{"id":3632,"date":"2024-11-25T14:19:11","date_gmt":"2024-11-25T19:19:11","guid":{"rendered":"https:\/\/commissionnairesquebec.ca\/cybersecurite\/"},"modified":"2025-12-04T17:04:25","modified_gmt":"2025-12-04T22:04:25","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3632\" class=\"elementor elementor-3632 elementor-56\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fd9c7b1 e-flex e-con-boxed e-con e-parent\" data-id=\"fd9c7b1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b75481 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"2b75481\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">our cybersecurity services<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9cbdaf elementor-widget elementor-widget-text-editor\" data-id=\"a9cbdaf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tQuebec orgnaizations face unique <strong>cybersecurity challenges<\/strong>. At Commissionnaires du Qu\u00e9bec, we recognize that each organization has specific needs and that even a single digital incident can have severe consequences. That\u2019s why we offer a comprehensive suite of cybersecurity services, customized to fit your specific reality and budget.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eccc3cd animated-slow elementor-view-default elementor-invisible elementor-widget elementor-widget-icon\" data-id=\"eccc3cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;flash&quot;}\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<a class=\"elementor-icon\" href=\"#1\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-long-arrow-alt-down\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M168 345.941V44c0-6.627-5.373-12-12-12h-56c-6.627 0-12 5.373-12 12v301.941H41.941c-21.382 0-32.09 25.851-16.971 40.971l86.059 86.059c9.373 9.373 24.569 9.373 33.941 0l86.059-86.059c15.119-15.119 4.411-40.971-16.971-40.971H168z\"><\/path><\/svg>\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7f8ae87 e-flex e-con-boxed e-con e-parent\" data-id=\"7f8ae87\" data-element_type=\"container\" data-e-type=\"container\" id=\"1\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b77f41f elementor-widget elementor-widget-heading\" data-id=\"b77f41f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">A COMPLETE APPROACH, TAILORED TO YOUR ORGANIZATION <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c92d1c0 elementor-widget elementor-widget-text-editor\" data-id=\"c92d1c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tOur solutions are designed to <strong>protect your assets, strengthen your resilience, and proactively prevent threats<\/strong>. Whether you need to assess vulnerabilities, train your employees, or test your defenses, our approach aligns with your priorities:\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-359dea9 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"359dea9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6a3f411 e-flex e-con-boxed e-con e-parent\" data-id=\"6a3f411\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-bcb33f2 e-con-full e-flex e-con e-child\" data-id=\"bcb33f2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cedd563 elementor-widget elementor-widget-heading\" data-id=\"cedd563\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Security Gap Analysis <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b9f1df elementor-widget elementor-widget-text-editor\" data-id=\"8b9f1df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThink you\u2019re not a target? In reality, <span style=\"color: #ffffff;\"><a style=\"color: #ffffff;\" href=\"https:\/\/www150.statcan.gc.ca\/n1\/daily-quotidien\/241021\/dq241021a-eng.htm\">about 1 in 6 (16%) Canadian businesses<\/a> experience cybersecurity incidents each year.<\/span>\u00a0Through in-depth gap analysis, our experts uncover your Information Security vulnerabilities and provide clear diagnostic with practical, actionable recommendations to fortify your security posture.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f26367d elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"f26367d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/gap-analysis\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Our Gap Analysis Service<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6ea4945 e-con-full e-flex e-con e-child\" data-id=\"6ea4945\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-037451c elementor-widget elementor-widget-heading\" data-id=\"037451c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Penetration Testing <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4aff724 elementor-widget elementor-widget-text-editor\" data-id=\"4aff724\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWould you prefer to find your vulnerabilities before cybercriminals do? <strong>Our penetration testing services simulate real-world attack scenarios<\/strong> to assess the security and resilience of your systems. By identifying exploitable weaknesses, we offer detailed, actionable recommendations to help you strengthen your defenses and mitigate potential risks\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-edca7a8 elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"edca7a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/penetration-testing\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Our Penetration Testing Service<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-91b217b e-con-full e-flex e-con e-child\" data-id=\"91b217b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ea88446 elementor-widget elementor-widget-heading\" data-id=\"ea88446\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Forensic Analysis<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e3be17 elementor-widget elementor-widget-text-editor\" data-id=\"2e3be17\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong>Has an incident already occurred?<\/strong> Our digital forensic experts will swiftly identify the origin of the attack, minimize its impact, and collect actionable evidence to support legal proceedings or internal investigations. We also provide detailed insights and guide you in strengthening your defenses to prevent future breaches, ensuring long-term security for your organization.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d93b804 elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"d93b804\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/forensic-analysis\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Our Forensic Analysis Service<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-486a505 e-con-full e-flex e-con e-child\" data-id=\"486a505\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-08b5411 elementor-widget elementor-widget-heading\" data-id=\"08b5411\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cyber Awareness Training<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c340690 elementor-widget elementor-widget-text-editor\" data-id=\"c340690\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tYour first line of defense against cyber threats is your employees. Our <strong>customized cyber awareness training platform<\/strong>, <span style=\"color: #ffffff;\"><a style=\"color: #ffffff;\" href=\"https:\/\/www.cira.ca\/\">in partnership with CIRA<\/a><\/span>, helps your teams recognize, counter, and prevent phishing attempts, fraud, and other digital threats. Through interactive modules, we empower your workforce with the knowledge and skills to identify risks and respond effectively.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-87df449 elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"87df449\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/cybersecurity-training-awareness\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Our Training and Awareness Services<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c807928 e-flex e-con-boxed e-con e-parent\" data-id=\"c807928\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1f62404 e-con-full e-flex e-con e-child\" data-id=\"1f62404\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-463b8d2 elementor-widget elementor-widget-heading\" data-id=\"463b8d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Legal Compliance and Law 25<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d548c8 elementor-widget elementor-widget-text-editor\" data-id=\"1d548c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tNeed to protect client data and meet legal obligations? Our <strong>cyber and legal experts<\/strong> deliver personalized assessments and practical solutions to ensure compliance with regulations, <strong>including Law 25<\/strong>, helping you avoid penalties and safeguard sensitive information. We provide in-depth risk analysis, tailored action plans, and ongoing support to strengthen your data protection measures, ensuring your organization stays ahead of evolving regulatory requirements.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72a9e71 elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"72a9e71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/legal-compliance-law-25\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Our Legal Compliance Services<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5412621 e-con-full e-flex e-con e-child\" data-id=\"5412621\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c3bd6d1 elementor-widget elementor-widget-heading\" data-id=\"c3bd6d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Incident Response<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-203b7b6 elementor-widget elementor-widget-text-editor\" data-id=\"203b7b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWhen a cyber incident strikes, time is critical. Our Incident Response service provides <strong>rapid, structured support<\/strong> to contain, analyze, and remediate security breaches. Our team of experts identifies the root cause, mitigates the impact, and helps restore your operations as quickly as possible. We also deliver actionable insights and recommendations to strengthen your defenses, ensuring your organization is better prepared to handle future threats.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-417c7d2 elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"417c7d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/incident-response\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Our Incident Response Services<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eacc3c1 e-con-full e-flex e-con e-child\" data-id=\"eacc3c1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-96450eb elementor-widget elementor-widget-heading\" data-id=\"96450eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">CYBER INVESTIGATIONS<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3dd3a88 elementor-widget elementor-widget-text-editor\" data-id=\"3dd3a88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIn cases of <strong>fraud, data theft, or cyberattacks<\/strong>, our team of experts identifies the perpetrators, collects actionable evidence, and provides concrete solutions. We conduct thorough forensic investigations, analyze vulnerabilities, and assist in implementing robust security measures. Additionally, we help you strengthen your internal processes to prevent recurrence, because a resolved threat is a threat permanently avoided.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-de6f855 elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"de6f855\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/cyber-investigations\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Our Cyber Investigation Services<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5427656 e-flex e-con-boxed e-con e-parent\" data-id=\"5427656\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fb50cba elementor-widget elementor-widget-heading\" data-id=\"fb50cba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">OUR CYBERSECURITY EXPERTISE <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-168eb48 elementor-widget elementor-widget-image\" data-id=\"168eb48\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"714\" height=\"355\" src=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2025\/02\/isos-en.webp\" class=\"attachment-large size-large wp-image-4369\" alt=\"\" srcset=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2025\/02\/isos-en.webp 714w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2025\/02\/isos-en-300x149.webp 300w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2025\/02\/isos-en-600x298.webp 600w\" sizes=\"(max-width: 714px) 100vw, 714px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fed2f6a elementor-widget elementor-widget-text-editor\" data-id=\"fed2f6a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong>Each industry faces distinct cybersecurity challenges<\/strong>. At Commissionnaires du Qu\u00e9bec, we\u2019ve developed in-depth expertise to safeguard your systems, data, and operations against evolving digital threats. Our tailored solutions address the specific security needs of key sectors, ensuring resilience and compliance:\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2a317cb e-flex e-con-boxed e-con e-parent\" data-id=\"2a317cb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b3f5942 e-con-full e-flex e-con e-child\" data-id=\"b3f5942\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-06440b3 elementor-widget elementor-widget-n-accordion\" data-id=\"06440b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;all_collapsed&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-6570\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-6570\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Federal Government <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-down\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6570\" class=\"elementor-element elementor-element-a79d302 e-con-full e-flex e-con e-child\" data-id=\"a79d302\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6570\" class=\"elementor-element elementor-element-cfc6e0d e-flex e-con-boxed e-con e-child\" data-id=\"cfc6e0d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-acfb3f8 elementor-widget elementor-widget-text-editor\" data-id=\"acfb3f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tProtecting critical infrastructure and sensitive government data is paramount. We work closely with agencies and ministries to fortify systems, mitigate risks, and ensure compliance with regulations such as Law 25, delivering robust protection where it matters most.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-6571\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-6571\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Municipalities <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-down\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6571\" class=\"elementor-element elementor-element-cb99615 e-con-full e-flex e-con e-child\" data-id=\"cb99615\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6571\" class=\"elementor-element elementor-element-cbfc035 e-flex e-con-boxed e-con e-child\" data-id=\"cbfc035\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ef1ec1d elementor-widget elementor-widget-text-editor\" data-id=\"ef1ec1d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tMunicipal systems are frequent targets of cyberattacks, putting essential services and citizens&#8217; data at risk. As the <a href=\"https:\/\/umq.qc.ca\/services\/cybersecurite\">UMQ\u2019s exclusive cybersecurity partner<\/a>, we support cities and municipalities in securing their infrastructure, databases and management systems to ensure service continuity and maintain public trust.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-6572\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-6572\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> SMBs <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-down\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6572\" class=\"elementor-element elementor-element-1922367 e-con-full e-flex e-con e-child\" data-id=\"1922367\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6572\" class=\"elementor-element elementor-element-d027204 e-flex e-con-boxed e-con e-child\" data-id=\"d027204\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8e53fc8 elementor-widget elementor-widget-text-editor\" data-id=\"8e53fc8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tSMBs are often perceived as easy targets for cybercriminals. Our accessible and tailored cybersecurity solutions are designed to protect critical assets, ensure compliance with legal requirements, and build long-term digital resilience.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-6573\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-6573\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Education <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-down\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6573\" class=\"elementor-element elementor-element-6abd586 e-con-full e-flex e-con e-child\" data-id=\"6abd586\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6573\" class=\"elementor-element elementor-element-a6e67a8 e-flex e-con-boxed e-con e-child\" data-id=\"a6e67a8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fdedb66 elementor-widget elementor-widget-text-editor\" data-id=\"fdedb66\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tEducational institutions store and manage sensitive information related to students, educators, and research. We develop and implement strategies to secure networks, learning platforms, and research data against unauthorized access and digital threats.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c1fba4a e-con-full e-flex e-con e-child\" data-id=\"c1fba4a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2409afd elementor-widget elementor-widget-n-accordion\" data-id=\"2409afd\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;all_collapsed&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-3770\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-3770\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Healthcare and Social Services <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-down\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3770\" class=\"elementor-element elementor-element-88283ad e-con-full e-flex e-con e-child\" data-id=\"88283ad\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3770\" class=\"elementor-element elementor-element-2ebd650 e-flex e-con-boxed e-con e-child\" data-id=\"2ebd650\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fd57e2b elementor-widget elementor-widget-text-editor\" data-id=\"fd57e2b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tHealthcare and social service facilities handle highly sensitive patient data, making them prime targets for cyberattacks. Our solutions protect electronic medical records, ensure adherence to strict confidentiality standards, and reduce vulnerabilities to safeguard critical healthcare operations.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-3771\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-3771\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Transport and Logistics <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-down\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3771\" class=\"elementor-element elementor-element-dd83041 e-con-full e-flex e-con e-child\" data-id=\"dd83041\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3771\" class=\"elementor-element elementor-element-f5bf2fa e-flex e-con-boxed e-con e-child\" data-id=\"f5bf2fa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2acc4c0 elementor-widget elementor-widget-text-editor\" data-id=\"2acc4c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIn an increasingly digitalized sector, intelligent transportation systems and supply chain platforms require advanced protection. We collaborate with industry stakeholders to secure infrastructure, mitigate disruptions, and ensure seamless operations against cyber threats.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-3772\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-3772\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Technology and Data Centers <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-down\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3772\" class=\"elementor-element elementor-element-f762685 e-con-full e-flex e-con e-child\" data-id=\"f762685\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3772\" class=\"elementor-element elementor-element-0e94ffa e-flex e-con-boxed e-con e-child\" data-id=\"0e94ffa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fe84660 elementor-widget elementor-widget-text-editor\" data-id=\"fe84660\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAs the backbone of digital operations, technology companies and data centers demand heightened security. We provide penetration testing, security audits, and advanced protection strategies to shield these critical environments from emerging threats.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-3773\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-3773\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Events and Entertainment <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-down\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3773\" class=\"elementor-element elementor-element-bbfef29 e-con-full e-flex e-con e-child\" data-id=\"bbfef29\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3773\" class=\"elementor-element elementor-element-3e86f4f e-flex e-con-boxed e-con e-child\" data-id=\"3e86f4f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2dc6ff5 elementor-widget elementor-widget-text-editor\" data-id=\"2dc6ff5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tOnline, hybrid, and physical events rely on secure systems for seamless execution. We ensure robust protection of booking platforms, participant data, and digital infrastructure, mitigating risks of fraud and unauthorized access.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d7e9bbe e-flex e-con-boxed e-con e-parent\" data-id=\"d7e9bbe\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-faac78a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"faac78a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8216f75 elementor-widget elementor-widget-image\" data-id=\"8216f75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/umq.qc.ca\/services\/cybersecurite\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1200\" height=\"640\" src=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2025\/12\/UMQ_Logo.webp\" class=\"attachment-full size-full wp-image-64164\" alt=\"\" srcset=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2025\/12\/UMQ_Logo.webp 1200w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2025\/12\/UMQ_Logo-300x160.webp 300w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2025\/12\/UMQ_Logo-1024x546.webp 1024w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2025\/12\/UMQ_Logo-768x410.webp 768w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2025\/12\/UMQ_Logo-600x320.webp 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-00f278f elementor-widget elementor-widget-heading\" data-id=\"00f278f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Proud exclusive cybersecurity partner of the UMQ<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-01e1fcb e-flex e-con-boxed e-con e-parent\" data-id=\"01e1fcb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2e4fde5 e-con-full e-flex e-con e-child\" data-id=\"2e4fde5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ebf4478 elementor-widget elementor-widget-image\" data-id=\"ebf4478\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/GCIH.png\" class=\"attachment-large size-large wp-image-1481\" alt=\"\" srcset=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/GCIH.png 600w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/GCIH-300x300.png 300w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/GCIH-150x150.png 150w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/GCIH-100x100.png 100w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a756bac e-con-full e-flex e-con e-child\" data-id=\"a756bac\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6215f25 elementor-widget elementor-widget-image\" data-id=\"6215f25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/image-1.png\" class=\"attachment-large size-large wp-image-1479\" alt=\"\" srcset=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/image-1.png 600w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/image-1-300x300.png 300w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/image-1-150x150.png 150w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/image-1-100x100.png 100w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8ddcf49 e-con-full e-flex e-con e-child\" data-id=\"8ddcf49\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bccedaa elementor-widget elementor-widget-image\" data-id=\"bccedaa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/image.png\" class=\"attachment-large size-large wp-image-1483\" alt=\"\" srcset=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/image.png 600w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/image-300x300.png 300w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/image-150x150.png 150w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/image-100x100.png 100w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7e797c9 e-con-full e-flex e-con e-child\" data-id=\"7e797c9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f0a3166 elementor-widget elementor-widget-image\" data-id=\"f0a3166\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2025\/03\/Certification_ISO_27001.webp\" class=\"attachment-full size-full wp-image-4882\" alt=\"\" srcset=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2025\/03\/Certification_ISO_27001.webp 600w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2025\/03\/Certification_ISO_27001-300x300.webp 300w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2025\/03\/Certification_ISO_27001-150x150.webp 150w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2025\/03\/Certification_ISO_27001-100x100.webp 100w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cefd7e8 e-con-full e-flex e-con e-child\" data-id=\"cefd7e8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2fdea42 elementor-widget elementor-widget-image\" data-id=\"2fdea42\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/MicrosoftTeams-image-12-1.png\" class=\"attachment-large size-large wp-image-1485\" alt=\"\" srcset=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/MicrosoftTeams-image-12-1.png 600w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/MicrosoftTeams-image-12-1-300x300.png 300w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/MicrosoftTeams-image-12-1-150x150.png 150w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/MicrosoftTeams-image-12-1-100x100.png 100w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ea25301 e-con-full e-flex e-con e-child\" data-id=\"ea25301\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0831e59 elementor-widget elementor-widget-image\" data-id=\"0831e59\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"406\" height=\"341\" src=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/MicrosoftTeams-image-13.png\" class=\"attachment-large size-large wp-image-1487\" alt=\"\" srcset=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/MicrosoftTeams-image-13.png 406w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/MicrosoftTeams-image-13-300x252.png 300w\" sizes=\"(max-width: 406px) 100vw, 406px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e2ee700 e-con-full e-flex e-con e-child\" data-id=\"e2ee700\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dff71a6 elementor-widget elementor-widget-image\" data-id=\"dff71a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"429\" height=\"358\" src=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/MicrosoftTeams-image-1552.png\" class=\"attachment-large size-large wp-image-1489\" alt=\"\" srcset=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/MicrosoftTeams-image-1552.png 429w, https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2024\/12\/MicrosoftTeams-image-1552-300x250.png 300w\" sizes=\"(max-width: 429px) 100vw, 429px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7d49528 e-flex e-con-boxed e-con e-parent\" data-id=\"7d49528\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9475644 e-con-full e-flex e-con e-child\" data-id=\"9475644\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-72e1b53 elementor-widget elementor-widget-heading\" data-id=\"72e1b53\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CONTACT OUR CYBERSECURITY EXPERTS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7abaa73 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"7abaa73\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2607431 e-flex e-con-boxed e-con e-parent\" data-id=\"2607431\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-21d255a e-con-full e-flex e-con e-child\" data-id=\"21d255a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-092ed61 elementor-widget elementor-widget-heading\" data-id=\"092ed61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">WHY CHOOSE COMMISSIONNAIRES DU QU\u00c9BEC?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c77dafd elementor-widget elementor-widget-text-editor\" data-id=\"c77dafd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n \t<li><strong>Tailored Solutions<\/strong>: Flexible, effective services tailored to your resources.<\/li>\n \t<li><strong>Experts by Your Side<\/strong>: A team of accessible professionals who simplify cybersecurity for you.<\/li>\n \t<li><strong>A Trusted Partner<\/strong>: Recognized for our commitment to your security and peace of mind.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a7a326d e-con-full e-flex e-con e-child\" data-id=\"a7a326d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-efa40f1 elementor-widget elementor-widget-text-editor\" data-id=\"efa40f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tYou don\u2019t need to be a large enterprise to access cutting-edge cybersecurity solutions. Protect your employees, clients, and future. Together, let\u2019s secure your business.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c2faff1 elementor-widget elementor-widget-shortcode\" data-id=\"c2faff1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f3725-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"3725\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/pages\/3632#wpcf7-f3725-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"3725\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f3725-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<label> Your Company\n    <span class=\"wpcf7-form-control-wrap\" data-name=\"company\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"company\" \/><\/span>\n<\/label>\n\n<label> Your Name\n    <span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" autocomplete=\"name\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span>\n<\/label>\n\n<label> Your Email\n    <span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" autocomplete=\"email\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span>\n<\/label>\n\n<label> Your Phone\n    <span class=\"wpcf7-form-control-wrap\" data-name=\"your-phone\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-text wpcf7-validates-as-tel\" autocomplete=\"tel\" aria-invalid=\"false\" value=\"\" type=\"tel\" name=\"your-phone\" \/><\/span>\n<\/label>\n\n<label> Extension Number\n    <span class=\"wpcf7-form-control-wrap\" data-name=\"your-phone-ext\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text\" aria-invalid=\"false\" placeholder=\"e.g. 123\" value=\"\" type=\"text\" name=\"your-phone-ext\" \/><\/span>\n<\/label>\n\n<label> Subject\n    <span class=\"wpcf7-form-control-wrap\" data-name=\"your-subject\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-subject\" \/><\/span>\n<\/label>\n\n<label> Your Message (optional)\n    <span class=\"wpcf7-form-control-wrap\" data-name=\"your-message\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea\" aria-invalid=\"false\" name=\"your-message\"><\/textarea><\/span>\n<\/label>\n\n<input class=\"wpcf7-form-control wpcf7-submit has-spinner cdqc-submit-transparent-dark\" type=\"submit\" value=\"Send\" \/><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>our cybersecurity services Quebec orgnaizations face unique cybersecurity challenges. At Commissionnaires du Qu\u00e9bec, we recognize that each organization has specific needs and that even a single digital incident can have severe consequences. That\u2019s why we offer a comprehensive suite of cybersecurity services, customized to fit your specific reality and budget. A COMPLETE APPROACH, TAILORED TO YOUR ORGANIZATION Our solutions are designed to protect your assets, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-3632","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity - Commissionnaires du Qu\u00e9bec<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity - Commissionnaires du Qu\u00e9bec\" \/>\n<meta property=\"og:description\" content=\"our cybersecurity services Quebec orgnaizations face unique cybersecurity challenges. At Commissionnaires du Qu\u00e9bec, we recognize that each organization has specific needs and that even a single digital incident can have severe consequences. That\u2019s why we offer a comprehensive suite of cybersecurity services, customized to fit your specific reality and budget. A COMPLETE APPROACH, TAILORED TO YOUR ORGANIZATION Our solutions are designed to protect your assets, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Commissionnaires du Qu\u00e9bec\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CommissionnairesduQuebec\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-04T22:04:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2025\/02\/isos-en.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"714\" \/>\n\t<meta property=\"og:image:height\" content=\"355\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/commissionnairesquebec.ca\\\/en\\\/cybersecurity\\\/\",\"url\":\"https:\\\/\\\/commissionnairesquebec.ca\\\/en\\\/cybersecurity\\\/\",\"name\":\"Cybersecurity - Commissionnaires du Qu\u00e9bec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cdqc.mppn.ca\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/commissionnairesquebec.ca\\\/en\\\/cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/commissionnairesquebec.ca\\\/en\\\/cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/commissionnairesquebec.ca\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/isos-en.webp\",\"datePublished\":\"2024-11-25T19:19:11+00:00\",\"dateModified\":\"2025-12-04T22:04:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/commissionnairesquebec.ca\\\/en\\\/cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/commissionnairesquebec.ca\\\/en\\\/cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/commissionnairesquebec.ca\\\/en\\\/cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/commissionnairesquebec.ca\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/isos-en.webp\",\"contentUrl\":\"https:\\\/\\\/commissionnairesquebec.ca\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/isos-en.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/commissionnairesquebec.ca\\\/en\\\/cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/commissionnairesquebec.ca\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cdqc.mppn.ca\\\/#website\",\"url\":\"https:\\\/\\\/cdqc.mppn.ca\\\/\",\"name\":\"Commissionnaires du Qu\u00e9bec\",\"description\":\"Experts en s\u00e9curit\u00e9 et cybers\u00e9curit\u00e9 | Humains. Biens. Informations.\",\"publisher\":{\"@id\":\"https:\\\/\\\/cdqc.mppn.ca\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cdqc.mppn.ca\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cdqc.mppn.ca\\\/#organization\",\"name\":\"Commissionnaires du Qu\u00e9bec\",\"url\":\"https:\\\/\\\/cdqc.mppn.ca\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cdqc.mppn.ca\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/commissionnairesquebec.ca\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/logo-100-ans-commissionnaires-quebec-b-o.svg\",\"contentUrl\":\"https:\\\/\\\/commissionnairesquebec.ca\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/logo-100-ans-commissionnaires-quebec-b-o.svg\",\"caption\":\"Commissionnaires du Qu\u00e9bec\"},\"image\":{\"@id\":\"https:\\\/\\\/cdqc.mppn.ca\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CommissionnairesduQuebec\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/2028146\",\"https:\\\/\\\/www.instagram.com\\\/commissionnairesqc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@commissionnairesduquebec\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity - Commissionnaires du Qu\u00e9bec","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity - Commissionnaires du Qu\u00e9bec","og_description":"our cybersecurity services Quebec orgnaizations face unique cybersecurity challenges. At Commissionnaires du Qu\u00e9bec, we recognize that each organization has specific needs and that even a single digital incident can have severe consequences. That\u2019s why we offer a comprehensive suite of cybersecurity services, customized to fit your specific reality and budget. A COMPLETE APPROACH, TAILORED TO YOUR ORGANIZATION Our solutions are designed to protect your assets, [&hellip;]","og_url":"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/","og_site_name":"Commissionnaires du Qu\u00e9bec","article_publisher":"https:\/\/www.facebook.com\/CommissionnairesduQuebec","article_modified_time":"2025-12-04T22:04:25+00:00","og_image":[{"width":714,"height":355,"url":"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2025\/02\/isos-en.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/","url":"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/","name":"Cybersecurity - Commissionnaires du Qu\u00e9bec","isPartOf":{"@id":"https:\/\/cdqc.mppn.ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2025\/02\/isos-en.webp","datePublished":"2024-11-25T19:19:11+00:00","dateModified":"2025-12-04T22:04:25+00:00","breadcrumb":{"@id":"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/#primaryimage","url":"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2025\/02\/isos-en.webp","contentUrl":"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2025\/02\/isos-en.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/commissionnairesquebec.ca\/en\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/commissionnairesquebec.ca\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/cdqc.mppn.ca\/#website","url":"https:\/\/cdqc.mppn.ca\/","name":"Commissionnaires du Qu\u00e9bec","description":"Experts en s\u00e9curit\u00e9 et cybers\u00e9curit\u00e9 | Humains. Biens. Informations.","publisher":{"@id":"https:\/\/cdqc.mppn.ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cdqc.mppn.ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cdqc.mppn.ca\/#organization","name":"Commissionnaires du Qu\u00e9bec","url":"https:\/\/cdqc.mppn.ca\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cdqc.mppn.ca\/#\/schema\/logo\/image\/","url":"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2025\/02\/logo-100-ans-commissionnaires-quebec-b-o.svg","contentUrl":"https:\/\/commissionnairesquebec.ca\/wp-content\/uploads\/2025\/02\/logo-100-ans-commissionnaires-quebec-b-o.svg","caption":"Commissionnaires du Qu\u00e9bec"},"image":{"@id":"https:\/\/cdqc.mppn.ca\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CommissionnairesduQuebec","https:\/\/www.linkedin.com\/company\/2028146","https:\/\/www.instagram.com\/commissionnairesqc\/","https:\/\/www.youtube.com\/@commissionnairesduquebec"]}]}},"_links":{"self":[{"href":"https:\/\/commissionnairesquebec.ca\/en\/wp-json\/wp\/v2\/pages\/3632","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/commissionnairesquebec.ca\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/commissionnairesquebec.ca\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/commissionnairesquebec.ca\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/commissionnairesquebec.ca\/en\/wp-json\/wp\/v2\/comments?post=3632"}],"version-history":[{"count":43,"href":"https:\/\/commissionnairesquebec.ca\/en\/wp-json\/wp\/v2\/pages\/3632\/revisions"}],"predecessor-version":[{"id":64172,"href":"https:\/\/commissionnairesquebec.ca\/en\/wp-json\/wp\/v2\/pages\/3632\/revisions\/64172"}],"wp:attachment":[{"href":"https:\/\/commissionnairesquebec.ca\/en\/wp-json\/wp\/v2\/media?parent=3632"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}