{"id":17422,"date":"2022-05-02T16:51:54","date_gmt":"2022-05-02T16:51:54","guid":{"rendered":"https:\/\/blackcatseo.ca\/cybersecurity-in-times-of-war\/"},"modified":"2022-05-02T17:02:59","modified_gmt":"2022-05-02T17:02:59","slug":"cybersecurity-in-times-of-war","status":"publish","type":"post","link":"https:\/\/blackcatseo.ca\/en\/cybersecurity-in-times-of-war\/","title":{"rendered":"Cybersecurity in 2022"},"content":{"rendered":"<div style='text-align:left' class='yasr-auto-insert-overall'><\/div><p>The war began more than 2 months ago in Ukraine, on February 24 Putin crossed the border trying to seize the country. After a few days, governments around the world understood that this war was different, that it would be computerized.<\/p>\n<p>In mid-February, the Beaulieu Canada company in acton vale had to close its doors for several days following a hack, almost 200 people could not go to work. This company, known in Canada for selling carpets, floor coverings and the like, is the largest supplier in all of Canada&#8217;s North. The hack was eventually settled by cybersecurity experts.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>  What methods do hackers use?  <\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p>Hackers have several methods, for example one <b>of the viruses<\/b> that has already appeared during this war is able to erase data on a computer, which can affect unforeseen targets, because it moves in cyberspace without really having control or traceability.<\/p>\n<p>The computer viruses that have been developing for several years suggest that a new &#8220;genre&#8221; could be invented and do great damage. However, for the moment only &#8220;harmless&#8221; attacks are to be declared. Some <b>computer worms<\/b> can go so far as to affect the nuclear program, as has already been observed before in several other wars. <strong>Nevertheless, it is on the economic and corporate level that most attacks are to be feared<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<h2><b>Leaks, Ddos, Viruses, and ransomware<\/b><\/h2>\n<p>The objectives of these hackers are multiple and depend on the attacks, they can serve  <b>to discover important information, codes, essential data, to take offline sites (Denial of Service, or &#8216;Ddos&#8217;), or to decode important communications<\/b> and succeed in disadvantage the enemy by controlling or sabotaging different valuable resources.<\/p>\n<p>Hackers use a known means <b>which is ransomware<\/b>, which consists of blocking access to the company&#8217;s data and only returning it if it hands over a certain amount of money. They may also threaten to reveal the data they have hacked. It has been seen that their appearances have increased since the beginning of the war in Ukraine. More and more companies will fall victim to it.<\/p>\n<p>If hackers manage to hack, they can stop a company&#8217;s traffic for several days, sometimes weeks. This is why large companies are often targeted, such as Hydro Qu\u00e9bec. This company has decided to strengthen its measures to prevent piracy. Hackers target companies that are essential for the country as well as for citizens in order to have an impact on morale. If Hydro Qu\u00e9bec were hacked, for example, the consequences would be enormous for the population.<\/p>\n<p>&nbsp;<\/p>\n<h1><b>Protect yourself well &#8211; not you, and by others.<br \/>\n<\/b><\/h1>\n<p>Owning or running a business can be stressful at this time, securing your business and data seems essential to be serene.<\/p>\n<ul>\n<li aria-level=\"1\">Updates, already. Forgetting to do them could allow viruses to install there such as computer worms, because in some cases updates make it possible to reinforce the flaws in the service. To find out everything that can be put in place you can get closer to a cybersecurity expert who will give you valuable advice, such as:<\/li>\n<li aria-level=\"2\"><i>Adoption of good practices<\/i><\/li>\n<li aria-level=\"2\"><i>Integration of security measures<\/i><\/li>\n<li aria-level=\"2\"><i>Ensure good human and technical cohesion with external service providers<\/i><\/li>\n<li aria-level=\"2\"><i>Support in the implementation of strategic security measures<\/i><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><b>Consult Experts.<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p>Beyond what is personally controllable by good practices, there are technical and human flaws that require the use of recognized experts to recognize, analyze and patch them. Especially:<\/p>\n<ul>\n<li aria-level=\"1\">After a good check of your servers we can test your resistance to cyberattacks what better than to test them using certain software this is possible, so you can quickly know if your company resists hacks.<\/li>\n<li aria-level=\"1\">Having a Digital Investigation carried out that adapts to each company, it can start with analyses of hard drives from a colleague or build an entire file with data collection, digital evidence.<\/li>\n<li aria-level=\"1\">Remain vigilant and be regularly trained on all the details that seem unusual to you, contact a team of experienced cybersecurity experts if you are facing any of these challenges<\/li>\n<\/ul>\n<p>Cyber warfare has already begun and will continue, it has no borders, all countries are involved. The speed of movement of cyber attacks is almost limitless. It involves everyone, citizens, business, government. Contact our <a href=\"https:\/\/blackcatseo.ca\/cybersecurite\/\">cybersecurity experts<\/a> for an audit and discussion on your corporate and information issues.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The war began more than 2 months ago in Ukraine, on February 24  [&#8230;]<\/p>\n","protected":false},"author":1,"featured_media":17420,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"yasr_overall_rating":0,"yasr_post_is_review":"","yasr_auto_insert_disabled":"","yasr_review_type":"","footnotes":""},"categories":[2284],"tags":[2285],"class_list":["post-17422","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurityy","tag-cyber-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity in 2022 - BlackCatSEO Montreal Agency<\/title>\n<meta name=\"description\" content=\"The war began more than 2 months ago in Ukraine, on February 24 Putin crossed the border trying to seize the country. After a few days, governments around\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blackcatseo.ca\/en\/cybersecurity-in-times-of-war\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity in 2022\" \/>\n<meta property=\"og:description\" content=\"The war began more than 2 months ago in Ukraine, on February 24 Putin crossed the border trying to seize the country. After a few days, governments around\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blackcatseo.ca\/en\/cybersecurity-in-times-of-war\/\" \/>\n<meta property=\"og:site_name\" content=\"BlackCatSEO Montreal Agency\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/blackcatSE0\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-02T16:51:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-02T17:02:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blackcatseo.ca\/wp-content\/uploads\/deconfinement-informatique.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"910\" \/>\n\t<meta property=\"og:image:height\" content=\"607\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"blackcatseo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@blackcatSE0\" \/>\n<meta name=\"twitter:site\" content=\"@blackcatSE0\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"blackcatseo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blackcatseo.ca\\\/en\\\/cybersecurity-in-times-of-war\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blackcatseo.ca\\\/en\\\/cybersecurity-in-times-of-war\\\/\"},\"author\":{\"name\":\"blackcatseo\",\"@id\":\"https:\\\/\\\/blackcatseo.ca\\\/en\\\/#\\\/schema\\\/person\\\/2b9afdb5e2a5cca43ee1136fd3cb2f43\"},\"headline\":\"Cybersecurity in 2022\",\"datePublished\":\"2022-05-02T16:51:54+00:00\",\"dateModified\":\"2022-05-02T17:02:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blackcatseo.ca\\\/en\\\/cybersecurity-in-times-of-war\\\/\"},\"wordCount\":712,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/blackcatseo.ca\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blackcatseo.ca\\\/en\\\/cybersecurity-in-times-of-war\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blackcatseo.ca\\\/wp-content\\\/uploads\\\/deconfinement-informatique.jpg\",\"keywords\":[\"cyber security\"],\"articleSection\":[\"Cybersecurityy\"],\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/blackcatseo.ca\\\/en\\\/cybersecurity-in-times-of-war\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blackcatseo.ca\\\/en\\\/cybersecurity-in-times-of-war\\\/\",\"url\":\"https:\\\/\\\/blackcatseo.ca\\\/en\\\/cybersecurity-in-times-of-war\\\/\",\"name\":\"Cybersecurity in 2022 - BlackCatSEO Montreal Agency\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blackcatseo.ca\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blackcatseo.ca\\\/en\\\/cybersecurity-in-times-of-war\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blackcatseo.ca\\\/en\\\/cybersecurity-in-times-of-war\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blackcatseo.ca\\\/wp-content\\\/uploads\\\/deconfinement-informatique.jpg\",\"datePublished\":\"2022-05-02T16:51:54+00:00\",\"dateModified\":\"2022-05-02T17:02:59+00:00\",\"description\":\"The war began more than 2 months ago in Ukraine, on February 24 Putin crossed the border trying to seize the country. After a few days, governments around\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blackcatseo.ca\\\/en\\\/cybersecurity-in-times-of-war\\\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blackcatseo.ca\\\/en\\\/cybersecurity-in-times-of-war\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/blackcatseo.ca\\\/en\\\/cybersecurity-in-times-of-war\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blackcatseo.ca\\\/wp-content\\\/uploads\\\/deconfinement-informatique.jpg\",\"contentUrl\":\"https:\\\/\\\/blackcatseo.ca\\\/wp-content\\\/uploads\\\/deconfinement-informatique.jpg\",\"width\":910,\"height\":607,\"caption\":\"SEO Montreal\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blackcatseo.ca\\\/en\\\/cybersecurity-in-times-of-war\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/blackcatseo.ca\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity in 2022\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blackcatseo.ca\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blackcatseo.ca\\\/en\\\/\",\"name\":\"Agence SEO \u00e0 Montr\u00e9al | R\u00e9f\u00e9rencement Web BlackCat\",\"description\":\"State-of-the-art SEO Agency in Montreal - Trafic Google, AIs &amp; LLMs\",\"publisher\":{\"@id\":\"https:\\\/\\\/blackcatseo.ca\\\/en\\\/#organization\"},\"alternateName\":\"BlackCat SEO Montreal\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blackcatseo.ca\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blackcatseo.ca\\\/en\\\/#organization\",\"name\":\"Agence SEO \u00e0 Montr\u00e9al | R\u00e9f\u00e9rencement Web BlackCat\",\"alternateName\":\"Blackcat SEO Montreal\",\"url\":\"https:\\\/\\\/blackcatseo.ca\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/blackcatseo.ca\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blackcatseo.ca\\\/wp-content\\\/uploads\\\/Nouveau-logo-site-web-bc.png\",\"contentUrl\":\"https:\\\/\\\/blackcatseo.ca\\\/wp-content\\\/uploads\\\/Nouveau-logo-site-web-bc.png\",\"width\":1245,\"height\":912,\"caption\":\"Agence SEO \u00e0 Montr\u00e9al | R\u00e9f\u00e9rencement Web BlackCat\"},\"image\":{\"@id\":\"https:\\\/\\\/blackcatseo.ca\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/blackcatSE0\",\"https:\\\/\\\/x.com\\\/blackcatSE0\",\"https:\\\/\\\/www.instagram.com\\\/seocat514\\\/?hl=en\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/r-f-rencement-blackcat-seo\\\/?originalSubdomain=ca\"],\"ownershipFundingInfo\":\"https:\\\/\\\/blackcatseo.ca\\\/team\\\/\",\"ethicsPolicy\":\"https:\\\/\\\/blackcatseo.ca\\\/charte-ethique-blackcat\\\/\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blackcatseo.ca\\\/en\\\/#\\\/schema\\\/person\\\/2b9afdb5e2a5cca43ee1136fd3cb2f43\",\"name\":\"blackcatseo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/461579eaa026b7fb01201095a6c98a47d2b38ecc607a84619174444a36860e64?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/461579eaa026b7fb01201095a6c98a47d2b38ecc607a84619174444a36860e64?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/461579eaa026b7fb01201095a6c98a47d2b38ecc607a84619174444a36860e64?s=96&d=mm&r=g\",\"caption\":\"blackcatseo\"},\"description\":\"Le SEO a temps plein.\",\"url\":\"https:\\\/\\\/blackcatseo.ca\\\/en\\\/author\\\/services-blackcatseo-inc\\\/\"},false]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity in 2022 - BlackCatSEO Montreal Agency","description":"The war began more than 2 months ago in Ukraine, on February 24 Putin crossed the border trying to seize the country. After a few days, governments around","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blackcatseo.ca\/en\/cybersecurity-in-times-of-war\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity in 2022","og_description":"The war began more than 2 months ago in Ukraine, on February 24 Putin crossed the border trying to seize the country. After a few days, governments around","og_url":"https:\/\/blackcatseo.ca\/en\/cybersecurity-in-times-of-war\/","og_site_name":"BlackCatSEO Montreal Agency","article_publisher":"https:\/\/www.facebook.com\/blackcatSE0","article_published_time":"2022-05-02T16:51:54+00:00","article_modified_time":"2022-05-02T17:02:59+00:00","og_image":[{"width":910,"height":607,"url":"https:\/\/blackcatseo.ca\/wp-content\/uploads\/deconfinement-informatique.jpg","type":"image\/jpeg"}],"author":"blackcatseo","twitter_card":"summary_large_image","twitter_creator":"@blackcatSE0","twitter_site":"@blackcatSE0","twitter_misc":{"Written by":"blackcatseo","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blackcatseo.ca\/en\/cybersecurity-in-times-of-war\/#article","isPartOf":{"@id":"https:\/\/blackcatseo.ca\/en\/cybersecurity-in-times-of-war\/"},"author":{"name":"blackcatseo","@id":"https:\/\/blackcatseo.ca\/en\/#\/schema\/person\/2b9afdb5e2a5cca43ee1136fd3cb2f43"},"headline":"Cybersecurity in 2022","datePublished":"2022-05-02T16:51:54+00:00","dateModified":"2022-05-02T17:02:59+00:00","mainEntityOfPage":{"@id":"https:\/\/blackcatseo.ca\/en\/cybersecurity-in-times-of-war\/"},"wordCount":712,"commentCount":0,"publisher":{"@id":"https:\/\/blackcatseo.ca\/en\/#organization"},"image":{"@id":"https:\/\/blackcatseo.ca\/en\/cybersecurity-in-times-of-war\/#primaryimage"},"thumbnailUrl":"https:\/\/blackcatseo.ca\/wp-content\/uploads\/deconfinement-informatique.jpg","keywords":["cyber security"],"articleSection":["Cybersecurityy"],"inLanguage":"en-CA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blackcatseo.ca\/en\/cybersecurity-in-times-of-war\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blackcatseo.ca\/en\/cybersecurity-in-times-of-war\/","url":"https:\/\/blackcatseo.ca\/en\/cybersecurity-in-times-of-war\/","name":"Cybersecurity in 2022 - BlackCatSEO Montreal Agency","isPartOf":{"@id":"https:\/\/blackcatseo.ca\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blackcatseo.ca\/en\/cybersecurity-in-times-of-war\/#primaryimage"},"image":{"@id":"https:\/\/blackcatseo.ca\/en\/cybersecurity-in-times-of-war\/#primaryimage"},"thumbnailUrl":"https:\/\/blackcatseo.ca\/wp-content\/uploads\/deconfinement-informatique.jpg","datePublished":"2022-05-02T16:51:54+00:00","dateModified":"2022-05-02T17:02:59+00:00","description":"The war began more than 2 months ago in Ukraine, on February 24 Putin crossed the border trying to seize the country. After a few days, governments around","breadcrumb":{"@id":"https:\/\/blackcatseo.ca\/en\/cybersecurity-in-times-of-war\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blackcatseo.ca\/en\/cybersecurity-in-times-of-war\/"]}]},{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/blackcatseo.ca\/en\/cybersecurity-in-times-of-war\/#primaryimage","url":"https:\/\/blackcatseo.ca\/wp-content\/uploads\/deconfinement-informatique.jpg","contentUrl":"https:\/\/blackcatseo.ca\/wp-content\/uploads\/deconfinement-informatique.jpg","width":910,"height":607,"caption":"SEO Montreal"},{"@type":"BreadcrumbList","@id":"https:\/\/blackcatseo.ca\/en\/cybersecurity-in-times-of-war\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/blackcatseo.ca\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity in 2022"}]},{"@type":"WebSite","@id":"https:\/\/blackcatseo.ca\/en\/#website","url":"https:\/\/blackcatseo.ca\/en\/","name":"Agence SEO \u00e0 Montr\u00e9al | R\u00e9f\u00e9rencement Web BlackCat","description":"State-of-the-art SEO Agency in Montreal - Trafic Google, AIs &amp; LLMs","publisher":{"@id":"https:\/\/blackcatseo.ca\/en\/#organization"},"alternateName":"BlackCat SEO Montreal","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blackcatseo.ca\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"},{"@type":"Organization","@id":"https:\/\/blackcatseo.ca\/en\/#organization","name":"Agence SEO \u00e0 Montr\u00e9al | R\u00e9f\u00e9rencement Web BlackCat","alternateName":"Blackcat SEO Montreal","url":"https:\/\/blackcatseo.ca\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/blackcatseo.ca\/en\/#\/schema\/logo\/image\/","url":"https:\/\/blackcatseo.ca\/wp-content\/uploads\/Nouveau-logo-site-web-bc.png","contentUrl":"https:\/\/blackcatseo.ca\/wp-content\/uploads\/Nouveau-logo-site-web-bc.png","width":1245,"height":912,"caption":"Agence SEO \u00e0 Montr\u00e9al | R\u00e9f\u00e9rencement Web BlackCat"},"image":{"@id":"https:\/\/blackcatseo.ca\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/blackcatSE0","https:\/\/x.com\/blackcatSE0","https:\/\/www.instagram.com\/seocat514\/?hl=en","https:\/\/www.linkedin.com\/company\/r-f-rencement-blackcat-seo\/?originalSubdomain=ca"],"ownershipFundingInfo":"https:\/\/blackcatseo.ca\/team\/","ethicsPolicy":"https:\/\/blackcatseo.ca\/charte-ethique-blackcat\/"},{"@type":"Person","@id":"https:\/\/blackcatseo.ca\/en\/#\/schema\/person\/2b9afdb5e2a5cca43ee1136fd3cb2f43","name":"blackcatseo","image":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/secure.gravatar.com\/avatar\/461579eaa026b7fb01201095a6c98a47d2b38ecc607a84619174444a36860e64?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/461579eaa026b7fb01201095a6c98a47d2b38ecc607a84619174444a36860e64?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/461579eaa026b7fb01201095a6c98a47d2b38ecc607a84619174444a36860e64?s=96&d=mm&r=g","caption":"blackcatseo"},"description":"Le SEO a temps plein.","url":"https:\/\/blackcatseo.ca\/en\/author\/services-blackcatseo-inc\/"},false]}},"yasr_visitor_votes":{"stars_attributes":{"read_only":false,"span_bottom":false},"number_of_votes":0,"sum_votes":0},"_links":{"self":[{"href":"https:\/\/blackcatseo.ca\/en\/wp-json\/wp\/v2\/posts\/17422","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blackcatseo.ca\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blackcatseo.ca\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blackcatseo.ca\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blackcatseo.ca\/en\/wp-json\/wp\/v2\/comments?post=17422"}],"version-history":[{"count":1,"href":"https:\/\/blackcatseo.ca\/en\/wp-json\/wp\/v2\/posts\/17422\/revisions"}],"predecessor-version":[{"id":17425,"href":"https:\/\/blackcatseo.ca\/en\/wp-json\/wp\/v2\/posts\/17422\/revisions\/17425"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blackcatseo.ca\/en\/wp-json\/wp\/v2\/media\/17420"}],"wp:attachment":[{"href":"https:\/\/blackcatseo.ca\/en\/wp-json\/wp\/v2\/media?parent=17422"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blackcatseo.ca\/en\/wp-json\/wp\/v2\/categories?post=17422"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blackcatseo.ca\/en\/wp-json\/wp\/v2\/tags?post=17422"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}