[section bg_color=”#59b549″ padding=”60px”]

[row]

[col span__sm=”12″ margin=”0px 0px -60px 0px” align=”center”]

[ux_text text_color=”rgb(0, 55, 70)”]

Cyberkit

[/ux_text]

[/col]

[/row]

[/section]
[section bg_color=”#003746″ dark=”true” padding=”60px”]

[row]

[col span__sm=”12″]

WHAT IS THE CYBERKIT?

A tool to better protect yourself and your organisation.

[/col]
[col span=”6″ span__sm=”12″]

The toolkit offers multiple contents to raise awareness of cyber-attacks and equip organisations and individuals with best practices in cyber security.

[button text=”Discover the different themes!” radius=”99″ icon=”icon-angle-right” link=”#themes” class=”hide-icon-on-tablet”]

[/col]
[col span=”6″ span__sm=”12″]

[ux_video url=”https://youtu.be/AiE79im5da0″ height=”50%”]

[/col]
[col span__sm=”12″ align=”left”]

WHO IS IT FOR?

For individuals and organisations of all sizes.

Although cyber attacks on large companies are often the ones that receive media attention, smaller companies and individuals are also victims on a daily basis.

Here are some figures representing the percentage of companies affected:

[/col]
[col span=”3″ span__sm=”12″ span__md=”4″ align=”center” class=”circle-progress”]

[ux_html class=”progress-circle p19″]

[/ux_html]
[ux_text font_size=”1″]

Small
(10 to 49 employees)

[/ux_text]

[/col]
[col span=”3″ span__sm=”12″ span__md=”4″ align=”center” class=”circle-progress”]

[ux_html class=”progress-circle p28″]

[/ux_html]
[ux_text font_size=”1″]

Medium
(50 to 249 employees)

[/ux_text]

[/col]
[col span=”3″ span__sm=”12″ span__md=”4″ align=”center” class=”circle-progress”]

[ux_html class=”progress-circle p41″]

[/ux_html]
[ux_text font_size=”1″]

Big
(250 employees)

[/ux_text]

[/col]

[/row]

[/section]
[scroll_to title=”Themes” bullet=”false”]

[section padding=”60px”]

[row]

[col span__sm=”12″]

Key topics in cybersecurity

[ux_slider slide_align=”left” nav_pos=”outside” nav_style=”simple” nav_color=”dark” class=”responsive-slider three-cols sooner-responsive”]

[section_inner]

[row_inner]

[col_inner span__sm=”12″ padding=”30px 40px 30px 30px” bg_color=”#003746″ color=”light”]

[featured_box]

[ux_text line_height=”1.1″ class=”line-clamp-2″]

Phishing

[/ux_text]
[row_inner_1 v_align=”middle” h_align=”center”]

[col_inner_1 span=”4″ span__sm=”12″]

[/col_inner_1]
[col_inner_1 span=”4″ span__sm=”12″]

[ux_image id=”2937″ class=”fix-100″]

[/col_inner_1]
[col_inner_1 span=”4″ span__sm=”12″]

[/col_inner_1]

[/row_inner_1]
[ux_text text_color=”#59b549″ class=”line-clamp-3″]

Protect your company against one of the attacks

[/ux_text]
[gap height=”20px”]

[button text=”Learn more” size=”smaller” radius=”99″ icon=”icon-angle-right” link=”https://qa.cybereco.ca/en/cyberkit/phishing/”]

[/featured_box]

[/col_inner]

[/row_inner]

[/section_inner]
[section_inner]

[row_inner]

[col_inner span__sm=”12″ padding=”30px 30px 30px 30px” bg_color=”#59b549″ color=”light”]

[featured_box]

[ux_text line_height=”1.1″ class=”line-clamp-2″]

Passwords

[/ux_text]
[row_inner_1 v_align=”middle” h_align=”center”]

[col_inner_1 span=”4″ span__sm=”12″]

[/col_inner_1]
[col_inner_1 span=”4″ span__sm=”12″]

[ux_image id=”2931″ width=”96″ class=”fix-100″]

[/col_inner_1]
[col_inner_1 span=”4″ span__sm=”12″]

[/col_inner_1]

[/row_inner_1]
[ux_text text_color=”#003746″ class=”line-clamp-3″]

All about creating a strong password

[/ux_text]
[gap height=”20px”]

[button text=”Learn more” color=”secondary” size=”smaller” radius=”99″ icon=”icon-angle-right” link=”https://qa.cybereco.ca/en/cyberkit/passwords/”]

[/featured_box]

[/col_inner]

[/row_inner]

[/section_inner]
[section_inner]

[row_inner]

[col_inner span__sm=”12″ padding=”30px 40px 30px 30px” bg_color=”#003746″ color=”light”]

[featured_box]

[ux_text line_height=”1.1″ class=”line-clamp-2″]

Fraud by impersonation

[/ux_text]
[row_inner_1 v_align=”middle” h_align=”center”]

[col_inner_1 span=”4″ span__sm=”12″]

[/col_inner_1]
[col_inner_1 span=”4″ span__sm=”12″]

[ux_image id=”2940″ class=”fix-100″]

[/col_inner_1]
[col_inner_1 span=”4″ span__sm=”12″]

[/col_inner_1]

[/row_inner_1]
[ux_text text_color=”#59b549″ class=”line-clamp-3″]

Protect your company against one of the attacks

[/ux_text]
[gap height=”20px”]

[button text=”Learn more” size=”smaller” radius=”99″ icon=”icon-angle-right” link=”https://qa.cybereco.ca/en/cyberkit/fraud-by-impersonation/”]

[/featured_box]

[/col_inner]

[/row_inner]

[/section_inner]
[section_inner]

[row_inner]

[col_inner span__sm=”12″ padding=”30px 30px 30px 30px” bg_color=”#59b549″ color=”light”]

[featured_box]

[ux_text line_height=”1.1″ class=”line-clamp-2″]

Remote working

[/ux_text]
[row_inner_1 v_align=”middle” h_align=”center”]

[col_inner_1 span=”4″ span__sm=”12″]

[/col_inner_1]
[col_inner_1 span=”4″ span__sm=”12″]

[ux_image id=”2942″ class=”fix-100″]

[/col_inner_1]
[col_inner_1 span=”4″ span__sm=”12″]

[/col_inner_1]

[/row_inner_1]
[ux_text text_color=”rgb(0, 55, 70)” class=”line-clamp-3″]

Protect yourself outside the office

[/ux_text]
[gap height=”20px”]

[button text=”Learn more” color=”secondary” size=”smaller” radius=”99″ icon=”icon-angle-right” link=”https://qa.cybereco.ca/en/cyberkit/remote-working/”]

[/featured_box]

[/col_inner]

[/row_inner]

[/section_inner]
[section_inner]

[row_inner]

[col_inner span__sm=”12″ padding=”30px 30px 30px 30px” bg_color=”#003746″ color=”light”]

[featured_box]

[ux_text line_height=”1.1″ class=”line-clamp-2″]

Ransomware

[/ux_text]
[row_inner_1 v_align=”middle” h_align=”center”]

[col_inner_1 span=”4″ span__sm=”12″]

[/col_inner_1]
[col_inner_1 span=”4″ span__sm=”12″]

[ux_image id=”2964″ class=”fix-100″]

[/col_inner_1]
[col_inner_1 span=”4″ span__sm=”12″]

[/col_inner_1]

[/row_inner_1]
[ux_text text_color=”#59b549″ class=”line-clamp-3″]

Protect yourself against cybercriminals and ransomware

[/ux_text]
[gap height=”20px”]

[button text=”Learn more” size=”smaller” radius=”99″ icon=”icon-angle-right” link=”https://qa.cybereco.ca/cybertrousse/rancongiciel/” target=”_blank”]

[/featured_box]

[/col_inner]

[/row_inner]

[/section_inner]
[section_inner]

[row_inner]

[col_inner span__sm=”12″ padding=”30px 30px 30px 30px” bg_color=”#59b549″ color=”light”]

[featured_box]

[ux_text line_height=”1.1″ class=”line-clamp-2″]

Data protection

[/ux_text]
[row_inner_1 v_align=”middle” h_align=”center”]

[col_inner_1 span=”4″ span__sm=”12″]

[/col_inner_1]
[col_inner_1 span=”4″ span__sm=”12″]

[ux_image id=”2962″ class=”fix-100″]

[/col_inner_1]
[col_inner_1 span=”4″ span__sm=”12″]

[/col_inner_1]

[/row_inner_1]
[ux_text text_color=”rgb(0, 55, 70)” class=”line-clamp-3″]

Protect your data at all times

[/ux_text]
[gap height=”20px”]

[button text=”Learn more” color=”secondary” size=”smaller” radius=”99″ icon=”icon-angle-right” link=”https://qa.cybereco.ca/cybertrousse/protection-des-donnees/” target=”_blank”]

[/featured_box]

[/col_inner]

[/row_inner]

[/section_inner]

[/ux_slider]

[/col]

[/row]

[/section]
[section bg_color=”#003746″ padding=”60px”]

[row]

[col span__sm=”12″]

Guides Cybereco

[ux_slider nav_pos=”outside” nav_style=”simple” nav_color=”dark” class=”responsive-slider three-cols”]

[row_inner h_align=”center”]

[col_inner span=”4″ span__sm=”12″ span__md=”10″]

[button text=”Guide on Incidents Management” radius=”99″ expand=”true” link=”https://qa.cybereco.ca/wp-content/uploads/guide-de-gestion-des-incidents-pmes-pdf.pdf” target=”_blank”]

[/col_inner]
[col_inner span=”4″ span__sm=”12″ span__md=”10″]

[button text=”Guide on Cyberinsurance” radius=”99″ expand=”true” link=”https://qa.cybereco.ca/wp-content/uploads/fr_cybereco-_cyber-insurance_-final.pdf” target=”_blank”]

[/col_inner]
[col_inner span=”4″ span__sm=”12″ span__md=”10″]

[button text=”Guide on Act 25″ radius=”99″ expand=”true” link=”https://qa.cybereco.ca/wp-content/uploads/loi-25-cybereco-20220531.pdf” target=”_blank”]

[ux_video url=”https://youtu.be/4W4TQXnei1M”]

[/col_inner]

[/row_inner]

[/ux_slider]

[/col]

[/row]

[/section]

This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.