{"id":16441,"date":"2022-07-05T10:18:10","date_gmt":"2022-07-05T08:18:10","guid":{"rendered":"https:\/\/www.topdesk.com\/fr\/?p=16441"},"modified":"2024-07-15T13:07:10","modified_gmt":"2024-07-15T11:07:10","slug":"les-risques-du-teletravail-en-matiere-de-cybersecurite","status":"publish","type":"post","link":"https:\/\/www.topdesk.com\/fr\/blog\/les-risques-du-teletravail-en-matiere-de-cybersecurite\/","title":{"rendered":"Les risques du t\u00e9l\u00e9travail en mati\u00e8re de cybers\u00e9curit\u00e9"},"content":{"rendered":"<p><strong>L\u2019avenir ne se fera plus sans t\u00e9l\u00e9travail. En fait, <\/strong><a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2020-07-14-gartner-survey-reveals-82-percent-of-company-leaders-plan-to-allow-employees-to-work-remotely-some-of-the-time\"><strong>d&#8217;apr\u00e8s une enqu\u00eate Gartner<\/strong><\/a><strong>, plus de 82\u00a0% des dirigeants d\u2019entreprise pr\u00e9voient d&#8217;autoriser d\u00e9finitivement le t\u00e9l\u00e9travail, au moins partiel, au sein de leurs rangs.<\/strong><\/p>\n<p><strong>Mais travailler \u00e0 la maison, c\u2019est plus que faire ses lessives entre deux\u00a0r\u00e9unions. Pour les d\u00e9partements IT, le t\u00e9l\u00e9travail implique une s\u00e9rie de risques en mati\u00e8re de cybers\u00e9curit\u00e9. Voici comment le travail hybride change le monde de la cybers\u00e9curit\u00e9.\u00a0<\/strong><\/p>\n<h2>Le service IT n\u2019est plus le seul \u00e0 \u00eatre impliqu\u00e9 dans la s\u00e9curit\u00e9<\/h2>\n<p>Avant l\u2019av\u00e8nement du travail hybride ou \u00e0 distance, les employ\u00e9s n\u2019\u00e9taient g\u00e9n\u00e9ralement pas au fait des bonnes pratiques de s\u00e9curit\u00e9 informatique. Certes ce n\u2019\u00e9tait pas une situation id\u00e9ale, mais, tant que l\u2019on restait dans l\u2019enceinte du bureau (et du r\u00e9seau de l\u2019entreprise), les d\u00e9partements IT parvenaient g\u00e9n\u00e9ralement \u00e0 g\u00e9rer les <a href=\"https:\/\/www.topdesk.com\/en\/blog\/itsm\/it-security-nightmares\/\"><strong>lacunes de s\u00e9curit\u00e9<\/strong><\/a>.<\/p>\n<p>Toutefois, maintenant que de nombreux employ\u00e9s travaillent depuis chez eux, bien loin de la supervision du d\u00e9partement IT, c\u2019est d\u00e9sormais \u00e0 eux qu&#8217;il appartient de veiller \u00e0 l\u2019application correcte des bonnes pratiques en mati\u00e8re de cybers\u00e9curit\u00e9.<\/p>\n<p>Tout au long de leur journ\u00e9e de travail, les employ\u00e9s doivent dor\u00e9navant se poser les questions suivantes\u00a0: Qui peut voir mon \u00e9cran depuis sa position\u00a0? Est-ce que le r\u00e9seau que j\u2019utilise est prot\u00e9g\u00e9\u00a0? Est-ce que je laisse mon appareil d\u00e9verrouill\u00e9 et sans surveillance\u00a0? Mon partenaire ou les membres de ma famille doivent-ils pouvoir avoir acc\u00e8s \u00e0 l&#8217;appareil avec lequel je travaille\u00a0?<\/p>\n<p>Il va sans dire que les employ\u00e9s sont de plus en plus conscientis\u00e9s \u00e0 la cybers\u00e9curit\u00e9, mais les dirigeants IT doivent continuer \u00e0 former les \u00e9quipes sur les risques du t\u00e9l\u00e9travail et sur les bonnes pratiques s&#8217;ils veulent que leurs coll\u00e8gues \u00e9chappent aux tentatives d\u2019hame\u00e7onnage ou aux occasionnelles menaces internes.<\/p>\n<h2>L&#8217;av\u00e8nement du \u00ab\u00a0tiers lieu\u00a0\u00bb<\/h2>\n<p>Lorsque le t\u00e9l\u00e9travail a commenc\u00e9 \u00e0 devenir la norme, la majorit\u00e9 des d\u00e9partements IT se sont concentr\u00e9s sur la s\u00e9curisation des environnements de travail au domicile des employ\u00e9s. \u00c7a para\u00eet logique. Mais, en r\u00e9alit\u00e9, les \u00e9tudes montrent que de plus en plus de travailleurs s&#8217;installent plut\u00f4t dans ce que l\u2019on appelle des <a href=\"https:\/\/journals.sagepub.com\/doi\/10.1177\/10946705211014278\"><strong>\u00ab\u00a0tiers lieux\u00a0\u00bb<\/strong><\/a> comme des tea-rooms, des biblioth\u00e8ques, voire n\u2019importe o\u00f9 ailleurs.<\/p>\n<p>Un ph\u00e9nom\u00e8ne qui a de lourdes implications pour l\u2019IT. En effet, ces endroits ont beau offrir un haut degr\u00e9 de libert\u00e9 et de flexibilit\u00e9 aux employ\u00e9s, ils augmentent \u00e9galement le risque que les travailleurs soient la cible de menaces de s\u00e9curit\u00e9. L&#8217;association d\u2019un environnement plein de distractions potentielles, de la pr\u00e9sence d&#8217;\u00e9trangers et de r\u00e9seaux non prot\u00e9g\u00e9s rend le travail \u00ab\u00a0on the go\u00a0\u00bb encore plus dangereux. Par cons\u00e9quent, au moment d&#8217;\u00e9tablir des mesures de cybers\u00e9curit\u00e9 pour le travail hybride, il est important de tenir compte de ces \u00ab\u00a0tiers lieux\u00a0\u00bb.<\/p>\n<p><strong>Les \u00e9quipes de s\u00e9curit\u00e9 doivent adopter une approche plus proactive que simplement r\u00e9active.<\/strong><\/p>\n<h2>Le proactif plut\u00f4t que le r\u00e9actif<\/h2>\n<p>Les attaques sur la cybers\u00e9curit\u00e9 gagnaient d\u00e9j\u00e0 en fr\u00e9quence et en complexit\u00e9 avant 2020, mais le t\u00e9l\u00e9travail y a encore mis un coup d\u2019acc\u00e9l\u00e9rateur.<\/p>\n<p>D&#8217;apr\u00e8s le rapport de Splunk sur l\u2019\u00e9tat de la cybers\u00e9curit\u00e9 en 2022, plus de 49\u00a0% des organisations disent avoir connu une fuite de donn\u00e9es dans le courant des deux\u00a0derni\u00e8res ann\u00e9es, contre 39\u00a0% avant la pand\u00e9mie.<\/p>\n<p>Plus que jamais, les \u00e9quipes de s\u00e9curit\u00e9 doivent adopter une approche plus proactive que simplement r\u00e9active. En d&#8217;autres termes, il conviendra de prendre des mesures afin d\u2019emp\u00eacher les cyberattaques plut\u00f4t que de chercher \u00e0 r\u00e9agir apr\u00e8s coup aux incidents. Pour ce faire, il faudra augmenter la sensibilisation des employ\u00e9s sur la th\u00e9matique de la cybers\u00e9curit\u00e9, \u00e9valuer les syst\u00e8mes internes \u00e0 intervalles r\u00e9guliers afin de d\u00e9tecter les points faibles qu\u2019ils renferment, garder le contr\u00f4le sur l\u2019<a href=\"https:\/\/www.topdesk.com\/fr\/blog\/itsm\/informatique-fantome\/\"><strong>IT fant\u00f4me<\/strong><\/a>, etc.<\/p>\n<p>Et, en cas de probl\u00e8me, voici comment g\u00e9rer les <a href=\"https:\/\/www.topdesk.com\/fr\/blog\/esm\/gerer-stress-servicedesk\/\"><strong>mouvements de panique au servicedesk<\/strong><\/a>.<\/p>\n<h2>La base reste la base<\/h2>\n<p>La g\u00e9n\u00e9ralisation du t\u00e9l\u00e9travail a augment\u00e9 encore davantage l\u2019importance d\u2019une vigilance constante en mati\u00e8re de cybers\u00e9curit\u00e9, mais tout n\u2019est pas noir pour autant. Vous serez heureux d&#8217;apprendre qu&#8217;il ne faut pas une technologie sophistiqu\u00e9e ou un d\u00e9partement s\u00e9curit\u00e9 b\u00e9ton pour arr\u00eater la majorit\u00e9 des cyberattaques.<\/p>\n<p>Emp\u00eacher les br\u00e8ches dans la s\u00e9curit\u00e9 ne doit pas n\u00e9cessairement \u00eatre une op\u00e9ration compliqu\u00e9e. Le tout est de veiller \u00e0 ce que les bases de la s\u00e9curit\u00e9 IT soient adopt\u00e9es par toute l\u2019entreprise. L\u2019authentification multifactorielle, l\u2019application du principe de moindre privil\u00e8ge et la mise \u00e0 jour constante des appareils doivent toujours figurer parmi les principales priorit\u00e9s des d\u00e9partements IT.<\/p>\n<p><strong>Vous voulez savoir comment assurer un bon niveau de s\u00e9curit\u00e9 lorsque les employ\u00e9s travaillent \u00e0 distance\u00a0?<\/strong><\/p>\n<p>Plus d&#8217;informations sur le <a href=\"https:\/\/www.topdesk.com\/en\/blog\/itsm\/cybersecurity-risks-remote-working\/\"><strong>t\u00e9l\u00e9travail<\/strong><\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>L\u2019avenir ne se fera plus sans t\u00e9l\u00e9travail. En fait, d&#8217;apr\u00e8s une enqu\u00eate Gartner, plus de 82\u00a0% des dirigeants d\u2019entreprise pr\u00e9voient d&#8217;autoriser d\u00e9finitivement le t\u00e9l\u00e9travail, au moins partiel, au sein de leurs rangs. Mais travailler \u00e0 la maison, c\u2019est plus que faire ses lessives entre deux\u00a0r\u00e9unions. Pour les d\u00e9partements IT, le t\u00e9l\u00e9travail implique une s\u00e9rie de<\/p>\n","protected":false},"author":269,"featured_media":16444,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"editor_notices":[],"footnotes":""},"class_list":["post-16441","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"acf":{"blog_author":"","blog_hubspot_cta_link":null,"toc_display":"not-visible","blog_promotion_overwrite":false,"blog_promotion":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.0) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Les risques du t\u00e9l\u00e9travail en mati\u00e8re de cybers\u00e9curit\u00e9 | TOPdesk<\/title>\n<meta name=\"description\" content=\"Le t\u00e9l\u00e9travail implique une s\u00e9rie de risques en mati\u00e8re de cybers\u00e9curit\u00e9, dont le service IT n&#039;est plus le seul responsable.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.topdesk.com\/fr\/blog\/les-risques-du-teletravail-en-matiere-de-cybersecurite\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les risques du t\u00e9l\u00e9travail en mati\u00e8re de cybers\u00e9curit\u00e9 | Un meilleur support, des clients satisfaits | TOPdesk\" \/>\n<meta property=\"og:description\" content=\"Le t\u00e9l\u00e9travail implique une s\u00e9rie de risques en mati\u00e8re de cybers\u00e9curit\u00e9, dont le service IT n&#039;est plus le seul responsable.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.topdesk.com\/fr\/blog\/les-risques-du-teletravail-en-matiere-de-cybersecurite\/\" \/>\n<meta property=\"og:site_name\" content=\"T3 TOPdesk - FR\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TOPdesk\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-05T08:18:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-15T11:07:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.topdesk.com\/fr\/wp-content\/media\/sites\/34\/Picture2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"602\" \/>\n\t<meta property=\"og:image:height\" content=\"301\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jasmine\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@topdesk\" \/>\n<meta name=\"twitter:site\" content=\"@topdesk\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jasmine\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.topdesk.com\/fr\/blog\/les-risques-du-teletravail-en-matiere-de-cybersecurite\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.topdesk.com\/fr\/blog\/les-risques-du-teletravail-en-matiere-de-cybersecurite\/\"},\"author\":{\"name\":\"Jasmine\",\"@id\":\"https:\/\/www.topdesk.com\/fr\/#\/schema\/person\/a91de687d9a85a5f876242909e596475\"},\"headline\":\"Les risques du t\u00e9l\u00e9travail en mati\u00e8re de cybers\u00e9curit\u00e9\",\"datePublished\":\"2022-07-05T08:18:10+00:00\",\"dateModified\":\"2024-07-15T11:07:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.topdesk.com\/fr\/blog\/les-risques-du-teletravail-en-matiere-de-cybersecurite\/\"},\"wordCount\":905,\"publisher\":{\"@id\":\"https:\/\/www.topdesk.com\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.com\/fr\/blog\/les-risques-du-teletravail-en-matiere-de-cybersecurite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.topdesk.com\/fr\/wp-content\/media\/sites\/34\/Picture2.png\",\"articleSection\":[\"S\u00e9curit\u00e9\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.topdesk.com\/fr\/blog\/les-risques-du-teletravail-en-matiere-de-cybersecurite\/\",\"url\":\"https:\/\/www.topdesk.com\/fr\/blog\/les-risques-du-teletravail-en-matiere-de-cybersecurite\/\",\"name\":\"Les risques du t\u00e9l\u00e9travail en mati\u00e8re de cybers\u00e9curit\u00e9 | TOPdesk\",\"isPartOf\":{\"@id\":\"https:\/\/www.topdesk.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.topdesk.com\/fr\/blog\/les-risques-du-teletravail-en-matiere-de-cybersecurite\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.com\/fr\/blog\/les-risques-du-teletravail-en-matiere-de-cybersecurite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.topdesk.com\/fr\/wp-content\/media\/sites\/34\/Picture2.png\",\"datePublished\":\"2022-07-05T08:18:10+00:00\",\"dateModified\":\"2024-07-15T11:07:10+00:00\",\"description\":\"Le t\u00e9l\u00e9travail implique une s\u00e9rie de risques en mati\u00e8re de cybers\u00e9curit\u00e9, dont le service IT n'est plus le seul responsable.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.topdesk.com\/fr\/blog\/les-risques-du-teletravail-en-matiere-de-cybersecurite\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.topdesk.com\/fr\/blog\/les-risques-du-teletravail-en-matiere-de-cybersecurite\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.com\/fr\/blog\/les-risques-du-teletravail-en-matiere-de-cybersecurite\/#primaryimage\",\"url\":\"https:\/\/www.topdesk.com\/fr\/wp-content\/media\/sites\/34\/Picture2.png\",\"contentUrl\":\"https:\/\/www.topdesk.com\/fr\/wp-content\/media\/sites\/34\/Picture2.png\",\"width\":602,\"height\":301},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.topdesk.com\/fr\/blog\/les-risques-du-teletravail-en-matiere-de-cybersecurite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.topdesk.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les risques du t\u00e9l\u00e9travail en mati\u00e8re de cybers\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.topdesk.com\/fr\/#website\",\"url\":\"https:\/\/www.topdesk.com\/fr\/\",\"name\":\"TOPdesk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.topdesk.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.topdesk.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.topdesk.com\/fr\/#organization\",\"name\":\"TOPdesk\",\"url\":\"https:\/\/www.topdesk.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.topdesk.com\/fr\/wp-content\/media\/sites\/34\/TOPdesk_RGB_Logo.svg\",\"contentUrl\":\"https:\/\/www.topdesk.com\/fr\/wp-content\/media\/sites\/34\/TOPdesk_RGB_Logo.svg\",\"width\":1,\"height\":1,\"caption\":\"TOPdesk\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TOPdesk\/\",\"https:\/\/x.com\/topdesk\",\"https:\/\/www.instagram.com\/topdeskuk\/\",\"https:\/\/www.linkedin.com\/company\/topdesk\/\",\"https:\/\/www.youtube.com\/user\/topdesk\",\"https:\/\/en.wikipedia.org\/wiki\/TOPdesk\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.topdesk.com\/fr\/#\/schema\/person\/a91de687d9a85a5f876242909e596475\",\"name\":\"Jasmine\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.com\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/46f6d582f9d20266c16e75c0f101c191d2bccb1ba81237970cad286d9293d6ea?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/46f6d582f9d20266c16e75c0f101c191d2bccb1ba81237970cad286d9293d6ea?s=96&d=mm&r=g\",\"caption\":\"Jasmine\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Les risques du t\u00e9l\u00e9travail en mati\u00e8re de cybers\u00e9curit\u00e9 | TOPdesk","description":"Le t\u00e9l\u00e9travail implique une s\u00e9rie de risques en mati\u00e8re de cybers\u00e9curit\u00e9, dont le service IT n'est plus le seul responsable.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.topdesk.com\/fr\/blog\/les-risques-du-teletravail-en-matiere-de-cybersecurite\/","og_locale":"en_US","og_type":"article","og_title":"Les risques du t\u00e9l\u00e9travail en mati\u00e8re de cybers\u00e9curit\u00e9 | Un meilleur support, des clients satisfaits | TOPdesk","og_description":"Le t\u00e9l\u00e9travail implique une s\u00e9rie de risques en mati\u00e8re de cybers\u00e9curit\u00e9, dont le service IT n'est plus le seul responsable.","og_url":"https:\/\/www.topdesk.com\/fr\/blog\/les-risques-du-teletravail-en-matiere-de-cybersecurite\/","og_site_name":"T3 TOPdesk - FR","article_publisher":"https:\/\/www.facebook.com\/TOPdesk\/","article_published_time":"2022-07-05T08:18:10+00:00","article_modified_time":"2024-07-15T11:07:10+00:00","og_image":[{"width":602,"height":301,"url":"https:\/\/www.topdesk.com\/fr\/wp-content\/media\/sites\/34\/Picture2.png","type":"image\/png"}],"author":"Jasmine","twitter_card":"summary_large_image","twitter_creator":"@topdesk","twitter_site":"@topdesk","twitter_misc":{"Written by":"Jasmine","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.topdesk.com\/fr\/blog\/les-risques-du-teletravail-en-matiere-de-cybersecurite\/#article","isPartOf":{"@id":"https:\/\/www.topdesk.com\/fr\/blog\/les-risques-du-teletravail-en-matiere-de-cybersecurite\/"},"author":{"name":"Jasmine","@id":"https:\/\/www.topdesk.com\/fr\/#\/schema\/person\/a91de687d9a85a5f876242909e596475"},"headline":"Les risques du t\u00e9l\u00e9travail en mati\u00e8re de cybers\u00e9curit\u00e9","datePublished":"2022-07-05T08:18:10+00:00","dateModified":"2024-07-15T11:07:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.topdesk.com\/fr\/blog\/les-risques-du-teletravail-en-matiere-de-cybersecurite\/"},"wordCount":905,"publisher":{"@id":"https:\/\/www.topdesk.com\/fr\/#organization"},"image":{"@id":"https:\/\/www.topdesk.com\/fr\/blog\/les-risques-du-teletravail-en-matiere-de-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.topdesk.com\/fr\/wp-content\/media\/sites\/34\/Picture2.png","articleSection":["S\u00e9curit\u00e9"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.topdesk.com\/fr\/blog\/les-risques-du-teletravail-en-matiere-de-cybersecurite\/","url":"https:\/\/www.topdesk.com\/fr\/blog\/les-risques-du-teletravail-en-matiere-de-cybersecurite\/","name":"Les risques du t\u00e9l\u00e9travail en mati\u00e8re de cybers\u00e9curit\u00e9 | TOPdesk","isPartOf":{"@id":"https:\/\/www.topdesk.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.topdesk.com\/fr\/blog\/les-risques-du-teletravail-en-matiere-de-cybersecurite\/#primaryimage"},"image":{"@id":"https:\/\/www.topdesk.com\/fr\/blog\/les-risques-du-teletravail-en-matiere-de-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.topdesk.com\/fr\/wp-content\/media\/sites\/34\/Picture2.png","datePublished":"2022-07-05T08:18:10+00:00","dateModified":"2024-07-15T11:07:10+00:00","description":"Le t\u00e9l\u00e9travail implique une s\u00e9rie de risques en mati\u00e8re de cybers\u00e9curit\u00e9, dont le service IT n'est plus le seul responsable.","breadcrumb":{"@id":"https:\/\/www.topdesk.com\/fr\/blog\/les-risques-du-teletravail-en-matiere-de-cybersecurite\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.topdesk.com\/fr\/blog\/les-risques-du-teletravail-en-matiere-de-cybersecurite\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.com\/fr\/blog\/les-risques-du-teletravail-en-matiere-de-cybersecurite\/#primaryimage","url":"https:\/\/www.topdesk.com\/fr\/wp-content\/media\/sites\/34\/Picture2.png","contentUrl":"https:\/\/www.topdesk.com\/fr\/wp-content\/media\/sites\/34\/Picture2.png","width":602,"height":301},{"@type":"BreadcrumbList","@id":"https:\/\/www.topdesk.com\/fr\/blog\/les-risques-du-teletravail-en-matiere-de-cybersecurite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.topdesk.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Les risques du t\u00e9l\u00e9travail en mati\u00e8re de cybers\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/www.topdesk.com\/fr\/#website","url":"https:\/\/www.topdesk.com\/fr\/","name":"TOPdesk","description":"","publisher":{"@id":"https:\/\/www.topdesk.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.topdesk.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.topdesk.com\/fr\/#organization","name":"TOPdesk","url":"https:\/\/www.topdesk.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.topdesk.com\/fr\/wp-content\/media\/sites\/34\/TOPdesk_RGB_Logo.svg","contentUrl":"https:\/\/www.topdesk.com\/fr\/wp-content\/media\/sites\/34\/TOPdesk_RGB_Logo.svg","width":1,"height":1,"caption":"TOPdesk"},"image":{"@id":"https:\/\/www.topdesk.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TOPdesk\/","https:\/\/x.com\/topdesk","https:\/\/www.instagram.com\/topdeskuk\/","https:\/\/www.linkedin.com\/company\/topdesk\/","https:\/\/www.youtube.com\/user\/topdesk","https:\/\/en.wikipedia.org\/wiki\/TOPdesk"]},{"@type":"Person","@id":"https:\/\/www.topdesk.com\/fr\/#\/schema\/person\/a91de687d9a85a5f876242909e596475","name":"Jasmine","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.com\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/46f6d582f9d20266c16e75c0f101c191d2bccb1ba81237970cad286d9293d6ea?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/46f6d582f9d20266c16e75c0f101c191d2bccb1ba81237970cad286d9293d6ea?s=96&d=mm&r=g","caption":"Jasmine"}}]}},"_links":{"self":[{"href":"https:\/\/www.topdesk.com\/fr\/wp-json\/wp\/v2\/posts\/16441","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.topdesk.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.topdesk.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/fr\/wp-json\/wp\/v2\/users\/269"}],"replies":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/fr\/wp-json\/wp\/v2\/comments?post=16441"}],"version-history":[{"count":2,"href":"https:\/\/www.topdesk.com\/fr\/wp-json\/wp\/v2\/posts\/16441\/revisions"}],"predecessor-version":[{"id":17202,"href":"https:\/\/www.topdesk.com\/fr\/wp-json\/wp\/v2\/posts\/16441\/revisions\/17202"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/fr\/wp-json\/wp\/v2\/media\/16444"}],"wp:attachment":[{"href":"https:\/\/www.topdesk.com\/fr\/wp-json\/wp\/v2\/media?parent=16441"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}