{"id":11224,"date":"2021-10-21T16:54:00","date_gmt":"2021-10-21T14:54:00","guid":{"rendered":"https:\/\/www.thegreenbow.com\/?post_type=resource&#038;p=11224"},"modified":"2023-01-13T16:56:15","modified_gmt":"2023-01-13T14:56:15","slug":"teletravail-comment-assurer-la-securite-des-equipements-connectes-part-2","status":"publish","type":"resource","link":"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/teletravail-comment-assurer-la-securite-des-equipements-connectes-part-2\/","title":{"rendered":"T\u00e9l\u00e9travail : comment assurer la s\u00e9curit\u00e9 des \u00e9quipements connect\u00e9s (part 2)"},"content":{"rendered":"\n<div class=\"wp-block-ch-resource-content alignfull\">\n<p><strong>Auteur : Arnaud Dufournet<\/strong>, Chief Marketing Officer<\/p>\n\n\n\n<p>Un an et demi apr\u00e8s le choc du premier confinement et la mise place massif du t\u00e9l\u00e9travail pour les salari\u00e9s, le mode de travail dit \u00ab&nbsp;hybride&nbsp;\u00bb est d\u00e9sormais bien ancr\u00e9 dans les entreprises. Apr\u00e8s l\u2019urgence de la prise en charge du travail \u00e0 distance pendant la pand\u00e9mie, elles ont pris conscience de certaines limites de leurs syst\u00e8mes existants. Par cons\u00e9quent, elles r\u00e9fl\u00e9chissent maintenant \u00e0 la mani\u00e8re de faire \u00e9voluer leur architecture de s\u00e9curit\u00e9. Toutes souhaitent pr\u00e9server les avantages du travail hybride tant en termes de productivit\u00e9 que d\u2019attractivit\u00e9, tout en r\u00e9duisant les risques d\u2019attaque.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong><strong>Quels principaux d\u00e9fis \u00e0 relever&nbsp;?<\/strong><\/strong><\/strong><\/h2>\n\n\n\n<p>Nous l\u2019avons vu dans l\u2019<a href=\"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/teletravail-comment-assurer-la-securite-des-equipements-connectes-part-1\/\" target=\"_blank\" rel=\"noreferrer noopener\">article pr\u00e9c\u00e9dent<\/a>, le nomadisme et le t\u00e9l\u00e9travail en particulier, touchent toutes les tailles d\u2019organisation, qu\u2019elles soient publiques ou priv\u00e9es.&nbsp; Pour rendre leurs ressources disponibles 24&nbsp;heures sur 24 et 7&nbsp;jours sur 7 tout en offrant une exp\u00e9rience utilisateur optimis\u00e9e et s\u00e9curis\u00e9e, elles cherchent \u00e0 pr\u00e9sent \u00e0 p\u00e9renniser leurs infrastructures d\u2019acc\u00e8s \u00e0 distance.<\/p>\n\n\n\n<p>Au-del\u00e0 du souci de p\u00e9renniser, les RSSI font face \u00e0 deux autres enjeux majeurs. Le premier est la conformit\u00e9 r\u00e9glementaire. Ces derni\u00e8res ann\u00e9es, les <strong>r\u00e9glementations nationales et internationales<\/strong> (voir notre <a href=\"https:\/\/www.thegreenbow.com\/fr\/ressource\/webtv\/cybersecurite-comment-se-preparer-aux-nouvelles-reglementations-qui-impactent-fortement-les-entreprises\/\" target=\"_blank\" rel=\"noreferrer noopener\">WebTV<\/a> \u00e0 ce sujet) ont prolif\u00e9r\u00e9. Par exemple le r\u00e8glement europ\u00e9en sur les donn\u00e9es personnelles (RGPD) impose \u00e0 toute organisation publique ou priv\u00e9e qui collecte ce type de donn\u00e9es,&nbsp;d\u2019en assurer la protection. Avec le t\u00e9l\u00e9travail, les collectivit\u00e9s territoriales comme les mairies, manipulent de plus en plus \u00e0 distance les donn\u00e9es personnelles de leurs administr\u00e9s. Les RSSI doivent donc veiller \u00e0 la s\u00e9curit\u00e9 des connexions distantes pour pr\u00e9venir tout risque d\u2019interception ou alt\u00e9ration de ces donn\u00e9es.<\/p>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\" style=\"grid-template-columns:45% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"628\" src=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/06\/WindowsCertif.png\" alt=\"\" class=\"wp-image-9162 size-full\" srcset=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/06\/WindowsCertif.png 768w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/06\/WindowsCertif-300x245.png 300w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/06\/WindowsCertif-100x82.png 100w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>La loi de programmation militaire (LPM) et la directive europ\u00e9enne NIS contraignent les op\u00e9rateurs d\u2019importance vitale (OIV) et op\u00e9rateurs de services essentiels (OSE) \u00e0 s\u00e9curiser les acc\u00e8s \u00e0 leur SI en utilisant des solutions de chiffrement des communications. <\/p>\n\n\n\n<p>La r\u00e9vision de la directive NIS va encore \u00e9largir le nombre d\u2019organisations concern\u00e9es puisque de nouvelles activit\u00e9s et secteurs seront inclus.<\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p>A ce sujet, Guillaume Poupard, directeur g\u00e9n\u00e9ral de l\u2019Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information (ANSSI), a pr\u00e9venu le mois dernier au FIC qu\u2019il pourrait y avoir<strong> <a href=\"https:\/\/www.lemagit.fr\/actualites\/252506469\/Une-version-2-donner-un-nouvel-elan-a-la-directive-NIS\" target=\"_blank\" rel=\"noreferrer noopener\">plusieurs milliers d\u2019OS<\/a><\/strong><a href=\"https:\/\/www.lemagit.fr\/actualites\/252506469\/Une-version-2-donner-un-nouvel-elan-a-la-directive-NIS\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>E en France<\/strong><\/a> avec la version 2 de la directive NIS.<\/p>\n\n\n\n<p>Les enjeux financiers sont \u00e9galement de plus en plus lourds, en particulier pour les PME. Un chiffre sid\u00e9rant illustre bien cela&nbsp;: <a href=\"https:\/\/itsocial.fr\/enjeux-it\/enjeux-strategie\/dsi\/les-pme-francaises-doivent-realiser-que-la-cybersecurite-nest-pas-quune-affaire-de-grands-groupes-internationaux\/\" target=\"_blank\" rel=\"noreferrer noopener\">60&nbsp;% des PME victimes d\u2019attaques<\/a> d\u00e9posent le bilan dans les six&nbsp;mois. Un cas d\u2019\u00e9cole embl\u00e9matique est celui du groupe Lise Charmel. La c\u00e9l\u00e8bre marque de lingerie a subi une attaque par ran\u00e7ongiciel d\u00e9but novembre 2019 et s\u2019est retrouv\u00e9e devant le tribunal de commerce pour demander un redressement judiciaire \u00e0 la fin f\u00e9vrier 2020. <\/p>\n\n\n\n<p>Les co\u00fbts directs d\u2019une attaque se voient rapidement&nbsp;: activit\u00e9 stopp\u00e9e entrainant une baisse du chiffre d\u2019affaires, arr\u00eat de la facturation, co\u00fbt de la rem\u00e9diation et de la reprise d\u2019activit\u00e9 \u2026 mais il y a aussi les co\u00fbts invisibles&nbsp;: la perte de confiance des clients et des fournisseurs, la prime d\u2019assurance qui s\u2019envole \u2026 Certains vont jusqu\u2019\u00e0 estimer que les d\u00e9g\u00e2ts immat\u00e9riels repr\u00e9senteraient plus de 40 % du montant de la facture totale d\u2019une attaque.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong>S\u00e9curiser les communications distantes<\/strong><\/strong><\/h2>\n\n\n\n<p>En 2018, l\u2019ANSSI avait d\u00e9j\u00e0 publi\u00e9 un <a href=\"https:\/\/www.ssi.gouv.fr\/guide\/recommandations-sur-le-nomadisme-numerique\/\" target=\"_blank\" rel=\"noreferrer noopener\">guide sur le nomadisme num\u00e9rique<\/a> alertant sur les risques li\u00e9s au t\u00e9l\u00e9travail et donnant des recommandations pratiques pour s\u00e9curiser les SI. Le<strong> chiffrement des communications<\/strong>, \u00e0 commencer par les flux d\u2019administrations, fait partie des mesures \u00e0 prendre, de m\u00eame que privil\u00e9gier les solutions disposant d\u2019un visa ANSSI.&nbsp; M\u00eame son de cloche du c\u00f4t\u00e9 de la <a href=\"https:\/\/www.cnil.fr\/fr\/les-conseils-de-la-cnil-pour-mettre-en-place-du-teletravail\" target=\"_blank\" rel=\"noreferrer noopener\">CNIL<\/a> qui recommande l\u2019usage d\u2019un VPN pour les connexions distantes et la s\u00e9curisation des donn\u00e9es personnelles.<\/p>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile\" style=\"grid-template-columns:auto 40%\"><div class=\"wp-block-media-text__content\">\n<p class=\"has-text-align-left\">Cybermalveillance.gouv.fr a \u00e9galement r\u00e9alis\u00e9 un <a href=\"https:\/\/www.cybermalveillance.gouv.fr\/medias\/2020\/09\/Fiche-Pratique_Teletravail.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">petit guide pratique<\/a> contenant des consignes similaires. Ce guide insiste en outre sur l\u2019importance d\u2019accompagner les collaborateurs en t\u00e9l\u00e9travail et de les sensibiliser sur les menaces. <\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/10\/Cybersecurity-1024x682.jpg\" alt=\"\" class=\"wp-image-11316 size-full\" srcset=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/10\/Cybersecurity-1024x682.jpg 1024w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/10\/Cybersecurity-300x200.jpg 300w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/10\/Cybersecurity-768x512.jpg 768w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/10\/Cybersecurity-100x67.jpg 100w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/10\/Cybersecurity-301x201.jpg 301w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/10\/Cybersecurity-343x229.jpg 343w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/10\/Cybersecurity.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p>Car la premi\u00e8re des vuln\u00e9rabilit\u00e9s demeure l\u2019humain.&nbsp;Le g\u00e9n\u00e9ral Marc Watin-Augouard, le fondateur du FIC, l\u2019a encore rappel\u00e9 sur BFM TV juste avant l\u2019ouverture du salon&nbsp;: \u00ab\u00a0<a href=\"https:\/\/www.bfmtv.com\/economie\/entreprises\/marc-watin-augouard-fondateur-du-forum-international-de-la-cybersecurite-et-general-d-armee-85-des-cyberattaques-sont-liees-a-une-erreur-humaine_VN-202109070049.html\" target=\"_blank\" rel=\"noreferrer noopener\">85% des cyberattaques sont li\u00e9es \u00e0 une erreur humaine<\/a>, comme l\u2019ouverture d\u2019une pi\u00e8ce jointe\u00a0\u00bb.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Qu\u2019avons-nous appris de 2020&nbsp;?<\/strong><\/h2>\n\n\n\n<p>Les VPN faisant partie des technologies les plus utilis\u00e9es en 2020 pour prot\u00e9ger les t\u00e9l\u00e9travailleurs, il y a beaucoup d\u2019enseignements int\u00e9ressants \u00e0 tirer des d\u00e9ploiements. Voici les principaux \u00e9cueils rencontr\u00e9s.<\/p>\n\n\n\n<p>Premier constat&nbsp;: le niveau de s\u00e9curit\u00e9 des produits. Tous les VPN ne se valent pas. Certains VPN, en particulier ceux utilisant le protocole SSL\/TLS, ont relev\u00e9 des vuln\u00e9rabilit\u00e9s s\u00e9v\u00e8res qui ont \u00e9t\u00e9 exploit\u00e9es par les pirates pour attaquer les t\u00e9l\u00e9travailleurs. Les \u00e9quipements (routeurs, firewall \u2026) ont \u00e9t\u00e9 aussi mis \u00e0 rude \u00e9preuve. <\/p>\n\n\n\n<p>Leur dimensionnement a souvent \u00e9t\u00e9 sous-estim\u00e9 pour absorber le surcro\u00eet de trafic provenant des VPN des collaborateurs distants. Ces derniers se sont alors plaints de probl\u00e8mes de connexion et de pertes de d\u00e9bit. Troisi\u00e8me \u00e9cueil que nous avons souvent constat\u00e9&nbsp;: la difficult\u00e9 \u00e0 configurer et d\u00e9ployer rapidement les VPN, surtout quand il s\u2019agit de prot\u00e9ger un parc de plusieurs milliers de poste.<\/p>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\" style=\"grid-template-columns:44% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/10\/AdobeStock_246884415-1024x683.jpeg\" alt=\"T\u00e9l\u00e9travail\" class=\"wp-image-11384 size-full\" srcset=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/10\/AdobeStock_246884415-1024x683.jpeg 1024w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/10\/AdobeStock_246884415-300x200.jpeg 300w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/10\/AdobeStock_246884415-768x512.jpeg 768w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/10\/AdobeStock_246884415-1536x1024.jpeg 1536w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/10\/AdobeStock_246884415-2048x1365.jpeg 2048w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/10\/AdobeStock_246884415-100x67.jpeg 100w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/10\/AdobeStock_246884415-301x201.jpeg 301w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/10\/AdobeStock_246884415-343x229.jpeg 343w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>Enfin, terminons par les collaborateurs eux-m\u00eames dont les RSSI ont pu mesurer \u00e0 quel point leurs connaissances informatiques \u00e9taient limit\u00e9es. La maitrise d\u2019applications collaboratives comme Zoom s\u2019est r\u00e9v\u00e9l\u00e9e beaucoup plus rapide que pour les solutions de cybers\u00e9curit\u00e9 comme les VPN.<\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Les crit\u00e8res de choix d&rsquo;un VPN ?<\/strong><\/h2>\n\n\n\n<p>Fort de ces enseignements, quels sont les crit\u00e8res importants pour bien choisir son VPN d\u2019entreprise&nbsp;? Chez TheGreenBow, nous pensons qu\u2019il y a trois principaux crit\u00e8res \u00e0 consid\u00e9rer.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Niveau de s\u00e9curit\u00e9<\/strong> : c\u2019est le crit\u00e8re non n\u00e9gociable, surtout pour les organisations ayant des SI class\u00e9s DR (<a href=\"https:\/\/www.thegreenbow.com\/fr\/cas-dusage-du-vpn\/diffusion-restreinte\/\">Diffusion Restreinte<\/a>). Bien s\u00fbr, choisir la version la plus \u00e0 jour du produit pour disposer d\u2019un algorithme de chiffrement \u00e0 l\u2019\u00e9tat de l\u2019art et d\u2019un syst\u00e8me d\u2019authentification robuste. Les VPN IPsec disposant d\u2019un visa de s\u00e9curit\u00e9 sont ceux offrant le niveau de s\u00e9curit\u00e9 le plus \u00e9lev\u00e9.<\/li>\n\n\n\n<li><strong>Interop\u00e9rabilit\u00e9<\/strong> : elle vous permet de garder la ma\u00eetrise sur vos choix en \u00e9quipements. Nombreuses sont les entreprises qui ont des \u00e9quipements h\u00e9t\u00e9rog\u00e8nes. Il est alors important que le VPN s\u2019interface avec tous. Pour ceux qui privil\u00e9gient les solutions souveraines de bout en bout, l\u2019interop\u00e9rabilit\u00e9 est \u00e9galement cl\u00e9. Les Clients VPN TheGreenBow s\u2019int\u00e8grent par exemple avec des pare-feux Atos, Stormshield ou Mistral.<\/li>\n\n\n\n<li><strong>Simplicit\u00e9 d&rsquo;utilisation <\/strong>: pour les utilisateurs finaux d\u2019abord. Pas de s\u00e9curit\u00e9 sans adoption de la solution cyber. Le VPN doit \u00eatre le plus transparent pour eux c\u2019est-\u00e0-dire requ\u00e9rant le minimum d\u2019interactions. Pour l\u2019administrateur \u00e9galement. Le Client VPN doit lui permettre de configurer facilement sa politique de s\u00e9curit\u00e9. Et le d\u00e9ploiement doit rester simple.<\/li>\n<\/ol>\n\n\n\n<p>TheGreenBow s\u2019est engag\u00e9 depuis de nombreuses ann\u00e9es dans un processus de certification de ses Clients VPN pour fournir le niveau de s\u00e9curit\u00e9 le plus \u00e9lev\u00e9 possible \u00e0 ses clients. Vous pouvez d\u00e9couvrir<strong> <a href=\"https:\/\/www.thegreenbow.com\/fr\/produits-vpn-thegreenbow\/endpoint-secure-connection\/\">nos produits<\/a> <\/strong>ici ou dans notre <a href=\"https:\/\/store.thegreenbow.com\/reu\/fr\/\"><strong>boutique en ligne<\/strong><\/a>. Enfin n\u2019h\u00e9sitez pas \u00e0 nous faire part de vos projets d\u2019am\u00e9lioration de votre infrastructure d\u2019acc\u00e8s \u00e0 distance en nous <a href=\"https:\/\/www.thegreenbow.com\/fr\/contact\/\">contactant ici<\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<p><\/p>\n\n\n\n  <section  class=\"wp-block-acf-linked-pages  section-content linked-pages-section\"  itemprop=\"hasPart\" itemscope itemtype=\"https:\/\/schema.org\/WebPageElement\">\n    <div class=\"grid-container\">\n     <div class=\"grid-x grid-padding-x align-center mobile-slider\">\n                <div class=\"cell medium-4 article\">\n            <div class=\"wrapper\">\n              \n                              <a  href=\"https:\/\/www.thegreenbow.com\/fr\/produits-vpn-thegreenbow\/endpoint-secure-connection\/\" >\n\n                                          <figure>\n                        <img decoding=\"async\"  data-fade-in loading=\"lazy\" src=\"data:image\/png;base64,R0lGODlhAQABAAD\/ACwAAAAAAQABAAACADs=\" data-lazy-interchange=\"[https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/Header_Produits-727x486.jpeg, small], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/Header_Produits-301x201.jpeg, medium], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/Header_Produits-343x229.jpeg, large], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/Header_Produits-1454x972.jpeg, retina], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/Header_Produits-602x402.jpeg, medium_retina], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/Header_Produits-686x458.jpeg, large_retina]\" data-interchange-sizes=\"{&quot;small&quot;:{&quot;w&quot;:727,&quot;h&quot;:486},&quot;medium&quot;:{&quot;w&quot;:301,&quot;h&quot;:201},&quot;large&quot;:{&quot;w&quot;:343,&quot;h&quot;:229},&quot;retina&quot;:{&quot;w&quot;:1454,&quot;h&quot;:972},&quot;medium_retina&quot;:{&quot;w&quot;:602,&quot;h&quot;:402},&quot;large_retina&quot;:{&quot;w&quot;:686,&quot;h&quot;:458}}\"  alt=\"T\u00e9l\u00e9travail : comment assurer la s\u00e9curit\u00e9 des \u00e9quipements connect\u00e9s (part 2)\" itemprop=\"image\" data-fade-in \/>\n                      <\/figure>\n                    \n                                      <h4 class=\"block-title\">D\u00e9couvrir les Clients VPN TheGreenBow<\/h4>\n                  \n                  \n                <\/a>\n              \n            <\/div>\n          <\/div>\n\n                  <div class=\"cell medium-4 article\">\n            <div class=\"wrapper\">\n              \n                              <a  href=\"https:\/\/store.thegreenbow.com\/reu\/fr\/\" >\n\n                                          <figure>\n                        <img decoding=\"async\"  data-fade-in loading=\"lazy\" src=\"data:image\/png;base64,R0lGODlhAQABAAD\/ACwAAAAAAQABAAACADs=\" data-lazy-interchange=\"[https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/Header_Produits-727x486.jpeg, small], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/Header_Produits-301x201.jpeg, medium], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/Header_Produits-343x229.jpeg, large], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/Header_Produits-1454x972.jpeg, retina], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/Header_Produits-602x402.jpeg, medium_retina], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/Header_Produits-686x458.jpeg, large_retina]\" data-interchange-sizes=\"{&quot;small&quot;:{&quot;w&quot;:727,&quot;h&quot;:486},&quot;medium&quot;:{&quot;w&quot;:301,&quot;h&quot;:201},&quot;large&quot;:{&quot;w&quot;:343,&quot;h&quot;:229},&quot;retina&quot;:{&quot;w&quot;:1454,&quot;h&quot;:972},&quot;medium_retina&quot;:{&quot;w&quot;:602,&quot;h&quot;:402},&quot;large_retina&quot;:{&quot;w&quot;:686,&quot;h&quot;:458}}\"  alt=\"T\u00e9l\u00e9travail : comment assurer la s\u00e9curit\u00e9 des \u00e9quipements connect\u00e9s (part 2)\" itemprop=\"image\" data-fade-in \/>\n                      <\/figure>\n                    \n                                      <h4 class=\"block-title\">Voir le store TheGreenBow<\/h4>\n                  \n                  \n                <\/a>\n              \n            <\/div>\n          <\/div>\n\n        \n\t\t<\/div>\n    <\/div>\n  <\/section>\n\n\n\n<p><\/p>\n<\/div>\n","protected":false},"featured_media":9174,"template":"","meta":{"_acf_changed":false,"resource_type":"internal"},"resource_category":[30],"class_list":["post-11224","resource","type-resource","status-publish","has-post-thumbnail","hentry","resource_category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>T\u00e9l\u00e9travail : comment s\u00e9curiser les \u00e9quipements connect\u00e9s ? part 2<\/title>\n<meta name=\"description\" content=\"Apr\u00e8s l\u2019urgence du d\u00e9ploiement du t\u00e9l\u00e9travail, les organisations r\u00e9fl\u00e9chissent \u00e0 la mani\u00e8re de faire \u00e9voluer leur architecture s\u00e9curit\u00e9\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/teletravail-comment-assurer-la-securite-des-equipements-connectes-part-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"T\u00e9l\u00e9travail : comment s\u00e9curiser les \u00e9quipements connect\u00e9s ? part 2\" \/>\n<meta property=\"og:description\" content=\"Apr\u00e8s l\u2019urgence du d\u00e9ploiement du t\u00e9l\u00e9travail, les organisations r\u00e9fl\u00e9chissent \u00e0 la mani\u00e8re de faire \u00e9voluer leur architecture s\u00e9curit\u00e9\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/teletravail-comment-assurer-la-securite-des-equipements-connectes-part-2\/\" \/>\n<meta property=\"og:site_name\" content=\"TheGreenBow\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-13T14:56:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/06\/iOS.png\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@thegreenbow\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/ressource\\\/blog\\\/teletravail-comment-assurer-la-securite-des-equipements-connectes-part-2\\\/\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/ressource\\\/blog\\\/teletravail-comment-assurer-la-securite-des-equipements-connectes-part-2\\\/\",\"name\":\"T\u00e9l\u00e9travail : comment s\u00e9curiser les \u00e9quipements connect\u00e9s ? part 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/ressource\\\/blog\\\/teletravail-comment-assurer-la-securite-des-equipements-connectes-part-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/ressource\\\/blog\\\/teletravail-comment-assurer-la-securite-des-equipements-connectes-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/iOS.png\",\"datePublished\":\"2021-10-21T14:54:00+00:00\",\"dateModified\":\"2023-01-13T14:56:15+00:00\",\"description\":\"Apr\u00e8s l\u2019urgence du d\u00e9ploiement du t\u00e9l\u00e9travail, les organisations r\u00e9fl\u00e9chissent \u00e0 la mani\u00e8re de faire \u00e9voluer leur architecture s\u00e9curit\u00e9\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/ressource\\\/blog\\\/teletravail-comment-assurer-la-securite-des-equipements-connectes-part-2\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/ressource\\\/blog\\\/teletravail-comment-assurer-la-securite-des-equipements-connectes-part-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/ressource\\\/blog\\\/teletravail-comment-assurer-la-securite-des-equipements-connectes-part-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/iOS.png\",\"contentUrl\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/iOS.png\",\"width\":768,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/ressource\\\/blog\\\/teletravail-comment-assurer-la-securite-des-equipements-connectes-part-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/ressources\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"T\u00e9l\u00e9travail : comment assurer la s\u00e9curit\u00e9 des \u00e9quipements connect\u00e9s (part 2)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/\",\"name\":\"TheGreenBow\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/#organization\",\"name\":\"TheGreenBow\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/Logotype@2x-min.png\",\"contentUrl\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/Logotype@2x-min.png\",\"width\":422,\"height\":84,\"caption\":\"TheGreenBow\"},\"image\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/thegreenbow\",\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/thegreenbow\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCZKtI7_fmgFcmovgGSy8AnQ\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"T\u00e9l\u00e9travail : comment s\u00e9curiser les \u00e9quipements connect\u00e9s ? part 2","description":"Apr\u00e8s l\u2019urgence du d\u00e9ploiement du t\u00e9l\u00e9travail, les organisations r\u00e9fl\u00e9chissent \u00e0 la mani\u00e8re de faire \u00e9voluer leur architecture s\u00e9curit\u00e9","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/teletravail-comment-assurer-la-securite-des-equipements-connectes-part-2\/","og_locale":"fr_FR","og_type":"article","og_title":"T\u00e9l\u00e9travail : comment s\u00e9curiser les \u00e9quipements connect\u00e9s ? part 2","og_description":"Apr\u00e8s l\u2019urgence du d\u00e9ploiement du t\u00e9l\u00e9travail, les organisations r\u00e9fl\u00e9chissent \u00e0 la mani\u00e8re de faire \u00e9voluer leur architecture s\u00e9curit\u00e9","og_url":"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/teletravail-comment-assurer-la-securite-des-equipements-connectes-part-2\/","og_site_name":"TheGreenBow","article_modified_time":"2023-01-13T14:56:15+00:00","og_image":[{"width":768,"height":628,"url":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/06\/iOS.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@thegreenbow","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/teletravail-comment-assurer-la-securite-des-equipements-connectes-part-2\/","url":"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/teletravail-comment-assurer-la-securite-des-equipements-connectes-part-2\/","name":"T\u00e9l\u00e9travail : comment s\u00e9curiser les \u00e9quipements connect\u00e9s ? part 2","isPartOf":{"@id":"https:\/\/www.thegreenbow.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/teletravail-comment-assurer-la-securite-des-equipements-connectes-part-2\/#primaryimage"},"image":{"@id":"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/teletravail-comment-assurer-la-securite-des-equipements-connectes-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/06\/iOS.png","datePublished":"2021-10-21T14:54:00+00:00","dateModified":"2023-01-13T14:56:15+00:00","description":"Apr\u00e8s l\u2019urgence du d\u00e9ploiement du t\u00e9l\u00e9travail, les organisations r\u00e9fl\u00e9chissent \u00e0 la mani\u00e8re de faire \u00e9voluer leur architecture s\u00e9curit\u00e9","breadcrumb":{"@id":"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/teletravail-comment-assurer-la-securite-des-equipements-connectes-part-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/teletravail-comment-assurer-la-securite-des-equipements-connectes-part-2\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/teletravail-comment-assurer-la-securite-des-equipements-connectes-part-2\/#primaryimage","url":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/06\/iOS.png","contentUrl":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/06\/iOS.png","width":768,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/teletravail-comment-assurer-la-securite-des-equipements-connectes-part-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.thegreenbow.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.thegreenbow.com\/fr\/ressources\/blog\/"},{"@type":"ListItem","position":3,"name":"T\u00e9l\u00e9travail : comment assurer la s\u00e9curit\u00e9 des \u00e9quipements connect\u00e9s (part 2)"}]},{"@type":"WebSite","@id":"https:\/\/www.thegreenbow.com\/fr\/#website","url":"https:\/\/www.thegreenbow.com\/fr\/","name":"TheGreenBow","description":"","publisher":{"@id":"https:\/\/www.thegreenbow.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.thegreenbow.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.thegreenbow.com\/fr\/#organization","name":"TheGreenBow","url":"https:\/\/www.thegreenbow.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.thegreenbow.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/04\/Logotype@2x-min.png","contentUrl":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/04\/Logotype@2x-min.png","width":422,"height":84,"caption":"TheGreenBow"},"image":{"@id":"https:\/\/www.thegreenbow.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/thegreenbow","https:\/\/fr.linkedin.com\/company\/thegreenbow","https:\/\/www.youtube.com\/channel\/UCZKtI7_fmgFcmovgGSy8AnQ"]}]}},"_links":{"self":[{"href":"https:\/\/www.thegreenbow.com\/fr\/wp-json\/wp\/v2\/resource\/11224","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.thegreenbow.com\/fr\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/www.thegreenbow.com\/fr\/wp-json\/wp\/v2\/types\/resource"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thegreenbow.com\/fr\/wp-json\/wp\/v2\/media\/9174"}],"wp:attachment":[{"href":"https:\/\/www.thegreenbow.com\/fr\/wp-json\/wp\/v2\/media?parent=11224"}],"wp:term":[{"taxonomy":"resource_category","embeddable":true,"href":"https:\/\/www.thegreenbow.com\/fr\/wp-json\/wp\/v2\/resource_category?post=11224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}