{"id":6972,"date":"2026-03-20T10:54:10","date_gmt":"2026-03-20T14:54:10","guid":{"rendered":"https:\/\/rhesus.net\/it-solutions\/cybersecurity\/cybersecurity-audit-and-posture-assessment\/"},"modified":"2026-05-19T15:33:12","modified_gmt":"2026-05-19T19:33:12","slug":"cybersecurity-audit-and-posture-assessment","status":"publish","type":"page","link":"https:\/\/rhesus.net\/en\/it-solutions\/cybersecurity\/cybersecurity-audit-and-posture-assessment\/","title":{"rendered":"Cybersecurity Audit and Posture Assessment"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"6972\" class=\"elementor elementor-6972 elementor-5972\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b3156c3 e-con e-atomic-element e-flexbox-base boxed-container hero-boxed bg-overlay-black-plus e-b3156c3-db0f98f\" data-id=\"b3156c3\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"b3156c3\" data-e-type=\"e-flexbox\" data-id=\"b3156c3\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d5dfa41 e-con e-atomic-element e-flexbox-base hero-container\" data-id=\"d5dfa41\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"d5dfa41\" data-e-type=\"e-flexbox\" data-id=\"d5dfa41\">\n\t\t\t\t<div class=\"elementor-element elementor-element-375640b e-con e-atomic-element e-flexbox-base padding-0 hero-content-box gap-40\" data-id=\"375640b\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"375640b\" data-e-type=\"e-flexbox\" data-id=\"375640b\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ec91a59 wide jedv-enabled--yes elementor-widget__width-inherit elementor-widget elementor-widget-breadcrumbs\" data-id=\"ec91a59\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><\/p>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<h1 \n\t\tdata-interaction-id=\"31121fe\" \n\t\tclass=\"extended display white flex-justify-left hero-title e-heading-base\" \n\t\t \n\t\tdata-e-type=\"widget\" data-id=\"31121fe\"\n\t>\n\t\n\t\t\tCybersecurity Audit and Posture Assessment for Businesses\n\t\t<\/h1>\n\t\t\t\t\t\t\t\t<p class=\"white texte-courant-big hero-txt e-paragraph-base\" data-interaction-id=\"fcffdbd\"  data-e-type=\"widget\" data-id=\"fcffdbd\">\n\t\t\t\t\t\t\t\tGet a clear picture of your Microsoft 365 environment and IT infrastructure\n\t\t\t\t\t<\/p>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc93516 e-con e-atomic-element e-flexbox-base boxed-container\" data-id=\"bc93516\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"bc93516\" data-e-type=\"e-flexbox\" data-id=\"bc93516\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e631ea9 e-con e-atomic-element e-flexbox-base main-padding flex-col gap-100\" data-id=\"e631ea9\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"e631ea9\" data-e-type=\"e-flexbox\" data-id=\"e631ea9\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e4a7312 e-con e-atomic-element e-flexbox-base padding-0 flex-col gap-30\" data-id=\"e4a7312\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"e4a7312\" data-e-type=\"e-flexbox\" data-id=\"e4a7312\">\n\t\t\t\t\t\t\t<h2 \n\t\tdata-interaction-id=\"3c62fee\" \n\t\tclass=\"wide square-title titre-courant e-3c62fee-ad961f2 full-width square-gold e-heading-base\" \n\t\t \n\t\tdata-e-type=\"widget\" data-id=\"3c62fee\"\n\t>\n\t\n\t\t\tYour business evolves, your tools multiply \u2014 and so do the threats.\n\t\t<\/h2>\n\t\t\t\t\t\t\t\t<p class=\"titre-31 e-paragraph-base\" data-interaction-id=\"bbce952\"  data-e-type=\"widget\" data-id=\"bbce952\">\n\t\t\t\t\t\t\t\tOur cybersecurity audit identifies:\n\t\t\t\t\t<\/p>\n\t\t\t\t<div class=\"elementor-element elementor-element-064a99c elementor-widget__width-inherit elementor-widget-laptop__width-inherit elementor-widget-mobile__width-inherit elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"064a99c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"62\" height=\"62\" viewBox=\"0 0 62 62\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M0 31.0001C0 13.8793 13.8793 0 31.0001 0C48.1208 0.000143427 61.9994 13.8788 61.9996 30.9994C61.9996 48.1203 48.1203 61.9996 30.9994 61.9996C13.879 61.9994 0.000229447 48.1206 0 31.0001ZM23.8821 19.4109C23.4213 19.4206 23.0559 19.8015 23.0652 20.2623C23.0746 20.7234 23.4556 21.09 23.9166 21.0806L39.7444 20.7568L19.2908 41.2104C18.9647 41.5365 18.9647 42.0651 19.2908 42.3912C19.6169 42.7167 20.1457 42.7171 20.4716 42.3912L40.9245 21.9383L40.6006 37.7646C40.5912 38.2257 40.9579 38.6066 41.4189 38.616C41.8796 38.6251 42.2608 38.2598 42.2703 37.7991L42.6356 19.897C42.6402 19.6701 42.5523 19.4507 42.3919 19.2901C42.2312 19.1294 42.0113 19.0411 41.7842 19.0456L23.8821 19.4109Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">your risks<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"62\" height=\"62\" viewBox=\"0 0 62 62\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M0 31.0001C0 13.8793 13.8793 0 31.0001 0C48.1208 0.000143427 61.9994 13.8788 61.9996 30.9994C61.9996 48.1203 48.1203 61.9996 30.9994 61.9996C13.879 61.9994 0.000229447 48.1206 0 31.0001ZM23.8821 19.4109C23.4213 19.4206 23.0559 19.8015 23.0652 20.2623C23.0746 20.7234 23.4556 21.09 23.9166 21.0806L39.7444 20.7568L19.2908 41.2104C18.9647 41.5365 18.9647 42.0651 19.2908 42.3912C19.6169 42.7167 20.1457 42.7171 20.4716 42.3912L40.9245 21.9383L40.6006 37.7646C40.5912 38.2257 40.9579 38.6066 41.4189 38.616C41.8796 38.6251 42.2608 38.2598 42.2703 37.7991L42.6356 19.897C42.6402 19.6701 42.5523 19.4507 42.3919 19.2901C42.2312 19.1294 42.0113 19.0411 41.7842 19.0456L23.8821 19.4109Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">your critical vulnerabilities<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"62\" height=\"62\" viewBox=\"0 0 62 62\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M0 31.0001C0 13.8793 13.8793 0 31.0001 0C48.1208 0.000143427 61.9994 13.8788 61.9996 30.9994C61.9996 48.1203 48.1203 61.9996 30.9994 61.9996C13.879 61.9994 0.000229447 48.1206 0 31.0001ZM23.8821 19.4109C23.4213 19.4206 23.0559 19.8015 23.0652 20.2623C23.0746 20.7234 23.4556 21.09 23.9166 21.0806L39.7444 20.7568L19.2908 41.2104C18.9647 41.5365 18.9647 42.0651 19.2908 42.3912C19.6169 42.7167 20.1457 42.7171 20.4716 42.3912L40.9245 21.9383L40.6006 37.7646C40.5912 38.2257 40.9579 38.6066 41.4189 38.616C41.8796 38.6251 42.2608 38.2598 42.2703 37.7991L42.6356 19.897C42.6402 19.6701 42.5523 19.4507 42.3919 19.2901C42.2312 19.1294 42.0113 19.0411 41.7842 19.0456L23.8821 19.4109Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">your outdated elements<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"62\" height=\"62\" viewBox=\"0 0 62 62\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M0 31.0001C0 13.8793 13.8793 0 31.0001 0C48.1208 0.000143427 61.9994 13.8788 61.9996 30.9994C61.9996 48.1203 48.1203 61.9996 30.9994 61.9996C13.879 61.9994 0.000229447 48.1206 0 31.0001ZM23.8821 19.4109C23.4213 19.4206 23.0559 19.8015 23.0652 20.2623C23.0746 20.7234 23.4556 21.09 23.9166 21.0806L39.7444 20.7568L19.2908 41.2104C18.9647 41.5365 18.9647 42.0651 19.2908 42.3912C19.6169 42.7167 20.1457 42.7171 20.4716 42.3912L40.9245 21.9383L40.6006 37.7646C40.5912 38.2257 40.9579 38.6066 41.4189 38.616C41.8796 38.6251 42.2608 38.2598 42.2703 37.7991L42.6356 19.897C42.6402 19.6701 42.5523 19.4507 42.3919 19.2901C42.2312 19.1294 42.0113 19.0411 41.7842 19.0456L23.8821 19.4109Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">your action priorities<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<p class=\"titre-31 e-paragraph-base\" data-interaction-id=\"e067bab\"  data-e-type=\"widget\" data-id=\"e067bab\">\n\t\t\t\t\t\t\t\tYet few organizations have a truly complete view of their IT security posture.<br><br>Our assessment helps you see exactly where vulnerabilities lie, what needs to be addressed quickly, and what can be planned over the medium term.\n\t\t\t\t\t<\/p>\n\t\t\t\t<div class=\"elementor-element elementor-element-b8e98a7 btn-aware elementor-mobile-align-left elementor-widget elementor-widget-button\" data-id=\"b8e98a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#form\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Let's talk about it<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bad5608 e-con e-atomic-element e-flexbox-base padding-0 flex-col gap-30\" data-id=\"bad5608\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"bad5608\" data-e-type=\"e-flexbox\" data-id=\"bad5608\">\n\t\t\t\t\t\t\t<h2 \n\t\tdata-interaction-id=\"2217207\" \n\t\tclass=\"wide square-title titre-courant e-2217207-a1f29f3 full-width square-gold e-heading-base\" \n\t\t \n\t\tdata-e-type=\"widget\" data-id=\"2217207\"\n\t>\n\t\n\t\t\tYou can\u2019t protect what you can\u2019t see clearly\n\t\t<\/h2>\n\t\t\t\t\t\t\t\t<p class=\"titre-31 e-paragraph-base\" data-interaction-id=\"2744996\"  data-e-type=\"widget\" data-id=\"2744996\">\n\t\t\t\t\t\t\t\tOver time, technology environments become more complex: Microsoft 365 accounts, devices, servers, remote access, licences, configurations, solutions added over the years.\n\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t\t<p class=\"texte-courant-big e-paragraph-base\" data-interaction-id=\"ab8dc6f\"  data-e-type=\"widget\" data-id=\"ab8dc6f\">\n\t\t\t\t\t\t\t\tThe risk doesn\u2019t come only from a cyberattack. It also comes from obsolescence, misconfigured settings, a lack of control, partial visibility, and a failure to prioritize.\n\t\t\t\t\t<\/p>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b17703b e-con e-atomic-element e-flexbox-base border-radius-20 padding-5 e-b17703b-00e4af6 flex-col gap-40 bg-overlay-grain\" data-id=\"b17703b\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"b17703b\" data-e-type=\"e-flexbox\" data-id=\"b17703b\">\n\t\t\t\t\t\t\t\t<p class=\"gold-500 white z-index-999 titre-31 e-paragraph-base\" data-interaction-id=\"8eb4dc8\"  data-e-type=\"widget\" data-id=\"8eb4dc8\">\n\t\t\t\t\t\t\t\tOur cybersecurity posture assessment helps you answer essential questions:\n\t\t\t\t\t<\/p>\n\t\t\t\t<div class=\"elementor-element elementor-element-ffd28ca e-con e-atomic-element e-flexbox-base padding-0 e-ffd28ca-91cd93a\" data-id=\"ffd28ca\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"ffd28ca\" data-e-type=\"e-flexbox\" data-id=\"ffd28ca\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c02e040 elementor-widget__width-inherit elementor-widget-laptop__width-inherit elementor-widget-mobile__width-inherit elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"c02e040\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"62\" height=\"62\" viewBox=\"0 0 62 62\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M0 31.0001C0 13.8793 13.8793 0 31.0001 0C48.1208 0.000143427 61.9994 13.8788 61.9996 30.9994C61.9996 48.1203 48.1203 61.9996 30.9994 61.9996C13.879 61.9994 0.000229447 48.1206 0 31.0001ZM23.8821 19.4109C23.4213 19.4206 23.0559 19.8015 23.0652 20.2623C23.0746 20.7234 23.4556 21.09 23.9166 21.0806L39.7444 20.7568L19.2908 41.2104C18.9647 41.5365 18.9647 42.0651 19.2908 42.3912C19.6169 42.7167 20.1457 42.7171 20.4716 42.3912L40.9245 21.9383L40.6006 37.7646C40.5912 38.2257 40.9579 38.6066 41.4189 38.616C41.8796 38.6251 42.2608 38.2598 42.2703 37.7991L42.6356 19.897C42.6402 19.6701 42.5523 19.4507 42.3919 19.2901C42.2312 19.1294 42.0113 19.0411 41.7842 19.0456L23.8821 19.4109Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Where are our most significant risks?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"62\" height=\"62\" viewBox=\"0 0 62 62\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M0 31.0001C0 13.8793 13.8793 0 31.0001 0C48.1208 0.000143427 61.9994 13.8788 61.9996 30.9994C61.9996 48.1203 48.1203 61.9996 30.9994 61.9996C13.879 61.9994 0.000229447 48.1206 0 31.0001ZM23.8821 19.4109C23.4213 19.4206 23.0559 19.8015 23.0652 20.2623C23.0746 20.7234 23.4556 21.09 23.9166 21.0806L39.7444 20.7568L19.2908 41.2104C18.9647 41.5365 18.9647 42.0651 19.2908 42.3912C19.6169 42.7167 20.1457 42.7171 20.4716 42.3912L40.9245 21.9383L40.6006 37.7646C40.5912 38.2257 40.9579 38.6066 41.4189 38.616C41.8796 38.6251 42.2608 38.2598 42.2703 37.7991L42.6356 19.897C42.6402 19.6701 42.5523 19.4507 42.3919 19.2901C42.2312 19.1294 42.0113 19.0411 41.7842 19.0456L23.8821 19.4109Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Which vulnerabilities need to be addressed first?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"62\" height=\"62\" viewBox=\"0 0 62 62\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M0 31.0001C0 13.8793 13.8793 0 31.0001 0C48.1208 0.000143427 61.9994 13.8788 61.9996 30.9994C61.9996 48.1203 48.1203 61.9996 30.9994 61.9996C13.879 61.9994 0.000229447 48.1206 0 31.0001ZM23.8821 19.4109C23.4213 19.4206 23.0559 19.8015 23.0652 20.2623C23.0746 20.7234 23.4556 21.09 23.9166 21.0806L39.7444 20.7568L19.2908 41.2104C18.9647 41.5365 18.9647 42.0651 19.2908 42.3912C19.6169 42.7167 20.1457 42.7171 20.4716 42.3912L40.9245 21.9383L40.6006 37.7646C40.5912 38.2257 40.9579 38.6066 41.4189 38.616C41.8796 38.6251 42.2608 38.2598 42.2703 37.7991L42.6356 19.897C42.6402 19.6701 42.5523 19.4507 42.3919 19.2901C42.2312 19.1294 42.0113 19.0411 41.7842 19.0456L23.8821 19.4109Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Is our Microsoft 365 environment adequately protected?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e759d23 elementor-widget__width-inherit elementor-widget-laptop__width-inherit elementor-widget-mobile__width-inherit elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"e759d23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"62\" height=\"62\" viewBox=\"0 0 62 62\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M0 31.0001C0 13.8793 13.8793 0 31.0001 0C48.1208 0.000143427 61.9994 13.8788 61.9996 30.9994C61.9996 48.1203 48.1203 61.9996 30.9994 61.9996C13.879 61.9994 0.000229447 48.1206 0 31.0001ZM23.8821 19.4109C23.4213 19.4206 23.0559 19.8015 23.0652 20.2623C23.0746 20.7234 23.4556 21.09 23.9166 21.0806L39.7444 20.7568L19.2908 41.2104C18.9647 41.5365 18.9647 42.0651 19.2908 42.3912C19.6169 42.7167 20.1457 42.7171 20.4716 42.3912L40.9245 21.9383L40.6006 37.7646C40.5912 38.2257 40.9579 38.6066 41.4189 38.616C41.8796 38.6251 42.2608 38.2598 42.2703 37.7991L42.6356 19.897C42.6402 19.6701 42.5523 19.4507 42.3919 19.2901C42.2312 19.1294 42.0113 19.0411 41.7842 19.0456L23.8821 19.4109Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Does our infrastructure include any outdated or vulnerable elements?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"62\" height=\"62\" viewBox=\"0 0 62 62\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M0 31.0001C0 13.8793 13.8793 0 31.0001 0C48.1208 0.000143427 61.9994 13.8788 61.9996 30.9994C61.9996 48.1203 48.1203 61.9996 30.9994 61.9996C13.879 61.9994 0.000229447 48.1206 0 31.0001ZM23.8821 19.4109C23.4213 19.4206 23.0559 19.8015 23.0652 20.2623C23.0746 20.7234 23.4556 21.09 23.9166 21.0806L39.7444 20.7568L19.2908 41.2104C18.9647 41.5365 18.9647 42.0651 19.2908 42.3912C19.6169 42.7167 20.1457 42.7171 20.4716 42.3912L40.9245 21.9383L40.6006 37.7646C40.5912 38.2257 40.9579 38.6066 41.4189 38.616C41.8796 38.6251 42.2608 38.2598 42.2703 37.7991L42.6356 19.897C42.6402 19.6701 42.5523 19.4507 42.3919 19.2901C42.2312 19.1294 42.0113 19.0411 41.7842 19.0456L23.8821 19.4109Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Which actions will have the greatest impact on our security?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<p class=\"titre-31 e-paragraph-base\" data-interaction-id=\"aa4d1e7\"  data-e-type=\"widget\" data-id=\"aa4d1e7\">\n\t\t\t\t\t\t\t\tA cybersecurity audit allows SMEs to identify the real risks in their technology environment, including Microsoft 365 configuration flaws, outdated infrastructure elements, and vulnerabilities that increase their exposure to cyberattacks.\n\t\t\t\t\t<\/p>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ba7762 e-con e-atomic-element e-flexbox-base boxed-container border-radius-TR-BR-120 e-5ba7762-0cd6c96 bg-overlay-grain\" data-id=\"5ba7762\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"5ba7762\" data-e-type=\"e-flexbox\" data-id=\"5ba7762\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57f0c92 e-con e-atomic-element e-flexbox-base flex-col z-index-999 diag-padding white gap-40\" data-id=\"57f0c92\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"57f0c92\" data-e-type=\"e-flexbox\" data-id=\"57f0c92\">\n\t\t\t\t\t\t\t<h2 \n\t\tdata-interaction-id=\"16ff4dd\" \n\t\tclass=\"wide square-title e-16ff4dd-47c10b6 width-80 square-gold-100 titre-courant e-heading-base\" \n\t\t \n\t\tdata-e-type=\"widget\" data-id=\"16ff4dd\"\n\t>\n\t\n\t\t\tA comprehensive analysis of your technological environment\n\t\t<\/h2>\n\t\t\t\t\t\t\t\t<p class=\"titre-31 e-paragraph-base\" data-interaction-id=\"31c4f75\"  data-e-type=\"widget\" data-id=\"31c4f75\">\n\t\t\t\t\t\t\t\tOur IT security audit covers your entire environment to provide a clear, concrete and prioritized view of your security level.\n\t\t\t\t\t<\/p>\n\t\t\t\t<div class=\"elementor-element elementor-element-f843ee1 e-con e-atomic-element e-flexbox-base black-blue-border-box\" data-id=\"f843ee1\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"f843ee1\" data-e-type=\"e-flexbox\" data-id=\"f843ee1\">\n\t\t\t\t\t\t\t\t<p class=\"titre-31 e-paragraph-base\" data-interaction-id=\"1af6378\"  data-e-type=\"widget\" data-id=\"1af6378\">\n\t\t\t\t\t\t\t\tMicrosoft 365\n\t\t\t\t\t<\/p>\n\t\t\t\t<div class=\"elementor-element elementor-element-c19a08e e-con e-atomic-element e-flexbox-base padding-0 e-c19a08e-2509475\" data-id=\"c19a08e\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"c19a08e\" data-e-type=\"e-flexbox\" data-id=\"c19a08e\">\n\t\t\t\t<div class=\"elementor-element elementor-element-56ec2e3 elementor-mobile-align-start elementor-widget__width-inherit elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"56ec2e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"62\" height=\"62\" viewBox=\"0 0 62 62\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M0 31.0001C0 13.8793 13.8793 0 31.0001 0C48.1208 0.000143427 61.9994 13.8788 61.9996 30.9994C61.9996 48.1203 48.1203 61.9996 30.9994 61.9996C13.879 61.9994 0.000229447 48.1206 0 31.0001ZM23.8821 19.4109C23.4213 19.4206 23.0559 19.8015 23.0652 20.2623C23.0746 20.7234 23.4556 21.09 23.9166 21.0806L39.7444 20.7568L19.2908 41.2104C18.9647 41.5365 18.9647 42.0651 19.2908 42.3912C19.6169 42.7167 20.1457 42.7171 20.4716 42.3912L40.9245 21.9383L40.6006 37.7646C40.5912 38.2257 40.9579 38.6066 41.4189 38.616C41.8796 38.6251 42.2608 38.2598 42.2703 37.7991L42.6356 19.897C42.6402 19.6701 42.5523 19.4507 42.3919 19.2901C42.2312 19.1294 42.0113 19.0411 41.7842 19.0456L23.8821 19.4109Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">General security settings<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"62\" height=\"62\" viewBox=\"0 0 62 62\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M0 31.0001C0 13.8793 13.8793 0 31.0001 0C48.1208 0.000143427 61.9994 13.8788 61.9996 30.9994C61.9996 48.1203 48.1203 61.9996 30.9994 61.9996C13.879 61.9994 0.000229447 48.1206 0 31.0001ZM23.8821 19.4109C23.4213 19.4206 23.0559 19.8015 23.0652 20.2623C23.0746 20.7234 23.4556 21.09 23.9166 21.0806L39.7444 20.7568L19.2908 41.2104C18.9647 41.5365 18.9647 42.0651 19.2908 42.3912C19.6169 42.7167 20.1457 42.7171 20.4716 42.3912L40.9245 21.9383L40.6006 37.7646C40.5912 38.2257 40.9579 38.6066 41.4189 38.616C41.8796 38.6251 42.2608 38.2598 42.2703 37.7991L42.6356 19.897C42.6402 19.6701 42.5523 19.4507 42.3919 19.2901C42.2312 19.1294 42.0113 19.0411 41.7842 19.0456L23.8821 19.4109Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Identity and access management<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"62\" height=\"62\" viewBox=\"0 0 62 62\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M0 31.0001C0 13.8793 13.8793 0 31.0001 0C48.1208 0.000143427 61.9994 13.8788 61.9996 30.9994C61.9996 48.1203 48.1203 61.9996 30.9994 61.9996C13.879 61.9994 0.000229447 48.1206 0 31.0001ZM23.8821 19.4109C23.4213 19.4206 23.0559 19.8015 23.0652 20.2623C23.0746 20.7234 23.4556 21.09 23.9166 21.0806L39.7444 20.7568L19.2908 41.2104C18.9647 41.5365 18.9647 42.0651 19.2908 42.3912C19.6169 42.7167 20.1457 42.7171 20.4716 42.3912L40.9245 21.9383L40.6006 37.7646C40.5912 38.2257 40.9579 38.6066 41.4189 38.616C41.8796 38.6251 42.2608 38.2598 42.2703 37.7991L42.6356 19.897C42.6402 19.6701 42.5523 19.4507 42.3919 19.2901C42.2312 19.1294 42.0113 19.0411 41.7842 19.0456L23.8821 19.4109Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Multi-factor authentication<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"62\" height=\"62\" viewBox=\"0 0 62 62\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M0 31.0001C0 13.8793 13.8793 0 31.0001 0C48.1208 0.000143427 61.9994 13.8788 61.9996 30.9994C61.9996 48.1203 48.1203 61.9996 30.9994 61.9996C13.879 61.9994 0.000229447 48.1206 0 31.0001ZM23.8821 19.4109C23.4213 19.4206 23.0559 19.8015 23.0652 20.2623C23.0746 20.7234 23.4556 21.09 23.9166 21.0806L39.7444 20.7568L19.2908 41.2104C18.9647 41.5365 18.9647 42.0651 19.2908 42.3912C19.6169 42.7167 20.1457 42.7171 20.4716 42.3912L40.9245 21.9383L40.6006 37.7646C40.5912 38.2257 40.9579 38.6066 41.4189 38.616C41.8796 38.6251 42.2608 38.2598 42.2703 37.7991L42.6356 19.897C42.6402 19.6701 42.5523 19.4507 42.3919 19.2901C42.2312 19.1294 42.0113 19.0411 41.7842 19.0456L23.8821 19.4109Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Privileged accounts<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-084f76a elementor-mobile-align-start elementor-widget__width-inherit elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"084f76a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"62\" height=\"62\" viewBox=\"0 0 62 62\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M0 31.0001C0 13.8793 13.8793 0 31.0001 0C48.1208 0.000143427 61.9994 13.8788 61.9996 30.9994C61.9996 48.1203 48.1203 61.9996 30.9994 61.9996C13.879 61.9994 0.000229447 48.1206 0 31.0001ZM23.8821 19.4109C23.4213 19.4206 23.0559 19.8015 23.0652 20.2623C23.0746 20.7234 23.4556 21.09 23.9166 21.0806L39.7444 20.7568L19.2908 41.2104C18.9647 41.5365 18.9647 42.0651 19.2908 42.3912C19.6169 42.7167 20.1457 42.7171 20.4716 42.3912L40.9245 21.9383L40.6006 37.7646C40.5912 38.2257 40.9579 38.6066 41.4189 38.616C41.8796 38.6251 42.2608 38.2598 42.2703 37.7991L42.6356 19.897C42.6402 19.6701 42.5523 19.4507 42.3919 19.2901C42.2312 19.1294 42.0113 19.0411 41.7842 19.0456L23.8821 19.4109Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Security and protection policies<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"62\" height=\"62\" viewBox=\"0 0 62 62\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M0 31.0001C0 13.8793 13.8793 0 31.0001 0C48.1208 0.000143427 61.9994 13.8788 61.9996 30.9994C61.9996 48.1203 48.1203 61.9996 30.9994 61.9996C13.879 61.9994 0.000229447 48.1206 0 31.0001ZM23.8821 19.4109C23.4213 19.4206 23.0559 19.8015 23.0652 20.2623C23.0746 20.7234 23.4556 21.09 23.9166 21.0806L39.7444 20.7568L19.2908 41.2104C18.9647 41.5365 18.9647 42.0651 19.2908 42.3912C19.6169 42.7167 20.1457 42.7171 20.4716 42.3912L40.9245 21.9383L40.6006 37.7646C40.5912 38.2257 40.9579 38.6066 41.4189 38.616C41.8796 38.6251 42.2608 38.2598 42.2703 37.7991L42.6356 19.897C42.6402 19.6701 42.5523 19.4507 42.3919 19.2901C42.2312 19.1294 42.0113 19.0411 41.7842 19.0456L23.8821 19.4109Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Data sharing, collaboration, and exposure<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"62\" height=\"62\" viewBox=\"0 0 62 62\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M0 31.0001C0 13.8793 13.8793 0 31.0001 0C48.1208 0.000143427 61.9994 13.8788 61.9996 30.9994C61.9996 48.1203 48.1203 61.9996 30.9994 61.9996C13.879 61.9994 0.000229447 48.1206 0 31.0001ZM23.8821 19.4109C23.4213 19.4206 23.0559 19.8015 23.0652 20.2623C23.0746 20.7234 23.4556 21.09 23.9166 21.0806L39.7444 20.7568L19.2908 41.2104C18.9647 41.5365 18.9647 42.0651 19.2908 42.3912C19.6169 42.7167 20.1457 42.7171 20.4716 42.3912L40.9245 21.9383L40.6006 37.7646C40.5912 38.2257 40.9579 38.6066 41.4189 38.616C41.8796 38.6251 42.2608 38.2598 42.2703 37.7991L42.6356 19.897C42.6402 19.6701 42.5523 19.4507 42.3919 19.2901C42.2312 19.1294 42.0113 19.0411 41.7842 19.0456L23.8821 19.4109Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Configuration best practices<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f28c7a e-con e-atomic-element e-flexbox-base black-blue-border-box\" data-id=\"6f28c7a\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"6f28c7a\" data-e-type=\"e-flexbox\" data-id=\"6f28c7a\">\n\t\t\t\t\t\t\t\t<p class=\"titre-31 e-paragraph-base\" data-interaction-id=\"25fdcf5\"  data-e-type=\"widget\" data-id=\"25fdcf5\">\n\t\t\t\t\t\t\t\tIT Infrastructure\n\t\t\t\t\t<\/p>\n\t\t\t\t<div class=\"elementor-element elementor-element-5acbbc5 e-con e-atomic-element e-flexbox-base padding-0 e-5acbbc5-a0878c7\" data-id=\"5acbbc5\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"5acbbc5\" data-e-type=\"e-flexbox\" data-id=\"5acbbc5\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f252365 elementor-mobile-align-start elementor-widget__width-inherit elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"f252365\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"62\" height=\"62\" viewBox=\"0 0 62 62\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M0 31.0001C0 13.8793 13.8793 0 31.0001 0C48.1208 0.000143427 61.9994 13.8788 61.9996 30.9994C61.9996 48.1203 48.1203 61.9996 30.9994 61.9996C13.879 61.9994 0.000229447 48.1206 0 31.0001ZM23.8821 19.4109C23.4213 19.4206 23.0559 19.8015 23.0652 20.2623C23.0746 20.7234 23.4556 21.09 23.9166 21.0806L39.7444 20.7568L19.2908 41.2104C18.9647 41.5365 18.9647 42.0651 19.2908 42.3912C19.6169 42.7167 20.1457 42.7171 20.4716 42.3912L40.9245 21.9383L40.6006 37.7646C40.5912 38.2257 40.9579 38.6066 41.4189 38.616C41.8796 38.6251 42.2608 38.2598 42.2703 37.7991L42.6356 19.897C42.6402 19.6701 42.5523 19.4507 42.3919 19.2901C42.2312 19.1294 42.0113 19.0411 41.7842 19.0456L23.8821 19.4109Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Servers, workstations, and network equipment<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"62\" height=\"62\" viewBox=\"0 0 62 62\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M0 31.0001C0 13.8793 13.8793 0 31.0001 0C48.1208 0.000143427 61.9994 13.8788 61.9996 30.9994C61.9996 48.1203 48.1203 61.9996 30.9994 61.9996C13.879 61.9994 0.000229447 48.1206 0 31.0001ZM23.8821 19.4109C23.4213 19.4206 23.0559 19.8015 23.0652 20.2623C23.0746 20.7234 23.4556 21.09 23.9166 21.0806L39.7444 20.7568L19.2908 41.2104C18.9647 41.5365 18.9647 42.0651 19.2908 42.3912C19.6169 42.7167 20.1457 42.7171 20.4716 42.3912L40.9245 21.9383L40.6006 37.7646C40.5912 38.2257 40.9579 38.6066 41.4189 38.616C41.8796 38.6251 42.2608 38.2598 42.2703 37.7991L42.6356 19.897C42.6402 19.6701 42.5523 19.4507 42.3919 19.2901C42.2312 19.1294 42.0113 19.0411 41.7842 19.0456L23.8821 19.4109Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Firewalls, remote access, and segmentation<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"62\" height=\"62\" viewBox=\"0 0 62 62\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M0 31.0001C0 13.8793 13.8793 0 31.0001 0C48.1208 0.000143427 61.9994 13.8788 61.9996 30.9994C61.9996 48.1203 48.1203 61.9996 30.9994 61.9996C13.879 61.9994 0.000229447 48.1206 0 31.0001ZM23.8821 19.4109C23.4213 19.4206 23.0559 19.8015 23.0652 20.2623C23.0746 20.7234 23.4556 21.09 23.9166 21.0806L39.7444 20.7568L19.2908 41.2104C18.9647 41.5365 18.9647 42.0651 19.2908 42.3912C19.6169 42.7167 20.1457 42.7171 20.4716 42.3912L40.9245 21.9383L40.6006 37.7646C40.5912 38.2257 40.9579 38.6066 41.4189 38.616C41.8796 38.6251 42.2608 38.2598 42.2703 37.7991L42.6356 19.897C42.6402 19.6701 42.5523 19.4507 42.3919 19.2901C42.2312 19.1294 42.0113 19.0411 41.7842 19.0456L23.8821 19.4109Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Outdated or end-of-life elements<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9232a0d elementor-mobile-align-start elementor-widget__width-inherit elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"9232a0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"62\" height=\"62\" viewBox=\"0 0 62 62\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M0 31.0001C0 13.8793 13.8793 0 31.0001 0C48.1208 0.000143427 61.9994 13.8788 61.9996 30.9994C61.9996 48.1203 48.1203 61.9996 30.9994 61.9996C13.879 61.9994 0.000229447 48.1206 0 31.0001ZM23.8821 19.4109C23.4213 19.4206 23.0559 19.8015 23.0652 20.2623C23.0746 20.7234 23.4556 21.09 23.9166 21.0806L39.7444 20.7568L19.2908 41.2104C18.9647 41.5365 18.9647 42.0651 19.2908 42.3912C19.6169 42.7167 20.1457 42.7171 20.4716 42.3912L40.9245 21.9383L40.6006 37.7646C40.5912 38.2257 40.9579 38.6066 41.4189 38.616C41.8796 38.6251 42.2608 38.2598 42.2703 37.7991L42.6356 19.897C42.6402 19.6701 42.5523 19.4507 42.3919 19.2901C42.2312 19.1294 42.0113 19.0411 41.7842 19.0456L23.8821 19.4109Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Exposure to known vulnerabilities<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"62\" height=\"62\" viewBox=\"0 0 62 62\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M0 31.0001C0 13.8793 13.8793 0 31.0001 0C48.1208 0.000143427 61.9994 13.8788 61.9996 30.9994C61.9996 48.1203 48.1203 61.9996 30.9994 61.9996C13.879 61.9994 0.000229447 48.1206 0 31.0001ZM23.8821 19.4109C23.4213 19.4206 23.0559 19.8015 23.0652 20.2623C23.0746 20.7234 23.4556 21.09 23.9166 21.0806L39.7444 20.7568L19.2908 41.2104C18.9647 41.5365 18.9647 42.0651 19.2908 42.3912C19.6169 42.7167 20.1457 42.7171 20.4716 42.3912L40.9245 21.9383L40.6006 37.7646C40.5912 38.2257 40.9579 38.6066 41.4189 38.616C41.8796 38.6251 42.2608 38.2598 42.2703 37.7991L42.6356 19.897C42.6402 19.6701 42.5523 19.4507 42.3919 19.2901C42.2312 19.1294 42.0113 19.0411 41.7842 19.0456L23.8821 19.4109Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Consistency of deployed protections<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"62\" height=\"62\" viewBox=\"0 0 62 62\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M0 31.0001C0 13.8793 13.8793 0 31.0001 0C48.1208 0.000143427 61.9994 13.8788 61.9996 30.9994C61.9996 48.1203 48.1203 61.9996 30.9994 61.9996C13.879 61.9994 0.000229447 48.1206 0 31.0001ZM23.8821 19.4109C23.4213 19.4206 23.0559 19.8015 23.0652 20.2623C23.0746 20.7234 23.4556 21.09 23.9166 21.0806L39.7444 20.7568L19.2908 41.2104C18.9647 41.5365 18.9647 42.0651 19.2908 42.3912C19.6169 42.7167 20.1457 42.7171 20.4716 42.3912L40.9245 21.9383L40.6006 37.7646C40.5912 38.2257 40.9579 38.6066 41.4189 38.616C41.8796 38.6251 42.2608 38.2598 42.2703 37.7991L42.6356 19.897C42.6402 19.6701 42.5523 19.4507 42.3919 19.2901C42.2312 19.1294 42.0113 19.0411 41.7842 19.0456L23.8821 19.4109Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Overall environment hygiene<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f64d27 e-con e-atomic-element e-flexbox-base black-blue-border-box\" data-id=\"8f64d27\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"8f64d27\" data-e-type=\"e-flexbox\" data-id=\"8f64d27\">\n\t\t\t\t\t\t\t\t<p class=\"titre-31 e-paragraph-base\" data-interaction-id=\"f62f381\"  data-e-type=\"widget\" data-id=\"f62f381\">\n\t\t\t\t\t\t\t\tGovernance and Prioritization\n\t\t\t\t\t<\/p>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ed2651 e-con e-atomic-element e-flexbox-base padding-0 e-3ed2651-30ceaa2\" data-id=\"3ed2651\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"3ed2651\" data-e-type=\"e-flexbox\" data-id=\"3ed2651\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b306175 elementor-mobile-align-start elementor-widget__width-inherit elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"b306175\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"62\" height=\"62\" viewBox=\"0 0 62 62\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M0 31.0001C0 13.8793 13.8793 0 31.0001 0C48.1208 0.000143427 61.9994 13.8788 61.9996 30.9994C61.9996 48.1203 48.1203 61.9996 30.9994 61.9996C13.879 61.9994 0.000229447 48.1206 0 31.0001ZM23.8821 19.4109C23.4213 19.4206 23.0559 19.8015 23.0652 20.2623C23.0746 20.7234 23.4556 21.09 23.9166 21.0806L39.7444 20.7568L19.2908 41.2104C18.9647 41.5365 18.9647 42.0651 19.2908 42.3912C19.6169 42.7167 20.1457 42.7171 20.4716 42.3912L40.9245 21.9383L40.6006 37.7646C40.5912 38.2257 40.9579 38.6066 41.4189 38.616C41.8796 38.6251 42.2608 38.2598 42.2703 37.7991L42.6356 19.897C42.6402 19.6701 42.5523 19.4507 42.3919 19.2901C42.2312 19.1294 42.0113 19.0411 41.7842 19.0456L23.8821 19.4109Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Key business risks<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"62\" height=\"62\" viewBox=\"0 0 62 62\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M0 31.0001C0 13.8793 13.8793 0 31.0001 0C48.1208 0.000143427 61.9994 13.8788 61.9996 30.9994C61.9996 48.1203 48.1203 61.9996 30.9994 61.9996C13.879 61.9994 0.000229447 48.1206 0 31.0001ZM23.8821 19.4109C23.4213 19.4206 23.0559 19.8015 23.0652 20.2623C23.0746 20.7234 23.4556 21.09 23.9166 21.0806L39.7444 20.7568L19.2908 41.2104C18.9647 41.5365 18.9647 42.0651 19.2908 42.3912C19.6169 42.7167 20.1457 42.7171 20.4716 42.3912L40.9245 21.9383L40.6006 37.7646C40.5912 38.2257 40.9579 38.6066 41.4189 38.616C41.8796 38.6251 42.2608 38.2598 42.2703 37.7991L42.6356 19.897C42.6402 19.6701 42.5523 19.4507 42.3919 19.2901C42.2312 19.1294 42.0113 19.0411 41.7842 19.0456L23.8821 19.4109Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Critical vulnerabilities to address quickly<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e70919e elementor-mobile-align-start elementor-widget__width-inherit elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"e70919e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"62\" height=\"62\" viewBox=\"0 0 62 62\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M0 31.0001C0 13.8793 13.8793 0 31.0001 0C48.1208 0.000143427 61.9994 13.8788 61.9996 30.9994C61.9996 48.1203 48.1203 61.9996 30.9994 61.9996C13.879 61.9994 0.000229447 48.1206 0 31.0001ZM23.8821 19.4109C23.4213 19.4206 23.0559 19.8015 23.0652 20.2623C23.0746 20.7234 23.4556 21.09 23.9166 21.0806L39.7444 20.7568L19.2908 41.2104C18.9647 41.5365 18.9647 42.0651 19.2908 42.3912C19.6169 42.7167 20.1457 42.7171 20.4716 42.3912L40.9245 21.9383L40.6006 37.7646C40.5912 38.2257 40.9579 38.6066 41.4189 38.616C41.8796 38.6251 42.2608 38.2598 42.2703 37.7991L42.6356 19.897C42.6402 19.6701 42.5523 19.4507 42.3919 19.2901C42.2312 19.1294 42.0113 19.0411 41.7842 19.0456L23.8821 19.4109Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Short-, medium-, and long-term priorities<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"62\" height=\"62\" viewBox=\"0 0 62 62\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M0 31.0001C0 13.8793 13.8793 0 31.0001 0C48.1208 0.000143427 61.9994 13.8788 61.9996 30.9994C61.9996 48.1203 48.1203 61.9996 30.9994 61.9996C13.879 61.9994 0.000229447 48.1206 0 31.0001ZM23.8821 19.4109C23.4213 19.4206 23.0559 19.8015 23.0652 20.2623C23.0746 20.7234 23.4556 21.09 23.9166 21.0806L39.7444 20.7568L19.2908 41.2104C18.9647 41.5365 18.9647 42.0651 19.2908 42.3912C19.6169 42.7167 20.1457 42.7171 20.4716 42.3912L40.9245 21.9383L40.6006 37.7646C40.5912 38.2257 40.9579 38.6066 41.4189 38.616C41.8796 38.6251 42.2608 38.2598 42.2703 37.7991L42.6356 19.897C42.6402 19.6701 42.5523 19.4507 42.3919 19.2901C42.2312 19.1294 42.0113 19.0411 41.7842 19.0456L23.8821 19.4109Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Realistic recommendations tailored to your context<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<p class=\"texte-courant-big e-paragraph-base\" data-interaction-id=\"d6c1260\"  data-e-type=\"widget\" data-id=\"d6c1260\">\n\t\t\t\t\t\t\t\tRhesus conducts cybersecurity audits for Quebec SMEs, covering three areas: the Microsoft 365 environment, IT infrastructure, and governance. The goal is to produce a clear picture with concrete action priorities.\n\t\t\t\t\t<\/p>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae33bdd e-con e-atomic-element e-flexbox-base boxed-container\" data-id=\"ae33bdd\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"ae33bdd\" data-e-type=\"e-flexbox\" data-id=\"ae33bdd\">\n\t\t\t\t<div class=\"elementor-element elementor-element-aedf776 e-con e-atomic-element e-flexbox-base flex-col gap-100 e-aedf776-85eb029\" data-id=\"aedf776\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"aedf776\" data-e-type=\"e-flexbox\" data-id=\"aedf776\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a01bcdd e-con e-atomic-element e-flexbox-base padding-0 flex-col gap-30\" data-id=\"a01bcdd\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"a01bcdd\" data-e-type=\"e-flexbox\" data-id=\"a01bcdd\">\n\t\t<div class=\"elementor-element elementor-element-62edaef e-grid e-con-full e-con e-child\" data-id=\"62edaef\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-de12322 e-con e-atomic-element e-flexbox-base flex-align-center flex-justify-center flex-col gap-20 black-500 e-de12322-9c88ab3\" data-id=\"de12322\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"de12322\" data-e-type=\"e-flexbox\" data-id=\"de12322\">\n\t\t\t\t\t\t\t<h2 \n\t\tdata-interaction-id=\"d6d6ae4\" \n\t\tclass=\"wide square-title titre-courant e-d6d6ae4-b208131 full-width square-gold e-heading-base\" \n\t\t \n\t\tdata-e-type=\"widget\" data-id=\"d6d6ae4\"\n\t>\n\t\n\t\t\tWhy conduct a cybersecurity audit for your business\n\t\t<\/h2>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-002043a e-con e-atomic-element e-flexbox-base flex-align-center flex-justify-center white flex-col gap-20 padding-12 bg-experience-100 e-002043a-e800f98\" data-id=\"002043a\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"002043a\" data-e-type=\"e-flexbox\" data-id=\"002043a\">\n\t\t\t\t\t\t\t<h5 \n\t\tdata-interaction-id=\"74d13e7\" \n\t\tclass=\"e-74d13e7-d220d9b full-width white square-title-small wide titre-courant-small uppercase e-heading-base\" \n\t\t \n\t\tdata-e-type=\"widget\" data-id=\"74d13e7\"\n\t>\n\t\n\t\t\tSee clearly \n\t\t<\/h5>\n\t\t\t\t\t\t\t\t<p class=\"gold-500 white z-index-999 texte-courant-big full-width e-paragraph-base\" data-interaction-id=\"a3688b6\"  data-e-type=\"widget\" data-id=\"a3688b6\">\n\t\t\t\t\t\t\t\tYou get a comprehensive picture of your IT security level, rather than a partial or intuitive impression.\n\t\t\t\t\t<\/p>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-88994e9 e-con e-atomic-element e-flexbox-base flex-align-center flex-justify-center white flex-col gap-20 padding-12 bg-experience-500 e-88994e9-6fe3949\" data-id=\"88994e9\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"88994e9\" data-e-type=\"e-flexbox\" data-id=\"88994e9\">\n\t\t\t\t\t\t\t<h5 \n\t\tdata-interaction-id=\"ba9a9a6\" \n\t\tclass=\"e-ba9a9a6-0058850 full-width white square-title-small wide titre-courant-small uppercase e-heading-base\" \n\t\t \n\t\tdata-e-type=\"widget\" data-id=\"ba9a9a6\"\n\t>\n\t\n\t\t\tPrioritize the right actions \n\t\t<\/h5>\n\t\t\t\t\t\t\t\t<p class=\"gold-500 white z-index-999 texte-courant-big full-width e-paragraph-base\" data-interaction-id=\"e34ab74\"  data-e-type=\"widget\" data-id=\"e34ab74\">\n\t\t\t\t\t\t\t\tNot all gaps carry the same impact. We help you distinguish between what\u2019s urgent, what\u2019s important, and what can be planned.\n\t\t\t\t\t<\/p>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-732d63e e-con e-atomic-element e-flexbox-base flex-align-center flex-justify-center flex-col gap-20 padding-12 bg-greige-100 black-500\" data-id=\"732d63e\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"732d63e\" data-e-type=\"e-flexbox\" data-id=\"732d63e\">\n\t\t\t\t\t\t\t<h5 \n\t\tdata-interaction-id=\"329babc\" \n\t\tclass=\"e-329babc-5fb7a7a full-width square-title-small wide titre-courant-small uppercase square-gold e-heading-base\" \n\t\t \n\t\tdata-e-type=\"widget\" data-id=\"329babc\"\n\t>\n\t\n\t\t\tReduce real risks \n\t\t<\/h5>\n\t\t\t\t\t\t\t\t<p class=\"z-index-999 texte-courant-big full-width e-paragraph-base\" data-interaction-id=\"2eb2c96\"  data-e-type=\"widget\" data-id=\"2eb2c96\">\n\t\t\t\t\t\t\t\tThe goal isn\u2019t to add unnecessary tools \u2014 it\u2019s to fix what genuinely exposes your business to cyberthreats.\n\t\t\t\t\t<\/p>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6cee93d e-con e-atomic-element e-flexbox-base flex-align-center flex-justify-center flex-col gap-20 padding-12 black-500 bg-greige-150\" data-id=\"6cee93d\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"6cee93d\" data-e-type=\"e-flexbox\" data-id=\"6cee93d\">\n\t\t\t\t\t\t\t<h5 \n\t\tdata-interaction-id=\"ead2212\" \n\t\tclass=\"full-width square-title-small wide titre-courant-small uppercase square-gold e-ead2212-53e09cf e-heading-base\" \n\t\t \n\t\tdata-e-type=\"widget\" data-id=\"ead2212\"\n\t>\n\t\n\t\t\tPlan your investments better \n\t\t<\/h5>\n\t\t\t\t\t\t\t\t<p class=\"z-index-999 texte-courant-big full-width e-paragraph-base\" data-interaction-id=\"6fc308c\"  data-e-type=\"widget\" data-id=\"6fc308c\">\n\t\t\t\t\t\t\t\tYou can direct your technology decisions based on risks, obsolescence, and concrete gains.\n\t\t\t\t\t<\/p>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d49f127 e-con e-atomic-element e-flexbox-base flex-align-center flex-justify-center white flex-col bg-gold-500 gap-20 padding-12\" data-id=\"d49f127\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"d49f127\" data-e-type=\"e-flexbox\" data-id=\"d49f127\">\n\t\t\t\t\t\t\t<h5 \n\t\tdata-interaction-id=\"37d6d33\" \n\t\tclass=\"e-37d6d33-caf2fab full-width white square-title-small wide titre-courant-small uppercase e-heading-base\" \n\t\t \n\t\tdata-e-type=\"widget\" data-id=\"37d6d33\"\n\t>\n\t\n\t\t\tStrengthen your resilience \n\t\t<\/h5>\n\t\t\t\t\t\t\t\t<p class=\"gold-500 white z-index-999 texte-courant-big full-width e-paragraph-base\" data-interaction-id=\"a764163\"  data-e-type=\"widget\" data-id=\"a764163\">\n\t\t\t\t\t\t\t\tA stronger cybersecurity posture reduces the likelihood of disruptions, compromises, and unpleasant surprises.\n\t\t\t\t\t<\/p>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a945c2 e-con e-atomic-element e-flexbox-base flex-align-center flex-justify-center flex-col gap-20 black-500 e-2a945c2-bf8c2b7\" data-id=\"2a945c2\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"2a945c2\" data-e-type=\"e-flexbox\" data-id=\"2a945c2\">\n\t\t\t\t\t\t\t\t<p class=\"titre-31 e-paragraph-base\" data-interaction-id=\"b9b7cb3\"  data-e-type=\"widget\" data-id=\"b9b7cb3\">\n\t\t\t\t\t\t\t\tA cybersecurity audit allows SMEs to identify the real risks in their technology environment, including Microsoft 365 configuration flaws, outdated infrastructure elements, and vulnerabilities that increase their exposure to cyberattacks.\n\t\t\t\t\t<\/p>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-625898f e-con e-atomic-element e-flexbox-base boxed-container\" data-id=\"625898f\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"625898f\" data-e-type=\"e-flexbox\" data-id=\"625898f\">\n\t\t\t\t<div class=\"elementor-element elementor-element-28de15b e-con e-atomic-element e-flexbox-base main-padding flex-col gap-100\" data-id=\"28de15b\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"28de15b\" data-e-type=\"e-flexbox\" data-id=\"28de15b\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c8e3607 e-con e-atomic-element e-flexbox-base padding-0 flex-col gap-30\" data-id=\"c8e3607\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"c8e3607\" data-e-type=\"e-flexbox\" data-id=\"c8e3607\">\n\t\t\t\t\t\t\t<h2 \n\t\tdata-interaction-id=\"5820a37\" \n\t\tclass=\"wide square-title titre-courant e-5820a37-7fbf7b7 square-gold width-80 e-heading-base\" \n\t\t \n\t\tdata-e-type=\"widget\" data-id=\"5820a37\"\n\t>\n\t\n\t\t\tCybersecurity audits for businesses across Quebec\n\t\t<\/h2>\n\t\t\t\t\t\t\t\t<p class=\"titre-31 black-500 e-paragraph-base\" data-interaction-id=\"c1bb0ad\"  data-e-type=\"widget\" data-id=\"c1bb0ad\">\n\t\t\t\t\t\t\t\tRhesus supports SMBs across multiple regions of Quebec. Our offices in Sherbrooke, Victoriaville, and Mirabel allow us to serve businesses in the Eastern Townships, Centre-du-Qu\u00e9bec, the Laurentians, and the greater Montreal area.\n\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t\t<p class=\"black-500 texte-courant-big e-paragraph-base\" data-interaction-id=\"56a4724\"  data-e-type=\"widget\" data-id=\"56a4724\">\n\t\t\t\t\t\t\t\tThe cybersecurity posture assessment can be conducted remotely or on-site depending on your needs and the size of your environment.\n\t\t\t\t\t<\/p>\n\t\t\t\t<div class=\"elementor-element elementor-element-e821363 e-con e-atomic-element e-flexbox-base padding-0 e-e821363-fd614d2 overflow-hidden\" data-id=\"e821363\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"e821363\" data-e-type=\"e-flexbox\" data-id=\"e821363\">\n\t\t\t\t<div class=\"elementor-element elementor-element-79f4efe e-con e-atomic-element e-flexbox-base padding-5 flex-justify-center flex-align-center bg-experience-500\" data-id=\"79f4efe\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"79f4efe\" data-e-type=\"e-flexbox\" data-id=\"79f4efe\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a7c471a wide bg-title blinky uppercase elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"a7c471a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/rhesus.net\/sherbrooke\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"62\" height=\"62\" viewBox=\"0 0 62 62\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M0 31.0001C0 13.8793 13.8793 0 31.0001 0C48.1208 0.000143427 61.9994 13.8788 61.9996 30.9994C61.9996 48.1203 48.1203 61.9996 30.9994 61.9996C13.879 61.9994 0.000229447 48.1206 0 31.0001ZM23.8821 19.4109C23.4213 19.4206 23.0559 19.8015 23.0652 20.2623C23.0746 20.7234 23.4556 21.09 23.9166 21.0806L39.7444 20.7568L19.2908 41.2104C18.9647 41.5365 18.9647 42.0651 19.2908 42.3912C19.6169 42.7167 20.1457 42.7171 20.4716 42.3912L40.9245 21.9383L40.6006 37.7646C40.5912 38.2257 40.9579 38.6066 41.4189 38.616C41.8796 38.6251 42.2608 38.2598 42.2703 37.7991L42.6356 19.897C42.6402 19.6701 42.5523 19.4507 42.3919 19.2901C42.2312 19.1294 42.0113 19.0411 41.7842 19.0456L23.8821 19.4109Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Sherbrooke<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc169a0 e-con e-atomic-element e-flexbox-base padding-5 flex-justify-center flex-align-center bg-gold-500\" data-id=\"fc169a0\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"fc169a0\" data-e-type=\"e-flexbox\" data-id=\"fc169a0\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8b136a6 wide bg-title blinky uppercase elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"8b136a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/rhesus.net\/victoriaville\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"62\" height=\"62\" viewBox=\"0 0 62 62\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M0 31.0001C0 13.8793 13.8793 0 31.0001 0C48.1208 0.000143427 61.9994 13.8788 61.9996 30.9994C61.9996 48.1203 48.1203 61.9996 30.9994 61.9996C13.879 61.9994 0.000229447 48.1206 0 31.0001ZM23.8821 19.4109C23.4213 19.4206 23.0559 19.8015 23.0652 20.2623C23.0746 20.7234 23.4556 21.09 23.9166 21.0806L39.7444 20.7568L19.2908 41.2104C18.9647 41.5365 18.9647 42.0651 19.2908 42.3912C19.6169 42.7167 20.1457 42.7171 20.4716 42.3912L40.9245 21.9383L40.6006 37.7646C40.5912 38.2257 40.9579 38.6066 41.4189 38.616C41.8796 38.6251 42.2608 38.2598 42.2703 37.7991L42.6356 19.897C42.6402 19.6701 42.5523 19.4507 42.3919 19.2901C42.2312 19.1294 42.0113 19.0411 41.7842 19.0456L23.8821 19.4109Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Victoriaville<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ac6555 e-con e-atomic-element e-flexbox-base padding-5 flex-justify-center flex-align-center bg-greige-100\" data-id=\"8ac6555\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"8ac6555\" data-e-type=\"e-flexbox\" data-id=\"8ac6555\">\n\t\t\t\t<div class=\"elementor-element elementor-element-307e4bb wide bg-title blinky uppercase elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"307e4bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/rhesus.net\/mirabel\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"62\" height=\"62\" viewBox=\"0 0 62 62\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M0 31.0001C0 13.8793 13.8793 0 31.0001 0C48.1208 0.000143427 61.9994 13.8788 61.9996 30.9994C61.9996 48.1203 48.1203 61.9996 30.9994 61.9996C13.879 61.9994 0.000229447 48.1206 0 31.0001ZM23.8821 19.4109C23.4213 19.4206 23.0559 19.8015 23.0652 20.2623C23.0746 20.7234 23.4556 21.09 23.9166 21.0806L39.7444 20.7568L19.2908 41.2104C18.9647 41.5365 18.9647 42.0651 19.2908 42.3912C19.6169 42.7167 20.1457 42.7171 20.4716 42.3912L40.9245 21.9383L40.6006 37.7646C40.5912 38.2257 40.9579 38.6066 41.4189 38.616C41.8796 38.6251 42.2608 38.2598 42.2703 37.7991L42.6356 19.897C42.6402 19.6701 42.5523 19.4507 42.3919 19.2901C42.2312 19.1294 42.0113 19.0411 41.7842 19.0456L23.8821 19.4109Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Mirabel<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9e8be28 e-con e-atomic-element e-flexbox-base padding-0 e-9e8be28-b8007c2 gap-faq\" data-id=\"9e8be28\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"9e8be28\" data-e-type=\"e-flexbox\" data-id=\"9e8be28\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ca52dd4 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-invisible elementor-widget elementor-widget-image\" data-id=\"ca52dd4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:3,&quot;sizes&quot;:[]},&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;laptop&quot;],&quot;motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}}}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"771\" height=\"936\" src=\"https:\/\/rhesus.net\/wp-content\/uploads\/2026\/05\/Photogrid.webp\" class=\"attachment-full size-full wp-image-6848\" alt=\"\" srcset=\"https:\/\/rhesus.net\/wp-content\/uploads\/2026\/05\/Photogrid.webp 771w, https:\/\/rhesus.net\/wp-content\/uploads\/2026\/05\/Photogrid-247x300.webp 247w, https:\/\/rhesus.net\/wp-content\/uploads\/2026\/05\/Photogrid-768x932.webp 768w\" sizes=\"(max-width: 771px) 100vw, 771px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6784af8 e-con e-atomic-element e-flexbox-base padding-0 flex-col gap-30\" data-id=\"6784af8\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"6784af8\" data-e-type=\"e-flexbox\" data-id=\"6784af8\">\n\t\t\t\t\t\t\t<h2 \n\t\tdata-interaction-id=\"424fd38\" \n\t\tclass=\"wide square-title titre-courant e-424fd38-baeabb8 full-width square-gold e-heading-base\" \n\t\t \n\t\tdata-e-type=\"widget\" data-id=\"424fd38\"\n\t>\n\t\n\t\t\tFrequently Asked Questions: Cybersecurity Audit\n\t\t<\/h2>\n\t\t\t\t<div class=\"elementor-element elementor-element-9947394 elementor-widget elementor-widget-n-accordion\" data-id=\"9947394\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;max_items_expended&quot;:&quot;multiple&quot;,&quot;default_state&quot;:&quot;expanded&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1600\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-1600\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What is a cybersecurity posture assessment?  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1600\" class=\"elementor-element elementor-element-1f428c1 e-con-full e-flex e-con e-child\" data-id=\"1f428c1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1ea1b56 link-effect elementor-widget elementor-widget-text-editor\" data-id=\"1ea1b56\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p> It\u2019s a comprehensive analysis of your technology environment aimed at identifying your risks, vulnerabilities, outdated elements, and action priorities to improve your security. The assessment covers Microsoft 365, physical infrastructure, and governance practices.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1601\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1601\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Why include Microsoft 365 in the security audit?  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1601\" class=\"elementor-element elementor-element-f78439b e-con-full e-flex e-con e-child\" data-id=\"f78439b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-32044b3 link-effect elementor-widget elementor-widget-text-editor\" data-id=\"32044b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft 365 is at the heart of many organizations\u2019 operations. Misconfigurations, overly permissive access, or incomplete protections can create significant risks \u2014 even if the organization believes it\u2019s well protected. The audit validates that proper security practices are in place.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1602\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1602\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Does the assessment also cover IT infrastructure?  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1602\" class=\"elementor-element elementor-element-00d3d77 e-con-full e-flex e-con e-child\" data-id=\"00d3d77\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-34d2e27 link-effect elementor-widget elementor-widget-text-editor\" data-id=\"34d2e27\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Yes. The analysis includes servers, workstations, network equipment, firewalls, remote access, and end-of-life elements. The goal is to identify critical weaknesses and vulnerabilities that increase your exposure.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1603\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1603\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What is the concrete outcome of the assessment?  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1603\" class=\"elementor-element elementor-element-8ab3328 e-con-full e-flex e-con e-child\" data-id=\"8ab3328\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7f8b111 link-effect elementor-widget elementor-widget-text-editor\" data-id=\"7f8b111\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>You receive a clear picture of your current posture with prioritized recommendations: what needs to be addressed immediately, what\u2019s important over the medium term, and what can be planned. Recommendations are realistic and adapted to your business context.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1604\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1604\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Is a cybersecurity audit useful for an SMB?  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1604\" class=\"elementor-element elementor-element-b03099c e-con-full e-flex e-con e-child\" data-id=\"b03099c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-41bfdeb link-effect elementor-widget elementor-widget-text-editor\" data-id=\"41bfdeb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Absolutely. SMBs are frequent targets of cyberattacks because they often have fewer dedicated security resources. An audit helps focus efforts and investments where the impact is greatest, rather than acting blindly.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<script type=\"application\/ld+json\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"What is a cybersecurity posture assessment?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"It\\u2019s a comprehensive analysis of your technology environment aimed at identifying your risks, vulnerabilities, outdated elements, and action priorities to improve your security. The assessment covers Microsoft 365, physical infrastructure, and governance practices.\"}},{\"@type\":\"Question\",\"name\":\"Why include Microsoft 365 in the security audit?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Microsoft 365 is at the heart of many organizations\\u2019 operations. Misconfigurations, overly permissive access, or incomplete protections can create significant risks \\u2014 even if the organization believes it\\u2019s well protected. The audit validates that proper security practices are in place.\"}},{\"@type\":\"Question\",\"name\":\"Does the assessment also cover IT infrastructure?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Yes. The analysis includes servers, workstations, network equipment, firewalls, remote access, and end-of-life elements. The goal is to identify critical weaknesses and vulnerabilities that increase your exposure.\"}},{\"@type\":\"Question\",\"name\":\"What is the concrete outcome of the assessment?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"You receive a clear picture of your current posture with prioritized recommendations: what needs to be addressed immediately, what\\u2019s important over the medium term, and what can be planned. Recommendations are realistic and adapted to your business context.\"}},{\"@type\":\"Question\",\"name\":\"Is a cybersecurity audit useful for an SMB?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Absolutely. SMBs are frequent targets of cyberattacks because they often have fewer dedicated security resources. An audit helps focus efforts and investments where the impact is greatest, rather than acting blindly.\"}}]}<\/script>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Audit and Posture Assessment for Businesses Get a clear picture of your Microsoft 365 environment and IT infrastructure Your business evolves, your tools multiply \u2014 and so do the threats. Our cybersecurity audit identifies: your risks your critical vulnerabilities your outdated elements your action priorities Yet few organizations have a truly complete view of [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":6822,"parent":2216,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-6972","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Audit and Posture Assessment for Businesses<\/title>\n<meta name=\"description\" content=\"Gain a clear understanding of your cybersecurity posture. Rhesus analyzes your Microsoft 365 environment and infrastructure to identify vulnerabilities, risks, and action priorities. Offices in Sherbrooke, Victoriaville, and Mirabel.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rhesus.net\/en\/it-solutions\/cybersecurity\/cybersecurity-audit-and-posture-assessment\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Audit and Posture Assessment for Businesses\" \/>\n<meta property=\"og:description\" content=\"Gain a clear understanding of your cybersecurity posture. Rhesus analyzes your Microsoft 365 environment and infrastructure to identify vulnerabilities, risks, and action priorities. Offices in Sherbrooke, Victoriaville, and Mirabel.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rhesus.net\/en\/it-solutions\/cybersecurity\/cybersecurity-audit-and-posture-assessment\/\" \/>\n<meta property=\"og:site_name\" content=\"RHESUS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RhesusInc\/?fref=ts\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-19T19:33:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/rhesus.net\/wp-content\/uploads\/2026\/03\/posture-cybersecurite-hero.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1282\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/rhesus.net\\\/en\\\/it-solutions\\\/cybersecurity\\\/cybersecurity-audit-and-posture-assessment\\\/\",\"url\":\"https:\\\/\\\/rhesus.net\\\/en\\\/it-solutions\\\/cybersecurity\\\/cybersecurity-audit-and-posture-assessment\\\/\",\"name\":\"Cybersecurity Audit and Posture Assessment for Businesses\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rhesus.net\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/rhesus.net\\\/en\\\/it-solutions\\\/cybersecurity\\\/cybersecurity-audit-and-posture-assessment\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/rhesus.net\\\/en\\\/it-solutions\\\/cybersecurity\\\/cybersecurity-audit-and-posture-assessment\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/rhesus.net\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/posture-cybersecurite-hero.webp\",\"datePublished\":\"2026-03-20T14:54:10+00:00\",\"dateModified\":\"2026-05-19T19:33:12+00:00\",\"description\":\"Gain a clear understanding of your cybersecurity posture. Rhesus analyzes your Microsoft 365 environment and infrastructure to identify vulnerabilities, risks, and action priorities. Offices in Sherbrooke, Victoriaville, and Mirabel.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/rhesus.net\\\/en\\\/it-solutions\\\/cybersecurity\\\/cybersecurity-audit-and-posture-assessment\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/rhesus.net\\\/en\\\/it-solutions\\\/cybersecurity\\\/cybersecurity-audit-and-posture-assessment\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/rhesus.net\\\/en\\\/it-solutions\\\/cybersecurity\\\/cybersecurity-audit-and-posture-assessment\\\/#primaryimage\",\"url\":\"https:\\\/\\\/rhesus.net\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/posture-cybersecurite-hero.webp\",\"contentUrl\":\"https:\\\/\\\/rhesus.net\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/posture-cybersecurite-hero.webp\",\"width\":1920,\"height\":1282},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/rhesus.net\\\/en\\\/it-solutions\\\/cybersecurity\\\/cybersecurity-audit-and-posture-assessment\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"IT Solutions\",\"item\":\"https:\\\/\\\/rhesus.net\\\/en\\\/solutions-ti\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/rhesus.net\\\/en\\\/solutions-ti\\\/cybersecurite\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity Audit and Posture Assessment\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/rhesus.net\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/rhesus.net\\\/en\\\/\",\"name\":\"Rhesus \u2013 Votre partenaire en technologies de l'information\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/rhesus.net\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/rhesus.net\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Audit and Posture Assessment for Businesses","description":"Gain a clear understanding of your cybersecurity posture. Rhesus analyzes your Microsoft 365 environment and infrastructure to identify vulnerabilities, risks, and action priorities. Offices in Sherbrooke, Victoriaville, and Mirabel.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rhesus.net\/en\/it-solutions\/cybersecurity\/cybersecurity-audit-and-posture-assessment\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Audit and Posture Assessment for Businesses","og_description":"Gain a clear understanding of your cybersecurity posture. Rhesus analyzes your Microsoft 365 environment and infrastructure to identify vulnerabilities, risks, and action priorities. Offices in Sherbrooke, Victoriaville, and Mirabel.","og_url":"https:\/\/rhesus.net\/en\/it-solutions\/cybersecurity\/cybersecurity-audit-and-posture-assessment\/","og_site_name":"RHESUS","article_publisher":"https:\/\/www.facebook.com\/RhesusInc\/?fref=ts","article_modified_time":"2026-05-19T19:33:12+00:00","og_image":[{"width":1920,"height":1282,"url":"https:\/\/rhesus.net\/wp-content\/uploads\/2026\/03\/posture-cybersecurite-hero.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/rhesus.net\/en\/it-solutions\/cybersecurity\/cybersecurity-audit-and-posture-assessment\/","url":"https:\/\/rhesus.net\/en\/it-solutions\/cybersecurity\/cybersecurity-audit-and-posture-assessment\/","name":"Cybersecurity Audit and Posture Assessment for Businesses","isPartOf":{"@id":"https:\/\/rhesus.net\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/rhesus.net\/en\/it-solutions\/cybersecurity\/cybersecurity-audit-and-posture-assessment\/#primaryimage"},"image":{"@id":"https:\/\/rhesus.net\/en\/it-solutions\/cybersecurity\/cybersecurity-audit-and-posture-assessment\/#primaryimage"},"thumbnailUrl":"https:\/\/rhesus.net\/wp-content\/uploads\/2026\/03\/posture-cybersecurite-hero.webp","datePublished":"2026-03-20T14:54:10+00:00","dateModified":"2026-05-19T19:33:12+00:00","description":"Gain a clear understanding of your cybersecurity posture. Rhesus analyzes your Microsoft 365 environment and infrastructure to identify vulnerabilities, risks, and action priorities. Offices in Sherbrooke, Victoriaville, and Mirabel.","breadcrumb":{"@id":"https:\/\/rhesus.net\/en\/it-solutions\/cybersecurity\/cybersecurity-audit-and-posture-assessment\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rhesus.net\/en\/it-solutions\/cybersecurity\/cybersecurity-audit-and-posture-assessment\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/rhesus.net\/en\/it-solutions\/cybersecurity\/cybersecurity-audit-and-posture-assessment\/#primaryimage","url":"https:\/\/rhesus.net\/wp-content\/uploads\/2026\/03\/posture-cybersecurite-hero.webp","contentUrl":"https:\/\/rhesus.net\/wp-content\/uploads\/2026\/03\/posture-cybersecurite-hero.webp","width":1920,"height":1282},{"@type":"BreadcrumbList","@id":"https:\/\/rhesus.net\/en\/it-solutions\/cybersecurity\/cybersecurity-audit-and-posture-assessment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"IT Solutions","item":"https:\/\/rhesus.net\/en\/solutions-ti\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/rhesus.net\/en\/solutions-ti\/cybersecurite\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity Audit and Posture Assessment"}]},{"@type":"WebSite","@id":"https:\/\/rhesus.net\/en\/#website","url":"https:\/\/rhesus.net\/en\/","name":"Rhesus \u2013 Votre partenaire en technologies de l'information","description":"","publisher":{"@id":"https:\/\/rhesus.net\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rhesus.net\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/rhesus.net\/en\/wp-json\/wp\/v2\/pages\/6972","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rhesus.net\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/rhesus.net\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/rhesus.net\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/rhesus.net\/en\/wp-json\/wp\/v2\/comments?post=6972"}],"version-history":[{"count":1,"href":"https:\/\/rhesus.net\/en\/wp-json\/wp\/v2\/pages\/6972\/revisions"}],"predecessor-version":[{"id":6973,"href":"https:\/\/rhesus.net\/en\/wp-json\/wp\/v2\/pages\/6972\/revisions\/6973"}],"up":[{"embeddable":true,"href":"https:\/\/rhesus.net\/en\/wp-json\/wp\/v2\/pages\/2216"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rhesus.net\/en\/wp-json\/wp\/v2\/media\/6822"}],"wp:attachment":[{"href":"https:\/\/rhesus.net\/en\/wp-json\/wp\/v2\/media?parent=6972"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}