{"id":7265,"date":"2024-01-19T14:09:50","date_gmt":"2024-01-19T13:09:50","guid":{"rendered":"http:\/\/bemotion.tech\/?page_id=7265"},"modified":"2024-07-09T20:21:52","modified_gmt":"2024-07-09T18:21:52","slug":"it-expert-montreal","status":"publish","type":"page","link":"https:\/\/bemotion.tech\/en\/it-expert-montreal\/","title":{"rendered":"IT Expert"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; prev_background_color=&#8221;#ffffff&#8221; next_background_color=&#8221;#ffffff&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; background_video_mp4=&#8221;http:\/\/bemotion.tech\/wp-content\/uploads\/2024\/02\/BM-Expert-TI.mp4&#8243; background_video_webm=&#8221;http:\/\/bemotion.tech\/wp-content\/uploads\/2024\/02\/BM_Expert.webm&#8221; background_video_pause_outside_viewport=&#8221;off&#8221; custom_padding=&#8221;0px|||||&#8221; top_divider_style=&#8221;asymmetric&#8221; top_divider_height=&#8221;50px&#8221; top_divider_flip=&#8221;vertical&#8221; top_divider_height_tablet=&#8221;30px&#8221; top_divider_height_phone=&#8221;20px&#8221; top_divider_height_last_edited=&#8221;on|tablet&#8221; bottom_divider_style=&#8221;asymmetric2&#8243; bottom_divider_height=&#8221;82px&#8221; bottom_divider_flip=&#8221;vertical|horizontal&#8221; bottom_divider_height_tablet=&#8221;50px&#8221; bottom_divider_height_phone=&#8221;30px&#8221; bottom_divider_height_last_edited=&#8221;on|phone&#8221; custom_css_main_element=&#8221;min-height: 65vh;||&#8221; global_colors_info=&#8221;{}&#8221; custom_css_main_element_last_edited=&#8221;on|phone&#8221; custom_css_main_element_tablet=&#8221;min-height: 65vh;&#8221; custom_css_main_element_phone=&#8221;min-height: 65vh;&#8221;][et_pb_row _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; positioning=&#8221;absolute&#8221; position_origin_a=&#8221;center_center&#8221; custom_padding=&#8221;1vw|1vw|1vw|1vw|true|true&#8221; border_radii=&#8221;on|25px|25px|25px|25px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_number_counter title=&#8221;Enterprise attacks\/day&#8221; number=&#8221;2200&#8243; percent_sign=&#8221;off&#8221; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; title_font=&#8221;|||on|||||&#8221; title_text_align=&#8221;left&#8221; title_text_color=&#8221;gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea&#8221; title_font_size=&#8221;25px&#8221; number_text_align=&#8221;left&#8221; number_text_color=&#8221;gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea&#8221; global_colors_info=&#8221;{%22gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea%22:%91%22title_text_color%22,%22number_text_color%22%93}&#8221;][\/et_pb_number_counter][et_pb_text _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Montserrat|800|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;2.5vw&#8221; text_line_height=&#8221;1em&#8221; header_font=&#8221;|800|||||||&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;56px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_margin_tablet=&#8221;||||false|false&#8221; custom_margin_phone=&#8221;||0px||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; text_font_size_tablet=&#8221;6vw&#8221; text_font_size_phone=&#8221;9vw&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;1em&#8221; text_line_height_phone=&#8221;1em&#8221; text_line_height_last_edited=&#8221;on|tablet&#8221; header_font_size_tablet=&#8221;1em&#8221; header_font_size_phone=&#8221;0.9em&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>IT administrators busy protecting your projects.<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; header_2_text_color=&#8221;gcid-bd64b08e-f891-42c5-be90-66d3f2bbf302&#8243; header_3_text_color=&#8221;gcid-bd64b08e-f891-42c5-be90-66d3f2bbf302&#8243; animation_style=&#8221;fade&#8221; header_3_font_size_tablet=&#8221;1em&#8221; header_3_font_size_phone=&#8221;1em&#8221; header_3_font_size_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-bd64b08e-f891-42c5-be90-66d3f2bbf302%22:%91%22header_2_text_color%22,%22header_3_text_color%22%93}&#8221;]<\/p>\n<h3>A proactive approach that identifies and monitors vulnerabilities and weaknesses in your networks, data, software, and devices that could be exposed to cyber threats.<\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|||on|||||&#8221; text_text_color=&#8221;gcid-a662aa67-a05e-4653-9072-3f91c608b36b&#8221; text_letter_spacing=&#8221;4px&#8221; custom_margin=&#8221;||0px|||&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{%22gcid-a662aa67-a05e-4653-9072-3f91c608b36b%22:%91%22text_text_color%22,%22text_text_color%22%93}&#8221;]<\/p>\n<p>since 1991<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Montserrat|800|||||||&#8221; text_text_color=&#8221;gcid-a662aa67-a05e-4653-9072-3f91c608b36b&#8221; text_font_size=&#8221;2vw&#8221; text_line_height=&#8221;1.2em&#8221; header_font=&#8221;|700|||||||&#8221; header_text_color=&#8221;gcid-a662aa67-a05e-4653-9072-3f91c608b36b&#8221; header_font_size=&#8221;1.9vw&#8221; header_line_height=&#8221;1.4em&#8221; custom_margin=&#8221;||||false|false&#8221; custom_margin_tablet=&#8221;||||false|false&#8221; custom_margin_phone=&#8221;||||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;||||false|false&#8221; animation_style=&#8221;fade&#8221; animation_delay=&#8221;50ms&#8221; header_font_size_tablet=&#8221;4vw&#8221; header_font_size_phone=&#8221;7vw&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-a662aa67-a05e-4653-9072-3f91c608b36b%22:%91%22header_text_color%22,%22text_text_color%22%93}&#8221;]<\/p>\n<h1>Unique proactive approach. IT experts for Greater Montreal and Laval businesses.<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;3_4,1_4&#8243; admin_label=&#8221;Approche Row&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(0,0,0,0.05)&#8221; custom_padding=&#8221;|25px||25px|false|true&#8221; border_radii=&#8221;off|25px|25px||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.8em&#8221; header_2_line_height=&#8221;1.2em&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;15px|30%|||false|false&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Controlling the situation before it happens. A proactive approach that leads to peace of mind.<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; header_3_line_height=&#8221;1.2em&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>\u00a0BeMotion\u2019s IT administrators proactive approach involves identifying vulnerabilities and weaknesses in your networks, software, and devices that could be exploited by cyberattacks. This is done by actively strengthening IT defenses, rather than waiting for attackers to strike. When they do, the repercussions can be devastating for your operations and data.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; admin_label=&#8221;Row Firm Text Image&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(0,0,0,0.05)&#8221; custom_padding=&#8221;|25px||25px|false|true&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; admin_label=&#8221;Column&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Montserrat|800|||||||&#8221; text_text_color=&#8221;gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea&#8221; text_font_size=&#8221;20px&#8221; text_line_height=&#8221;1.2em&#8221; text_orientation=&#8221;right&#8221; custom_margin=&#8221;||4vh||false|false&#8221; text_font_size_tablet=&#8221;1.3em&#8221; text_font_size_phone=&#8221;1.3em&#8221; text_font_size_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{%22gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea%22:%91%22text_text_color%22%93}&#8221;]<\/p>\n<p>Cybersecurity regulations are intensifying for professional firms.<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;http:\/\/bemotion.tech\/wp-content\/uploads\/2024\/01\/plan_relance_informatique_montreal.jpg&#8221; title_text=&#8221;plan_relance_informatique_montreal&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; z_index=&#8221;2&#8243; scroll_horizontal_motion_enable=&#8221;on&#8221; scroll_horizontal_motion=&#8221;0|45|45|100|-4|0|0&#8243; scroll_fade_enable=&#8221;on&#8221; border_radii=&#8221;on|50px|50px|50px|50px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|||on|||||&#8221; text_text_color=&#8221;gcid-a662aa67-a05e-4653-9072-3f91c608b36b&#8221; text_letter_spacing=&#8221;4px&#8221; custom_margin=&#8221;||0px|||&#8221; global_colors_info=&#8221;{%22gcid-a662aa67-a05e-4653-9072-3f91c608b36b%22:%91%22text_text_color%22%93}&#8221;]<\/p>\n<p>IT for Professsionnal firms<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; text_line_height=&#8221;1.3em&#8221; header_2_line_height=&#8221;1.2em&#8221; min_height=&#8221;109px&#8221; custom_margin=&#8221;10px||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; text_font_size_tablet=&#8221;1em&#8221; text_font_size_phone=&#8221;1em&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;1.3em&#8221; header_2_font_size_phone=&#8221;1.3em&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;1em&#8221; header_3_font_size_phone=&#8221;1em&#8221; header_3_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Professional firms&#8217; specialised data is valuable.<\/h2>\n<p>Professional firms and offices are prime targets for hackers. They store extremely valuable and sensitive information and may even have access to trust accounts containing their clients\u2019 money. Therefore, they are likely to be stolen or subject to ransom demands.<\/p>\n<p>[\/et_pb_text][et_pb_toggle title=&#8221;Cyberthreats targeting professional firms&#8221; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; title_text_color=&#8221;gcid-a662aa67-a05e-4653-9072-3f91c608b36b&#8221; title_line_height=&#8221;1.4em&#8221; scroll_fade_enable=&#8221;on&#8221; global_colors_info=&#8221;{%22gcid-a662aa67-a05e-4653-9072-3f91c608b36b%22:%91%22title_text_color%22%93}&#8221;]<\/p>\n<ul>\n<li><strong>Theft of credentials.<\/strong> 49% of data breaches involved the use of stolen credentials. It often starts with a malicious email designed to trick associates, lawyers, or staff into sharing their login information.<\/li>\n<li><strong>Financial redirection.<\/strong> Financial redirection occurs when a hacker intercepts payments between you and your clients.<\/li>\n<li><strong>Ransomware attacks.<\/strong> Ransomware, which encrypts important files and information, can start with a malicious email or a website download. The cybercriminal can also exploit a vulnerability, such as an outdated operating system, to break into the computer and launch the malware.<\/li>\n<li><strong>Supply chain attacks.<\/strong> Intrusion through a weak link in your supply chain to access your network or data.<\/li>\n<li><strong>Hybrid work environments<\/strong> are more exposed to cyberthreats.<\/li>\n<\/ul>\n<p>[\/et_pb_toggle][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; admin_label=&#8221;Pink Firm Square&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; height=&#8221;0px&#8221; max_height=&#8221;0px&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea&#8221; transform_rotate=&#8221;0deg|0deg|6deg&#8221; positioning=&#8221;absolute&#8221; vertical_offset=&#8221;-248px&#8221; z_index=&#8221;1&#8243; vertical_offset_tablet=&#8221;-675px&#8221; vertical_offset_phone=&#8221;-804px&#8221; vertical_offset_last_edited=&#8221;on|tablet&#8221; scroll_horizontal_motion_enable=&#8221;on&#8221; scroll_horizontal_motion=&#8221;0|29|29|100|-4|0|0&#8243; scroll_fade_enable=&#8221;on&#8221; border_radii=&#8221;on|50px|50px|50px|50px&#8221; global_colors_info=&#8221;{%22gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea%22:%91%22background_color%22%93}&#8221;][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; height=&#8221;250px&#8221; height_tablet=&#8221;200px&#8221; height_phone=&#8221;150px&#8221; height_last_edited=&#8221;on|phone&#8221; max_height=&#8221;250px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; admin_label=&#8221;Row Genie Text Image&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(0,0,0,0.05)&#8221; custom_padding=&#8221;|25px||25px|false|true&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|||on|||||&#8221; text_text_color=&#8221;gcid-a662aa67-a05e-4653-9072-3f91c608b36b&#8221; text_letter_spacing=&#8221;4px&#8221; custom_margin=&#8221;||0px|||&#8221; global_colors_info=&#8221;{%22gcid-a662aa67-a05e-4653-9072-3f91c608b36b%22:%91%22text_text_color%22%93}&#8221;]<\/p>\n<p>IT for Engineering and Construction<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; text_line_height=&#8221;1.3em&#8221; header_2_line_height=&#8221;1.2em&#8221; min_height=&#8221;109px&#8221; custom_margin=&#8221;10px||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; text_font_size_tablet=&#8221;1em&#8221; text_font_size_phone=&#8221;1em&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;1.3em&#8221; header_2_font_size_phone=&#8221;1.3em&#8221; header_2_font_size_last_edited=&#8221;on|tablet&#8221; header_3_font_size_tablet=&#8221;1em&#8221; header_3_font_size_phone=&#8221;1em&#8221; header_3_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Before starting to develop a cybersecurity strategy, it is important to know the most significant risks.<\/h2>\n<p>We know that you rely on your technology for every aspect of a project\u2019s lifecycle &#8211; from preconstruction to management, operations, and everything in between. We help our engineering clients stay safe.<\/p>\n<p>BeMotion specializes in helping engineering firms protect their sensitive data against all types of threats<\/p>\n<p>[\/et_pb_text][et_pb_toggle title=&#8221;Common methods used by hackers to infiltrate a network&#8221; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; title_text_color=&#8221;gcid-a662aa67-a05e-4653-9072-3f91c608b36b&#8221; title_line_height=&#8221;1.4em&#8221; global_colors_info=&#8221;{%22gcid-a662aa67-a05e-4653-9072-3f91c608b36b%22:%91%22title_text_color%22%93}&#8221;]<\/p>\n<ul>\n<li>Unsupported or outdated operating systems and\/or hardware.<\/li>\n<li>Hardware and\/or software configuration issues.<\/li>\n<li>Lack of patches and updates.<\/li>\n<li>Untrained employees downloading malware or sending confidential information.<\/li>\n<li>Lack of corporate-level cybersecurity solutions.<\/li>\n<\/ul>\n<p>[\/et_pb_toggle][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Montserrat|800|||||||&#8221; text_text_color=&#8221;gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea&#8221; text_font_size=&#8221;20px&#8221; text_line_height=&#8221;1.2em&#8221; text_orientation=&#8221;right&#8221; custom_margin=&#8221;||4vh||false|false&#8221; text_font_size_tablet=&#8221;1.3em&#8221; text_font_size_phone=&#8221;1.3em&#8221; text_font_size_last_edited=&#8221;on|tablet&#8221; text_orientation_tablet=&#8221;left&#8221; text_orientation_phone=&#8221;left&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{%22gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea%22:%91%22text_text_color%22,%22text_text_color%22%93}&#8221;]<\/p>\n<p>Insuring engineering firms protect their sensitive data against all types of threats.<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;http:\/\/bemotion.tech\/wp-content\/uploads\/2024\/01\/soutien_ti_ingenieur.jpg&#8221; title_text=&#8221;soutien_ti_ingenieur&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; scroll_horizontal_motion_enable=&#8221;on&#8221; scroll_horizontal_motion=&#8221;0|45|45|100|4|0|0&#8243; scroll_fade_enable=&#8221;on&#8221; border_radii=&#8221;on|50px|50px|50px|50px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; admin_label=&#8221;Pink genie Square&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; height=&#8221;0px&#8221; max_height=&#8221;0px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea&#8221; transform_rotate=&#8221;0deg|0deg|6deg&#8221; positioning=&#8221;absolute&#8221; position_origin_a=&#8221;top_right&#8221; vertical_offset=&#8221;-268px&#8221; horizontal_offset=&#8221;-7px&#8221; z_index=&#8221;1&#8243; vertical_offset_tablet=&#8221;-336px&#8221; vertical_offset_phone=&#8221;-193px&#8221; vertical_offset_last_edited=&#8221;on|phone&#8221; scroll_horizontal_motion_enable=&#8221;on&#8221; scroll_horizontal_motion=&#8221;0|29|29|100|-4|0|0&#8243; scroll_fade_enable=&#8221;on&#8221; border_radii=&#8221;on|50px|50px|50px|50px&#8221; global_colors_info=&#8221;{%22gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea%22:%91%22background_color%22%93}&#8221;][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; height=&#8221;250px&#8221; height_tablet=&#8221;200px&#8221; height_phone=&#8221;150px&#8221; height_last_edited=&#8221;on|phone&#8221; max_height=&#8221;250px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; admin_label=&#8221;Row Manufacturing text&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(0,0,0,0.05)&#8221; custom_padding=&#8221;|25px||25px|false|true&#8221; border_radii_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Montserrat|800|||||||&#8221; text_text_color=&#8221;gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea&#8221; text_font_size=&#8221;20px&#8221; text_line_height=&#8221;1.2em&#8221; text_orientation=&#8221;right&#8221; custom_margin=&#8221;||4vh||false|false&#8221; text_font_size_tablet=&#8221;1.3em&#8221; text_font_size_phone=&#8221;1.3em&#8221; text_font_size_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{%22gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea%22:%91%22text_text_color%22,%22text_text_color%22%93}&#8221;]<\/p>\n<p><strong>Integrating IT and OT security<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;http:\/\/bemotion.tech\/wp-content\/uploads\/2024\/02\/pretection-informatique-industriel.jpeg&#8221; title_text=&#8221;pretection-informatique-industriel&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; scroll_horizontal_motion_enable=&#8221;on&#8221; scroll_horizontal_motion=&#8221;0|45|45|100|-4|0|0&#8243; scroll_fade_enable=&#8221;on&#8221; border_radii=&#8221;on|50px|50px|50px|50px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|||on|||||&#8221; text_text_color=&#8221;gcid-a662aa67-a05e-4653-9072-3f91c608b36b&#8221; text_letter_spacing=&#8221;4px&#8221; custom_margin=&#8221;||0px|||&#8221; global_colors_info=&#8221;{%22gcid-a662aa67-a05e-4653-9072-3f91c608b36b%22:%91%22text_text_color%22%93}&#8221;]<\/p>\n<p>IT for Manufacturing<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; text_line_height=&#8221;1.3em&#8221; header_2_line_height=&#8221;1.2em&#8221; min_height=&#8221;109px&#8221; custom_margin=&#8221;10px||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; text_font_size_tablet=&#8221;1em&#8221; text_font_size_phone=&#8221;1em&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;1.3em&#8221; header_2_font_size_phone=&#8221;1.3em&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;1em&#8221; header_3_font_size_phone=&#8221;1em&#8221; header_3_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>A disruption of production lines due to a cyberthreat can cost thousands of dollars per minute. Such disruptions are the very antithesis of the number one goal of the manufacturing industry, which is to increase profitability.<\/h2>\n<p>The manufacturing industry is one of the fastest-evolving sectors of the global economy, meaning that the quantities and methods of using, processing, storing, and accessing data are changing radically. As an existing target for cyber attackers, manufacturing companies have every interest in redoubling their efforts as soon as possible to secure their systems.<\/p>\n<p>[\/et_pb_text][et_pb_toggle title=&#8221;Main Cybersecurity Risks for Manufacturing Companies&#8221; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; title_text_color=&#8221;gcid-a662aa67-a05e-4653-9072-3f91c608b36b&#8221; title_line_height=&#8221;1.4em&#8221; global_colors_info=&#8221;{%22gcid-a662aa67-a05e-4653-9072-3f91c608b36b%22:%91%22title_text_color%22%93}&#8221;]<\/p>\n<ul>\n<li>Theft of intellectual property through cyber espionage.\u00a0<\/li>\n<li>Social engineering and phishing attacks.\u00a0<\/li>\n<li>Ransomware, where threat actors encrypt the company\u2019s critical data and demand money in exchange for the decryption key.\u00a0<\/li>\n<li>A supply chain attack can have a significant ripple effect, potentially damaging multiple operations.<\/li>\n<\/ul>\n<p>[\/et_pb_toggle][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Pink Manufacturing Square&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; horizontal_offset=&#8221;-122px&#8221; horizontal_offset_tablet=&#8221;-189px&#8221; horizontal_offset_phone=&#8221;-189px&#8221; horizontal_offset_last_edited=&#8221;on|tablet&#8221; max_width=&#8221;256px&#8221; height=&#8221;0px&#8221; max_height=&#8221;0px&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; scroll_horizontal_motion_enable=&#8221;off&#8221; scroll_horizontal_motion=&#8221;0|52|52|100|4|0|-4&#8243; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{%22gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea%22:%91%22background_color%22%93}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea&#8221; transform_rotate=&#8221;0deg|0deg|6deg&#8221; positioning=&#8221;absolute&#8221; vertical_offset=&#8221;-380px&#8221; horizontal_offset=&#8221;-18px&#8221; z_index=&#8221;1&#8243; vertical_offset_tablet=&#8221;-675px&#8221; vertical_offset_phone=&#8221;-950px&#8221; vertical_offset_last_edited=&#8221;on|phone&#8221; horizontal_offset_tablet=&#8221;160px&#8221; horizontal_offset_phone=&#8221;160px&#8221; horizontal_offset_last_edited=&#8221;on|desktop&#8221; scroll_horizontal_motion_enable=&#8221;on&#8221; scroll_horizontal_motion=&#8221;0|29|29|100|-4|0|0&#8243; scroll_fade_enable=&#8221;on&#8221; border_radii=&#8221;on|50px|50px|50px|50px&#8221; global_colors_info=&#8221;{%22gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea%22:%91%22background_color%22,%22background_color%22%93}&#8221;][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; height=&#8221;250px&#8221; height_tablet=&#8221;200px&#8221; height_phone=&#8221;150px&#8221; height_last_edited=&#8221;on|phone&#8221; max_height=&#8221;250px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Row CAll to action&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(0,0,0,0.05)&#8221; custom_padding=&#8221;25px|25px|25px|25px|true|true&#8221; border_radii=&#8221;off|||25px|25px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjU3MTIifX0=@&#8221; button_text=&#8221;global it demo&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.26.0&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;0.8vw&#8221; button_text_color=&#8221;gcid-ed71b614-8bfc-4aff-8f4a-b1ded32f4571&#8243; button_bg_color=&#8221;#FFFFFF&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;gcid-16cb6075-d74e-46be-8e55-ee01bf9fbbee&#8221; button_border_radius=&#8221;100px&#8221; button_letter_spacing=&#8221;1px&#8221; button_font=&#8221;|700||on|||||&#8221; custom_margin=&#8221;||||true|false&#8221; custom_margin_tablet=&#8221;10px||10px||true|false&#8221; custom_margin_phone=&#8221;10px||10px||true|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;0.2vw|2.5vw|0.2vw|2.5vw|true|true&#8221; custom_padding_tablet=&#8221;1vw|3vw|1vw|3vw|true|true&#8221; custom_padding_phone=&#8221;2vw|4vw|2vw|4vw|true|true&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; button_text_size_tablet=&#8221;1.7vw&#8221; button_text_size_phone=&#8221;3.4vw&#8221; button_text_size_last_edited=&#8221;on|phone&#8221; custom_css_main_element=&#8221;||&#8221; box_shadow_style=&#8221;preset1&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-ed71b614-8bfc-4aff-8f4a-b1ded32f4571%22:%91%22button_text_color%22,%22button_text_color%22,%22button_text_color%22,%22button_text_color%22,%22button_text_color%22%93,%22gcid-16cb6075-d74e-46be-8e55-ee01bf9fbbee%22:%91%22button_border_color%22,%22button_border_color%22,%22button_border_color%22,%22button_border_color%22,%22button_border_color%22%93}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; transform_scale__hover=&#8221;110%|110%&#8221;][\/et_pb_button][et_pb_text _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; text_line_height=&#8221;1.5em&#8221; text_orientation=&#8221;center&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|desktop&#8221; max_width_tablet=&#8221;&#8221; max_width_phone=&#8221;&#8221; max_width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px|14%|0px|14%|false|true&#8221; custom_padding_tablet=&#8221;0px|10%|0px|10%|false|true&#8221; custom_padding_phone=&#8221;0px|10%|0px|10%|false|true&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; text_font_size_tablet=&#8221;0.8em&#8221; text_font_size_phone=&#8221;0.8em&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Discover the IT difference that allows your company to grow with today\u2019s and tomorrow\u2019s cybersecurity challenges.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Section TI&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;gcid-c7998334-6175-4dc3-ae96-44e2f8ea4c17&#8243; border_radii=&#8221;on|50px|50px|50px|50px&#8221; global_module=&#8221;5867&#8243; saved_tabs=&#8221;all&#8221; global_colors_info=&#8221;{%22gcid-c7998334-6175-4dc3-ae96-44e2f8ea4c17%22:%91%22background_color%22%93}&#8221;][et_pb_row _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;|auto||auto|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;http:\/\/bemotion.tech\/wp-content\/uploads\/2024\/01\/backup_cloud_icon@300x.png&#8221; title_text=&#8221;backup_cloud_icon@300x&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;75px&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;center&#8221; header_2_line_height=&#8221;1.5em&#8221; header_2_font_size_tablet=&#8221;2em&#8221; header_2_font_size_phone=&#8221;&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Well managed, well secured against cyber threats.<\/h2>\n<h2>Global range of managed IT services.<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;gcid-261a7f97-e468-4161-bdce-24fe9bdf7d2a&#8221; text_font_size=&#8221;18px&#8221; text_orientation=&#8221;center&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;15px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-261a7f97-e468-4161-bdce-24fe9bdf7d2a%22:%91%22text_text_color%22%93}&#8221;]<\/p>\n<p>To ensure the smooth operation of your company, a cybersecurity solution must integrate a range of essential IT management services. BeMotion centralizes the IT management of your IT infrastructure by consolidating a range of IT services under a global managed service, to strengthen your company\u2019s protection against cyber threats.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;http:\/\/bemotion.tech\/wp-content\/uploads\/2024\/01\/gestion_TI_6_niveaux-1.png&#8221; title_text=&#8221;gestion_TI_6_niveaux&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; scroll_fade_enable=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjU3MTIifX0=@&#8221; button_text=&#8221;Get the Demo today!&#8221; button_alignment=&#8221;center&#8221; admin_label=&#8221;Bouton&#8221; _builder_version=&#8221;4.26.0&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;20px&#8221; button_text_color=&#8221;gcid-ed71b614-8bfc-4aff-8f4a-b1ded32f4571&#8243; button_bg_color=&#8221;#FFFFFF&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;gcid-16cb6075-d74e-46be-8e55-ee01bf9fbbee&#8221; button_border_radius=&#8221;100px&#8221; button_letter_spacing=&#8221;1px&#8221; button_font=&#8221;|700||on|||||&#8221; custom_margin=&#8221;||||true|false&#8221; custom_margin_tablet=&#8221;10px||10px||true|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;0.2vw|2.5vw|0.2vw|2.5vw|true|true&#8221; custom_padding_tablet=&#8221;1vw|3vw|1vw|3vw|true|true&#8221; custom_padding_phone=&#8221;2vw|4vw|2vw|4vw|true|true&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; scroll_scaling_enable=&#8221;on&#8221; motion_trigger_start=&#8221;top&#8221; button_text_size_tablet=&#8221;1.3em&#8221; button_text_size_phone=&#8221;1.3em&#8221; button_text_size_last_edited=&#8221;on|phone&#8221; custom_css_main_element=&#8221;||&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{%22gcid-ed71b614-8bfc-4aff-8f4a-b1ded32f4571%22:%91%22button_text_color%22,%22button_text_color%22%93,%22gcid-16cb6075-d74e-46be-8e55-ee01bf9fbbee%22:%91%22button_border_color%22,%22button_border_color%22%93}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; transform_scale__hover=&#8221;110%|110%&#8221;][\/et_pb_button][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;center&#8221; text_orientation=&#8221;center&#8221; max_width_tablet=&#8221;&#8221; max_width_phone=&#8221;&#8221; max_width_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;|20%||20%|false|true&#8221; custom_padding_tablet=&#8221;|5%||5%|false|true&#8221; custom_padding_phone=&#8221;|5%||5%|false|true&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; text_font_size_tablet=&#8221;1em&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Why a &#8220;Global&#8221; IT Management service?<\/strong><br \/>Well managed, well secured! Understanding today\u2019s and tomorrow\u2019s cybersecurity challenges. Ask for our DEMO, now.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Section Technique&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;gcid-81f50182-4aac-4cf4-a9fc-4877c62860bb&#8221; background_image=&#8221;http:\/\/bemotion.tech\/wp-content\/uploads\/2024\/01\/mountain_bicking_montreal-1.jpg&#8221; parallax=&#8221;on&#8221; background_blend=&#8221;multiply&#8221; positioning=&#8221;none&#8221; custom_padding=&#8221;||138px|||&#8221; border_radii=&#8221;on|50px|50px|50px|50px&#8221; global_module=&#8221;5868&#8243; saved_tabs=&#8221;all&#8221; global_colors_info=&#8221;{%22gcid-a662aa67-a05e-4653-9072-3f91c608b36b%22:%91%22background_pattern_color%22%93,%22gcid-81f50182-4aac-4cf4-a9fc-4877c62860bb%22:%91%22background_color%22%93}&#8221;][et_pb_row _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;http:\/\/bemotion.tech\/wp-content\/uploads\/2024\/01\/network_security@300x.png&#8221; title_text=&#8221;network_security@300x&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;75px&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;gcid-bd64b08e-f891-42c5-be90-66d3f2bbf302&#8243; header_font=&#8221;|700|||||||&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;gcid-bd64b08e-f891-42c5-be90-66d3f2bbf302&#8243; header_font_size=&#8221;28px&#8221; header_font_size_tablet=&#8221;2em&#8221; header_font_size_phone=&#8221;1.5em&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-bd64b08e-f891-42c5-be90-66d3f2bbf302%22:%91%22text_text_color%22,%22header_text_color%22%93}&#8221;]<\/p>\n<h1>Active IT Mangement benefits.<\/h1>\n<h1>Well managed, well secured&#8230; easy.<\/h1>\n<p>[\/et_pb_text][et_pb_image src=&#8221;http:\/\/bemotion.tech\/wp-content\/uploads\/2024\/01\/IT_gestion@300x.png&#8221; title_text=&#8221;IT_gestion@300x&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;50%&#8221; max_width_tablet=&#8221;60%&#8221; max_width_phone=&#8221;100%&#8221; max_width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;center&#8221; animation_style=&#8221;zoom&#8221; animation_duration=&#8221;1400ms&#8221; animation_delay=&#8221;800ms&#8221; animation_speed_curve=&#8221;ease-in&#8221; scroll_vertical_motion=&#8221;12|50|50|80|4|0|-4&#8243; scroll_fade_enable=&#8221;on&#8221; motion_trigger_start=&#8221;top&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;gcid-bd64b08e-f891-42c5-be90-66d3f2bbf302&#8243; header_font=&#8221;|700||on|||||&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;gcid-bd64b08e-f891-42c5-be90-66d3f2bbf302&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-bd64b08e-f891-42c5-be90-66d3f2bbf302%22:%91%22text_text_color%22,%22header_text_color%22%93}&#8221;]<\/p>\n<h1>Management. Support. Protection.<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;gcid-bd64b08e-f891-42c5-be90-66d3f2bbf302&#8243; max_width_tablet=&#8221;80%&#8221; max_width_phone=&#8221;100%&#8221; max_width_last_edited=&#8221;on|phone&#8221; text_font_size_tablet=&#8221;1.3em&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-bd64b08e-f891-42c5-be90-66d3f2bbf302%22:%91%22text_text_color%22%93}&#8221;]<\/p>\n<p>Implement a preventive IT approach and gain peace of mind knowing that malware will not infiltrate your IT infrastructure when BeMotion manages and supports your IT.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjU3MTIifX0=@&#8221; button_text=&#8221;book a demo&#8221; button_alignment=&#8221;center&#8221; button_alignment_tablet=&#8221;left&#8221; button_alignment_phone=&#8221;left&#8221; button_alignment_last_edited=&#8221;on|tablet&#8221; admin_label=&#8221;Bouton&#8221; _builder_version=&#8221;4.26.0&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;20px&#8221; button_text_color=&#8221;gcid-ed71b614-8bfc-4aff-8f4a-b1ded32f4571&#8243; button_bg_color=&#8221;#FFFFFF&#8221; button_border_width=&#8221;0px&#8221; button_border_color=&#8221;gcid-16cb6075-d74e-46be-8e55-ee01bf9fbbee&#8221; button_border_radius=&#8221;100px&#8221; button_letter_spacing=&#8221;1px&#8221; button_font=&#8221;|700||on|||||&#8221; custom_margin=&#8221;||||true|false&#8221; custom_margin_tablet=&#8221;10px||10px||true|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;0.2vw|2.5vw|0.2vw|2.5vw|true|true&#8221; custom_padding_tablet=&#8221;1vw|3vw|1vw|3vw|true|true&#8221; custom_padding_phone=&#8221;2vw|4vw|2vw|4vw|true|true&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; button_text_size_tablet=&#8221;1.3em&#8221; button_text_size_phone=&#8221;1.3em&#8221; button_text_size_last_edited=&#8221;on|phone&#8221; button_border_width_tablet=&#8221;0px&#8221; button_border_width_phone=&#8221;&#8221; button_border_width_last_edited=&#8221;on|phone&#8221; custom_css_main_element=&#8221;||&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{%22gcid-ed71b614-8bfc-4aff-8f4a-b1ded32f4571%22:%91%22button_text_color%22,%22button_text_color%22,%22button_text_color%22,%22button_text_color%22,%22button_text_color%22%93,%22gcid-16cb6075-d74e-46be-8e55-ee01bf9fbbee%22:%91%22button_border_color%22,%22button_border_color%22,%22button_border_color%22,%22button_border_color%22,%22button_border_color%22%93}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; transform_scale__hover=&#8221;110%|110%&#8221;][\/et_pb_button][et_pb_text _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_line_height=&#8221;1.3em&#8221; header_text_align=&#8221;center&#8221; width_tablet=&#8221;60%&#8221; width_phone=&#8221;80%&#8221; width_last_edited=&#8221;on|phone&#8221; max_width_tablet=&#8221;&#8221; max_width_phone=&#8221;&#8221; max_width_last_edited=&#8221;on|tablet&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; text_font_size_tablet=&#8221;1em&#8221; text_font_size_phone=&#8221;0.8em&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Presentation of <strong>BeMotion\u2019s Global IT Management Service solution.<\/strong> The IT difference that allows your enterprise to grow with today\u2019s and tomorrow\u2019s cybersecurity challenges.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IT administrators busy protecting your projects.A proactive approach that identifies and monitors vulnerabilities and weaknesses in your networks, data, software, and devices that could be exposed to cyber threats.since 1991Unique proactive approach. IT experts for Greater Montreal and Laval businesses.Controlling the situation before it happens. A proactive approach that leads to peace of mind.\u00a0BeMotion\u2019s IT administrators proactive approach involves identifying vulnerabilities and weaknesses in your networks, software, and devices that could be exploited by cyberattacks. This is done by actively strengthening IT defenses, rather than waiting for attackers to strike. When they do, the repercussions can be devastating for your operations and data.Cybersecurity regulations are intensifying for professional firms.IT for Professsionnal firmsProfessional firms&#8217; specialised data is valuable. Professional firms and offices are prime targets for hackers. They store extremely valuable and sensitive information and may even have access to trust accounts containing their clients\u2019 money. Therefore, they are likely to be stolen or subject to ransom demands. Theft of credentials. 49% of data breaches involved the use of stolen credentials. It often starts with a malicious email designed to trick associates, lawyers, or staff into sharing their login information. Financial redirection. Financial redirection occurs when a hacker intercepts payments between [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":5523,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<p>[et_pb_section fb_built=\"1\" prev_background_color=\"#ffffff\" next_background_color=\"#ffffff\" _builder_version=\"4.24.2\" _module_preset=\"default\" background_enable_color=\"off\" background_video_mp4=\"http:\/\/bemotion.tech\/wp-content\/uploads\/2024\/02\/BM-Expert-TI.mp4\" background_video_webm=\"http:\/\/bemotion.tech\/wp-content\/uploads\/2024\/02\/BM_Expert.webm\" background_video_pause_outside_viewport=\"off\" custom_padding=\"0px|||||\" top_divider_style=\"asymmetric\" top_divider_height=\"50px\" top_divider_flip=\"vertical\" top_divider_height_tablet=\"30px\" top_divider_height_phone=\"20px\" top_divider_height_last_edited=\"on|tablet\" bottom_divider_style=\"asymmetric2\" bottom_divider_height=\"82px\" bottom_divider_flip=\"vertical|horizontal\" bottom_divider_height_tablet=\"50px\" bottom_divider_height_phone=\"30px\" bottom_divider_height_last_edited=\"on|phone\" custom_css_main_element=\"min-height: 65vh;||\" global_colors_info=\"{}\" custom_css_main_element_last_edited=\"on|phone\" custom_css_main_element_tablet=\"min-height: 65vh;\" custom_css_main_element_phone=\"min-height: 65vh;\"][et_pb_row _builder_version=\"4.23.4\" _module_preset=\"default\" background_enable_color=\"off\" positioning=\"absolute\" position_origin_a=\"center_center\" custom_padding=\"1vw|1vw|1vw|1vw|true|true\" border_radii=\"on|25px|25px|25px|25px\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.23.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_number_counter title=\"attaques pme\/jour\" number=\"2200\" percent_sign=\"off\" _builder_version=\"4.23.4\" _module_preset=\"default\" title_font=\"|||on|||||\" title_text_align=\"left\" title_text_color=\"gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea\" title_font_size=\"25px\" number_text_align=\"left\" number_text_color=\"gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea\" global_colors_info=\"{%22gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea%22:%91%22title_text_color%22,%22number_text_color%22%93}\"][\/et_pb_number_counter][et_pb_text _builder_version=\"4.24.2\" _module_preset=\"default\" text_font=\"Montserrat|800|||||||\" text_text_color=\"#FFFFFF\" text_font_size=\"2.5vw\" text_line_height=\"1em\" header_font=\"|800|||||||\" header_text_color=\"#FFFFFF\" header_font_size=\"56px\" custom_margin=\"||0px||false|false\" custom_margin_tablet=\"||||false|false\" custom_margin_phone=\"||0px||false|false\" custom_margin_last_edited=\"on|phone\" text_font_size_tablet=\"6vw\" text_font_size_phone=\"9vw\" text_font_size_last_edited=\"on|desktop\" text_line_height_tablet=\"1em\" text_line_height_phone=\"1em\" text_line_height_last_edited=\"on|tablet\" header_font_size_tablet=\"1em\" header_font_size_phone=\"0.9em\" header_font_size_last_edited=\"on|phone\" locked=\"off\" global_colors_info=\"{}\"]<\/p><h1>Administrateurs TI occup\u00e9s \u00e0 prot\u00e9ger vos projets.<\/h1><p>[\/et_pb_text][et_pb_text _builder_version=\"4.24.2\" _module_preset=\"default\" header_2_text_color=\"gcid-bd64b08e-f891-42c5-be90-66d3f2bbf302\" header_3_text_color=\"gcid-bd64b08e-f891-42c5-be90-66d3f2bbf302\" animation_style=\"fade\" header_3_font_size_tablet=\"1em\" header_3_font_size_phone=\"1em\" header_3_font_size_last_edited=\"on|phone\" locked=\"off\" global_colors_info=\"{%22gcid-bd64b08e-f891-42c5-be90-66d3f2bbf302%22:%91%22header_2_text_color%22,%22header_3_text_color%22%93}\"]<\/p><h3>Approche proactive qui identifie et surveille proactivement les vuln\u00e9rabilit\u00e9s et les faiblesses de vos r\u00e9seaux, donn\u00e9es, logiciels et terminaux qui pourraient \u00eatre expos\u00e9es aux cybermenaces.<\/h3><p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" _builder_version=\"4.23.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_row column_structure=\"3_5,2_5\" _builder_version=\"4.23.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"3_5\" _builder_version=\"4.23.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.24.2\" _module_preset=\"default\" text_font=\"|||on|||||\" text_text_color=\"gcid-a662aa67-a05e-4653-9072-3f91c608b36b\" text_letter_spacing=\"4px\" custom_margin=\"||0px|||\" text_font_size_tablet=\"\" text_font_size_phone=\"\" text_font_size_last_edited=\"on|tablet\" global_colors_info=\"{%22gcid-a662aa67-a05e-4653-9072-3f91c608b36b%22:%91%22text_text_color%22,%22text_text_color%22%93}\"]<\/p><p>depuis 1991<\/p><p>[\/et_pb_text][et_pb_text _builder_version=\"4.24.2\" _module_preset=\"default\" text_font=\"Montserrat|800|||||||\" text_text_color=\"gcid-a662aa67-a05e-4653-9072-3f91c608b36b\" text_font_size=\"2vw\" text_line_height=\"1.2em\" header_font=\"|700|||||||\" header_text_color=\"gcid-a662aa67-a05e-4653-9072-3f91c608b36b\" header_font_size=\"1.9vw\" header_line_height=\"1.4em\" custom_margin=\"||||false|false\" custom_margin_tablet=\"||||false|false\" custom_margin_phone=\"||||false|false\" custom_margin_last_edited=\"on|phone\" custom_padding=\"||||false|false\" animation_style=\"fade\" animation_delay=\"50ms\" header_font_size_tablet=\"4vw\" header_font_size_phone=\"7vw\" header_font_size_last_edited=\"on|phone\" locked=\"off\" global_colors_info=\"{%22gcid-a662aa67-a05e-4653-9072-3f91c608b36b%22:%91%22header_text_color%22,%22text_text_color%22%93}\"]<\/p><h1>Approche proactive unique. Experts TI proactifs des PME du grand Montr\u00e9al et Laval.<\/h1><p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_5\" _builder_version=\"4.23.4\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" _builder_version=\"4.23.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_row column_structure=\"3_4,1_4\" admin_label=\"Approche Row\" _builder_version=\"4.23.4\" _module_preset=\"default\" background_color=\"rgba(0,0,0,0.05)\" custom_padding=\"|25px||25px|false|true\" border_radii=\"off|25px|25px||\" global_colors_info=\"{}\"][et_pb_column type=\"3_4\" _builder_version=\"4.23.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.24.2\" _module_preset=\"default\" text_font_size=\"18px\" text_line_height=\"1.8em\" header_2_line_height=\"1.2em\" module_alignment=\"left\" custom_margin=\"||||false|false\" custom_padding=\"15px|30%|||false|false\" header_2_font_size_tablet=\"\" header_2_font_size_phone=\"\" header_2_font_size_last_edited=\"on|phone\" locked=\"off\" global_colors_info=\"{}\"]<\/p><h2>Approche proactive adapt\u00e9e \u00e0 chaque PME.<\/h2><p>[\/et_pb_text][et_pb_text _builder_version=\"4.24.2\" _module_preset=\"default\" header_3_line_height=\"1.2em\" global_colors_info=\"{}\"]<\/p><p>L'approche proactive des administrateurs TI BeMotion consiste \u00e0 identifier de mani\u00e8re proactive les vuln\u00e9rabilit\u00e9s et les faiblesses de vos r\u00e9seaux, logiciels et terminaux qui pourraient \u00eatre exploit\u00e9es par des cyberattaques en renfor\u00e7ant activement les d\u00e9fenses informatiques, plut\u00f4t que d\u2019attendre que les attaquants frappent. Parce que quand ils le font, les r\u00e9percussions peuvent \u00eatre d\u00e9vastatrices pour vos op\u00e9rations et vos donn\u00e9es.<\/p><p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_4\" _builder_version=\"4.23.4\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" admin_label=\"Row Firm Text Image\" _builder_version=\"4.23.4\" _module_preset=\"default\" background_color=\"rgba(0,0,0,0.05)\" custom_padding=\"|25px||25px|false|true\" global_colors_info=\"{}\"][et_pb_column type=\"1_2\" admin_label=\"Column\" _builder_version=\"4.23.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.24.2\" _module_preset=\"default\" text_font=\"Montserrat|800|||||||\" text_text_color=\"gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea\" text_font_size=\"20px\" text_line_height=\"1.2em\" text_orientation=\"right\" custom_margin=\"||4vh||false|false\" text_font_size_tablet=\"1.3em\" text_font_size_phone=\"1.3em\" text_font_size_last_edited=\"on|tablet\" global_colors_info=\"{%22gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea%22:%91%22text_text_color%22%93}\"]<\/p><p>Les r\u00e9glementations en mati\u00e8re de cybers\u00e9curit\u00e9 s'intensifient pour les firmes professionnelles.<\/p><p>[\/et_pb_text][et_pb_image src=\"http:\/\/bemotion.tech\/wp-content\/uploads\/2024\/01\/plan_relance_informatique_montreal.jpg\" title_text=\"plan_relance_informatique_montreal\" _builder_version=\"4.23.4\" _module_preset=\"default\" z_index=\"2\" scroll_horizontal_motion_enable=\"on\" scroll_horizontal_motion=\"0|45|45|100|-4|0|0\" scroll_fade_enable=\"on\" border_radii=\"on|50px|50px|50px|50px\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.23.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.23.4\" _module_preset=\"default\" text_font=\"|||on|||||\" text_text_color=\"gcid-a662aa67-a05e-4653-9072-3f91c608b36b\" text_letter_spacing=\"4px\" custom_margin=\"||0px|||\" global_colors_info=\"{%22gcid-a662aa67-a05e-4653-9072-3f91c608b36b%22:%91%22text_text_color%22%93}\"]<\/p><p>TI firme professionnelle<\/p><p>[\/et_pb_text][et_pb_text _builder_version=\"4.24.2\" _module_preset=\"default\" text_line_height=\"1.3em\" header_2_line_height=\"1.2em\" min_height=\"109px\" custom_margin=\"10px||||false|false\" custom_padding=\"||||false|false\" text_font_size_tablet=\"1em\" text_font_size_phone=\"1em\" text_font_size_last_edited=\"on|phone\" header_2_font_size_tablet=\"1.3em\" header_2_font_size_phone=\"1.3em\" header_2_font_size_last_edited=\"on|phone\" header_3_font_size_tablet=\"1em\" header_3_font_size_phone=\"1em\" header_3_font_size_last_edited=\"on|phone\" global_colors_info=\"{}\"]<\/p><h2>Les donn\u00e9es sp\u00e9cialis\u00e9s des firmes professionnels sont pr\u00e9cieuses.<\/h2><p>Les firmes et cabinets professionnels sont des cibles de choix pour les pirates informatiques. Ils stockent des informations extr\u00eamement pr\u00e9cieuses et sensibles, et peuvent m\u00eame avoir acc\u00e8s \u00e0 des comptes en fid\u00e9icommis contenant l'argent de leurs clients. Ils sont donc susceptibles d'\u00eatre vol\u00e9s ou de faire l'objet d'une demande de ran\u00e7on.<\/p><p>[\/et_pb_text][et_pb_toggle title=\"Les cybermenaces qui visent les firmes professionnelles\" _builder_version=\"4.24.2\" _module_preset=\"default\" title_text_color=\"gcid-a662aa67-a05e-4653-9072-3f91c608b36b\" title_line_height=\"1.4em\" scroll_fade_enable=\"on\" global_colors_info=\"{%22gcid-a662aa67-a05e-4653-9072-3f91c608b36b%22:%91%22title_text_color%22%93}\"]<\/p><ul><li><strong>Vol d'informations d'identification.<\/strong><br \/>49 % des violations de donn\u00e9es ont impliqu\u00e9 l'utilisation d'informations d'identification vol\u00e9es. Commence souvent par un courriel malveillant con\u00e7u pour inciter les associ\u00e9s, les avocats ou le personnel \u00e0 partager leurs informations de connexion.<\/li><li><strong>Redirection financi\u00e8re.<\/strong><br \/>Il y a redirection financi\u00e8re lorsqu'un pirate intercepte les paiements entre vous et vos clients.<\/li><li><strong>Attaques par ransomware.<\/strong><br \/>Le ransomware, crypte des fichiers et des informations importants, peut commencer par un courriel malveillant ou le t\u00e9l\u00e9chargement d'un site web. Le cybercriminel peut \u00e9galement exploiter une vuln\u00e9rabilit\u00e9, telle qu'un syst\u00e8me d'exploitation obsol\u00e8te, pour s'introduire dans l'ordinateur et lancer le logiciel malveillant.<\/li><li><strong>Attaques de la cha\u00eene d'approvisionnement.<\/strong><br \/>Instrusion par un maillon faible de votre cha\u00eene d'approvisionnement pour acc\u00e9der \u00e0 votre r\u00e9seau ou \u00e0 vos donn\u00e9es.<\/li><li>Les <strong>environnements de travail hybrides<\/strong> sont plus expos\u00e9s aux cybermenaces.<\/li><\/ul><p>[\/et_pb_toggle][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" admin_label=\"Pink Firm Square\" _builder_version=\"4.24.2\" _module_preset=\"default\" height=\"0px\" max_height=\"0px\" custom_margin=\"0px||0px||false|false\" custom_padding=\"0px||0px||false|false\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.24.2\" _module_preset=\"default\" background_color=\"gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea\" transform_rotate=\"0deg|0deg|6deg\" positioning=\"absolute\" vertical_offset=\"-248px\" z_index=\"1\" vertical_offset_tablet=\"-675px\" vertical_offset_phone=\"-804px\" vertical_offset_last_edited=\"on|tablet\" scroll_horizontal_motion_enable=\"on\" scroll_horizontal_motion=\"0|29|29|100|-4|0|0\" scroll_fade_enable=\"on\" border_radii=\"on|50px|50px|50px|50px\" global_colors_info=\"{%22gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea%22:%91%22background_color%22%93}\"][et_pb_text _builder_version=\"4.24.2\" _module_preset=\"default\" height=\"250px\" height_tablet=\"200px\" height_phone=\"150px\" height_last_edited=\"on|phone\" max_height=\"250px\" global_colors_info=\"{}\"][\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.23.4\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.23.4\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" admin_label=\"Row Genie Text Image\" _builder_version=\"4.23.4\" _module_preset=\"default\" background_color=\"rgba(0,0,0,0.05)\" custom_padding=\"|25px||25px|false|true\" global_colors_info=\"{}\"][et_pb_column type=\"1_2\" _builder_version=\"4.23.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.24.2\" _module_preset=\"default\" text_font=\"|||on|||||\" text_text_color=\"gcid-a662aa67-a05e-4653-9072-3f91c608b36b\" text_letter_spacing=\"4px\" custom_margin=\"||0px|||\" global_colors_info=\"{%22gcid-a662aa67-a05e-4653-9072-3f91c608b36b%22:%91%22text_text_color%22%93}\"]<\/p><p>TI g\u00e9nie et construction<\/p><p>[\/et_pb_text][et_pb_text _builder_version=\"4.24.2\" _module_preset=\"default\" text_line_height=\"1.3em\" header_2_line_height=\"1.2em\" min_height=\"109px\" custom_margin=\"10px||||false|false\" custom_padding=\"||||false|false\" text_font_size_tablet=\"1em\" text_font_size_phone=\"1em\" text_font_size_last_edited=\"on|phone\" header_2_font_size_tablet=\"1.3em\" header_2_font_size_phone=\"1.3em\" header_2_font_size_last_edited=\"on|tablet\" header_3_font_size_tablet=\"1em\" header_3_font_size_phone=\"1em\" header_3_font_size_last_edited=\"on|phone\" global_colors_info=\"{}\"]<\/p><h2>Avant de commencer \u00e0 \u00e9laborer une strat\u00e9gie de cybers\u00e9curit\u00e9, il est important de conna\u00eetre les risques les plus importants.<\/h2><p>Nous savons que vous d\u00e9pendez de votre technologie pour chaque aspect du cycle de vie d'un projet - de la pr\u00e9construction \u00e0 la gestion en passant par les op\u00e9rations et tout ce qui se trouve entre les deux. Nous aidons nos clients ing\u00e9nieurs \u00e0 rester en s\u00e9curit\u00e9.<\/p><p>BeMotion est sp\u00e9cialis\u00e9 dans l'aide aux soci\u00e9t\u00e9s d'ing\u00e9nierie pour prot\u00e9ger leurs donn\u00e9es sensibles contre tous les types de menaces.<\/p><p>[\/et_pb_text][et_pb_toggle title=\"Moyens les plus courants utilis\u00e9s par les pirates pour s'introduire dans le r\u00e9seau\" _builder_version=\"4.23.4\" _module_preset=\"default\" title_text_color=\"gcid-a662aa67-a05e-4653-9072-3f91c608b36b\" title_line_height=\"1.4em\" global_colors_info=\"{%22gcid-a662aa67-a05e-4653-9072-3f91c608b36b%22:%91%22title_text_color%22%93}\"]<\/p><ul><li>Syst\u00e8mes d'exploitation et\/ou mat\u00e9riel non pris en charge ou de veille technologie.<\/li><li>Probl\u00e8mes de configuration du mat\u00e9riel et\/ou des logiciels.<\/li><li>Absence de correctifs et de mises \u00e0 jour.<\/li><li>Employ\u00e9s non form\u00e9s t\u00e9l\u00e9chargeant des logiciels malveillants ou envoyant des informations confidentielles.<\/li><li>Absence de solutions de cybers\u00e9curit\u00e9 de niveau corporatif.<\/li><\/ul><p>[\/et_pb_toggle][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.23.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.24.2\" _module_preset=\"default\" text_font=\"Montserrat|800|||||||\" text_text_color=\"gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea\" text_font_size=\"20px\" text_line_height=\"1.2em\" text_orientation=\"right\" custom_margin=\"||4vh||false|false\" text_font_size_tablet=\"1.3em\" text_font_size_phone=\"1.3em\" text_font_size_last_edited=\"on|tablet\" text_orientation_tablet=\"left\" text_orientation_phone=\"left\" text_orientation_last_edited=\"on|phone\" global_colors_info=\"{%22gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea%22:%91%22text_text_color%22,%22text_text_color%22%93}\"]<\/p><p>Aider les soci\u00e9t\u00e9s d'ing\u00e9nierie \u00e0 prot\u00e9ger leurs donn\u00e9es sensibles contre tous les types de menaces.<\/p><p>[\/et_pb_text][et_pb_image src=\"http:\/\/bemotion.tech\/wp-content\/uploads\/2024\/01\/soutien_ti_ingenieur.jpg\" title_text=\"soutien_ti_ingenieur\" _builder_version=\"4.24.2\" _module_preset=\"default\" scroll_horizontal_motion_enable=\"on\" scroll_horizontal_motion=\"0|45|45|100|4|0|0\" scroll_fade_enable=\"on\" border_radii=\"on|50px|50px|50px|50px\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" admin_label=\"Pink genie Square\" _builder_version=\"4.24.2\" _module_preset=\"default\" height=\"0px\" max_height=\"0px\" custom_margin=\"||0px||false|false\" custom_padding=\"0px||0px||false|false\" collapsed=\"on\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.24.2\" _module_preset=\"default\" background_color=\"gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea\" transform_rotate=\"0deg|0deg|6deg\" positioning=\"absolute\" position_origin_a=\"top_right\" vertical_offset=\"-268px\" horizontal_offset=\"-7px\" z_index=\"1\" vertical_offset_tablet=\"-336px\" vertical_offset_phone=\"-193px\" vertical_offset_last_edited=\"on|phone\" scroll_horizontal_motion_enable=\"on\" scroll_horizontal_motion=\"0|29|29|100|-4|0|0\" scroll_fade_enable=\"on\" border_radii=\"on|50px|50px|50px|50px\" global_colors_info=\"{%22gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea%22:%91%22background_color%22%93}\"][et_pb_text _builder_version=\"4.24.2\" _module_preset=\"default\" height=\"250px\" height_tablet=\"200px\" height_phone=\"150px\" height_last_edited=\"on|phone\" max_height=\"250px\" global_colors_info=\"{}\"][\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.23.4\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.23.4\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" admin_label=\"Row Manufacturing text\" _builder_version=\"4.23.4\" _module_preset=\"default\" background_color=\"rgba(0,0,0,0.05)\" custom_padding=\"|25px||25px|false|true\" border_radii_last_edited=\"off|desktop\" global_colors_info=\"{}\"][et_pb_column type=\"1_2\" _builder_version=\"4.23.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.23.4\" _module_preset=\"default\" text_font=\"Montserrat|800|||||||\" text_text_color=\"gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea\" text_font_size=\"20px\" text_line_height=\"1.2em\" text_orientation=\"right\" custom_margin=\"||4vh||false|false\" text_font_size_tablet=\"1.3em\" text_font_size_phone=\"1.3em\" text_font_size_last_edited=\"on|tablet\" global_colors_info=\"{%22gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea%22:%91%22text_text_color%22,%22text_text_color%22%93}\"]Int\u00e9grer la s\u00e9curit\u00e9 des technologies de l'information et des technologies op\u00e9rationnelles[\/et_pb_text][et_pb_image src=\"http:\/\/bemotion.tech\/wp-content\/uploads\/2024\/02\/pretection-informatique-industriel.jpeg\" title_text=\"pretection-informatique-industriel\" _builder_version=\"4.24.2\" _module_preset=\"default\" scroll_horizontal_motion_enable=\"on\" scroll_horizontal_motion=\"0|45|45|100|-4|0|0\" scroll_fade_enable=\"on\" border_radii=\"on|50px|50px|50px|50px\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.23.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.23.4\" _module_preset=\"default\" text_font=\"|||on|||||\" text_text_color=\"gcid-a662aa67-a05e-4653-9072-3f91c608b36b\" text_letter_spacing=\"4px\" custom_margin=\"||0px|||\" global_colors_info=\"{%22gcid-a662aa67-a05e-4653-9072-3f91c608b36b%22:%91%22text_text_color%22%93}\"]<\/p><p>TI manufacturier<\/p><p>[\/et_pb_text][et_pb_text _builder_version=\"4.24.2\" _module_preset=\"default\" text_line_height=\"1.3em\" header_2_line_height=\"1.2em\" min_height=\"109px\" custom_margin=\"10px||||false|false\" custom_padding=\"||||false|false\" text_font_size_tablet=\"1em\" text_font_size_phone=\"1em\" text_font_size_last_edited=\"on|phone\" header_2_font_size_tablet=\"1.3em\" header_2_font_size_phone=\"1.3em\" header_2_font_size_last_edited=\"on|phone\" header_3_font_size_tablet=\"1em\" header_3_font_size_phone=\"1em\" header_3_font_size_last_edited=\"on|phone\" global_colors_info=\"{}\"]<\/p><h2>Une perturbation des lignes de production due \u00e0 une cybermenace peut co\u00fbter des milliers de dollars par minute. De telles perturbations sont l'antith\u00e8se m\u00eame de l'objectif num\u00e9ro un de l'industrie manufacturi\u00e8re, qui est d'accro\u00eetre sa rentabilit\u00e9.<\/h2><p>L'industrie manufacturi\u00e8re est l'un des secteurs de l'\u00e9conomie mondiale qui \u00e9volue le plus rapidement, ce qui signifie que les quantit\u00e9s et les modes d'utilisation, de traitement, de stockage et d'acc\u00e8s aux donn\u00e9es changent radicalement. En tant que cible existante des cyber-attaquants, les entreprises manufacturi\u00e8res ont tout int\u00e9r\u00eat \u00e0 redoubler d'efforts d\u00e8s que possible pour s\u00e9curiser leurs syst\u00e8mes.<\/p><p>[\/et_pb_text][et_pb_toggle title=\"Principaux risques de cybers\u00e9curit\u00e9 pour les entreprises manufacturi\u00e8res\" _builder_version=\"4.23.4\" _module_preset=\"default\" title_text_color=\"gcid-a662aa67-a05e-4653-9072-3f91c608b36b\" title_line_height=\"1.4em\" global_colors_info=\"{%22gcid-a662aa67-a05e-4653-9072-3f91c608b36b%22:%91%22title_text_color%22%93}\"]<\/p><ul><li>Vol de propri\u00e9t\u00e9 intellectuelle par le biais du cyber-espionnage.<\/li><li>Ing\u00e9nierie sociale et attaques de phishing (ham\u00e7onnage).<\/li><li>Le ransomware o\u00f9 les acteurs de la menace chiffrent les donn\u00e9es critiques de l'entreprise et demandent de l'argent en \u00e9change de la cl\u00e9 de d\u00e9cryptage.<\/li><li>Une attaques de la cha\u00eene d'approvisionnement peut avoir un effet d'entra\u00eenement consid\u00e9rable, susceptible d'endommager plusieurs op\u00e9rations.<\/li><\/ul><p>[\/et_pb_toggle][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=\"Pink Manufacturing Square\" _builder_version=\"4.24.2\" _module_preset=\"default\" horizontal_offset=\"-122px\" horizontal_offset_tablet=\"-189px\" horizontal_offset_phone=\"-189px\" horizontal_offset_last_edited=\"on|tablet\" max_width=\"256px\" height=\"0px\" max_height=\"0px\" custom_margin=\"0px||0px||false|false\" custom_padding=\"0px||0px||false|false\" scroll_horizontal_motion_enable=\"off\" scroll_horizontal_motion=\"0|52|52|100|4|0|-4\" collapsed=\"on\" global_colors_info=\"{%22gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea%22:%91%22background_color%22%93}\"][et_pb_column type=\"4_4\" _builder_version=\"4.24.2\" _module_preset=\"default\" background_color=\"gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea\" transform_rotate=\"0deg|0deg|6deg\" positioning=\"absolute\" vertical_offset=\"-380px\" horizontal_offset=\"-18px\" z_index=\"1\" vertical_offset_tablet=\"-675px\" vertical_offset_phone=\"-950px\" vertical_offset_last_edited=\"on|phone\" horizontal_offset_tablet=\"160px\" horizontal_offset_phone=\"160px\" horizontal_offset_last_edited=\"on|desktop\" scroll_horizontal_motion_enable=\"on\" scroll_horizontal_motion=\"0|29|29|100|-4|0|0\" scroll_fade_enable=\"on\" border_radii=\"on|50px|50px|50px|50px\" global_colors_info=\"{%22gcid-e4f3a889-a64d-47f2-b9d4-f8c8051816ea%22:%91%22background_color%22,%22background_color%22%93}\"][et_pb_text _builder_version=\"4.24.2\" _module_preset=\"default\" height=\"250px\" height_tablet=\"200px\" height_phone=\"150px\" height_last_edited=\"on|phone\" max_height=\"250px\" global_colors_info=\"{}\"][\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=\"Row CAll to action\" _builder_version=\"4.23.4\" _module_preset=\"default\" background_color=\"rgba(0,0,0,0.05)\" custom_padding=\"25px|25px|25px|25px|true|true\" border_radii=\"off|||25px|25px\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.23.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_button button_url=\"@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjU3MTIifX0=@\" button_text=\"Gestion TI Globale\" button_alignment=\"center\" _builder_version=\"4.24.2\" _dynamic_attributes=\"button_url\" _module_preset=\"default\" custom_button=\"on\" button_text_size=\"0.8vw\" button_text_color=\"gcid-ed71b614-8bfc-4aff-8f4a-b1ded32f4571\" button_bg_color=\"#FFFFFF\" button_border_width=\"2px\" button_border_color=\"gcid-16cb6075-d74e-46be-8e55-ee01bf9fbbee\" button_border_radius=\"100px\" button_letter_spacing=\"1px\" button_font=\"|700||on|||||\" custom_margin=\"||||true|false\" custom_margin_tablet=\"10px||10px||true|false\" custom_margin_phone=\"10px||10px||true|false\" custom_margin_last_edited=\"on|phone\" custom_padding=\"0.2vw|2.5vw|0.2vw|2.5vw|true|true\" custom_padding_tablet=\"1vw|3vw|1vw|3vw|true|true\" custom_padding_phone=\"2vw|4vw|2vw|4vw|true|true\" custom_padding_last_edited=\"on|phone\" button_text_size_tablet=\"1.7vw\" button_text_size_phone=\"3.4vw\" button_text_size_last_edited=\"on|phone\" custom_css_main_element=\"||\" box_shadow_style=\"preset1\" locked=\"off\" global_colors_info=\"{%22gcid-ed71b614-8bfc-4aff-8f4a-b1ded32f4571%22:%91%22button_text_color%22,%22button_text_color%22,%22button_text_color%22,%22button_text_color%22,%22button_text_color%22%93,%22gcid-16cb6075-d74e-46be-8e55-ee01bf9fbbee%22:%91%22button_border_color%22,%22button_border_color%22,%22button_border_color%22,%22button_border_color%22,%22button_border_color%22%93}\" transform_styles__hover_enabled=\"on|hover\" transform_scale__hover_enabled=\"on|hover\" transform_translate__hover_enabled=\"on|desktop\" transform_rotate__hover_enabled=\"on|desktop\" transform_skew__hover_enabled=\"on|desktop\" transform_origin__hover_enabled=\"on|desktop\" transform_scale__hover=\"110%|110%\"][\/et_pb_button][et_pb_text _builder_version=\"4.24.2\" _module_preset=\"default\" text_line_height=\"1.5em\" text_orientation=\"center\" width_tablet=\"\" width_phone=\"\" width_last_edited=\"on|desktop\" max_width_tablet=\"\" max_width_phone=\"\" max_width_last_edited=\"on|tablet\" custom_margin=\"0px||0px||false|false\" custom_padding=\"0px|14%|0px|14%|false|true\" custom_padding_tablet=\"0px|10%|0px|10%|false|true\" custom_padding_phone=\"0px|10%|0px|10%|false|true\" custom_padding_last_edited=\"on|phone\" text_font_size_tablet=\"0.8em\" text_font_size_phone=\"0.8em\" text_font_size_last_edited=\"on|phone\" locked=\"off\" global_colors_info=\"{}\"]<\/p><p>Pr\u00e9sentation de la solution de services de<strong> Gestion TI Globale<\/strong> de BeMotion. Mieux comprendre les enjeux de cybers\u00e9curit\u00e9 d'aujourd'hui et de demain.<\/p><p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" admin_label=\"Section TI\" _builder_version=\"4.23.4\" _module_preset=\"default\" background_color=\"gcid-c7998334-6175-4dc3-ae96-44e2f8ea4c17\" border_radii=\"on|50px|50px|50px|50px\" global_module=\"5867\" saved_tabs=\"all\" global_colors_info=\"{%22gcid-c7998334-6175-4dc3-ae96-44e2f8ea4c17%22:%91%22background_color%22%93}\"][et_pb_row _builder_version=\"4.23.4\" _module_preset=\"default\" custom_margin=\"|auto||auto|false|false\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.23.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"http:\/\/bemotion.tech\/wp-content\/uploads\/2024\/01\/backup_cloud_icon@300x.png\" title_text=\"backup_cloud_icon@300x\" _builder_version=\"4.23.4\" _module_preset=\"default\" max_width=\"75px\" module_alignment=\"center\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_text _builder_version=\"4.24.2\" _module_preset=\"default\" header_2_font=\"|700|||||||\" header_2_text_align=\"center\" header_2_line_height=\"1.5em\" header_2_font_size_tablet=\"2em\" header_2_font_size_phone=\"\" header_2_font_size_last_edited=\"on|phone\" global_colors_info=\"{}\"]<\/p><h2>Mieux g\u00e9r\u00e9, mieux prot\u00e9g\u00e9 contre les cybermenaces.<\/h2><h2>\u00c9ventail global de services TI g\u00e9r\u00e9s.<\/h2><p>[\/et_pb_text][et_pb_text _builder_version=\"4.24.2\" _module_preset=\"default\" text_text_color=\"gcid-261a7f97-e468-4161-bdce-24fe9bdf7d2a\" text_font_size=\"18px\" text_orientation=\"center\" text_font_size_tablet=\"\" text_font_size_phone=\"15px\" text_font_size_last_edited=\"on|phone\" global_colors_info=\"{%22gcid-261a7f97-e468-4161-bdce-24fe9bdf7d2a%22:%91%22text_text_color%22%93}\"]<\/p><p>Pour assurer le bon fonctionnement de votre PME, une solution de cybers\u00e9curit\u00e9 doit int\u00e9grer une gamme de gestion informatique essentielle. BeMotion centralise la gestion informatique de votre parc informatique en consolidant un \u00e9ventail de services informatiques sous un service g\u00e9r\u00e9 global, afin de renforcer la protection de votre entreprise contre les cybermenaces.<\/p><p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.23.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.23.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"http:\/\/bemotion.tech\/wp-content\/uploads\/2024\/01\/gestion_TI_6_niveaux-1.png\" title_text=\"gestion_TI_6_niveaux\" align=\"center\" _builder_version=\"4.23.4\" _module_preset=\"default\" scroll_fade_enable=\"on\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_button button_url=\"@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjU3MTIifX0=@\" button_text=\"Gestion TI globale\" button_alignment=\"center\" admin_label=\"Bouton\" _builder_version=\"4.24.2\" _dynamic_attributes=\"button_url\" _module_preset=\"default\" custom_button=\"on\" button_text_size=\"20px\" button_text_color=\"gcid-ed71b614-8bfc-4aff-8f4a-b1ded32f4571\" button_bg_color=\"#FFFFFF\" button_border_width=\"2px\" button_border_color=\"gcid-16cb6075-d74e-46be-8e55-ee01bf9fbbee\" button_border_radius=\"100px\" button_letter_spacing=\"1px\" button_font=\"|700||on|||||\" custom_margin=\"||||true|false\" custom_margin_tablet=\"10px||10px||true|false\" custom_margin_phone=\"\" custom_margin_last_edited=\"on|phone\" custom_padding=\"0.2vw|2.5vw|0.2vw|2.5vw|true|true\" custom_padding_tablet=\"1vw|3vw|1vw|3vw|true|true\" custom_padding_phone=\"2vw|4vw|2vw|4vw|true|true\" custom_padding_last_edited=\"on|phone\" scroll_scaling_enable=\"on\" motion_trigger_start=\"top\" button_text_size_tablet=\"1.3em\" button_text_size_phone=\"1.3em\" button_text_size_last_edited=\"on|phone\" custom_css_main_element=\"||\" box_shadow_style=\"preset1\" global_colors_info=\"{%22gcid-ed71b614-8bfc-4aff-8f4a-b1ded32f4571%22:%91%22button_text_color%22,%22button_text_color%22%93,%22gcid-16cb6075-d74e-46be-8e55-ee01bf9fbbee%22:%91%22button_border_color%22,%22button_border_color%22%93}\" transform_styles__hover_enabled=\"on|hover\" transform_scale__hover_enabled=\"on|hover\" transform_translate__hover_enabled=\"on|desktop\" transform_rotate__hover_enabled=\"on|desktop\" transform_skew__hover_enabled=\"on|desktop\" transform_origin__hover_enabled=\"on|desktop\" transform_scale__hover=\"110%|110%\"][\/et_pb_button][et_pb_text _builder_version=\"4.24.2\" _module_preset=\"default\" header_text_align=\"center\" text_orientation=\"center\" max_width_tablet=\"\" max_width_phone=\"\" max_width_last_edited=\"on|phone\" custom_padding=\"|20%||20%|false|true\" custom_padding_tablet=\"|5%||5%|false|true\" custom_padding_phone=\"|5%||5%|false|true\" custom_padding_last_edited=\"on|tablet\" text_font_size_tablet=\"1em\" text_font_size_phone=\"\" text_font_size_last_edited=\"on|phone\" global_colors_info=\"{}\"]<\/p><p><strong>Pourquoi un service de Gestion TI \"Globale\" ?<\/strong><br \/>Mieux g\u00e9r\u00e9, mieux prot\u00e9g\u00e9 ! Comprendre les enjeux de cybers\u00e9curit\u00e9 d'aujourd'hui et de demain. R\u00e9servez votre pr\u00e9sentation maintenant.<\/p><p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" admin_label=\"Section Technique\" _builder_version=\"4.23.4\" _module_preset=\"default\" background_color=\"gcid-81f50182-4aac-4cf4-a9fc-4877c62860bb\" background_image=\"http:\/\/bemotion.tech\/wp-content\/uploads\/2024\/01\/mountain_bicking_montreal-1.jpg\" parallax=\"on\" background_blend=\"multiply\" positioning=\"none\" custom_padding=\"||138px|||\" border_radii=\"on|50px|50px|50px|50px\" global_module=\"5868\" saved_tabs=\"all\" global_colors_info=\"{%22gcid-a662aa67-a05e-4653-9072-3f91c608b36b%22:%91%22background_pattern_color%22%93,%22gcid-81f50182-4aac-4cf4-a9fc-4877c62860bb%22:%91%22background_color%22%93}\"][et_pb_row _builder_version=\"4.23.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.23.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"http:\/\/bemotion.tech\/wp-content\/uploads\/2024\/01\/network_security@300x.png\" title_text=\"network_security@300x\" _builder_version=\"4.23.4\" _module_preset=\"default\" max_width=\"75px\" module_alignment=\"center\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_text _builder_version=\"4.24.2\" _module_preset=\"default\" text_text_color=\"gcid-bd64b08e-f891-42c5-be90-66d3f2bbf302\" header_font=\"|700|||||||\" header_text_align=\"center\" header_text_color=\"gcid-bd64b08e-f891-42c5-be90-66d3f2bbf302\" header_font_size=\"28px\" header_font_size_tablet=\"2em\" header_font_size_phone=\"1.5em\" header_font_size_last_edited=\"on|phone\" global_colors_info=\"{%22gcid-bd64b08e-f891-42c5-be90-66d3f2bbf302%22:%91%22text_text_color%22,%22header_text_color%22%93}\"]<\/p><h1>Les b\u00e9n\u00e9fices d'une gestion TI active.<\/h1><h1>Mieux g\u00e9r\u00e9, mieux prot\u00e9g\u00e9... simplement.<\/h1><p>[\/et_pb_text][et_pb_image src=\"http:\/\/bemotion.tech\/wp-content\/uploads\/2024\/01\/IT_gestion@300x.png\" title_text=\"IT_gestion@300x\" _builder_version=\"4.24.2\" _module_preset=\"default\" max_width=\"50%\" max_width_tablet=\"60%\" max_width_phone=\"100%\" max_width_last_edited=\"on|phone\" module_alignment=\"center\" animation_style=\"zoom\" animation_duration=\"1400ms\" animation_delay=\"800ms\" animation_speed_curve=\"ease-in\" scroll_vertical_motion=\"12|50|50|80|4|0|-4\" scroll_fade_enable=\"on\" motion_trigger_start=\"top\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_text _builder_version=\"4.23.4\" _module_preset=\"default\" text_text_color=\"gcid-bd64b08e-f891-42c5-be90-66d3f2bbf302\" header_font=\"|700||on|||||\" header_text_align=\"center\" header_text_color=\"gcid-bd64b08e-f891-42c5-be90-66d3f2bbf302\" global_colors_info=\"{%22gcid-bd64b08e-f891-42c5-be90-66d3f2bbf302%22:%91%22text_text_color%22,%22header_text_color%22%93}\"]<\/p><h1>Gestion. Support. Protection.<\/h1><p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" _builder_version=\"4.23.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"1_2\" _builder_version=\"4.23.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.24.2\" _module_preset=\"default\" text_text_color=\"gcid-bd64b08e-f891-42c5-be90-66d3f2bbf302\" max_width_tablet=\"80%\" max_width_phone=\"100%\" max_width_last_edited=\"on|phone\" text_font_size_tablet=\"1.3em\" text_font_size_phone=\"\" text_font_size_last_edited=\"on|phone\" global_colors_info=\"{%22gcid-bd64b08e-f891-42c5-be90-66d3f2bbf302%22:%91%22text_text_color%22%93}\"]<\/p><p>Mettre en \u0153uvre une approche informatique ax\u00e9e sur la pr\u00e9vention et obtenez une tranquillit\u00e9 d\u2019esprit en sachant que les logiciels malveillants ne se retrouveront jamais dans votre parc informatique lorsque BeMotion g\u00e8re et soutient vos TI.<\/p><p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.23.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_button button_url=\"@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjU3MTIifX0=@\" button_text=\"Gestion TI Active\" button_alignment=\"center\" button_alignment_tablet=\"left\" button_alignment_phone=\"left\" button_alignment_last_edited=\"on|tablet\" admin_label=\"Bouton\" _builder_version=\"4.24.2\" _dynamic_attributes=\"button_url\" _module_preset=\"default\" custom_button=\"on\" button_text_size=\"20px\" button_text_color=\"gcid-ed71b614-8bfc-4aff-8f4a-b1ded32f4571\" button_bg_color=\"#FFFFFF\" button_border_width=\"0px\" button_border_color=\"gcid-16cb6075-d74e-46be-8e55-ee01bf9fbbee\" button_border_radius=\"100px\" button_letter_spacing=\"1px\" button_font=\"|700||on|||||\" custom_margin=\"||||true|false\" custom_margin_tablet=\"10px||10px||true|false\" custom_margin_phone=\"\" custom_margin_last_edited=\"on|phone\" custom_padding=\"0.2vw|2.5vw|0.2vw|2.5vw|true|true\" custom_padding_tablet=\"1vw|3vw|1vw|3vw|true|true\" custom_padding_phone=\"2vw|4vw|2vw|4vw|true|true\" custom_padding_last_edited=\"on|phone\" button_text_size_tablet=\"1.3em\" button_text_size_phone=\"1.3em\" button_text_size_last_edited=\"on|phone\" button_border_width_tablet=\"0px\" button_border_width_phone=\"\" button_border_width_last_edited=\"on|phone\" custom_css_main_element=\"||\" box_shadow_style=\"preset1\" global_colors_info=\"{%22gcid-ed71b614-8bfc-4aff-8f4a-b1ded32f4571%22:%91%22button_text_color%22,%22button_text_color%22,%22button_text_color%22,%22button_text_color%22,%22button_text_color%22%93,%22gcid-16cb6075-d74e-46be-8e55-ee01bf9fbbee%22:%91%22button_border_color%22,%22button_border_color%22,%22button_border_color%22,%22button_border_color%22,%22button_border_color%22%93}\" transform_styles__hover_enabled=\"on|hover\" transform_scale__hover_enabled=\"on|hover\" transform_translate__hover_enabled=\"on|desktop\" transform_rotate__hover_enabled=\"on|desktop\" transform_skew__hover_enabled=\"on|desktop\" transform_origin__hover_enabled=\"on|desktop\" transform_scale__hover=\"110%|110%\"][\/et_pb_button][et_pb_text _builder_version=\"4.24.2\" _module_preset=\"default\" text_text_color=\"#FFFFFF\" text_line_height=\"1.3em\" header_text_align=\"center\" width_tablet=\"60%\" width_phone=\"80%\" width_last_edited=\"on|phone\" max_width_tablet=\"\" max_width_phone=\"\" max_width_last_edited=\"on|tablet\" module_alignment=\"left\" custom_margin=\"0px||0px||false|false\" text_font_size_tablet=\"1em\" text_font_size_phone=\"0.8em\" text_font_size_last_edited=\"on|phone\" global_colors_info=\"{}\"]<\/p><p>Pr\u00e9sentation des b\u00e9n\u00e9fices du <strong>Service de Gestion TI Globale<\/strong> de BeMotion pour une gestion active de vos TI.<\/p><p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>","_et_gb_content_width":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-7265","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IT Expert | Managed IT Services in Montreal &amp; Laval<\/title>\n<meta name=\"description\" content=\"Service Informatique G\u00e9r\u00e9 de Montr\u00e9al et Laval. Service TI G\u00e9r\u00e9. Support. Cybers\u00e9curit\u00e9. Protection des donn\u00e9es. Optimisation des frais TI. Info (514) 955-3505.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bemotion.ca\/en\/it-expert-montreal\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Expert | Managed IT Services in Montreal &amp; Laval\" \/>\n<meta property=\"og:description\" content=\"Service Informatique G\u00e9r\u00e9 de Montr\u00e9al et Laval. Service TI G\u00e9r\u00e9. Support. Cybers\u00e9curit\u00e9. Protection des donn\u00e9es. Optimisation des frais TI. Info (514) 955-3505.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bemotion.tech\/en\/it-expert-montreal\/\" \/>\n<meta property=\"og:site_name\" content=\"Managed IT Services in Montreal &amp; Laval\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-09T18:21:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bemotion.tech\/wp-content\/uploads\/2024\/01\/soutien_ti_ingenieur.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"338\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/bemotion.tech\/en\/it-expert-montreal\/\",\"url\":\"https:\/\/bemotion.tech\/en\/it-expert-montreal\/\",\"name\":\"IT Expert | Managed IT Services in Montreal &amp; Laval\",\"isPartOf\":{\"@id\":\"https:\/\/bemotion.tech\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/bemotion.tech\/en\/it-expert-montreal\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/bemotion.tech\/en\/it-expert-montreal\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/bemotion.tech\/wp-content\/uploads\/2024\/01\/soutien_ti_ingenieur.jpg\",\"datePublished\":\"2024-01-19T13:09:50+00:00\",\"dateModified\":\"2024-07-09T18:21:52+00:00\",\"description\":\"Service Informatique G\u00e9r\u00e9 de Montr\u00e9al et Laval. Service TI G\u00e9r\u00e9. Support. Cybers\u00e9curit\u00e9. Protection des donn\u00e9es. Optimisation des frais TI. Info (514) 955-3505.\",\"breadcrumb\":{\"@id\":\"https:\/\/bemotion.tech\/en\/it-expert-montreal\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/bemotion.tech\/en\/it-expert-montreal\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\/\/bemotion.tech\/en\/it-expert-montreal\/#primaryimage\",\"url\":\"https:\/\/bemotion.tech\/wp-content\/uploads\/2024\/01\/soutien_ti_ingenieur.jpg\",\"contentUrl\":\"https:\/\/bemotion.tech\/wp-content\/uploads\/2024\/01\/soutien_ti_ingenieur.jpg\",\"width\":600,\"height\":338,\"caption\":\"Soutien Informatique pour ing\u00e9nieur\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/bemotion.tech\/en\/it-expert-montreal\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/bemotion.tech\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Expert\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/bemotion.tech\/en\/#website\",\"url\":\"https:\/\/bemotion.tech\/en\/\",\"name\":\"Service Informatique G\u00e9r\u00e9 Expert TI Montr\u00e9al\",\"description\":\"IT, well managed, well secured!\",\"publisher\":{\"@id\":\"https:\/\/bemotion.tech\/en\/#organization\"},\"alternateName\":\"Service TI G\u00e9r\u00e9\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/bemotion.tech\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/bemotion.tech\/en\/#organization\",\"name\":\"Service Informatique g\u00e9r\u00e9 de Montr\u00e9al BeMotion Technologie\",\"url\":\"https:\/\/bemotion.tech\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\/\/bemotion.tech\/en\/#\/schema\/logo\/image\/\",\"url\":\"http:\/\/bemotion.tech\/wp-content\/uploads\/2024\/07\/BM-Logo-Color@4x.png\",\"contentUrl\":\"http:\/\/bemotion.tech\/wp-content\/uploads\/2024\/07\/BM-Logo-Color@4x.png\",\"width\":598,\"height\":455,\"caption\":\"Service Informatique g\u00e9r\u00e9 de Montr\u00e9al BeMotion Technologie\"},\"image\":{\"@id\":\"https:\/\/bemotion.tech\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/bemotiontechnologie\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Expert | Managed IT Services in Montreal &amp; Laval","description":"Service Informatique G\u00e9r\u00e9 de Montr\u00e9al et Laval. Service TI G\u00e9r\u00e9. Support. Cybers\u00e9curit\u00e9. Protection des donn\u00e9es. Optimisation des frais TI. Info (514) 955-3505.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bemotion.ca\/en\/it-expert-montreal\/","og_locale":"en_US","og_type":"article","og_title":"IT Expert | Managed IT Services in Montreal &amp; Laval","og_description":"Service Informatique G\u00e9r\u00e9 de Montr\u00e9al et Laval. Service TI G\u00e9r\u00e9. Support. Cybers\u00e9curit\u00e9. Protection des donn\u00e9es. Optimisation des frais TI. Info (514) 955-3505.","og_url":"https:\/\/bemotion.tech\/en\/it-expert-montreal\/","og_site_name":"Managed IT Services in Montreal &amp; Laval","article_modified_time":"2024-07-09T18:21:52+00:00","og_image":[{"width":600,"height":338,"url":"https:\/\/bemotion.tech\/wp-content\/uploads\/2024\/01\/soutien_ti_ingenieur.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/bemotion.tech\/en\/it-expert-montreal\/","url":"https:\/\/bemotion.tech\/en\/it-expert-montreal\/","name":"IT Expert | Managed IT Services in Montreal &amp; Laval","isPartOf":{"@id":"https:\/\/bemotion.tech\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bemotion.tech\/en\/it-expert-montreal\/#primaryimage"},"image":{"@id":"https:\/\/bemotion.tech\/en\/it-expert-montreal\/#primaryimage"},"thumbnailUrl":"https:\/\/bemotion.tech\/wp-content\/uploads\/2024\/01\/soutien_ti_ingenieur.jpg","datePublished":"2024-01-19T13:09:50+00:00","dateModified":"2024-07-09T18:21:52+00:00","description":"Service Informatique G\u00e9r\u00e9 de Montr\u00e9al et Laval. Service TI G\u00e9r\u00e9. Support. Cybers\u00e9curit\u00e9. Protection des donn\u00e9es. Optimisation des frais TI. Info (514) 955-3505.","breadcrumb":{"@id":"https:\/\/bemotion.tech\/en\/it-expert-montreal\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bemotion.tech\/en\/it-expert-montreal\/"]}]},{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/bemotion.tech\/en\/it-expert-montreal\/#primaryimage","url":"https:\/\/bemotion.tech\/wp-content\/uploads\/2024\/01\/soutien_ti_ingenieur.jpg","contentUrl":"https:\/\/bemotion.tech\/wp-content\/uploads\/2024\/01\/soutien_ti_ingenieur.jpg","width":600,"height":338,"caption":"Soutien Informatique pour ing\u00e9nieur"},{"@type":"BreadcrumbList","@id":"https:\/\/bemotion.tech\/en\/it-expert-montreal\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/bemotion.tech\/en\/"},{"@type":"ListItem","position":2,"name":"IT Expert"}]},{"@type":"WebSite","@id":"https:\/\/bemotion.tech\/en\/#website","url":"https:\/\/bemotion.tech\/en\/","name":"Service Informatique G\u00e9r\u00e9 Expert TI Montr\u00e9al","description":"IT, well managed, well secured!","publisher":{"@id":"https:\/\/bemotion.tech\/en\/#organization"},"alternateName":"Service TI G\u00e9r\u00e9","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bemotion.tech\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"},{"@type":"Organization","@id":"https:\/\/bemotion.tech\/en\/#organization","name":"Service Informatique g\u00e9r\u00e9 de Montr\u00e9al BeMotion Technologie","url":"https:\/\/bemotion.tech\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/bemotion.tech\/en\/#\/schema\/logo\/image\/","url":"http:\/\/bemotion.tech\/wp-content\/uploads\/2024\/07\/BM-Logo-Color@4x.png","contentUrl":"http:\/\/bemotion.tech\/wp-content\/uploads\/2024\/07\/BM-Logo-Color@4x.png","width":598,"height":455,"caption":"Service Informatique g\u00e9r\u00e9 de Montr\u00e9al BeMotion Technologie"},"image":{"@id":"https:\/\/bemotion.tech\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/bemotiontechnologie"]}]}},"_links":{"self":[{"href":"https:\/\/bemotion.tech\/en\/wp-json\/wp\/v2\/pages\/7265","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bemotion.tech\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/bemotion.tech\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/bemotion.tech\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/bemotion.tech\/en\/wp-json\/wp\/v2\/comments?post=7265"}],"version-history":[{"count":11,"href":"https:\/\/bemotion.tech\/en\/wp-json\/wp\/v2\/pages\/7265\/revisions"}],"predecessor-version":[{"id":7718,"href":"https:\/\/bemotion.tech\/en\/wp-json\/wp\/v2\/pages\/7265\/revisions\/7718"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bemotion.tech\/en\/wp-json\/wp\/v2\/media\/5523"}],"wp:attachment":[{"href":"https:\/\/bemotion.tech\/en\/wp-json\/wp\/v2\/media?parent=7265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}