{"id":1895,"date":"2017-03-24T10:37:55","date_gmt":"2017-03-24T09:37:55","guid":{"rendered":"http:\/\/www.groupe-indicia.com\/dev\/lutter-contre-le-piratage.html\/"},"modified":"2023-10-26T18:55:32","modified_gmt":"2023-10-26T16:55:32","slug":"combatting-hacking","status":"publish","type":"page","link":"https:\/\/www.groupe-indicia.com\/en\/it-investigations\/combatting-hacking","title":{"rendered":"Combatting hacking"},"content":{"rendered":"

IT INVESTIGATIONS<\/p>\n


\n<\/div><\/div>[vc_custom_heading text=”Combatting hacking” font_container=”tag:h1|font_size:2em|text_align:left|color:%232574a9″ google_fonts=”font_family:Droid%20Sans%3Aregular%2C700|font_style:400%20regular%3A400%3Anormal” el_class=”titreh1″ css=”%7B%22default%22%3A%7B%22color%22%3A%22%232574a9%22%2C%22font-size%22%3A%222em%22%7D%7D”]

Computer attacks have become an invisible weapon commonly used to destabilise and steal a company\u2019s strategic information.<\/strong><\/p>\n

The Indicia Group helps you to combat hacking and offers you security plans tailored to your needs. We analyse the technical context of the attack and help you collect the evidence in relation to what caused the breach.<\/p>\n<\/div><\/div>

Don\u2019t put up with it any more, protect the key sectors of your business!<\/p>\n<\/div><\/div>

Examples of investigations<\/h3>\n
    \n
  • We determine the origin of a viral attack or an intrusion and search for evidence on all computer systems and all digital media: hard drive, USB stick, DVD, smartphone, etc.<\/li>\n
  • We put the necessary resources in place to ensure fast and coordinated action: electronic countermeasures, search for audio and video listening devices.<\/li>\n
  • We prepare and customise effective means of protection: security audits and computer security audits, penetration tests, business continuity plan, data loss prevention.<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"IT INVESTIGATIONS [vc_custom_heading text=\"Combatting hacking\" font_container=\"tag:h1|font_size:2em|text_align:left|color:%232574a9\" google_fonts=\"font_family:Droid%20Sans%3Aregular%2C700|font_style:400%20regular%3A400%3Anormal\" el_class=\"titreh1\" css=\"%7B%22default%22%3A%7B%22color%22%3A%22%232574a9%22%2C%22font-size%22%3A%222em%22%7D%7D\"]Computer attacks have become an invisible weapon commonly used to destabilise and steal a company\u2019s strategic information. The Indicia Group helps you to combat hacking and offers you security plans tailored to your needs. We analyse the technical context of the attack and help you collect the...","protected":false},"author":5,"featured_media":4014,"parent":1909,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"yoast_head":"\nCombatting hacking - Indicia Group - Private detectives agencies<\/title>\n<meta name=\"description\" content=\"Computer attacks have become an invisible weapon commonly used to destabilise and steal a company\u2019s strategic information.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.groupe-indicia.com\/en\/it-investigations\/combatting-hacking\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Combatting hacking - Indicia Group - Private detectives agencies\" \/>\n<meta property=\"og:description\" content=\"Computer attacks have become an invisible weapon commonly used to destabilise and steal a company\u2019s strategic information.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.groupe-indicia.com\/en\/it-investigations\/combatting-hacking\" \/>\n<meta property=\"og:site_name\" content=\"Groupe Indicia - R\u00e9seau de d\u00e9tectives priv\u00e9s en France\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-26T16:55:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.groupe-indicia.com\/wp-content\/uploads\/2017\/05\/enquetes-informatiques-detectives-prives-groupe-indicia.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.groupe-indicia.com\/en\/it-investigations\/combatting-hacking\",\"url\":\"https:\/\/www.groupe-indicia.com\/en\/it-investigations\/combatting-hacking\",\"name\":\"Combatting hacking - Indicia Group - Private detectives agencies\",\"isPartOf\":{\"@id\":\"https:\/\/www.groupe-indicia.com\/en\/#website\"},\"datePublished\":\"2017-03-24T09:37:55+00:00\",\"dateModified\":\"2023-10-26T16:55:32+00:00\",\"description\":\"Computer attacks have become an invisible weapon commonly used to destabilise and steal a company\u2019s strategic information.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.groupe-indicia.com\/en\/it-investigations\/combatting-hacking#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.groupe-indicia.com\/en\/it-investigations\/combatting-hacking\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.groupe-indicia.com\/en\/it-investigations\/combatting-hacking#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.groupe-indicia.com\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Investigations\",\"item\":\"https:\/\/www.groupe-indicia.com\/en\/it-investigations\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Combatting hacking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.groupe-indicia.com\/en\/#website\",\"url\":\"https:\/\/www.groupe-indicia.com\/en\/\",\"name\":\"Groupe Indicia - R\u00e9seau de d\u00e9tectives priv\u00e9s en France\",\"description\":\"D\u00e9tective priv\u00e9 \u00e0 Paris - Lyon - Marseille - Montpellier\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.groupe-indicia.com\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Combatting hacking - Indicia Group - Private detectives agencies","description":"Computer attacks have become an invisible weapon commonly used to destabilise and steal a company\u2019s strategic information.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.groupe-indicia.com\/en\/it-investigations\/combatting-hacking","og_locale":"en_US","og_type":"article","og_title":"Combatting hacking - Indicia Group - Private detectives agencies","og_description":"Computer attacks have become an invisible weapon commonly used to destabilise and steal a company\u2019s strategic information.","og_url":"https:\/\/www.groupe-indicia.com\/en\/it-investigations\/combatting-hacking","og_site_name":"Groupe Indicia - R\u00e9seau de d\u00e9tectives priv\u00e9s en France","article_modified_time":"2023-10-26T16:55:32+00:00","og_image":[{"width":1920,"height":300,"url":"https:\/\/www.groupe-indicia.com\/wp-content\/uploads\/2017\/05\/enquetes-informatiques-detectives-prives-groupe-indicia.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.groupe-indicia.com\/en\/it-investigations\/combatting-hacking","url":"https:\/\/www.groupe-indicia.com\/en\/it-investigations\/combatting-hacking","name":"Combatting hacking - Indicia Group - Private detectives agencies","isPartOf":{"@id":"https:\/\/www.groupe-indicia.com\/en\/#website"},"datePublished":"2017-03-24T09:37:55+00:00","dateModified":"2023-10-26T16:55:32+00:00","description":"Computer attacks have become an invisible weapon commonly used to destabilise and steal a company\u2019s strategic information.","breadcrumb":{"@id":"https:\/\/www.groupe-indicia.com\/en\/it-investigations\/combatting-hacking#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.groupe-indicia.com\/en\/it-investigations\/combatting-hacking"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.groupe-indicia.com\/en\/it-investigations\/combatting-hacking#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.groupe-indicia.com\/en"},{"@type":"ListItem","position":2,"name":"IT Investigations","item":"https:\/\/www.groupe-indicia.com\/en\/it-investigations"},{"@type":"ListItem","position":3,"name":"Combatting hacking"}]},{"@type":"WebSite","@id":"https:\/\/www.groupe-indicia.com\/en\/#website","url":"https:\/\/www.groupe-indicia.com\/en\/","name":"Groupe Indicia - R\u00e9seau de d\u00e9tectives priv\u00e9s en France","description":"D\u00e9tective priv\u00e9 \u00e0 Paris - Lyon - Marseille - Montpellier","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.groupe-indicia.com\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.groupe-indicia.com\/en\/wp-json\/wp\/v2\/pages\/1895"}],"collection":[{"href":"https:\/\/www.groupe-indicia.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.groupe-indicia.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.groupe-indicia.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.groupe-indicia.com\/en\/wp-json\/wp\/v2\/comments?post=1895"}],"version-history":[{"count":1,"href":"https:\/\/www.groupe-indicia.com\/en\/wp-json\/wp\/v2\/pages\/1895\/revisions"}],"predecessor-version":[{"id":4577,"href":"https:\/\/www.groupe-indicia.com\/en\/wp-json\/wp\/v2\/pages\/1895\/revisions\/4577"}],"up":[{"embeddable":true,"href":"https:\/\/www.groupe-indicia.com\/en\/wp-json\/wp\/v2\/pages\/1909"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.groupe-indicia.com\/en\/wp-json\/wp\/v2\/media\/4014"}],"wp:attachment":[{"href":"https:\/\/www.groupe-indicia.com\/en\/wp-json\/wp\/v2\/media?parent=1895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}