{"id":1892,"date":"2022-09-20T13:42:00","date_gmt":"2022-09-20T17:42:00","guid":{"rendered":"https:\/\/www.dialoginsight.com\/la-cybersecurite-et-la-protection-des-renseignements-personnels\/"},"modified":"2025-10-17T11:13:47","modified_gmt":"2025-10-17T15:13:47","slug":"cybersecurity-and-protection-of-personnal-data","status":"publish","type":"post","link":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/","title":{"rendered":"Cybersecurity and Protection of Personal Data"},"content":{"rendered":"<section class=\"page-block page-block-simple-text vertical-padding-top-none vertical-padding-bottom-none text-color-black page-block-text-color-black page-block-background-color-transparent full-background background-crop-none filter-none\">\n<div class=\"page-block-inner\">\n<div class=\"the-page-block simple-text\">\n<div class=\"the-page-block-inner content-width col-8-12\">\n<div class=\"fragment-text-block has-deco-pattern text-color-black padding-normal background-crop-none\">\n<div class=\"fragment-inner\">\n<div class=\"fragment-text\">\n<div class=\"fragment-inner\">\n<div class=\"the-text wysiwyg light-bg\">\n<section class=\"page-block page-block-simple-text vertical-padding-top-none vertical-padding-bottom-none text-color-black page-block-text-color-black page-block-background-color-transparent full-background background-crop-none filter-none\">\n<div class=\"page-block-inner\">\n<div class=\"the-page-block simple-text\">\n<div class=\"the-page-block-inner content-width col-8-12\">\n<div class=\"fragment-text-block has-deco-pattern text-color-black padding-normal background-crop-none\">\n<div class=\"fragment-inner\">\n<div class=\"fragment-text\">\n<div class=\"fragment-inner\">\n<div class=\"the-text wysiwyg light-bg\">\n<p>It is no longer uncommon to see the names of large companies in the media dealing with privacy incidents. With the increase in electronic sharing of personal information on different computer platforms, cybersecurity threats will become more frequent. Their consequences will be more serious. Privacy incidents are no longer isolated events. It is important to be ready to deal with them and limit their risks and impact.<\/p>\n<p><\/p>\n<h2>Privacy incidents<\/h2>\n<p>These incidents occur when there is a breach of privacy. Whether through unauthorized access, use or disclosure. This also includes the loss of confidential data that can identify a natural person. The intrusion of hackers into a database containing personal information is one of the most serious incidents. This is called a data leak. The purpose of this operation is to use this information or sell it on the Dark Web to usurp the identity of these people.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section class=\"page-block page-block-simple-text vertical-padding-top-none vertical-padding-bottom-none text-color-black page-block-text-color-black page-block-background-color-transparent full-background background-crop-none filter-none\">\n<div class=\"page-block-inner\">\n<div class=\"fragment-background background-width-full background-crop-none\" role=\"presentation\">\n<div class=\"fragment-inner\">\n<div class=\"color background-color-transparent\">&nbsp;<\/div>\n<\/div>\n<\/div>\n<div class=\"the-page-block simple-text\">\n<div class=\"the-page-block-inner content-width col-8-12\">\n<div class=\"fragment-text-block has-deco-pattern text-color-black padding-normal background-crop-none\">\n<div class=\"fragment-background background-width-full background-crop-none\" role=\"presentation\">\n<div class=\"fragment-inner\">\n<div class=\"color background-color-transparent\">&nbsp;<\/div>\n<\/div>\n<\/div>\n<div class=\"fragment-inner\">\n<div class=\"fragment-text\">\n<div class=\"fragment-inner\">\n<div class=\"the-text wysiwyg light-bg\">\n<h2>The Calm Before the Storm: Be prepare<\/h2>\n<p>Although cyberattacks are often associated with large enterprises, small and medium-sized businesses must also be on the lookout for these threats. In fact, these companies are targeted by 43% of cyberattacks. Thus, it is important that every organization holding sensitive information is well prepared. Some initiatives can already be taken internally as a preventive measure.<\/p>\n<p><\/p>\n<h3>1. Raising awareness among stakeholders<\/h3>\n<p>It is important to&nbsp;<strong>educate your employees as well as your customers<\/strong>&nbsp;on the subject of cybersecurity. They must be informed about the precautions to be taken to avoid such incidents. They must be equipped to protect their data against unauthorized access or theft.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n\n\n<div class=\"wp-block-columns blog-txt-block-with-bg has-background is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\" style=\"background-color:#05d17d\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignright wp-image-1180 size-medium\" src=\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2022\/09\/phising-stats-298x300.jpg\" alt=\"\" width=\"298\" height=\"300\" srcset=\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2022\/09\/phising-stats-298x300.jpg 298w, https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2022\/09\/phising-stats-150x150.jpg 150w, https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2022\/09\/phising-stats.jpg 444w\" sizes=\"(max-width: 298px) 100vw, 298px\" \/><\/p>\n<p>Privacy incidents put the privacy of your customers, employees and\/or business partners at risk. This indirectly harms your business. Indeed, these incidents have a financial impact on your organization and they risk to impact your sustainability.<\/p>\n<p>One of the most worrying cybersecurity threats today is Ransomware. With this strategy, hackers gain access to company computer files and they can block access to data until a ransom is paid. The annual share of ransomware attacks experienced by organizations worldwide has been on the rise since 2018, peaking at 68.5% in 2021 (<a href=\"https:\/\/www.statista.com\/topics\/4136\/ransomware\/#topicHeader__wrapper\" target=\"_blank\" rel=\"noopener\">Statista<\/a>). This threat is largely the result of phishing attacks.<\/p>\n<\/div>\n<\/div>\n\n\n<section class=\"page-block page-block-simple-text vertical-padding-top-none vertical-padding-bottom-none text-color-black page-block-text-color-black page-block-background-color-transparent full-background background-crop-none filter-none\">\n<div class=\"page-block-inner\">\n<div class=\"the-page-block simple-text\">\n<div class=\"the-page-block-inner content-width col-8-12\">\n<div class=\"fragment-text-block has-deco-pattern text-color-black padding-normal background-crop-none\">\n<div class=\"fragment-inner\">\n<div class=\"fragment-text\">\n<div class=\"fragment-inner\">\n<div class=\"the-text wysiwyg light-bg\">\n<h3>2. Implement good cybersecurity management practices<\/h3>\n<p>Some recognized cybersecurity management practices include, but are not limited to:<\/p>\n<ul>\n<li>Install anti-virus and anti-malware software<\/li>\n<li>Enable data encryption<\/li>\n<li>Carry out security audits<\/li>\n<li>Comply with current legislation<\/li>\n<li>Take out data leak insurance<\/li>\n<li>Establish a cybersecurity policy (password management, access management, etc.)<\/li>\n<\/ul>\n<h3>3. Surround yourself with trusted business partners<\/h3>\n<p>It is important to have sufficient cybersecurity resources and to have trusted business partners. Especially for&nbsp;<strong>data hosting<\/strong>. At Dialog Insight, the security of your data is a&nbsp;<a href=\"https:\/\/www.dialoginsight.com\/en\/solutions\/tailored-options\/securite-conformite-confidentialite\/\" target=\"_blank\" rel=\"noopener\">priority<\/a>. As a result, we implement the best practices in the industry. Moreover, we comply with the requirements of legislation in Quebec (Law 25), Canada and Europe (GDPR). In addition, we hold ISO 27001 and SOC2 certifications.<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-1183 size-full\" src=\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2022\/09\/iso27001-550x287-1.jpg\" alt=\"\" width=\"550\" height=\"287\" srcset=\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2022\/09\/iso27001-550x287-1.jpg 550w, https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2022\/09\/iso27001-550x287-1-300x157.jpg 300w\" sizes=\"(max-width: 550px) 100vw, 550px\" \/><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section class=\"page-block page-block-simple-text vertical-padding-top-none vertical-padding-bottom-none text-color-black page-block-text-color-black page-block-background-color-transparent full-background background-crop-none filter-none\">\n<div class=\"page-block-inner\">\n<div class=\"fragment-background background-width-full background-crop-none\" role=\"presentation\">\n<div class=\"fragment-inner\">\n<div class=\"color background-color-transparent\">&nbsp;<\/div>\n<\/div>\n<\/div>\n<div class=\"the-page-block simple-text\">\n<div class=\"the-page-block-inner content-width col-8-12\">\n<div class=\"fragment-text-block has-deco-pattern text-color-black padding-normal background-crop-none\">\n<div class=\"fragment-background background-width-full background-crop-none\" role=\"presentation\">\n<div class=\"fragment-inner\">\n<div class=\"color background-color-transparent\">&nbsp;<\/div>\n<\/div>\n<\/div>\n<div class=\"fragment-inner\">\n<div class=\"fragment-text\">\n<div class=\"fragment-inner\">\n<div class=\"the-text wysiwyg light-bg\">\n<h2>Victim of a cyberattack: What to do?<\/h2>\n<p>In the event that the worst happens and your business is the victim of a cyberattack, certain actions are required by the various levels of government.<\/p>\n<p>In Quebec, Law 25 (Bill 64) aims to improve the protection of personal information by public bodies and private companies. It sets out the various obligations that must be respected in the management of confidential data. Its main objective is to better control confidentiality incidents and limit their impact.<\/p>\n<p>Law 25 requires that a person who operates a business must take reasonable measures to reduce the risk of harm being caused and to prevent new incidents of the same nature from occurring. When there is reason to believe that there has been a confidentiality incident involving personal information that it holds.<\/p>\n<p>Here are the steps to follow in the event of a theft of personal information:<\/p>\n<ol>\n<li><strong>Preliminary assessment of the situation:&nbsp;<\/strong>Define the context, designate a person responsible for managing the situation, inform the internal stakeholders concerned<\/li>\n<li><strong>Limit the invasion of privacy:&nbsp;<\/strong>Recover data, modify access codes, control gaps<\/li>\n<li><strong>Assess the risks:&nbsp;<\/strong>consider the sensitivity of the personal information in question, determine the potential harm, determine the actions to be taken as a priority<\/li>\n<li><strong>Notifying data subjects:&nbsp;<\/strong>determining who needs to be notified and how<\/li>\n<li><strong>In-depth assessment of the situation and prevention:&nbsp;<\/strong>analyze the circumstances of the event, make recommendations on the internal directives to be put in place<\/li>\n<li><strong>Follow-up<\/strong><\/li>\n<\/ol>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n\n\n<div class=\"wp-block-columns blog-txt-block-with-bg has-background is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\" style=\"background-color:#05d17d\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<h3>New obligations related to Law 25<\/h3>\n<p>When a privacy incident poses a&nbsp;<strong>risk of serious harm<\/strong>&nbsp;being caused, Law 25 requires companies to take the following actions, starting September 22, 2022:<\/p>\n<ol>\n<li>Notify the Commission d\u2019acc\u00e8s \u00e0 l\u2019information<\/li>\n<li>Notify any person whose personal information is affected by the incident<\/li>\n<li>Notify any person or organization likely to reduce this risk<\/li>\n<li>Consult with Privacy Officer to assess risk of harm<\/li>\n<li>Maintain a register of confidentiality incidents, to be communicated to the Commission on request<\/li>\n<\/ol>\n<\/div>\n<\/div>\n\n\n<p>For more information on Law 25 and the various obligations arising from it, see our latest article\u00a0<a href=\"https:\/\/www.dialoginsight.com\/en\/blog\/preparer-application-loi-64\/\" target=\"_blank\" rel=\"noopener\">Preparing for the implementation of Law 25<\/a><\/p>\n<p>\u00a0<\/p>\n<p><strong>This article does not represent legal advice. You should consult your legal advisors for an opinion with respect to Law 25 or its implication.<\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>With the increase in electronic sharing of personal information on different computer platforms, cybersecurity threats will be more frequent and their consequences will be more serious. Since confidentiality incidents are no longer isolated events, it is important to be ready to deal with them and limit their risks and impact.<\/p>\n","protected":false},"author":7,"featured_media":1177,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1892","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-and-conformity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity and Protection of Personal Data<\/title>\n<meta name=\"description\" content=\"How to ensure the protection of personal information and what to do in the event of cyberattacks causing the leak of confidential data?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity and Protection of Personal Data\" \/>\n<meta property=\"og:description\" content=\"How to ensure the protection of personal information and what to do in the event of cyberattacks causing the leak of confidential data?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Dialog Insight\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-20T17:42:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-17T15:13:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/06\/bimi-impact.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Marie-Noelle Morin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marie-Noelle Morin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/\"},\"author\":{\"name\":\"Marie-Noelle Morin\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/b5f207021fbf2c6367c9f3e7869495f7\"},\"headline\":\"Cybersecurity and Protection of Personal Data\",\"datePublished\":\"2022-09-20T17:42:00+00:00\",\"dateModified\":\"2025-10-17T15:13:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/\"},\"wordCount\":854,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/06\/bimi-impact.jpg\",\"articleSection\":[\"Security and conformity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/\",\"url\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/\",\"name\":\"Cybersecurity and Protection of Personal Data\",\"isPartOf\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/06\/bimi-impact.jpg\",\"datePublished\":\"2022-09-20T17:42:00+00:00\",\"dateModified\":\"2025-10-17T15:13:47+00:00\",\"author\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/b5f207021fbf2c6367c9f3e7869495f7\"},\"description\":\"How to ensure the protection of personal information and what to do in the event of cyberattacks causing the leak of confidential data?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/#primaryimage\",\"url\":\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/06\/bimi-impact.jpg\",\"contentUrl\":\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/06\/bimi-impact.jpg\",\"width\":1200,\"height\":628,\"caption\":\"bimi impact\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.dialoginsight.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity and Protection of Personal Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/#website\",\"url\":\"https:\/\/www.dialoginsight.com\/en\/\",\"name\":\"Dialog Insight\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dialoginsight.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/b5f207021fbf2c6367c9f3e7869495f7\",\"name\":\"Marie-Noelle Morin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/911da3158f52a918f7ec500775c9cadbfbbd4e7b188172aded07c39b11270dd8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/911da3158f52a918f7ec500775c9cadbfbbd4e7b188172aded07c39b11270dd8?s=96&d=mm&r=g\",\"caption\":\"Marie-Noelle Morin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity and Protection of Personal Data","description":"How to ensure the protection of personal information and what to do in the event of cyberattacks causing the leak of confidential data?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity and Protection of Personal Data","og_description":"How to ensure the protection of personal information and what to do in the event of cyberattacks causing the leak of confidential data?","og_url":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/","og_site_name":"Dialog Insight","article_published_time":"2022-09-20T17:42:00+00:00","article_modified_time":"2025-10-17T15:13:47+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/06\/bimi-impact.jpg","type":"image\/jpeg"}],"author":"Marie-Noelle Morin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Marie-Noelle Morin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/#article","isPartOf":{"@id":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/"},"author":{"name":"Marie-Noelle Morin","@id":"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/b5f207021fbf2c6367c9f3e7869495f7"},"headline":"Cybersecurity and Protection of Personal Data","datePublished":"2022-09-20T17:42:00+00:00","dateModified":"2025-10-17T15:13:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/"},"wordCount":854,"commentCount":0,"image":{"@id":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/06\/bimi-impact.jpg","articleSection":["Security and conformity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/","url":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/","name":"Cybersecurity and Protection of Personal Data","isPartOf":{"@id":"https:\/\/www.dialoginsight.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/#primaryimage"},"image":{"@id":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/06\/bimi-impact.jpg","datePublished":"2022-09-20T17:42:00+00:00","dateModified":"2025-10-17T15:13:47+00:00","author":{"@id":"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/b5f207021fbf2c6367c9f3e7869495f7"},"description":"How to ensure the protection of personal information and what to do in the event of cyberattacks causing the leak of confidential data?","breadcrumb":{"@id":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/#primaryimage","url":"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/06\/bimi-impact.jpg","contentUrl":"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/06\/bimi-impact.jpg","width":1200,"height":628,"caption":"bimi impact"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/cybersecurity-and-protection-of-personnal-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.dialoginsight.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity and Protection of Personal Data"}]},{"@type":"WebSite","@id":"https:\/\/www.dialoginsight.com\/en\/#website","url":"https:\/\/www.dialoginsight.com\/en\/","name":"Dialog Insight","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dialoginsight.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/b5f207021fbf2c6367c9f3e7869495f7","name":"Marie-Noelle Morin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/911da3158f52a918f7ec500775c9cadbfbbd4e7b188172aded07c39b11270dd8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/911da3158f52a918f7ec500775c9cadbfbbd4e7b188172aded07c39b11270dd8?s=96&d=mm&r=g","caption":"Marie-Noelle Morin"}}]}},"_links":{"self":[{"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/posts\/1892","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/comments?post=1892"}],"version-history":[{"count":1,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/posts\/1892\/revisions"}],"predecessor-version":[{"id":8392,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/posts\/1892\/revisions\/8392"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/media\/1177"}],"wp:attachment":[{"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/media?parent=1892"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/categories?post=1892"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/tags?post=1892"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}