{"id":90404,"date":"2018-03-14T10:47:14","date_gmt":"2018-03-14T09:47:14","guid":{"rendered":"https:\/\/www.stormshield.com\/?p=90404"},"modified":"2024-06-20T14:22:00","modified_gmt":"2024-06-20T13:22:00","slug":"teletravail-et-cybersecurite-comment-allier-mobilite-et-securite-informatique","status":"publish","type":"post","link":"https:\/\/www.stormshield.com\/fr\/actus\/teletravail-et-cybersecurite-comment-allier-mobilite-et-securite-informatique\/","title":{"rendered":"T\u00e9l\u00e9travail et cybers\u00e9curit\u00e9 : comment allier mobilit\u00e9 et s\u00e9curit\u00e9 informatique"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-90406\" title=\"Image utilis\u00e9e sous licence de Shutterstock.com\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_443885167.jpg\" alt=\"\" width=\"800\" height=\"518\" \/><\/p>\n<p><strong>Pratiqu\u00e9 par de plus en plus d\u2019entreprises et pris\u00e9 par les salari\u00e9s, le t\u00e9l\u00e9travail est en plein essor. Une tendance forte, qui n\u00e9cessite toutefois quelques pr\u00e9cautions de la part des entreprises, pour ne pas avoir de mauvaises surprises en mati\u00e8re de protection des donn\u00e9es.<\/strong><\/p>\n<p>Depuis la r\u00e9forme du Code du travail de septembre 2017, de nouvelles r\u00e8gles \u00e9largissent encore le cadre juridique du t\u00e9l\u00e9travail en France, permettant aux collaborateurs d\u2019exercer de fa\u00e7on plus ou moins r\u00e9guli\u00e8re leur activit\u00e9 professionnelle en dehors des locaux de l\u2019entreprise.<\/p>\n<p>Une \u00e9tude men\u00e9e en 2017 par <a href=\"http:\/\/blog.kronos.fr\/les-chiffres-clefs-du-teletravail-en-2016\/\" target=\"_blank\" rel=\"noopener noreferrer\">RH Kronos<\/a> montre d\u2019ailleurs que plus de deux Fran\u00e7ais sur trois sont favorables au d\u00e9veloppement du t\u00e9l\u00e9travail, bien qu\u2019ils ne soient que 17% \u00e0 peine \u00e0 le pratiquer plus d\u2019une journ\u00e9e par semaine. Loin, encore, des 30% en moyenne constat\u00e9s en Europe.<\/p>\n<h2>T\u00e9l\u00e9travail : une pratique qui s\u00e9duit, mais pas sans risques informatiques<\/h2>\n<p>Selon <a href=\"https:\/\/www.symantec.com\/fr\/fr\/security-center\/threat-report\" target=\"_blank\" rel=\"noopener noreferrer\">une r\u00e9cente \u00e9tude<\/a> r\u00e9alis\u00e9e par un acteur de la cybers\u00e9curit\u00e9, 86% des salari\u00e9s interrog\u00e9s utilisent leur mat\u00e9riel informatique personnel \u00e0 des fins professionnelles. Or, 42% d\u00e9clarent ne pas mettre \u00e0 jour r\u00e9guli\u00e8rement leur syst\u00e8me de s\u00e9curit\u00e9, quand 70% de leurs homologues allemands le font r\u00e9guli\u00e8rement. Autant dire que le d\u00e9veloppement du t\u00e9l\u00e9travail permettant aux collaborateurs d\u2019acc\u00e9der r\u00e9guli\u00e8rement aux informations sensibles de l\u2019entreprise a de quoi donner des sueurs froides aux DSI.<\/p>\n<p>Trois types de risques doivent particuli\u00e8rement \u00eatre anticip\u00e9s :<\/p>\n<ul>\n<li>l\u2019impossibilit\u00e9, pour le salari\u00e9, d\u2019acc\u00e9der aux ressources dont il a besoin pour travailler,<\/li>\n<li>la contamination du syst\u00e8me de l\u2019entreprise par le biais d\u2019une faille de s\u00e9curit\u00e9 de l\u2019appareil de l\u2019employ\u00e9 (et r\u00e9ciproquement),<\/li>\n<li>la fuite ou la perte de donn\u00e9es.<\/li>\n<\/ul>\n<h2>Sensibiliser les collaborateurs aux risques informatiques du t\u00e9l\u00e9travail<\/h2>\n<p>Pour se prot\u00e9ger contre ce genre de d\u00e9sagr\u00e9ments, il est \u00e9videmment essentiel de <a href=\"https:\/\/www.stormshield.com\/fr\/actus\/lhumain-cle-de-la-cybersecurite-des-entreprises\/\">sensibiliser les utilisateurs aux enjeux de s\u00e9curit\u00e9 informatique<\/a> li\u00e9s au t\u00e9l\u00e9travail. Mise \u00e0 jour r\u00e9guli\u00e8re des antivirus, dissociation des messageries personnelles et professionnelles, limitation de l\u2019usage de p\u00e9riph\u00e9riques externes (cl\u00e9s USB, disques durs\u2026) pour transf\u00e9rer des donn\u00e9es d\u2019un ordinateur \u00e0 l\u2019autre\u2026 les bonnes pratiques de base doivent r\u00e9guli\u00e8rement \u00eatre rappel\u00e9es aux t\u00e9l\u00e9travailleurs.<\/p>\n<p>\u00ab\u00a0<em>Cette sensibilisation est indispensable, mais elle ne suffit pas<\/em>\u00a0\u00bb, pr\u00e9vient <a href=\"https:\/\/www.linkedin.com\/in\/jocelyn-krystlik-26207aa\/\" target=\"_blank\" rel=\"noopener noreferrer\">Jocelyn Krystlik<\/a>, Manager de la Business Unit Data Security chez Stormshield. \u00ab\u00a0<em>Aujourd\u2019hui, il n\u2019est pas r\u00e9aliste d\u2019imposer de trop fortes contraintes aux utilisateurs. Et la s\u00e9curit\u00e9 informatique des entreprises ne peut reposer uniquement sur ce genre de mesures, qui restent de l\u2019ordre de la pr\u00e9vention.<\/em>\u00a0\u00bb<\/p>\n<h2>Syst\u00e8mes d\u2019identification et solutions cloud au c\u0153ur de la protection<\/h2>\n<p>Pour les entreprises, limiter les risques informatiques li\u00e9s au t\u00e9l\u00e9travail passe par des mesures concr\u00e8tes et des solutions techniques.<\/p>\n<ol>\n<li><strong>Profiler les t\u00e9l\u00e9travailleurs.<\/strong> Pour l\u2019entreprise, il est essentiel de d\u00e9finir en amont des profils de t\u00e9l\u00e9travailleurs en fonction de leurs attributions et des informations sensibles auxquelles ils doivent ou non avoir acc\u00e8s. Entre les t\u00e9l\u00e9travailleurs occasionnels du week-end, ceux \u00e0 temps partiel ou \u00e0 plein temps, les m\u00e9canismes de s\u00e9curit\u00e9 ne sont pas les m\u00eames.<\/li>\n<li><strong>Authentifier les acc\u00e8s \u00e0 distance.<\/strong> Le premier moyen d\u2019\u00e9viter une intrusion \u00e9trang\u00e8re dans le syst\u00e8me de l\u2019entreprise est d\u2019instaurer un syst\u00e8me d\u2019identification du t\u00e9l\u00e9travailleur lorsqu\u2019il s\u2019y connecte (identifiant, mot de passe, code \u00e0 usage unique\u2026).<\/li>\n<li><strong>Dissocier et prot\u00e9ger les appareils.<\/strong> Au-del\u00e0 d\u2019un syst\u00e8me de protection anti-virus, le moyen le plus simple d\u2019\u00e9viter les risques de contamination entre le mat\u00e9riel de l\u2019employ\u00e9 et le syst\u00e8me informatique de l\u2019entreprise est encore de r\u00e9duire les droits d\u2019administration au maximum sur la machine. Et donc d\u2019attribuer au t\u00e9l\u00e9travailleur un PC \u00e0 usage strictement professionnel, r\u00e9guli\u00e8rement mis \u00e0 jour \u2013 au niveau s\u00e9curitaire \u2013 par le service informatique.<\/li>\n<li><strong>S\u00e9curiser l\u2019acc\u00e8s aux donn\u00e9es.<\/strong> Afin de s\u00e9curiser les flux d\u2019informations entre le poste du salari\u00e9 et le r\u00e9seau de l\u2019entreprise, il est \u00e9galement possible d\u2019utiliser un VPN (Virtual Private Network), m\u00eame si \u00ab\u00a0<em>ce mod\u00e8le a de moins en moins de raison d\u2019\u00eatre, avec le d\u00e9veloppement du cloud<\/em>\u00a0\u00bb, temp\u00e8re Jocelyn Krystlik. La mise en place d\u2019une plateforme de bureau virtuel permet en effet d\u2019acc\u00e9der n\u2019importe o\u00f9 et sur n\u2019importe quel appareil aux donn\u00e9es sensibles de l\u2019entreprise, sans y \u00eatre directement physiquement connect\u00e9. \u00ab\u00a0<em>La solution du cloud permet de d\u00e9corr\u00e9ler l\u2019authentification pour l\u2019utilisation du poste, toujours difficile \u00e0 prot\u00e9ger, de l\u2019authentification pour l\u2019acc\u00e8s \u00e0 l\u2019information sensible. Au final ce qui compte, c\u2019est la s\u00e9curisation de la donn\u00e9e stock\u00e9e qui va transiter<\/em>\u00a0\u00bb, conclut Jocelyn Krystlik.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><em>Un article \u00e9crit en collaboration avec l'agence\u00a0<a href=\"http:\/\/www.agence-ultramedia.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ultramedia<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pratiqu\u00e9 par de plus en plus d\u2019entreprises et pris\u00e9 par les salari\u00e9s, le t\u00e9l\u00e9travail est en plein essor. Une tendance forte, qui n\u00e9cessite toutefois quelques pr\u00e9cautions de la part des entreprises, pour ne pas avoir de mauvaises surprises en mati\u00e8re de protection des donn\u00e9es. Depuis&#8230;<\/p>\n","protected":false},"author":31,"featured_media":90406,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1612],"tags":[4363],"business_size":[682,683,681],"industry":[695],"help_mefind":[],"features":[],"type_security":[754,758],"maintenance":[],"offer":[],"administration_tools":[],"cloud_offers":[],"listing_product":[1570,1530],"class_list":["post-90404","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-veille-securite","tag-la-cybersecurite-premiers-pas","business_size-eti","business_size-grande-entreprise","business_size-pme","industry-administrations-publiques","type_security-donnees","type_security-reseaux","listing_product-sds-fr","listing_product-sns-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>T\u00e9l\u00e9travail et cybers\u00e9curit\u00e9 : comment se prot\u00e9ger I Stormshield<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez comment s\u00e9curiser votre poste informatique en t\u00e9l\u00e9travail, avec des gestes simples qui vous prot\u00e8gent des cyber attaques et vols de donn\u00e9es.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stormshield.com\/fr\/actus\/teletravail-et-cybersecurite-comment-allier-mobilite-et-securite-informatique\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"T\u00e9l\u00e9travail et cybers\u00e9curit\u00e9 : comment se prot\u00e9ger I Stormshield\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez comment s\u00e9curiser votre poste informatique en t\u00e9l\u00e9travail, avec des gestes simples qui vous prot\u00e8gent des cyber attaques et vols de donn\u00e9es.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stormshield.com\/fr\/actus\/teletravail-et-cybersecurite-comment-allier-mobilite-et-securite-informatique\/\" \/>\n<meta property=\"og:site_name\" content=\"Stormshield\" \/>\n<meta property=\"article:published_time\" content=\"2018-03-14T09:47:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-20T13:22:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_443885167.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"324\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Victor Poitevin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:site\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Victor Poitevin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/teletravail-et-cybersecurite-comment-allier-mobilite-et-securite-informatique\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/teletravail-et-cybersecurite-comment-allier-mobilite-et-securite-informatique\\\/\"},\"author\":{\"name\":\"Victor Poitevin\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/0adf015dda8f00b6273db9b417b12da2\"},\"headline\":\"T\u00e9l\u00e9travail et cybers\u00e9curit\u00e9 : comment allier mobilit\u00e9 et s\u00e9curit\u00e9 informatique\",\"datePublished\":\"2018-03-14T09:47:14+00:00\",\"dateModified\":\"2024-06-20T13:22:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/teletravail-et-cybersecurite-comment-allier-mobilite-et-securite-informatique\\\/\"},\"wordCount\":877,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/teletravail-et-cybersecurite-comment-allier-mobilite-et-securite-informatique\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_443885167.jpg\",\"keywords\":[\"La cybers\u00e9curit\u00e9 - premiers pas\"],\"articleSection\":[\"Veille s\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/teletravail-et-cybersecurite-comment-allier-mobilite-et-securite-informatique\\\/\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/teletravail-et-cybersecurite-comment-allier-mobilite-et-securite-informatique\\\/\",\"name\":\"T\u00e9l\u00e9travail et cybers\u00e9curit\u00e9 : comment se prot\u00e9ger I Stormshield\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/teletravail-et-cybersecurite-comment-allier-mobilite-et-securite-informatique\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/teletravail-et-cybersecurite-comment-allier-mobilite-et-securite-informatique\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_443885167.jpg\",\"datePublished\":\"2018-03-14T09:47:14+00:00\",\"dateModified\":\"2024-06-20T13:22:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/0adf015dda8f00b6273db9b417b12da2\"},\"description\":\"D\u00e9couvrez comment s\u00e9curiser votre poste informatique en t\u00e9l\u00e9travail, avec des gestes simples qui vous prot\u00e8gent des cyber attaques et vols de donn\u00e9es.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/teletravail-et-cybersecurite-comment-allier-mobilite-et-securite-informatique\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/teletravail-et-cybersecurite-comment-allier-mobilite-et-securite-informatique\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/teletravail-et-cybersecurite-comment-allier-mobilite-et-securite-informatique\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_443885167.jpg\",\"contentUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_443885167.jpg\",\"width\":500,\"height\":324},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/teletravail-et-cybersecurite-comment-allier-mobilite-et-securite-informatique\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"T\u00e9l\u00e9travail et cybers\u00e9curit\u00e9 : comment allier mobilit\u00e9 et s\u00e9curit\u00e9 informatique\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\",\"name\":\"Stormshield\",\"description\":\"Stormshield\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/0adf015dda8f00b6273db9b417b12da2\",\"name\":\"Victor Poitevin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g\",\"caption\":\"Victor Poitevin\"},\"description\":\"Victor is Stormshield\u2019s Editorial &amp; Digital Manager. Attached to the Marketing Department, his role is to improve the Group\u2019s online visibility. This involves Stormshield\u2019s entire ecosystem, including websites, social networks and blogs. He will make use of his diverse experience, gained in several major French and international groups and communications agencies, to fulfill the Group\u2019s high digital aspirations.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"T\u00e9l\u00e9travail et cybers\u00e9curit\u00e9 : comment se prot\u00e9ger I Stormshield","description":"D\u00e9couvrez comment s\u00e9curiser votre poste informatique en t\u00e9l\u00e9travail, avec des gestes simples qui vous prot\u00e8gent des cyber attaques et vols de donn\u00e9es.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stormshield.com\/fr\/actus\/teletravail-et-cybersecurite-comment-allier-mobilite-et-securite-informatique\/","og_locale":"fr_FR","og_type":"article","og_title":"T\u00e9l\u00e9travail et cybers\u00e9curit\u00e9 : comment se prot\u00e9ger I Stormshield","og_description":"D\u00e9couvrez comment s\u00e9curiser votre poste informatique en t\u00e9l\u00e9travail, avec des gestes simples qui vous prot\u00e8gent des cyber attaques et vols de donn\u00e9es.","og_url":"https:\/\/www.stormshield.com\/fr\/actus\/teletravail-et-cybersecurite-comment-allier-mobilite-et-securite-informatique\/","og_site_name":"Stormshield","article_published_time":"2018-03-14T09:47:14+00:00","article_modified_time":"2024-06-20T13:22:00+00:00","og_image":[{"width":500,"height":324,"url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_443885167.jpg","type":"image\/jpeg"}],"author":"Victor Poitevin","twitter_card":"summary_large_image","twitter_creator":"@Stormshield","twitter_site":"@Stormshield","twitter_misc":{"\u00c9crit par":"Victor Poitevin","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stormshield.com\/fr\/actus\/teletravail-et-cybersecurite-comment-allier-mobilite-et-securite-informatique\/#article","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/teletravail-et-cybersecurite-comment-allier-mobilite-et-securite-informatique\/"},"author":{"name":"Victor Poitevin","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2"},"headline":"T\u00e9l\u00e9travail et cybers\u00e9curit\u00e9 : comment allier mobilit\u00e9 et s\u00e9curit\u00e9 informatique","datePublished":"2018-03-14T09:47:14+00:00","dateModified":"2024-06-20T13:22:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/teletravail-et-cybersecurite-comment-allier-mobilite-et-securite-informatique\/"},"wordCount":877,"commentCount":0,"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/teletravail-et-cybersecurite-comment-allier-mobilite-et-securite-informatique\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_443885167.jpg","keywords":["La cybers\u00e9curit\u00e9 - premiers pas"],"articleSection":["Veille s\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.stormshield.com\/fr\/actus\/teletravail-et-cybersecurite-comment-allier-mobilite-et-securite-informatique\/","url":"https:\/\/www.stormshield.com\/fr\/actus\/teletravail-et-cybersecurite-comment-allier-mobilite-et-securite-informatique\/","name":"T\u00e9l\u00e9travail et cybers\u00e9curit\u00e9 : comment se prot\u00e9ger I Stormshield","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/teletravail-et-cybersecurite-comment-allier-mobilite-et-securite-informatique\/#primaryimage"},"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/teletravail-et-cybersecurite-comment-allier-mobilite-et-securite-informatique\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_443885167.jpg","datePublished":"2018-03-14T09:47:14+00:00","dateModified":"2024-06-20T13:22:00+00:00","author":{"@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2"},"description":"D\u00e9couvrez comment s\u00e9curiser votre poste informatique en t\u00e9l\u00e9travail, avec des gestes simples qui vous prot\u00e8gent des cyber attaques et vols de donn\u00e9es.","breadcrumb":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/teletravail-et-cybersecurite-comment-allier-mobilite-et-securite-informatique\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stormshield.com\/fr\/actus\/teletravail-et-cybersecurite-comment-allier-mobilite-et-securite-informatique\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/actus\/teletravail-et-cybersecurite-comment-allier-mobilite-et-securite-informatique\/#primaryimage","url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_443885167.jpg","contentUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_443885167.jpg","width":500,"height":324},{"@type":"BreadcrumbList","@id":"https:\/\/www.stormshield.com\/fr\/actus\/teletravail-et-cybersecurite-comment-allier-mobilite-et-securite-informatique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stormshield.com\/fr\/"},{"@type":"ListItem","position":2,"name":"T\u00e9l\u00e9travail et cybers\u00e9curit\u00e9 : comment allier mobilit\u00e9 et s\u00e9curit\u00e9 informatique"}]},{"@type":"WebSite","@id":"https:\/\/www.stormshield.com\/fr\/#website","url":"https:\/\/www.stormshield.com\/fr\/","name":"Stormshield","description":"Stormshield","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2","name":"Victor Poitevin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g","caption":"Victor Poitevin"},"description":"Victor is Stormshield\u2019s Editorial &amp; Digital Manager. Attached to the Marketing Department, his role is to improve the Group\u2019s online visibility. This involves Stormshield\u2019s entire ecosystem, including websites, social networks and blogs. He will make use of his diverse experience, gained in several major French and international groups and communications agencies, to fulfill the Group\u2019s high digital aspirations."}]}},"_links":{"self":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/90404","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/comments?post=90404"}],"version-history":[{"count":10,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/90404\/revisions"}],"predecessor-version":[{"id":548892,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/90404\/revisions\/548892"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media\/90406"}],"wp:attachment":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media?parent=90404"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/categories?post=90404"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/tags?post=90404"},{"taxonomy":"business_size","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/business_size?post=90404"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/industry?post=90404"},{"taxonomy":"help_mefind","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/help_mefind?post=90404"},{"taxonomy":"features","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/features?post=90404"},{"taxonomy":"type_security","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/type_security?post=90404"},{"taxonomy":"maintenance","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/maintenance?post=90404"},{"taxonomy":"offer","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/offer?post=90404"},{"taxonomy":"administration_tools","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/administration_tools?post=90404"},{"taxonomy":"cloud_offers","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/cloud_offers?post=90404"},{"taxonomy":"listing_product","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/listing_product?post=90404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}