{"id":8450,"date":"2021-10-28T21:38:51","date_gmt":"2021-10-28T20:38:51","guid":{"rendered":"https:\/\/nboldapp.com\/?p=8450"},"modified":"2022-03-30T10:00:54","modified_gmt":"2022-03-30T09:00:54","slug":"security-risks-of-working-remotely","status":"publish","type":"post","link":"https:\/\/nboldapp.com\/fr\/security-risks-of-working-remotely\/","title":{"rendered":"Risques de s\u00e9curit\u00e9 li\u00e9s au travail \u00e0 distance"},"content":{"rendered":"<p>Twenty years ago, it would have been a good joke between colleagues to suggest working from home over working from offices. They would have assumed that <a href=\"https:\/\/nboldapp.com\/fr\/make-remote-work-more-efficient-with-microsoft-teams\/\" target=\"_blank\" rel=\"noreferrer noopener\">remote working<\/a> is an informal easy job that you can do while still in pajamas. They&#8217;d picture having the last piece of pancake in one hand and holding the telephone in the other. <\/p>\n\n\n\n<p>The reality, however, is different because working remotely is as hard and tiring as working from offices. Even though you can actually work in pajamas if you wish you still have to attend meetings, deliver reports, and do everything you were doing while being in your office.<\/p>\n\n\n\n<p>Tech revolution and software industry together introduced new tools that have changed the business concepts we used to know in the past. In 2020 the COVID-19 pandemic changed the face of the business world in a blink of an eye. It pushed everyone into cyberspace and forced the notion of working remotely as a perfect solution to overcome the international lockdowns. Of course, working from home started before the pandemic but it became mandatory for most industries during the last two years. Just like the other modes of work, remote also has its challenges, one of the big ones being security risks<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\" id=\"h-the-pros-and-cons-of-working-remotely\">The pros and cons of working remotely<\/h2>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Working from home is a new trend, and with new trends, there are always drawbacks. Business owners, managers, and employees can all<a href=\"https:\/\/nboldapp.com\/fr\/remote-working-pros-and-cons\/\" target=\"_blank\" rel=\"noreferrer noopener\"> benefit from remote working<\/a>. Nevertheless, there are lots of risks, and challenges that will have you think twice before considering to shift remotely. At least it will have you consider the right steps to take, not just make the decision and start.<\/p>\n\n\n\n<p>Remote working reduces costs (e.g., transportation), and it encourages hiring employees overseas which adds lots of diversity. The effect on nature is also important to mention. With less paperwork, less transportation, and fewer crowds on the metro stations every morning and afternoon.<\/p>\n\n\n\n<p>All the above will sound good to hear but what about the risks that accompany working from home? Are these risks so serious that you have to think about them? This is what we\u2019ll be discussing in our article today. We will focus on the risks we don\u2019t mean to discourage you from moving your business into the remote environment. We want you to do that with firm steps and good support to keep your business running with no issues.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\" id=\"h-the-biggest-security-risks-of-working-from-home\">The biggest security risks of working from home<\/h2>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/10\/Untitled-design-3.png\" alt=\"\" class=\"wp-image-8458\" width=\"768\" height=\"576\" srcset=\"https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/10\/Untitled-design-3.png 1024w, https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/10\/Untitled-design-3-300x225.png 300w, https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/10\/Untitled-design-3-768x576.png 768w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/figure>\n\n\n\n<p>Allowing employees to work remotely while maintaining their normal business routine means that they need to access the company\u2019s files and sensitive information using their own internet connection and devices. This raises the question about the reliability and efficiency of this process. How will it affect the privacy of business information?<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-work-vs-home-laptops-and-computers\">Work vs. home laptops and computers<\/h3>\n\n\n\n<p>Asking remote employees to use their devices while working from home raises two important questions.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-will-your-company-s-data-be-secure-while-stored-on-a-personal-device\">Will your company\u2019s data be secure while stored on a personal device?<\/h4>\n\n\n\n<p>Without enough training about security risks, you are putting your business in danger. Keep in mind that personal devices are always easier to access than work ones. This doesn\u2019t have to be by means of harm all the time. Someone could unintentionally cause damage to your information or mistakenly expose it to others. Sometimes clients won\u2019t accept the idea of having their sensitive information being stored in a personal device somewhere without enough supervision from the company itself.&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-will-their-device-technically-correspond-to-all-your-business-requirements\">Will their device technically correspond to all your business requirements?<\/h4>\n\n\n\n<p>Never underestimate the amount of headache and the cost of having employees working on older devices that do not technically fit for the job. This issue will cost you time and money trying to maintain the same level of performance as in the office while solving tech-related problems like dying CPUs and full RAMs, etc. resulting in unfinished tasks.<\/p>\n\n\n\n<p>Solving these issues requires taking some actions to avoid future trouble<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Educating employees about possible security risks and how to handle them.<\/li><li>Using a proper software solution to maintain the security of information and organize access privileges professionally.<\/li><li>Setting technical minimum requirements for personal employee\u2019s devices or providing work dedicated ones that are suitable for the job.<\/li><\/ul>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-unsafe-wi-fi-network-as-a-security-risk\">Unsafe Wi-Fi network as a security risk<\/h3>\n\n\n\n<p>Remote employees can control who has access to their home networks. However, this isn\u2019t the same when they are using public Wi-Fi to do their jobs. Sometimes remote workers use coffee shops or co-working spaces in as their offices. You might ignore the fact that someone might be sitting next to them and taking a look at their screens. <\/p>\n\n\n\n<p>However, you can\u2019t ignore the possibility of falling into a malicious attack from a cybercriminal. They can use a variety of tools to steal their data or monitor their screens. As a worst-case scenario, they can even get access to their business accounts by stealing their passwords and security information. <\/p>\n\n\n\n<p>Although this doesn\u2019t happen often, the chances still exist, and you need to think of precautions to maintain a high level of security.<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-other-security-risks-that-unsafe-networks-pose\">Other security risks that unsafe networks pose<\/h3>\n\n\n\n<p>Again, education is key when it comes to cyber security. You have to keep all your remote employees aware of what could go wrong and how they can protect their privacy. The rule of thumb here is to avoid sharing any sensitive or critical information while using a public network. And if it\u2019s urgent then better connect their devices to a hotspot of their own before they start sharing. You can also teach them:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>To only access networks with a WPA authentication, <\/li><li>Turn off the auto-connect feature on their devices, <\/li><li>Turn on the system\u2019s built-in firewall.<\/li><\/ul>\n\n\n\n<p>Using security software is also important. It adds an extra layer of protection and reduce the chances of being scammed. Like using a VPN whenever possible so they can send and receive data through an encrypted tunnel. It&#8217;s an advice that many security professionals give. You can also protect your data by applying multi-factor authentication to avoid suspicious logins and ensure only your employees are accessing your internal data. Did you know this is one of the main security features in Microsoft Teams? Check out this article to find out more about the level of security teams can bring to your remote environment<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-cyberattacks\">Cyberattacks<\/h3>\n\n\n\n<p>Protecting your company from cyberattacks might be a lot easier when you have all the employees in one place, and all the devices are being supervised and controlled by a specialist. IT teams can keep updating the security software and control the access to the network on a professional level. This isn&#8217;t the case in the remote working environment, and employees are often left on their own to face cyberattacks that can be specifically targeting your business or just fishing for weak prey.<\/p>\n\n\n\n<p>Tech vulnerabilities are the most common reasons behind cyberattacks and adopting the remote business model without preparing for them is like committing suicide \u2018from a business prescriptive\u2019. Security can be guaranteed if the right processes were applied and the right software was chosen to control the remote working infrastructure.&nbsp;<\/p>\n\n\n\n<p>Cloud-based systems like Microsoft Teams are strong against such kinds of attacks. It allows the company to embrace a level of security for remote workers and create a multi-layered access control. With Microsoft Teams, data is encrypted in transit and stored in Microsoft datacenters. Microsoft uses industry standard technologies such as TLS and SRTP to encrypt all data in transit between users&#8217; devices and Microsoft datacenters. This includes messages, files, meetings, and other content.<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-dealing-with-sensitive-data\">Dealing with sensitive data<\/h3>\n\n\n\n<p>When you allow remote working you will have to accept the fact that some of your employees will have to access the company\u2019s sensitive data from their homes for them to do their jobs. This triggers the alarm for the importance of having all the data organized, backed up, secured while being carefully shared with remote workers to guarantee that nothing could go wrong, or at least you can fix it up if it did.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\" id=\"h-how-to-minimize-the-security-risks\">How to minimize the security risks?&nbsp;<\/h2>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"676\" src=\"https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/10\/Untitled-design-2-1024x676.png\" alt=\"\" class=\"wp-image-8457\" srcset=\"https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/10\/Untitled-design-2-1024x676.png 1024w, https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/10\/Untitled-design-2-300x198.png 300w, https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/10\/Untitled-design-2-768x507.png 768w, https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/10\/Untitled-design-2-1536x1014.png 1536w, https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/10\/Untitled-design-2.png 1399w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Choosing the right software to support your endeavor in adopting a remote business model is the first step into securing your data and ensuring all the processes are well organized. Systems can provide the hub for connectivity, collaboration, and productivity that you need to keep the integration of your team as if they were working in the same office, and even better.<\/p>\n\n\n\n<p>Microsoft Teams provides the perfect solution for remote working environments. Its built-in tools and features allow you to focus on the company goals instead of wasting time worrying about technical stuff.&nbsp;<\/p>\n\n\n\n<p>All chatting, online conferencing and documentation sharing functions of this platform maintain a high level of privacy for all users. Using Teams, employees can chat, create, share, and edit documents in real-time all the while complying with all security guidelines.&nbsp;<\/p>\n\n\n\n<p>Here are some features and tools that Microsoft Teams offers that will help you manage security risks.&nbsp;<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-governance-policies\">Governance policies&nbsp;<\/h3>\n\n\n\n<p>Governance policies allow you to <a href=\"https:\/\/techbegins.com\/protect-yourself-when-using-social-media\/\" target=\"_blank\" rel=\"noreferrer noopener\">protect information<\/a> shared within the organization. It helps you control what users can and can\u2019t do within Microsoft Teams. For example, what they can do via the platform, who can create teams, what kind of information and data they can share, etc. The last one is a particularly important one. Through a proper governance policy, you can administer the flow and the dissemination of the data stored in Microsoft Teams. Learn more about governance policies <a href=\"https:\/\/nboldapp.com\/fr\/microsoft-teams-governance-best-practices\/\" target=\"_blank\" rel=\"noreferrer noopener\">ici<\/a>.<\/p>\n\n\n\n<div style=\"height:26px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-sensitivity-labels\">\u00c9tiquettes de sensibilit\u00e9&nbsp;<\/h3>\n\n\n\n<p>In this day and age when essentially every company deals with an overwhelming amount of documents, it\u2019s very easy to mistakenly share a confidential one. To avoid such mistakes with big consequences, Microsoft Teams offers you to use sensitivity labels. Sensitivity labels are a means to classify your organization\u2019s data in a way that shows how sensitive the data is. It is an amazing feature which ensures that the data you manage is classified according to its sensitivity, so it\u2019s not misused. Learn more about what sensitivity labels do and how you can use them <a href=\"https:\/\/nboldapp.com\/fr\/etiquettes-de-sensibilite\/\" target=\"_blank\" rel=\"noreferrer noopener\">ici<\/a>.&nbsp;<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-activity-alerts\">Activity alerts&nbsp;<\/h3>\n\n\n\n<p>Another one of our favorite features in Microsoft\u2019s \u201csecurity kit\u201d is the <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoftteams\/audit-log-events\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft 365 Audit Log<\/a>. Using the Audit Log, you can create activity alerts for things like external sharing, uploading\/downloading files, granting permissions, and other potentially security-related risky activities.&nbsp;<\/p>\n\n\n\n<p><em>Learn more about Microsoft Teams security best practices <a href=\"https:\/\/nboldapp.com\/fr\/microsoft-teams-security-best-practices\/\" target=\"_blank\" rel=\"noreferrer noopener\">ici<\/a>.<\/em><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Another way to ensure a higher level of security of your teams and the information they&#8217;re sharing is through   Collaboration Templates. The allow you to achieve operational excellence at scale while providing your workspace with advanced security settings. You can <a href=\"https:\/\/nboldapp.com\/fr\/how-to-restrict-users-from-creating-new-teams-in-microsoft-teams\/\" target=\"_blank\" rel=\"noreferrer noopener\">control the team creation<\/a> process, team <a href=\"https:\/\/nboldapp.com\/fr\/microsoft-teams-ownership-and-membership-explained\/\" target=\"_blank\" rel=\"noreferrer noopener\">ownership and membership<\/a>, <a href=\"https:\/\/nboldapp.com\/fr\/microsoft-teams-private-channels-details-challenges-and-governance-with-templates\/\" target=\"_blank\" rel=\"noreferrer noopener\">private channel<\/a> settings, sensitivity labels and more.<em> <\/em>It will not only save you time and energy but also provide you with additional tools to manage security risks. <\/p>\n\n\n\n<p><em><a href=\"https:\/\/nboldapp.com\/fr\/contact-our-team\/\" target=\"_blank\" rel=\"noreferrer noopener\">Contacter notre \u00e9quipe<\/a> to learn how to improve your collaboration efficiency.<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Twenty years ago, it would have been a good joke between colleagues to suggest working from home over working from offices. They would have assumed that remote working is an informal easy job that you can do while still in pajamas. They&#8217;d picture having the last piece of pancake in one hand and holding the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":8456,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[161],"tags":[97,21,621],"class_list":["post-8450","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-governance","tag-remote-work","tag-security","tag-security-risks"],"featured_image_src":"https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/10\/Untitled-design-1.png","author_info":{"display_name":"Alexandre Cipriani","author_link":"https:\/\/nboldapp.com\/fr\/author\/acipriani\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security Risks of Working Remotely - nBold<\/title>\n<meta name=\"description\" content=\"Working remotely poses security risks. Learn how to manage those risks using the right strategies and tools.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nboldapp.com\/fr\/security-risks-of-working-remotely\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Risks of Working Remotely\" \/>\n<meta property=\"og:description\" content=\"Working remotely poses security risks. Learn how to manage those risks using the right strategies and tools.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nboldapp.com\/fr\/security-risks-of-working-remotely\/\" \/>\n<meta property=\"og:site_name\" content=\"nBold\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-28T20:38:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-30T09:00:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/10\/Untitled-design-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1344\" \/>\n\t<meta property=\"og:image:height\" content=\"591\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alexandre Cipriani\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@nboldhq\" \/>\n<meta name=\"twitter:site\" content=\"@nboldhq\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alexandre Cipriani\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security Risks of Working Remotely - nBold","description":"Working remotely poses security risks. Learn how to manage those risks using the right strategies and tools.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nboldapp.com\/fr\/security-risks-of-working-remotely\/","og_locale":"fr_FR","og_type":"article","og_title":"Security Risks of Working Remotely","og_description":"Working remotely poses security risks. Learn how to manage those risks using the right strategies and tools.","og_url":"https:\/\/nboldapp.com\/fr\/security-risks-of-working-remotely\/","og_site_name":"nBold","article_published_time":"2021-10-28T20:38:51+00:00","article_modified_time":"2022-03-30T09:00:54+00:00","og_image":[{"width":1344,"height":591,"url":"https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/10\/Untitled-design-1.png","type":"image\/png"}],"author":"Alexandre Cipriani","twitter_card":"summary_large_image","twitter_creator":"@nboldhq","twitter_site":"@nboldhq","twitter_misc":{"\u00c9crit par":"Alexandre Cipriani","Dur\u00e9e de lecture estim\u00e9e":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nboldapp.com\/security-risks-of-working-remotely\/#article","isPartOf":{"@id":"https:\/\/nboldapp.com\/security-risks-of-working-remotely\/"},"author":{"name":"Alexandre Cipriani","@id":"https:\/\/nboldapp.com\/#\/schema\/person\/1a692fc52f6b8879fc00501f21c4109c"},"headline":"Security Risks of Working Remotely","datePublished":"2021-10-28T20:38:51+00:00","dateModified":"2022-03-30T09:00:54+00:00","mainEntityOfPage":{"@id":"https:\/\/nboldapp.com\/security-risks-of-working-remotely\/"},"wordCount":1841,"publisher":{"@id":"https:\/\/nboldapp.com\/#organization"},"image":{"@id":"https:\/\/nboldapp.com\/security-risks-of-working-remotely\/#primaryimage"},"thumbnailUrl":"https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/10\/Untitled-design-1.png","keywords":["remote work","security","security risks"],"articleSection":["Governance"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/nboldapp.com\/security-risks-of-working-remotely\/","url":"https:\/\/nboldapp.com\/security-risks-of-working-remotely\/","name":"Security Risks of Working Remotely - nBold","isPartOf":{"@id":"https:\/\/nboldapp.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nboldapp.com\/security-risks-of-working-remotely\/#primaryimage"},"image":{"@id":"https:\/\/nboldapp.com\/security-risks-of-working-remotely\/#primaryimage"},"thumbnailUrl":"https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/10\/Untitled-design-1.png","datePublished":"2021-10-28T20:38:51+00:00","dateModified":"2022-03-30T09:00:54+00:00","description":"Working remotely poses security risks. Learn how to manage those risks using the right strategies and tools.","breadcrumb":{"@id":"https:\/\/nboldapp.com\/security-risks-of-working-remotely\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nboldapp.com\/security-risks-of-working-remotely\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/nboldapp.com\/security-risks-of-working-remotely\/#primaryimage","url":"https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/10\/Untitled-design-1.png","contentUrl":"https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/10\/Untitled-design-1.png","width":1344,"height":591},{"@type":"BreadcrumbList","@id":"https:\/\/nboldapp.com\/security-risks-of-working-remotely\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nboldapp.com\/"},{"@type":"ListItem","position":2,"name":"Security Risks of Working Remotely"}]},{"@type":"WebSite","@id":"https:\/\/nboldapp.com\/#website","url":"https:\/\/nboldapp.com\/","name":"nBold","description":"The Collaboration Process Technology.","publisher":{"@id":"https:\/\/nboldapp.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nboldapp.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/nboldapp.com\/#organization","name":"nBold","url":"https:\/\/nboldapp.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/nboldapp.com\/#\/schema\/logo\/image\/","url":"https:\/\/nboldapp.com\/wp-content\/uploads\/2022\/02\/Logo.svg","contentUrl":"https:\/\/nboldapp.com\/wp-content\/uploads\/2022\/02\/Logo.svg","width":74,"height":21,"caption":"nBold"},"image":{"@id":"https:\/\/nboldapp.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/nboldhq","https:\/\/www.linkedin.com\/company\/nboldhq"]},{"@type":"Person","@id":"https:\/\/nboldapp.com\/#\/schema\/person\/1a692fc52f6b8879fc00501f21c4109c","name":"Alexandre Cipriani","url":"https:\/\/nboldapp.com\/fr\/author\/acipriani\/"}]}},"_links":{"self":[{"href":"https:\/\/nboldapp.com\/fr\/wp-json\/wp\/v2\/posts\/8450","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nboldapp.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nboldapp.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nboldapp.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nboldapp.com\/fr\/wp-json\/wp\/v2\/comments?post=8450"}],"version-history":[{"count":0,"href":"https:\/\/nboldapp.com\/fr\/wp-json\/wp\/v2\/posts\/8450\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nboldapp.com\/fr\/wp-json\/wp\/v2\/media\/8456"}],"wp:attachment":[{"href":"https:\/\/nboldapp.com\/fr\/wp-json\/wp\/v2\/media?parent=8450"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nboldapp.com\/fr\/wp-json\/wp\/v2\/categories?post=8450"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nboldapp.com\/fr\/wp-json\/wp\/v2\/tags?post=8450"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}