﻿{"id":1761,"date":"2022-08-18T06:56:31","date_gmt":"2022-08-18T11:56:31","guid":{"rendered":"https:\/\/www.uqac.ca\/cybersecurite\/?page_id=1761"},"modified":"2023-10-11T10:11:01","modified_gmt":"2023-10-11T15:11:01","slug":"eviter-la-pandemie-numerique","status":"publish","type":"page","link":"https:\/\/www.uqac.ca\/cybersecurite\/eviter-la-pandemie-numerique\/","title":{"rendered":"La cybers\u00e9curit\u00e9 en t\u00e9l\u00e9travail"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2023\/10\/Capture-3.png\" alt=\"\" class=\"wp-image-2842\" style=\"width:170px;height:188px\" width=\"170\" height=\"188\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>L&rsquo;opportunit\u00e9 de faire du t\u00e9l\u00e9travail ne doit pas avoir pour cons\u00e9quence des risques \u00e0 la s\u00e9curit\u00e9 de l&rsquo;information.  <a href=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2019\/10\/Semaine-5-Meilleures-pratiques-1.pdf\">Les bonne pratiques<\/a>, d\u00e9j\u00e0 connues, doivent \u00eatre bonifi\u00e9es en fonction de notre environnement num\u00e9rique \u00e0 domicile.  <br>Voici quelques conseils:<\/td><\/tr><tr><td><img decoding=\"async\" class=\"wp-image-2855\" style=\"width: NaNpx;\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2023\/10\/securite-teletravail-v1.1-20230118.pdf\" alt=\"\"><a href=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2023\/10\/securite-teletravail-v1.1-20230118.pdf\">S\u00e9curit\u00e9 en t\u00e9l\u00e9travail<\/a> du centre d&rsquo;expertise en s\u00e9curit\u00e9 de l&rsquo;information <\/td><\/tr><tr><td>Centre canadien pour la cybers\u00e9curit\u00e9 &#8211; <a href=\"https:\/\/cyber.gc.ca\/fr\/orientation\/assurer-sa-securite-en-ligne-pendant-la-pandemie-de-la-covid-19\">Assurer sa s\u00e9curit\u00e9 en ligne en t\u00e9l\u00e9travail<\/a><\/td><\/tr><tr><td>Centre canadien pour la cybers\u00e9curit\u00e9 \u2013 En raison de l\u2019accroissement de l\u2019utilisation du num\u00e9rique voici des <a href=\"https:\/\/cyber.gc.ca\/fr\/orientation\/conseils-de-cybersecurite-pour-le-teletravail-itsap10116\">Conseils   de s\u00e9curit\u00e9 pour le t\u00e9l\u00e9travail<\/a>   <\/td><\/tr><tr><td><\/td><\/tr><tr><td>IN-SEC-M &#8211; <a href=\"https:\/\/insecm.ca\/teletravail\/\">Guide pratique pour une saine hygi\u00e8ne num\u00e9rique<\/a><br><\/td><\/tr><tr><td>Terranova &#8211; <a href=\"https:\/\/terranovasecurity.com\/fr\/trousse-cybersecurite-teletravail\/\">Obtenez votre trousse de cybers\u00e9curit\u00e9 pour le t\u00e9l\u00e9travail&nbsp;<\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>L&rsquo;opportunit\u00e9 de faire du t\u00e9l\u00e9travail ne doit pas avoir pour cons\u00e9quence des risques \u00e0 la s\u00e9curit\u00e9 de l&rsquo;information. Les bonne pratiques, d\u00e9j\u00e0 connues, doivent \u00eatre bonifi\u00e9es en fonction de notre environnement num\u00e9rique \u00e0 domicile. Voici quelques conseils: S\u00e9curit\u00e9 en t\u00e9l\u00e9travail du centre d&rsquo;expertise en s\u00e9curit\u00e9 de l&rsquo;information Centre canadien pour la cybers\u00e9curit\u00e9 &#8211; Assurer sa [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":1467,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1761","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/pages\/1761","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/comments?post=1761"}],"version-history":[{"count":11,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/pages\/1761\/revisions"}],"predecessor-version":[{"id":2856,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/pages\/1761\/revisions\/2856"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media\/1467"}],"wp:attachment":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media?parent=1761"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}