{"id":6285,"date":"2025-05-27T16:49:01","date_gmt":"2025-05-27T16:49:01","guid":{"rendered":"https:\/\/outi.ca\/?page_id=6285"},"modified":"2025-06-10T18:55:36","modified_gmt":"2025-06-10T18:55:36","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/outi.ca\/en\/cybersecurity\/","title":{"rendered":"CYBERSECURITY"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:5%;--awb-padding-left:5%;--awb-margin-top:2.5%;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-top:3%;--awb-padding-right:3%;--awb-padding-bottom:3%;--awb-padding-left:3%;--awb-overflow:hidden;--awb-bg-color:var(--awb-color4);--awb-bg-color-hover:var(--awb-color4);--awb-bg-size:cover;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0.96%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0.96%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0.96%;--awb-spacing-left-medium:0.96%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-menu-anchor\" id=\"integration\"><\/div><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-0 fusion_builder_column_inner_1_2 1_2 fusion-flex-column fusion-flex-align-self-stretch\" style=\"--awb-bg-color:var(--awb-color4);--awb-bg-color-hover:var(--awb-color4);--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-font-size:18px;--awb-line-height:23px;\"><h2>IT SECURITY<br \/>\nIMPLEMENTATION<\/h2>\n<p>Our IT Security Implementation services provide a comprehensive approach to protect your organization\u2019s information technology assets and infrastructure.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-1 fusion_builder_column_inner_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-top:3%;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:18px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Figtree&quot;;font-style:normal;font-weight:700;margin:0;font-size:1em;--fontSize:18;--minFontSize:18;line-height:1.28;\"><strong>WHAT YOU GET:<\/strong><\/h4><\/div><ul style=\"--awb-size:18px;--awb-item-padding-top:0px;--awb-item-padding-right:0px;--awb-item-padding-bottom:0px;--awb-item-padding-left:0px;--awb-iconcolor:var(--awb-color5);--awb-textcolor:var(--awb-color5);--awb-line-height:30.6px;--awb-icon-width:30.6px;--awb-icon-height:30.6px;--awb-icon-margin:12.6px;--awb-content-margin:43.2px;\" class=\"fusion-checklist fusion-checklist-1 type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\"><strong>Risk Management: <\/strong> Identify and mitigate potential threats to your IT systems.<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\"><strong>Identity and Access Management:<\/strong> Control who has access to your data and systems.<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><strong>Network and Endpoint Security:<\/strong> Protect your network and devices from cyber threats.<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\"><strong>Malware Protection:<\/strong> Implement advanced solutions to detect and prevent malware attacks.<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\"><strong>Incident Response:<\/strong> Develop and execute plans to respond to security breaches.<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\"><strong>Data Protection and Privacy: <\/strong> Ensure your data is secure and compliant with regulations.<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><strong>Security Training and Awareness:<\/strong> Educate your team on best practices for maintaining IT security.<\/p>\n<\/div><\/li><\/ul><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_5 2_5 fusion-flex-column fusion-flex-align-self-stretch\" style=\"--awb-overflow:hidden;--awb-bg-image:url(&#039;https:\/\/outi.ca\/wp-content\/uploads\/2025\/04\/u2861115611_a_team_of_architect_with_orange_hat_imagining_a_com_31e3691f-9fae-45f0-b65a-6a105c5fd119.png&#039;);--awb-bg-size:cover;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:40%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.4%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.4%;--awb-width-medium:40%;--awb-order-medium:0;--awb-spacing-right-medium:2.4%;--awb-spacing-left-medium:2.4%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column fusion-empty-column-bg-image fusion-column-has-bg-image\" data-bg-url=\"https:\/\/outi.ca\/wp-content\/uploads\/2025\/04\/u2861115611_a_team_of_architect_with_orange_hat_imagining_a_com_31e3691f-9fae-45f0-b65a-6a105c5fd119.png\"><img decoding=\"async\" class=\"fusion-empty-dims-img-placeholder\" alt=\"Solution EDR avanc\u00e9e pour la cybers\u00e9curit\u00e9 des PME avec OUTi\" aria-label=\"solution-edr\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%272912%27%20height%3D%271632%27%20viewBox%3D%270%200%202912%201632%27%3E%3Crect%20width%3D%272912%27%20height%3D%271632%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\"><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_3_5 3_5 fusion-flex-column fusion-flex-align-self-stretch\" style=\"--awb-padding-top:3%;--awb-padding-right:3%;--awb-padding-bottom:3%;--awb-padding-left:3%;--awb-overflow:hidden;--awb-bg-color:var(--awb-color4);--awb-bg-color-hover:var(--awb-color4);--awb-bg-size:cover;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.6%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.6%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:1.6%;--awb-spacing-left-medium:1.6%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-menu-anchor\" id=\"solutions\"><\/div><div class=\"fusion-text fusion-text-2 fusion-text-no-margin\" style=\"--awb-font-size:18px;--awb-line-height:23px;--awb-margin-bottom:0px;\"><h2 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 38.4; line-height: 1.2;\" data-fontsize=\"38.4\" data-lineheight=\"46.08px\">ADVANCED EDR SOLUTIONS<\/h2>\n<p><strong>Boost Your Cybersecurity with our EDR Solutions<\/strong><\/p>\n<p>OUTi Endpoint Detection and Response (EDR) solutions are your frontline defense against cyber threats. It continuously monitors your devices, detects suspicious activities, and automatically responds to potential threats, ensuring your endpoints are secure and resilient.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:5%;--awb-padding-left:5%;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-padding-top:3%;--awb-padding-right:3%;--awb-padding-bottom:3%;--awb-padding-left:3%;--awb-overflow:hidden;--awb-bg-color:var(--awb-color4);--awb-bg-color-hover:var(--awb-color4);--awb-bg-size:cover;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.44%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.44%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:1.44%;--awb-spacing-left-medium:1.44%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-menu-anchor\" id=\"audits\"><\/div><div class=\"fusion-text fusion-text-3 fusion-text-no-margin\" style=\"--awb-font-size:18px;--awb-line-height:23px;--awb-margin-bottom:0px;--awb-text-font-family:&quot;Figtree&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><h2>IT SECURITY<br \/>\nAUDITS &amp; REVIEWS<\/h2>\n<p><strong>Enhance Your Cybersecurity with Our IT Security Audits &amp; Reviews<\/strong><\/p>\n<p>In today\u2019s digital landscape, safeguarding your IT infrastructure is more critical than ever. OUTi IT Security Audits &amp; Reviews thoroughly evaluate your digital systems to identify vulnerabilities and enhance overall security.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-top:3%;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:18px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Figtree&quot;;font-style:normal;font-weight:700;margin:0;font-size:1em;--fontSize:18;--minFontSize:18;line-height:1.28;\"><strong>WHAT YOU GET :<\/strong><\/h4><\/div><ul style=\"--awb-size:18px;--awb-item-padding-top:0px;--awb-item-padding-right:0px;--awb-item-padding-bottom:0px;--awb-item-padding-left:0px;--awb-iconcolor:var(--awb-color5);--awb-textcolor:var(--awb-color5);--awb-line-height:30.6px;--awb-icon-width:30.6px;--awb-icon-height:30.6px;--awb-icon-margin:12.6px;--awb-content-margin:43.2px;\" class=\"fusion-checklist fusion-checklist-2 type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><strong>Comprehensive Assessments:<\/strong> DUncover potential security gaps and weaknesses.<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\"><strong>Risk Mitigation:<\/strong> Proactively address vulnerabilities before they can be exploited.<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\"><strong>Performance Optimization:<\/strong> Improve the efficiency and reliability of your IT infrastructure.<br \/><\/div><\/li><\/ul><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-flex-align-self-stretch\" style=\"--awb-padding-top:5%;--awb-padding-right:5%;--awb-padding-bottom:5%;--awb-padding-left:5%;--awb-overflow:hidden;--awb-bg-image:linear-gradient(180deg, var(--awb-color3) 0%,var(--awb-color2) 100%);--awb-bg-size:cover;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color6);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:36;line-height:var(--awb-typography1-line-height);\">FREE IT<br \/>CONSULTATION<\/h2><\/div><div class=\"fusion-text fusion-text-4\" style=\"--awb-font-size:18px;--awb-line-height:23px;--awb-text-color:var(--awb-color6);\"><p>Book an appointment today and enjoy a free consultation with an expert who will take the time to understand your needs and guide you toward the best possible options.<\/p>\n<\/div><div ><a class=\"fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:var(--awb-color2);--button_accent_hover_color:var(--awb-color6);--button_border_hover_color:var(--awb-color2);--button_gradient_top_color:var(--awb-color6);--button_gradient_bottom_color:var(--awb-color6);--button_gradient_top_color_hover:hsla(var(--awb-color3-h),calc(var(--awb-color3-s) - 5%),calc(var(--awb-color3-l) - 10%),var(--awb-color3-a));--button_gradient_bottom_color_hover:hsla(var(--awb-color3-h),calc(var(--awb-color3-s) - 5%),calc(var(--awb-color3-l) - 10%),var(--awb-color3-a));\" target=\"_self\" href=\"#\" data-toggle=\"modal\" data-target=\".fusion-modal.RDV\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">BOOK AN APPOINTMENT<\/span><\/a><\/div><div class=\"fusion-modal modal fade modal-1 RDV\" tabindex=\"-1\" role=\"dialog\" aria-labelledby=\"modal-heading-1\" aria-hidden=\"true\" style=\"--awb-border-color:var(--awb-color6);--awb-background:var(--awb-color6);\"><div class=\"modal-dialog modal-lg\" role=\"document\"><div class=\"modal-content fusion-modal-content\"><div class=\"modal-header\"><button class=\"close\" type=\"button\" data-dismiss=\"modal\" aria-hidden=\"true\" aria-label=\"Close\">&times;<\/button><h3 class=\"modal-title\" id=\"modal-heading-1\" data-dismiss=\"modal\" aria-hidden=\"true\">FREE APPOINTMENT<\/h3><\/div><div class=\"modal-body fusion-clearfix\"><iframe style=\"border: 0;\" src=\"https:\/\/outlook.office365.com\/owa\/calendar\/OUTi1@outi.ca\/bookings\/\" width=\"100%\" height=\"650\" scrolling=\"yes\"><\/iframe><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:5%;--awb-padding-left:5%;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-top:3%;--awb-padding-right:3%;--awb-padding-bottom:3%;--awb-padding-left:3%;--awb-overflow:hidden;--awb-bg-color:var(--awb-color4);--awb-bg-color-hover:var(--awb-color4);--awb-bg-size:cover;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0.96%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0.96%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0.96%;--awb-spacing-left-medium:0.96%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-menu-anchor\" id=\"programme\"><\/div><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-2 fusion_builder_column_inner_1_2 1_2 fusion-flex-column fusion-flex-align-self-stretch\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-text fusion-text-5\" style=\"--awb-font-size:18px;--awb-line-height:23px;\"><h2>CYBERSECURITY<br \/>\nAWARENESS TRAINING<br \/>\nPROGRAM<\/h2>\n<p>Stay Ahead of Cyber Threats with Continuous Cybersecurity Awareness Training<\/p>\n<p>OUTi continuous Cybersecurity Awareness Training program is an ongoing educational program designed to keep your employees informed and vigilant about the latest cyber threats and best practices for protecting organizational data.<\/p>\n<p>Unlike one-time training sessions, continuous training ensures that cybersecurity awareness is maintained and updated regularly.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-3 fusion_builder_column_inner_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-top:3%;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:18px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Figtree&quot;;font-style:normal;font-weight:700;margin:0;font-size:1em;--fontSize:18;--minFontSize:18;line-height:1.28;\"><strong>WHAT YOU GET:<\/strong><\/h4><\/div><ul style=\"--awb-size:18px;--awb-item-padding-top:0px;--awb-item-padding-right:0px;--awb-item-padding-bottom:0px;--awb-item-padding-left:0px;--awb-iconcolor:var(--awb-color5);--awb-textcolor:var(--awb-color5);--awb-line-height:30.6px;--awb-icon-width:30.6px;--awb-icon-height:30.6px;--awb-icon-margin:12.6px;--awb-content-margin:43.2px;\" class=\"fusion-checklist fusion-checklist-3 type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\"><strong>Regular Updates:<\/strong> Frequent training sessions keep your employees aware of new threats and evolving cybercriminal tactics.<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\"><strong>Interactive Learning:<\/strong> Engaging modules, simulations, and quizzes reinforce learning and retention.<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\"><strong>Phishing Simulations:<\/strong> Regular simulated phishing attacks help employees recognize and avoid real threats.<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\"><strong>Policy Refreshers:<\/strong> Periodic reviews of your company\u2019s security policies and procedures ensure compliance and understanding.<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\"><strong>Performance Tracking: <\/strong> Monitor and assess employee progress to identify areas needing improvement.<\/div><\/li><\/ul><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-top:3%;--awb-padding-bottom:3%;--awb-overflow:hidden;--awb-bg-image:linear-gradient(180deg, rgba(61,61,61,0.45) 0%,rgba(61,61,61,0.45) 100%),url(https:\/\/outi.ca\/wp-content\/uploads\/2025\/03\/u2861115611_a_team_of_architect_with_orange_hat_imagining_a_com_44e6eee8-45ca-49ef-a903-9c3fed617579-300x168.png);;--awb-bg-position:center center;--awb-bg-size:cover;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0.96%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0.96%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0.96%;--awb-spacing-left-medium:0.96%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column fusion-column-has-bg-image\" data-bg-url=\"https:\/\/outi.ca\/wp-content\/uploads\/2025\/03\/u2861115611_a_team_of_architect_with_orange_hat_imagining_a_com_44e6eee8-45ca-49ef-a903-9c3fed617579-300x168.png\"><div class=\"fusion-text fusion-text-6 fusion-text-no-margin\" style=\"--awb-content-alignment:center;--awb-text-color:var(--awb-color5);--awb-margin-bottom:0px;\"><h2><span style=\"color: var(--awb-color4);\">FREE<br \/>\nIT CONSULTING<\/span><\/h2>\n<\/div><div class=\"fusion-text fusion-text-7\" style=\"--awb-content-alignment:center;--awb-font-size:18px;--awb-line-height:23px;--awb-text-color:var(--awb-color6);--awb-margin-top:-2%;\"><p>Don&#8217;t wait any longer:<br \/>Book your IT consultation with OUTi today.<\/p>\n<\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-2 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"#\" data-toggle=\"modal\" data-target=\".fusion-modal.RDV\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">SCHEDULE A CONSULTATION<\/span><\/a><\/div><\/div><\/div>\n<\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:5%;--awb-padding-left:5%;--awb-margin-bottom:2.5%;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-space-around fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-flex-align-self-stretch fusion-column-inner-bg-wrapper\" style=\"--awb-padding-top:1%;--awb-padding-right:4%;--awb-padding-bottom:1%;--awb-padding-left:4%;--awb-overflow:hidden;--awb-inner-bg-color:var(--awb-color6);--awb-inner-bg-color-hover:rgba(255,255,255,0);--awb-inner-bg-image:url(&#039;https:\/\/outi.ca\/wp-content\/uploads\/2025\/04\/services_-3-1024x384.jpg&#039;);--awb-inner-bg-position:left center;--awb-inner-bg-size:cover;--awb-border-color:var(--awb-color2);--awb-border-color-hover:rgba(255,255,255,0);--awb-border-top:2px;--awb-border-right:2px;--awb-border-bottom:2px;--awb-border-left:2px;--awb-border-style:solid;--awb-border-radius:5px 5px 5px 5px;--awb-inner-bg-border-radius:5px 5px 5px 5px;--awb-inner-bg-overflow:hidden;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><span class=\"fusion-column-inner-bg hover-type-none\"><a class=\"fusion-column-anchor\" href=\"https:\/\/outi.ca\/en\/services\/\"><span class=\"fusion-column-inner-bg-image\"><\/span><\/a><\/span><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column fusion-column-has-bg-image\" data-bg-url=\"https:\/\/outi.ca\/wp-content\/uploads\/2025\/04\/services_-3-1024x384.jpg\"><div class=\"fusion-text fusion-text-8\"><p>SERVICES<\/p>\n<\/div><i class=\"fb-icon-element-1 fb-icon-element fontawesome-icon fa-arrow-left fas circle-yes fusion-text-flow\" style=\"--awb-iconcolor:var(--awb-color2);--awb-iconcolor-hover:var(--awb-color2);--awb-circlecolor:rgba(255,255,255,0);--awb-circlecolor-hover:rgba(255,255,255,0);--awb-circlebordercolor:var(--awb-color2);--awb-circlebordercolor-hover:var(--awb-color2);--awb-circlebordersize:1px;--awb-font-size:17.6px;--awb-width:35.2px;--awb-height:35.2px;--awb-line-height:33.2px;--awb-margin-right:10px;\"><\/i><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:5.76%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-flex-align-self-stretch fusion-column-inner-bg-wrapper\" style=\"--awb-padding-top:1%;--awb-padding-right:4%;--awb-padding-bottom:1%;--awb-padding-left:4%;--awb-overflow:hidden;--awb-inner-bg-color:var(--awb-color6);--awb-inner-bg-color-hover:rgba(255,255,255,0);--awb-inner-bg-image:url(&#039;https:\/\/outi.ca\/wp-content\/uploads\/2025\/03\/consultation-flipped-1024x574.jpg&#039;);--awb-inner-bg-size:cover;--awb-border-color:var(--awb-color2);--awb-border-color-hover:rgba(255,255,255,0);--awb-border-top:2px;--awb-border-right:2px;--awb-border-bottom:2px;--awb-border-left:2px;--awb-border-style:solid;--awb-border-radius:5px 5px 5px 5px;--awb-inner-bg-border-radius:5px 5px 5px 5px;--awb-inner-bg-overflow:hidden;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><span class=\"fusion-column-inner-bg hover-type-none\"><a class=\"fusion-column-anchor\" href=\"https:\/\/outi.ca\/en\/it-consulting\/\"><span class=\"fusion-column-inner-bg-image\"><\/span><\/a><\/span><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column fusion-column-has-bg-image\" data-bg-url=\"https:\/\/outi.ca\/wp-content\/uploads\/2025\/03\/consultation-flipped-1024x574.jpg\"><div class=\"fusion-text fusion-text-9\" style=\"--awb-content-alignment:right;\"><p>IT CONSULTING<\/p>\n<\/div><i class=\"fb-icon-element-2 fb-icon-element fontawesome-icon fa-arrow-right fas circle-yes\" style=\"--awb-iconcolor:var(--awb-color2);--awb-iconcolor-hover:var(--awb-color2);--awb-circlecolor:rgba(255,255,255,0);--awb-circlecolor-hover:rgba(255,255,255,0);--awb-circlebordercolor:var(--awb-color2);--awb-circlebordercolor-hover:var(--awb-color2);--awb-circlebordersize:1px;--awb-font-size:17.6px;--awb-width:35.2px;--awb-height:35.2px;--awb-line-height:33.2px;--awb-margin-top:0;--awb-margin-right:0;--awb-margin-bottom:0;--awb-margin-left:10px;--awb-align-self:flex-end;\"><\/i><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":5340,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-6285","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CYBERSECURITY - OUTi<\/title>\n<meta name=\"description\" content=\"Prot\u00e9gez votre entreprise avec OUTi : solutions de cybers\u00e9curit\u00e9, audits TI, formations, int\u00e9gration de s\u00e9curit\u00e9 et consultations gratuites.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/outi.ca\/en\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CYBERSECURITY - OUTi\" \/>\n<meta property=\"og:description\" content=\"Prot\u00e9gez votre entreprise avec OUTi : solutions de cybers\u00e9curit\u00e9, audits TI, formations, int\u00e9gration de s\u00e9curit\u00e9 et consultations gratuites.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/outi.ca\/en\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"OUTi\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-10T18:55:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bjf.wax.mybluehost.me\/website_0f909993\/wp-content\/uploads\/2025\/04\/Outi_reseaux_sociaux-1024x538.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"34 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/outi.ca\\\/en\\\/cybersecurity\\\/\",\"url\":\"https:\\\/\\\/outi.ca\\\/en\\\/cybersecurity\\\/\",\"name\":\"CYBERSECURITY - OUTi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/outi.ca\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/outi.ca\\\/en\\\/cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/outi.ca\\\/en\\\/cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/outi.ca\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/cybersecurite_.jpg\",\"datePublished\":\"2025-05-27T16:49:01+00:00\",\"dateModified\":\"2025-06-10T18:55:36+00:00\",\"description\":\"Prot\u00e9gez votre entreprise avec OUTi : solutions de cybers\u00e9curit\u00e9, audits TI, formations, int\u00e9gration de s\u00e9curit\u00e9 et consultations gratuites.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/outi.ca\\\/en\\\/cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/outi.ca\\\/en\\\/cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/outi.ca\\\/en\\\/cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/outi.ca\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/cybersecurite_.jpg\",\"contentUrl\":\"https:\\\/\\\/outi.ca\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/cybersecurite_.jpg\",\"width\":2000,\"height\":750},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/outi.ca\\\/en\\\/cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/outi.ca\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CYBERSECURITY\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/outi.ca\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/outi.ca\\\/en\\\/\",\"name\":\"OUTi\",\"description\":\"Architectes TI\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/outi.ca\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CYBERSECURITY - OUTi","description":"Prot\u00e9gez votre entreprise avec OUTi : solutions de cybers\u00e9curit\u00e9, audits TI, formations, int\u00e9gration de s\u00e9curit\u00e9 et consultations gratuites.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/outi.ca\/en\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"CYBERSECURITY - OUTi","og_description":"Prot\u00e9gez votre entreprise avec OUTi : solutions de cybers\u00e9curit\u00e9, audits TI, formations, int\u00e9gration de s\u00e9curit\u00e9 et consultations gratuites.","og_url":"https:\/\/outi.ca\/en\/cybersecurity\/","og_site_name":"OUTi","article_modified_time":"2025-06-10T18:55:36+00:00","og_image":[{"url":"https:\/\/bjf.wax.mybluehost.me\/website_0f909993\/wp-content\/uploads\/2025\/04\/Outi_reseaux_sociaux-1024x538.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"34 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/outi.ca\/en\/cybersecurity\/","url":"https:\/\/outi.ca\/en\/cybersecurity\/","name":"CYBERSECURITY - OUTi","isPartOf":{"@id":"https:\/\/outi.ca\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/outi.ca\/en\/cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/outi.ca\/en\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/outi.ca\/wp-content\/uploads\/2025\/04\/cybersecurite_.jpg","datePublished":"2025-05-27T16:49:01+00:00","dateModified":"2025-06-10T18:55:36+00:00","description":"Prot\u00e9gez votre entreprise avec OUTi : solutions de cybers\u00e9curit\u00e9, audits TI, formations, int\u00e9gration de s\u00e9curit\u00e9 et consultations gratuites.","breadcrumb":{"@id":"https:\/\/outi.ca\/en\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/outi.ca\/en\/cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/outi.ca\/en\/cybersecurity\/#primaryimage","url":"https:\/\/outi.ca\/wp-content\/uploads\/2025\/04\/cybersecurite_.jpg","contentUrl":"https:\/\/outi.ca\/wp-content\/uploads\/2025\/04\/cybersecurite_.jpg","width":2000,"height":750},{"@type":"BreadcrumbList","@id":"https:\/\/outi.ca\/en\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/outi.ca\/en\/"},{"@type":"ListItem","position":2,"name":"CYBERSECURITY"}]},{"@type":"WebSite","@id":"https:\/\/outi.ca\/en\/#website","url":"https:\/\/outi.ca\/en\/","name":"OUTi","description":"Architectes TI","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/outi.ca\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/outi.ca\/en\/wp-json\/wp\/v2\/pages\/6285","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/outi.ca\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/outi.ca\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/outi.ca\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/outi.ca\/en\/wp-json\/wp\/v2\/comments?post=6285"}],"version-history":[{"count":31,"href":"https:\/\/outi.ca\/en\/wp-json\/wp\/v2\/pages\/6285\/revisions"}],"predecessor-version":[{"id":6559,"href":"https:\/\/outi.ca\/en\/wp-json\/wp\/v2\/pages\/6285\/revisions\/6559"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/outi.ca\/en\/wp-json\/wp\/v2\/media\/5340"}],"wp:attachment":[{"href":"https:\/\/outi.ca\/en\/wp-json\/wp\/v2\/media?parent=6285"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}