{"id":27983,"date":"2022-08-11T16:30:00","date_gmt":"2022-08-11T20:30:00","guid":{"rendered":"https:\/\/www.people20.com\/blog\/assurer-la-securite-de-votre-main-doeuvre-a-distance\/"},"modified":"2025-10-09T10:30:10","modified_gmt":"2025-10-09T14:30:10","slug":"remote-workforce-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.people20.com\/fr-ca\/blog\/remote-workforce-cybersecurity\/","title":{"rendered":"Assurer la s\u00e9curit\u00e9 de votre main-d\u2019\u0153uvre \u00e0 distance"},"content":{"rendered":"\n<p>Le monde du travail continue de changer et de se transformer. <a href=\"https:\/\/2b8j8w1mu82n19e4qk2h6121-wpengine.netdna-ssl.com\/wp-content\/uploads\/2022\/04\/Contract_Staffing_Impact_Report-FINAL-2.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Presque tous les<\/a> travailleurs du savoir veulent un horaire flexible. Ces horaires flexibles m\u00e8nent souvent \u00e0 des emplacements flexibles. Moins de travailleurs passent tout leur temps au bureau que les ann\u00e9es pr\u00e9c\u00e9dentes. Seulement <a href=\"https:\/\/globalworkplaceanalytics.com\/telecommuting-statistics\" target=\"_blank\" rel=\"noreferrer noopener\">environ 4,1%<\/a> de la main-d\u2019\u0153uvre am\u00e9ricaine t\u00e9l\u00e9travaillait 50% du temps avant la pand\u00e9mie. La demande n\u2019a fait que cro\u00eetre depuis. <a href=\"https:\/\/www.gartner.com\/smarterwithgartner\/digital-workers-say-flexibility-is-key-to-their-productivity#:~:text=According%20to%20the%20Gartner%202021,respondents%20said%20their%20productivity%20fell\" target=\"_blank\" rel=\"noreferrer noopener\">Gartner<\/a> s\u2019attend \u00e0 ce que les travailleurs \u00e0 distance repr\u00e9sentent environ 32% de tous les employ\u00e9s d\u2019ici 2021, soit <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2021-06-22-gartner-forecasts-51-percent-of-global-knowledge-workers-will-be-remote-by-2021\" target=\"_blank\" rel=\"noreferrer noopener\">51%<\/a> des travailleurs du savoir \u00e0 l\u2019\u00e9chelle mondiale. Et ils n\u2019\u00e9taient pas loin de la v\u00e9rit\u00e9.       <\/p>\n\n<p>Avec le besoin croissant d\u2019une main-d\u2019\u0153uvre distribu\u00e9e et la demande de flexibilit\u00e9 de la part des employ\u00e9s actuels et des candidats, il y a aussi un besoin accru de mesures de cybers\u00e9curit\u00e9. L\u2019augmentation du nombre d\u2019employ\u00e9s travaillant \u00e0 distance signifie que vous ne g\u00e9rez plus un seul r\u00e9seau \u00e0 votre bureau, mais plut\u00f4t 20 \u00e0 100 r\u00e9seaux diff\u00e9rents \u00e0 travers votre main-d\u2019\u0153uvre distribu\u00e9e.   <\/p>\n\n<p>Les risques de s\u00e9curit\u00e9 informatique auxquels votre entreprise est confront\u00e9e ont \u00e9volu\u00e9. Bien que les menaces soient souvent les m\u00eames, les d\u00e9fis li\u00e9s \u00e0 la s\u00e9curisation d\u2019une main-d\u2019\u0153uvre distribu\u00e9e ne le sont pas. Le passage \u00e0 une main-d\u2019\u0153uvre \u00e0 distance a cr\u00e9\u00e9 une opportunit\u00e9 pour les cyberattaquants, ce qui a entra\u00een\u00e9 une <a href=\"https:\/\/www.servicenow.com\/workflow\/security-risk\/how-this-wave-is-different\/?campid=63879&amp;cid=sc:brand:all:forbes:q421:thwart_hybrid_article_1:3040:phdus:discov&amp;utm_medium=sponsoredcontent&amp;utm_source=forbes\" target=\"_blank\" rel=\"noreferrer noopener\">augmentation des violations de donn\u00e9es<\/a>.    <\/p>\n\n<p>Chaque nouvel appareil connect\u00e9 au r\u00e9seau et \u00e0 l\u2019Internet des objets (IoT) est une autre occasion pour les attaquants d\u2019infiltrer vos syst\u00e8mes et d\u2019acc\u00e9der \u00e0 vos donn\u00e9es. Les \u00ab mauvais acteurs \u00bb sont tr\u00e8s conscients du risque suppl\u00e9mentaire et sautent sur l\u2019occasion. Bien que supprimer le t\u00e9l\u00e9travail semble \u00eatre la solution la plus simple, la demande de vos talents actuels et potentiels rend cela impossible.    <\/p>\n\n<p>Vous devez prendre des mesures pour assurer la s\u00e9curit\u00e9 de vos r\u00e9seaux, ce qui devient de plus en plus important et complexe lorsqu\u2019on emploie une main-d\u2019\u0153uvre distribu\u00e9e.  <\/p>\n\n<h2 class=\"wp-block-heading\">Le co\u00fbt d\u2019une faille de s\u00e9curit\u00e9<\/h2>\n\n<p>Les menaces augmentent. Les acteurs malveillants profitent des travailleurs \u00e0 distance, ce qui entra\u00eene une augmentation de 11% des attaques de phishing de 2020 \u00e0 2021, selon le <a href=\"https:\/\/www.verizon.com\/about\/news\/verizon-2021-data-breach-investigations-report\" target=\"_blank\" rel=\"noreferrer noopener\">rapport d\u2019enqu\u00eate sur les violations de donn\u00e9es de Verizon en 2021<\/a>. Les attaques par ran\u00e7ongiciel ont augment\u00e9 de 6% d\u2019une ann\u00e9e \u00e0 l\u2019autre \u2014 avec une attaque estim\u00e9e <g id=\"gid_1\">toutes les 11 secondes<\/g> \u2014 et la fausse repr\u00e9sentation a \u00e9t\u00e9 multipli\u00e9e par 15. Ce sont des chiffres pr\u00e9occupants.     <\/p>\n\n<p>Ce qui est encore plus pr\u00e9occupant, c\u2019est que le co\u00fbt moyen d\u2019une violation a augment\u00e9 de 10% en 2021 pour <a href=\"https:\/\/www.ibm.com\/downloads\/cas\/OJDVQGRY\" target=\"_blank\" rel=\"noreferrer noopener\">atteindre 5,04 millions de dollars<\/a>, avec une moyenne de 4,62 millions de dollars pour les attaques de ran\u00e7ongiciel. Les violations o\u00f9 le travail \u00e0 distance a \u00e9t\u00e9 un facteur \u00e0 l\u2019origine de la violation co\u00fbtent <a href=\"https:\/\/www.ibm.com\/downloads\/cas\/OJDVQGRY\" target=\"_blank\" rel=\"noreferrer noopener\">en moyenne 1,07 million de dollars de plus<\/a> . Ce ne sont pas des probl\u00e8mes qui se r\u00e8glent du jour au lendemain. En fait, les violations de donn\u00e9es passent souvent inaper\u00e7ues pendant une longue p\u00e9riode. Il a fallu en moyenne <a href=\"https:\/\/www.ibm.com\/downloads\/cas\/OJDVQGRY\" target=\"_blank\" rel=\"noreferrer noopener\">287 jours<\/a> pour identifier et contenir une violation de donn\u00e9es en 2021.      <\/p>\n\n<p>Les menaces ne visent plus simplement les donn\u00e9es de votre client. Les attaques contre la technologie op\u00e9rationnelle (OT) sont \u00e9galement en hausse, les acteurs malveillants verrouillant les organisations hors de leurs propres syst\u00e8mes et entra\u00eenant des arr\u00eats co\u00fbteux de leur production.   <\/p>\n\n<p>Vous devez prendre des mesures pour prot\u00e9ger vos appareils compatibles Internet des objets (IoT). Comment? Verizon a constat\u00e9 que 85% des violations comportaient un \u00e9l\u00e9ment humain.  <em> <\/em>Donc, le meilleur endroit pour commencer, c\u2019est avec vos gens.  <\/p>\n\n<h2 class=\"wp-block-heading\">D\u00e9fis de s\u00e9curit\u00e9 pour une main-d\u2019\u0153uvre distribu\u00e9e<\/h2>\n\n<p>Il y a de nombreux d\u00e9fis lorsqu\u2019on travaille avec une main-d\u2019\u0153uvre distribu\u00e9e, allant de la <a href=\"https:\/\/www.people20.com\/fr-ca\/blog\/remote-collaboration\/\" target=\"_blank\" rel=\"noreferrer noopener\">collaboration \u00e0 distance<\/a> et des difficult\u00e9s de communication \u00e0 la <a href=\"https:\/\/www.people20.com\/fr-ca\/blog\/remote-payroll-taxes\/\" target=\"_blank\" rel=\"noreferrer noopener\">conformit\u00e9 de la taxe sur la paie<\/a>. La gestion de la main-d\u2019\u0153uvre \u00e0 distance inclut maintenant un \u00e9l\u00e9ment de cybers\u00e9curit\u00e9.   <\/p>\n\n<p>Qu\u2019est-ce qui rend l\u2019\u00e9l\u00e9ment humain aussi risqu\u00e9? Les travailleurs \u00e0 distance sont <a href=\"https:\/\/www.forbes.com\/sites\/servicenow\/2021\/11\/22\/thwarting-new-security-threats-in-a-distributed-workforce\/?sh=611ebec24a9b\" target=\"_blank\" rel=\"noreferrer noopener\">plus susceptibles<\/a> d\u2019utiliser leurs appareils personnels pour se connecter aux r\u00e9seaux de travail, cliquer sur des courriels douteux et adopter des comportements \u00e0 risque. Cela ouvre le r\u00e9seau aux attaques via ces connexions.    <\/p>\n\n<p>Malheureusement, la p\u00e9nurie de talents a aussi affect\u00e9 l\u2019industrie des TI et de la cybers\u00e9curit\u00e9, laissant de nombreuses organisations en sous-effectif dans les d\u00e9partements, ce qui peut affecter la s\u00e9curit\u00e9 globale de votre organisation. Le manque de formation \u00e0 la s\u00e9curit\u00e9 pour les employ\u00e9s entra\u00eene \u00e9galement des d\u00e9fis suppl\u00e9mentaires en mati\u00e8re de s\u00e9curit\u00e9.   <\/p>\n\n<p>Avec une main-d\u2019\u0153uvre distribu\u00e9e, vous avez le d\u00e9fi suppl\u00e9mentaire de maintenir la conformit\u00e9 avec les diff\u00e9rentes lois sur la protection des donn\u00e9es. Vous et tous vos employ\u00e9s et travailleurs temporaires devrez vous conformer \u00e0 la loi am\u00e9ricaine sur <a href=\"https:\/\/www.ftc.gov\/tips-advice\/business-center\/guidance\/can-spam-act-compliance-guide-business\" target=\"_blank\" rel=\"noreferrer noopener\">le pourriel (Can-Spam<\/a>), <a href=\"https:\/\/oag.ca.gov\/privacy\/ccpa\" target=\"_blank\" rel=\"noreferrer noopener\">\u00e0 la California Consumer Privacy Act<\/a> (CCPA), <a href=\"http:\/\/fightspam.gc.ca\/eic\/site\/030.nsf\/eng\/home\" target=\"_blank\" rel=\"noreferrer noopener\">\u00e0 la l\u00e9gislation canadienne anti-pourriel<\/a>, ainsi qu\u2019au <a href=\"https:\/\/gdpr.eu\/\" target=\"_blank\" rel=\"noreferrer noopener\">R\u00e8glement g\u00e9n\u00e9ral sur la protection des donn\u00e9es (RGPD<\/a>) de l\u2019Europe<em>. <\/em>  <\/p>\n\n<h2 class=\"wp-block-heading\">Mesures pour assurer la s\u00e9curit\u00e9 d\u2019une main-d\u2019\u0153uvre \u00e0 distance<\/h2>\n\n<p>Avec une main-d\u2019\u0153uvre distribu\u00e9e r\u00e9partie \u00e0 travers le pays ou dans le monde, il est temps de commencer \u00e0 envisager vos mesures de s\u00e9curit\u00e9 diff\u00e9remment. Votre plan de gestion de la main-d\u2019\u0153uvre \u00e0 distance doit inclure la cybers\u00e9curit\u00e9. Heureusement, il existe des mesures que vous pouvez prendre pour assurer la s\u00e9curit\u00e9 de votre \u00e9quipe \u00e0 distance ou distribu\u00e9e.  <em> <\/em><\/p>\n\n<h3 class=\"wp-block-heading\">Mises \u00e0 jour des protocoles de s\u00e9curit\u00e9 pour la main-d\u2019\u0153uvre distribu\u00e9e<\/h3>\n\n<p>Avant tout, vous devrez mettre \u00e0 jour vos protocoles de s\u00e9curit\u00e9 pour inclure des \u00e9l\u00e9ments directement li\u00e9s \u00e0 la gestion de la main-d\u2019\u0153uvre \u00e0 distance. Cela inclut : <\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Protocoles de connexion.<\/strong>  Vos protocoles de s\u00e9curit\u00e9 doivent inclure des protocoles de connexion. O\u00f9 les employ\u00e9s doivent-ils se connecter au r\u00e9seau et o\u00f9 doivent-ils \u00e9viter? En g\u00e9n\u00e9ral, il vaut mieux \u00e9viter les r\u00e9seaux non s\u00e9curis\u00e9s.    <\/li>\n\n\n\n<li><strong>S\u00e9curit\u00e9 des mots de passe.<\/strong>  Si un mot de passe est facile \u00e0 deviner ou \u00e0 d\u00e9chiffrer, cela menace la s\u00e9curit\u00e9 de votre r\u00e9seau. Envisagez d\u2019activer <a href=\"https:\/\/www.cisa.gov\/publication\/multi-factor-authentication-mfa\" target=\"_blank\" rel=\"noreferrer noopener\">l\u2019authentification multifactorielle<\/a> (MFA).   <\/li>\n\n\n\n<li><strong>Politiques sur les appareils.<\/strong>  Bien qu\u2019il soit moins co\u00fbteux et moins compliqu\u00e9 de mettre en place une politique \u00ab apportez votre propre appareil \u00bb, cela peut en r\u00e9alit\u00e9 nuire \u00e0 la s\u00e9curit\u00e9. Les appareils personnels seront utilis\u00e9s pour plus que des t\u00e2ches professionnelles et peuvent mettre le r\u00e9seau en danger.   <\/li>\n\n\n\n<li><strong>Acc\u00e8s s\u00e9curis\u00e9.<\/strong>  Assurez-vous que votre personnel \u00e0 distance puisse acc\u00e9der au r\u00e9seau de fa\u00e7on s\u00e9curis\u00e9e. Plusieurs options sont disponibles, notamment le Secure Access Service Edge (SASE) et l\u2019acc\u00e8s r\u00e9seau Zero Trust (ZTNA).   <\/li>\n\n\n\n<li><strong>S\u00e9curit\u00e9 des donn\u00e9es.<\/strong>  Il devrait y avoir plusieurs mesures de s\u00e9curit\u00e9 en place. Votre r\u00e9seau a diff\u00e9rentes couches et les failles peuvent venir de n\u2019importe laquelle d\u2019entre elles. Se contenter de prot\u00e9ger les mots de passe ne suffit pas. Vous devez aussi assurer la s\u00e9curit\u00e9 de vos donn\u00e9es et de votre OT. Pensez \u00e0 la s\u00e9curit\u00e9 et au chiffrement au niveau du cloud.      <\/li>\n<\/ul>\n\n<h3 class=\"wp-block-heading\">\u00c9duquez vos employ\u00e9s (et entrepreneurs)<\/h3>\n\n<p>Les protocoles de s\u00e9curit\u00e9 ne sont que la premi\u00e8re \u00e9tape. Une fois que vous avez d\u00e9termin\u00e9 vos protocoles de s\u00e9curit\u00e9 et commenc\u00e9 \u00e0 les mettre en \u0153uvre, il est temps de porter votre attention sur l\u2019aspect humain. Sans une \u00e9ducation ad\u00e9quate, votre main-d\u2019\u0153uvre distribu\u00e9e continuera d\u2019adopter des comportements \u00e0 risque qui repr\u00e9sentent un risque pour la s\u00e9curit\u00e9 de votre organisation.    <\/p>\n\n<p>Vous devriez \u00e9duquer vos employ\u00e9s et contractuels \u2014 toute personne qui acc\u00e8de r\u00e9guli\u00e8rement \u00e0 votre r\u00e9seau \u2014 aux protocoles et mesures de s\u00e9curit\u00e9. Et pas seulement une fois. Assurez une conformit\u00e9 constante en mati\u00e8re de s\u00e9curit\u00e9 en r\u00e9\u00e9duquant r\u00e9guli\u00e8rement votre personnel \u00e0 distance.    <\/p>\n\n<p>Vous voulez \u00e9duquer votre main-d\u2019\u0153uvre \u00e0 distance sur :<\/p>\n\n<ul class=\"wp-block-list\">\n<li>Protocoles appropri\u00e9s<\/li>\n\n\n\n<li>Types d\u2019attaques\n<ul class=\"wp-block-list\">\n<li>Les attaques de phishing \u2014 en particulier la complexit\u00e9 des attaques de spearphishing<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Probl\u00e8mes qui peuvent survenir lorsqu\u2019on travaille dans des espaces partag\u00e9s\n<ul class=\"wp-block-list\">\n<li>Les dangers des hotspots\/r\u00e9seaux non s\u00e9curis\u00e9s<\/li>\n\n\n\n<li>\u00c9coute clandestine<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n<p>La cybers\u00e9curit\u00e9 n\u2019est qu\u2019un des nombreux \u00e9l\u00e9ments \u00e0 consid\u00e9rer lors de l\u2019embauche \u00e0 distance. La conformit\u00e9 est une autre consid\u00e9ration complexe. Assurez-vous de la s\u00e9curit\u00e9 de votre entreprise lorsque vous <a href=\"https:\/\/www.people20.com\/fr-ca\/blog\/remote-payroll-taxes\/\" target=\"_blank\" rel=\"noreferrer noopener\">embauchez des talents conform\u00e9ment \u00e0 la conformit\u00e9<\/a>.   Contactez <a href=\"https:\/\/www.people20.com\/fr-ca\/\" target=\"_blank\" rel=\"noreferrer noopener\">People2.0<\/a> d\u00e8s aujourd\u2019hui pour en savoir plus.  <\/p>\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vos mesures de cybers\u00e9curit\u00e9 devront \u00eatre diff\u00e9rentes lors de la gestion d\u2019une main-d\u2019\u0153uvre \u00e0 distance. Il y a d\u2019autres d\u00e9fis et \u00e9tapes \u00e0 entreprendre. <\/p>\n","protected":false},"author":1,"featured_media":27453,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[1163,1227,1231,1235,1239,1203,1207,1211,1884,1215],"tags":[1419,1367,1683,1631,1687,1431,1679,1675,1595,1371],"class_list":["post-27983","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-fr-ca","category-compliance-fr-ca","category-consulting-fr-ca","category-contracting-fr-ca","category-mass-talent-fr-ca","category-practice-areas-fr-ca","category-search-recruiting-fr-ca","category-staffing-fr-ca","category-workforce-compliance","category-workforce-management-fr-ca","tag-employee-relations-fr-ca","tag-industry-insights-fr-ca","tag-pa3-fr-ca","tag-mitigating-compliance-risks-fr-ca","tag-pa4-fr-ca","tag-risk-mitigation-fr-ca","tag-pa2-fr-ca","tag-pa1-fr-ca","tag-trends-in-the-global-talent-marketplace-fr-ca","tag-workforce-compliance-fr-ca"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Assurer la s\u00e9curit\u00e9 de votre main-d\u2019\u0153uvre \u00e0 distance &#8211; People2.0 | Global<\/title>\n<meta name=\"description\" content=\"Vos mesures de cybers\u00e9curit\u00e9 devront \u00eatre diff\u00e9rentes lors de la gestion d\u2019une main-d\u2019\u0153uvre \u00e0 distance. Il y a d\u2019autres d\u00e9fis et \u00e9tapes \u00e0 entreprendre.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.people20.com\/fr-ca\/blog\/remote-workforce-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Assurer la s\u00e9curit\u00e9 de votre main-d\u2019\u0153uvre \u00e0 distance &#8211; People2.0 | Global\" \/>\n<meta property=\"og:description\" content=\"Vos mesures de cybers\u00e9curit\u00e9 devront \u00eatre diff\u00e9rentes lors de la gestion d\u2019une main-d\u2019\u0153uvre \u00e0 distance. Il y a d\u2019autres d\u00e9fis et \u00e9tapes \u00e0 entreprendre.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.people20.com\/fr-ca\/blog\/remote-workforce-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"People2.0 | Global\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-11T20:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-09T14:30:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.people20.com\/wp-content\/uploads\/2025\/09\/default-featured-blog-image-e1759425826602.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"mstockton\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"mstockton\" \/>\n\t<meta name=\"twitter:label2\" content=\"Temps estim\u00e9 \u00e0 la lecture \" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minute\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Assurer la s\u00e9curit\u00e9 de votre main-d\u2019\u0153uvre \u00e0 distance &#8211; People2.0 | Global","description":"Vos mesures de cybers\u00e9curit\u00e9 devront \u00eatre diff\u00e9rentes lors de la gestion d\u2019une main-d\u2019\u0153uvre \u00e0 distance. Il y a d\u2019autres d\u00e9fis et \u00e9tapes \u00e0 entreprendre.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.people20.com\/fr-ca\/blog\/remote-workforce-cybersecurity\/","og_locale":"fr_CA","og_type":"article","og_title":"Assurer la s\u00e9curit\u00e9 de votre main-d\u2019\u0153uvre \u00e0 distance &#8211; People2.0 | Global","og_description":"Vos mesures de cybers\u00e9curit\u00e9 devront \u00eatre diff\u00e9rentes lors de la gestion d\u2019une main-d\u2019\u0153uvre \u00e0 distance. Il y a d\u2019autres d\u00e9fis et \u00e9tapes \u00e0 entreprendre.","og_url":"https:\/\/www.people20.com\/fr-ca\/blog\/remote-workforce-cybersecurity\/","og_site_name":"People2.0 | Global","article_published_time":"2022-08-11T20:30:00+00:00","article_modified_time":"2025-10-09T14:30:10+00:00","og_image":[{"width":1000,"height":675,"url":"https:\/\/www.people20.com\/wp-content\/uploads\/2025\/09\/default-featured-blog-image-e1759425826602.png","type":"image\/png"}],"author":"mstockton","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"mstockton","Temps estim\u00e9 \u00e0 la lecture ":"7 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.people20.com\/fr-ca\/blog\/remote-workforce-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.people20.com\/fr-ca\/blog\/remote-workforce-cybersecurity\/"},"author":{"name":"mstockton","@id":"https:\/\/www.people20.com\/fr-ca\/#\/schema\/person\/8e2bd6d4178279b0432c3a752289cf70"},"headline":"Assurer la s\u00e9curit\u00e9 de votre main-d\u2019\u0153uvre \u00e0 distance","datePublished":"2022-08-11T20:30:00+00:00","dateModified":"2025-10-09T14:30:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.people20.com\/fr-ca\/blog\/remote-workforce-cybersecurity\/"},"wordCount":1478,"commentCount":0,"publisher":{"@id":"https:\/\/www.people20.com\/fr-ca\/#organization"},"image":{"@id":"https:\/\/www.people20.com\/fr-ca\/blog\/remote-workforce-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.people20.com\/wp-content\/uploads\/2025\/09\/default-featured-blog-image-e1759425826602.png","keywords":["Employee Relations","Industry Insights","Mass Talent and Enterprise","Mitigating Compliance Risks","Professional Services","Risk Mitigation","Search and Recruiting","Staffing","Trends in the Global Talent Marketplace","Workforce Compliance"],"articleSection":["Blog","Compliance","Consulting","Contracting","Mass Talent Procurement","Practice Areas","Search &amp; Recruiting","Staffing","Workforce Compliance\u00a0","Workforce Management"],"inLanguage":"fr-CA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.people20.com\/fr-ca\/blog\/remote-workforce-cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.people20.com\/fr-ca\/blog\/remote-workforce-cybersecurity\/","url":"https:\/\/www.people20.com\/fr-ca\/blog\/remote-workforce-cybersecurity\/","name":"Assurer la s\u00e9curit\u00e9 de votre main-d\u2019\u0153uvre \u00e0 distance &#8211; People2.0 | Global","isPartOf":{"@id":"https:\/\/www.people20.com\/fr-ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.people20.com\/fr-ca\/blog\/remote-workforce-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.people20.com\/fr-ca\/blog\/remote-workforce-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.people20.com\/wp-content\/uploads\/2025\/09\/default-featured-blog-image-e1759425826602.png","datePublished":"2022-08-11T20:30:00+00:00","dateModified":"2025-10-09T14:30:10+00:00","description":"Vos mesures de cybers\u00e9curit\u00e9 devront \u00eatre diff\u00e9rentes lors de la gestion d\u2019une main-d\u2019\u0153uvre \u00e0 distance. Il y a d\u2019autres d\u00e9fis et \u00e9tapes \u00e0 entreprendre.","breadcrumb":{"@id":"https:\/\/www.people20.com\/fr-ca\/blog\/remote-workforce-cybersecurity\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.people20.com\/fr-ca\/blog\/remote-workforce-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.people20.com\/fr-ca\/blog\/remote-workforce-cybersecurity\/#primaryimage","url":"https:\/\/www.people20.com\/wp-content\/uploads\/2025\/09\/default-featured-blog-image-e1759425826602.png","contentUrl":"https:\/\/www.people20.com\/wp-content\/uploads\/2025\/09\/default-featured-blog-image-e1759425826602.png","width":1000,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/www.people20.com\/fr-ca\/blog\/remote-workforce-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.people20.com\/fr-ca\/home\/"},{"@type":"ListItem","position":2,"name":"Assurer la s\u00e9curit\u00e9 de votre main-d\u2019\u0153uvre \u00e0 distance"}]},{"@type":"WebSite","@id":"https:\/\/www.people20.com\/fr-ca\/#website","url":"https:\/\/www.people20.com\/fr-ca\/","name":"People2.0 | Global","description":"Global employment, simplified.","publisher":{"@id":"https:\/\/www.people20.com\/fr-ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.people20.com\/fr-ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/www.people20.com\/fr-ca\/#organization","name":"People2.0 | Global","url":"https:\/\/www.people20.com\/fr-ca\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.people20.com\/fr-ca\/#\/schema\/logo\/image\/","url":"https:\/\/www.people20.com\/wp-content\/uploads\/2025\/05\/people20-logo.svg","contentUrl":"https:\/\/www.people20.com\/wp-content\/uploads\/2025\/05\/people20-logo.svg","caption":"People2.0 | Global"},"image":{"@id":"https:\/\/www.people20.com\/fr-ca\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.people20.com\/fr-ca\/#\/schema\/person\/8e2bd6d4178279b0432c3a752289cf70","name":"mstockton","image":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/secure.gravatar.com\/avatar\/647d665762e1eb25072a3fd27f241688164506d74742d36e717bfcd92cdb5b68?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/647d665762e1eb25072a3fd27f241688164506d74742d36e717bfcd92cdb5b68?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/647d665762e1eb25072a3fd27f241688164506d74742d36e717bfcd92cdb5b68?s=96&d=mm&r=g","caption":"mstockton"},"sameAs":["http:\/\/www.people20.com"],"url":"https:\/\/www.people20.com\/fr-ca\/blog\/author\/mrstockton\/"}]}},"_links":{"self":[{"href":"https:\/\/www.people20.com\/fr-ca\/wp-json\/wp\/v2\/posts\/27983","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.people20.com\/fr-ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.people20.com\/fr-ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.people20.com\/fr-ca\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.people20.com\/fr-ca\/wp-json\/wp\/v2\/comments?post=27983"}],"version-history":[{"count":2,"href":"https:\/\/www.people20.com\/fr-ca\/wp-json\/wp\/v2\/posts\/27983\/revisions"}],"predecessor-version":[{"id":31559,"href":"https:\/\/www.people20.com\/fr-ca\/wp-json\/wp\/v2\/posts\/27983\/revisions\/31559"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.people20.com\/fr-ca\/wp-json\/wp\/v2\/media\/27453"}],"wp:attachment":[{"href":"https:\/\/www.people20.com\/fr-ca\/wp-json\/wp\/v2\/media?parent=27983"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.people20.com\/fr-ca\/wp-json\/wp\/v2\/categories?post=27983"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.people20.com\/fr-ca\/wp-json\/wp\/v2\/tags?post=27983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}