsible. It describes, in layperson\u2019s terms, some of the more prolific attacks that companies and individuals may suffer and highlights the importance of preparing to respond and investigate effectively. Cybercrime \u2013 old crimes, new tools? This phrase coined in 2001 by [&hellip;]","og_url":"https:\/\/www.accuracy.com\/fr\/la-cybercriminalite-est-en-hausse-votre-entreprise-est-elle-preparee\/","og_site_name":"Accuracy","article_published_time":"2023-02-09T07:45:15+00:00","article_modified_time":"2025-10-23T12:50:48+00:00","og_image":[{"width":1170,"height":550,"url":"https:\/\/www.accuracy.com\/wp-content\/uploads\/2023\/04\/shutterstock_2174039683.jpg","type":"image\/jpeg"}],"author":"dev","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"dev","Estimation du temps de lecture":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.accuracy.com\/cybercrime-is-on-the-rise-is-your-business-prepared\/#article","isPartOf":{"@id":"https:\/\/www.accuracy.com\/cybercrime-is-on-the-rise-is-your-business-prepared\/"},"author":{"name":"dev","@id":"https:\/\/www.accuracy.com\/#\/schema\/person\/8cfdef62d7af45536d2b7b45979f72e7"},"headline":"Cybercrime is on the rise \u2013 is your business prepared?","datePublished":"2023-02-09T07:45:15+00:00","dateModified":"2025-10-23T12:50:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.accuracy.com\/cybercrime-is-on-the-rise-is-your-business-prepared\/"},"wordCount":1377,"commentCount":0,"publisher":{"@id":"https:\/\/www.accuracy.com\/#organization"},"image":{"@id":"https:\/\/www.accuracy.com\/cybercrime-is-on-the-rise-is-your-business-prepared\/#primaryimage"},"thumbnailUrl":"https:\/\/www.accuracy.com\/wp-content\/uploads\/2023\/04\/shutterstock_2174039683.jpg","keywords":["Perspectives"],"articleSection":["Analysis","Digital - Telecommunications","Digital technology &amp; Software","Perspectives"],"inLanguage":"fr-CA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.accuracy.com\/cybercrime-is-on-the-rise-is-your-business-prepared\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.accuracy.com\/cybercrime-is-on-the-rise-is-your-business-prepared\/","url":"https:\/\/www.accuracy.com\/cybercrime-is-on-the-rise-is-your-business-prepared\/","name":"La cybercriminalit\u00e9 est en hausse - votre entreprise est-elle pr\u00e9par\u00e9e ? - Pr\u00e9cision","isPartOf":{"@id":"https:\/\/www.accuracy.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.accuracy.com\/cybercrime-is-on-the-rise-is-your-business-prepared\/#primaryimage"},"image":{"@id":"https:\/\/www.accuracy.com\/cybercrime-is-on-the-rise-is-your-business-prepared\/#primaryimage"},"thumbnailUrl":"https:\/\/www.accuracy.com\/wp-content\/uploads\/2023\/04\/shutterstock_2174039683.jpg","datePublished":"2023-02-09T07:45:15+00:00","dateModified":"2025-10-23T12:50:48+00:00","breadcrumb":{"@id":"https:\/\/www.accuracy.com\/cybercrime-is-on-the-rise-is-your-business-prepared\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.accuracy.com\/cybercrime-is-on-the-rise-is-your-business-prepared\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.accuracy.com\/cybercrime-is-on-the-rise-is-your-business-prepared\/#primaryimage","url":"https:\/\/www.accuracy.com\/wp-content\/uploads\/2023\/04\/shutterstock_2174039683.jpg","contentUrl":"https:\/\/www.accuracy.com\/wp-content\/uploads\/2023\/04\/shutterstock_2174039683.jpg","width":1170,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.accuracy.com\/cybercrime-is-on-the-rise-is-your-business-prepared\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.accuracy.com\/"},{"@type":"ListItem","position":2,"name":"Cybercrime is on the rise \u2013 is your business prepared?"}]},{"@type":"WebSite","@id":"https:\/\/www.accuracy.com\/#website","url":"https:\/\/www.accuracy.com\/","name":"Pr\u00e9cision","description":"Conseillers d'entreprise - Consultants financiers","publisher":{"@id":"https:\/\/www.accuracy.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.accuracy.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/www.accuracy.com\/#organization","name":"Pr\u00e9cision","url":"https:\/\/www.accuracy.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.accuracy.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.accuracy.com\/wp-content\/uploads\/2023\/08\/unnamed-3.jpg","contentUrl":"https:\/\/www.accuracy.com\/wp-content\/uploads\/2023\/08\/unnamed-3.jpg","width":512,"height":512,"caption":"Accuracy"},"image":{"@id":"https:\/\/www.accuracy.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/accuracy\/?originalSubdomain=fr","https:\/\/www.instagram.com\/accuracycareers\/"]},{"@type":"Person","@id":"https:\/\/www.accuracy.com\/#\/schema\/person\/8cfdef62d7af45536d2b7b45979f72e7","name":"dev","image":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/secure.gravatar.com\/avatar\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=blank&r=g","caption":"dev"},"sameAs":["https:\/\/www.accuracy.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.accuracy.com\/fr\/wp-json\/wp\/v2\/posts\/22779","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.accuracy.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.accuracy.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.accuracy.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.accuracy.com\/fr\/wp-json\/wp\/v2\/comments?post=22779"}],"version-history":[{"count":4,"href":"https:\/\/www.accuracy.com\/fr\/wp-json\/wp\/v2\/posts\/22779\/revisions"}],"predecessor-version":[{"id":51738,"href":"https:\/\/www.accuracy.com\/fr\/wp-json\/wp\/v2\/posts\/22779\/revisions\/51738"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.accuracy.com\/fr\/wp-json\/wp\/v2\/media\/22780"}],"wp:attachment":[{"href":"https:\/\/www.accuracy.com\/fr\/wp-json\/wp\/v2\/media?parent=22779"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.accuracy.com\/fr\/wp-json\/wp\/v2\/categories?post=22779"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.accuracy.com\/fr\/wp-json\/wp\/v2\/tags?post=22779"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}