{"id":82042,"date":"2020-08-10T19:42:13","date_gmt":"2020-08-10T23:42:13","guid":{"rendered":"https:\/\/digitalmainstreet.ca\/?p=82042"},"modified":"2020-08-10T19:58:03","modified_gmt":"2020-08-10T23:58:03","slug":"your-security-checklist-to-help-protect-your-employees-working-from-home","status":"publish","type":"post","link":"https:\/\/digitalmainstreet.ca\/fr\/your-security-checklist-to-help-protect-your-employees-working-from-home\/","title":{"rendered":"Your security checklist to help protect your employees working from home"},"content":{"rendered":"<blockquote>\n<p class=\"x-hidden-focus\">Cyberthreats represent a clear and present threat to Canadian organizations of all sizes, in both the private and public sector.<\/p>\n<\/blockquote>\n<p>&nbsp;<\/p>\n<h2>Security risks on the rise<\/h2>\n<p>Unfortunately, cybercriminals prey on fear and uncertainty; during times like these, hackers run scams and commit fraud like, but not limited to, email attacks, fake websites, and text scams. Remember, hackers don\u2019t discriminate or care who they attack.<\/p>\n<p>&nbsp;<\/p>\n<blockquote>\n<p>Criminals search for organizations relying on outdated or unsecure IT to work remotely. Make sure you take steps to protect yourself!<\/p>\n<\/blockquote>\n<p>&nbsp;<\/p>\n<p>If anything, unsuspecting small businesses represent an ideal target for cybercriminals. They count on these businesses to skimp or to implement sporadic and inconsistent cybersecurity measures. And yes, during a crisis, those same criminals capitalize on fear and uncertainty to target employees, especially those unaccustomed to working remotely.<\/p>\n<blockquote>\n<p>&nbsp;<\/p>\n<p>In their national\u00a0<a href=\"https:\/\/www.priv.gc.ca\/en\/opc-actions-and-decisions\/research\/explore-privacy-research\/2016\/por_2016_12\/#toc1\" target=\"_blank\" rel=\"noopener noreferrer\">survey<\/a>, the Office of the Privacy Commissioner found\u00a0<strong>92 percent<\/strong> of Canadians expressed some level of concern about the protection of their privacy!<\/p>\n<\/blockquote>\n<h2>Privacy matters<\/h2>\n<p>Protecting your privacy\u2014and that of your customers and vendors\u2014is another important reason to improve your security. Canadians, as customers, clients, and citizens, expect the organizations they rely on\u2014big and small\u2014to go out of their way to protect any data they provide and their communication, including emails and video conference calls.<\/p>\n<p>&nbsp;<\/p>\n<blockquote>\n<p>When employees rely on different devices and apps to share files, send emails, or do video calls, your company\u2019s risk of a security and privacy breach climbs exponentially.<\/p>\n<\/blockquote>\n<h2>\u00a0<\/h2>\n<h2>The most secure strategy<\/h2>\n<p><strong>Adopt a layered security approach<\/strong>. Think of each security technology or practice as a layer of armour. The more layers you add, the fewer potential breaches and the lower the damage should a hacker breach your cyber defence. Don\u2019t rely on just one layer! One layer of cybersecurity, like an antivirus software, cannot protect your business working remotely. That app or utility is just one piece of the security puzzle you need.<\/p>\n<p>&nbsp;<\/p>\n<blockquote>\n<p>Knowledge is power. Visit the\u00a0<a href=\"https:\/\/www.antifraudcentre-centreantifraude.ca\/index-eng.htm\" target=\"_blank\" rel=\"noopener noreferrer\">Canadian Anti-Fraud Centre<\/a>\u00a0for more information about current fraud and identity attacks in your area.<\/p>\n<\/blockquote>\n<p>&nbsp;<\/p>\n<p>You may not need to adopt all the technologies or practices we talk about next, but we strongly recommend that you consider them. Think of how they can work together as a digital defence plan. Beyond file protection, your plan must also protect transactional information, databases, lists, and all other sensitive data,\u00a0<u>including your identities<\/u>.\u00a0<strong>Remember:<\/strong>\u00a0Identity theft can wreak havoc on thousands of lives.<\/p>\n<h2>Your security checklist<\/h2>\n<p><strong>From the simple to the more technically complex, here are some security layers to consider when devising your security strategy.<\/strong><\/p>\n<ul>\n<li><strong>Employee training -&gt;<\/strong>\u00a0Train every employee *<strong>not<\/strong>* to open attachments or to click links in unsolicited communication, even if the emails, texts, or calls seem to come from a recognized source, especially when they request information, personal, or otherwise.\u00a0<a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/intelligence\/phishing\" target=\"_blank\" rel=\"noopener noreferrer\">This Microsoft article<\/a>\u00a0offers descriptions of phishing threats and a list of the\u00a0<strong>telltale signs employees should look for<\/strong>, such as:\n<ul>\n<li>The communication you receive is unsolicited<\/li>\n<li>The sender does not mention you by name<\/li>\n<li>The communication requests information<\/li>\n<li>The sender asks you to install\/adjust\/enable software<\/li>\n<li>The sender\u2019s email address does not look accurate<\/li>\n<li>The sender\u2019s address does not match their name<\/li>\n<li>The link or URL does not point to the correct website<\/li>\n<li>The communication contains errors, like typos<\/li>\n<li>You can see multiple recipients received the email<\/li>\n<li>The communication or website doesn\u2019t look right<\/li>\n<li>The page that opens is an image, not a page<\/li>\n<\/ul>\n<\/li>\n<li><strong>Secure employee hub -&gt;<\/strong>\u00a0Ensure your employees communicate securely using Microsoft Teams, a collaboration hub. This one app reduces internal emails and keeps employees connected by enabling them to message, call, and host meetings. Keep your calls secure and private! Get links and guidance in this\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/blog\/2020\/03\/05\/our-commitment-to-customers-during-covid-19\/\" target=\"_blank\" rel=\"noopener noreferrer\">Teams blog post<\/a>.<\/li>\n<li><strong>Built-in security -&gt;\u00a0<\/strong>Rely on business-class solutions that feature built-in enterprise-grade security. Ensure all employees run always-up-to-date software, and\/or keep their applications and devices current by running the latest security updates. Windows users should enable\u00a0<a href=\"https:\/\/www.microsoft.com\/en-ca\/windows\/comprehensive-security\" target=\"_blank\" rel=\"noopener noreferrer\">Windows Defender Antivirus<\/a>.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<blockquote>\n<p>Microsoft Security Graph, which underpins Microsoft Security, enables rapid threat detection and response based on billions of daily emails and insights from intelligence, machine learning, and analytics.<\/p>\n<\/blockquote>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>Advanced threat protection -&gt;<\/strong>\u00a0Office subscribers can add advanced threat protection, which leverages the Microsoft Security Graph to provide industry-leading defenses. The most basic plan introduces features like safe attachments, safe links, anti-phishing policies, and real-time reports. See\u00a0<a href=\"https:\/\/products.office.com\/en-ca\/exchange\/advance-threat-protection#office-ProductsCompare-785zwzq\" target=\"_blank\" rel=\"noopener noreferrer\">Advanced Threat Protection plans<\/a>.<\/li>\n<li><strong>Multi-factor authentication -&gt;<\/strong>\u00a0Introducing a second form of authentication when employees sign-in is one of the most effective things you can do to protect your organization. Its familiarity from the consumer digital world makes it easy for employees to understand and accept.\u00a0<a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/admin\/security-and-compliance\/set-up-multi-factor-authentication?view=o365-worldwide\" target=\"_blank\" rel=\"noopener noreferrer\">Set up your multi-factor authentication (MFA) now<\/a>.<\/li>\n<li><strong>Device management capabilities -&gt;\u00a0<\/strong>Even with work laptops at home, employees still use personal devices to access company data. Put security measures in place to protect your network and control access. Office subscribers can\u00a0<a href=\"https:\/\/www.microsoft.com\/en-ca\/microsoft-365\/business#compareProductsRegion\" target=\"_blank\" rel=\"noopener noreferrer\">expand their Microsoft 365 subscription<\/a>\u00a0to include\u00a0<strong>device management<\/strong>\u00a0as well as a full suite of\u00a0<strong>advanced security features<\/strong>, including Advanced Threat Protection, app protection, and more:\n<ul>\n<li><strong>Advanced Threat Protection<\/strong>\u00a0\u2013 for phishing, malware, and zero-day threats<\/li>\n<li><strong>Selective Wipe<\/strong>\u00a0\u2013 to remotely wipe company data from lost or stolen devices<\/li>\n<li><strong>App protection for Office mobile apps<\/strong>\u00a0\u2013 to restrict copying\/saving of your info<\/li>\n<li><strong>Information Rights Management<\/strong>\u00a0\u2013 to control who has access to company info<\/li>\n<li><strong>Windows Defender Exploit Guard<\/strong>\u00a0\u2013 to provide pre-breach threat resistance<\/li>\n<li><strong>Exchange Online Archiving<\/strong>\u00a0\u2013 to enable a long-term business preservation policy<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Additionally, here are some smart security layers for mid-market and enterprises:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>Device management in Azure -&gt;<\/strong>\u00a0In Azure, you can combine Azure AD Conditional Access and Microsoft Intune application protection policies to manage and help secure data in approved apps and on personal devices.<\/li>\n<li><strong>Single sign-on -&gt;<\/strong>\u00a0Azure Single sign-on enables you to connect identities to all of your apps from anywhere, enforcing strong authentication to prevent compromise, and using Conditional Access and Identity Governance to ensure that only the right people have access to the right resources.<\/li>\n<li><strong>Visibility across your digital estate -&gt;<\/strong>\u00a0Azure Sentinel gives you the ability to identify security risks across your operations. With artificial intelligence built-in, Azure Sentinel makes threat detection, hunting, prevention, and response smarter, faster, and automated.<\/li>\n<li><strong>Secure access to your on-premises apps -&gt;\u00a0<\/strong>Most organizations run lots of business-critical apps that may not be accessible from outside the corporate network. Azure AD Application Proxy is a lightweight agent that enables access to your on-premises apps, without providing broad access to your network. Combine it with existing Azure AD authentication and Conditional Access policies to help keep users and data secured.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><u>Security checklist summary<\/u><\/h2>\n<ul>\n<li>Employee training to spot\u00a0<a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/intelligence\/phishing\" target=\"_blank\" rel=\"noopener noreferrer\">phishing<\/a>\u00a0and other cyber crimes<\/li>\n<li>Secure employee hub like Microsoft Teams<\/li>\n<li>Built-in security with\u00a0<a href=\"https:\/\/www.microsoft.com\/en-ca\/windows\/comprehensive-security\" target=\"_blank\" rel=\"noopener noreferrer\">Windows Defender Antivirus<\/a><\/li>\n<li>Advanced threat protection for Office subscribers<\/li>\n<li>Set up\u00a0<a href=\"https:\/\/docs.microsoft.com\/microsoft-365\/admin\/security-and-compliance\/set-up-multi-factor-authentication\" target=\"_blank\" rel=\"noopener noreferrer\">multi-factor authentication<\/a>\u00a0for everyone<\/li>\n<li>Device management capabilities with\u00a0<a href=\"https:\/\/www.microsoft.com\/en-ca\/microsoft-365\/business#compareProductsRegion\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft 365<\/a><\/li>\n<\/ul>\n<h4><u>Mid-market\/enterprise solutions:<\/u><\/h4>\n<ul>\n<li>Device management with Azure AD Conditional Access and Microsoft Intune<\/li>\n<li>Single sign-on with Azure using Conditional Access and Identity Governance<\/li>\n<li>Visibility across your digital estate with Azure Sentinel<\/li>\n<li>Secure access to your on-premises apps with Azure AD Application Proxy<\/li>\n<\/ul>\n<h3>Keep your business moving securely\u00a0series<\/h3>\n<ol>\n<li><a href=\"https:\/\/cloudblogs.microsoft.com\/industry-blog\/en-ca\/uncategorized\/2020\/06\/17\/how-to-work-remotely-for-everyone-who-needs-to-stay-productive-from-home\/\" data-cke-saved-href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fcloudblogs.microsoft.com%2Findustry-blog%2Fen-ca%2Funcategorized%2F2020%2F06%2F17%2Fhow-to-work-remotely-for-everyone-who-needs-to-stay-productive-from-home%2F&data=02%7C01%7Cv-laplac%40microsoft.com%7Cb35e07507b174d62a0ca08d829bb2621%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637305231092383418&sdata=zqJWxlrV1A9lsM7BJLFxTOwSccH4tRYVv2otA2IZxfc%3D&reserved=0\">How to work remotely, for everyone who needs to stay productive from home<\/a><\/li>\n<li><a href=\"https:\/\/cloudblogs.microsoft.com\/industry-blog\/en-ca\/uncategorized\/2020\/06\/30\/eight-remote-working-essentials-to-stay-productive\/\" data-cke-saved-href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fcloudblogs.microsoft.com%2Findustry-blog%2Fen-ca%2Funcategorized%2F2020%2F06%2F30%2Feight-remote-working-essentials-to-stay-productive%2F&data=02%7C01%7Cv-laplac%40microsoft.com%7Cb35e07507b174d62a0ca08d829bb2621%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637305231092393408&sdata=toKJlglyjl8bC05yqcjrxwlLjGwsh3FUfK8HT2eGD2c%3D&reserved=0\">Eight remote working essentials to stay productive<\/a><\/li>\n<li><a href=\"https:\/\/cloudblogs.microsoft.com\/industry-blog\/en-ca\/uncategorized\/2020\/06\/30\/your-security-checklist-to-help-protect-your-employees-working-from-home\/\" data-cke-saved-href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fcloudblogs.microsoft.com%2Findustry-blog%2Fen-ca%2Funcategorized%2F2020%2F06%2F30%2Fyour-security-checklist-to-help-protect-your-employees-working-from-home%2F&data=02%7C01%7Cv-laplac%40microsoft.com%7Cb35e07507b174d62a0ca08d829bb2621%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637305231092393408&sdata=9YPVD3oIYWXD4KJRK0m9cG%2BgEsEu%2BEeyPGUUG1PCzdU%3D&reserved=0\">Your security checklist to help protect your employees working from home<\/a><\/li>\n<li class=\"x-hidden-focus\"><a href=\"https:\/\/cloudblogs.microsoft.com\/industry-blog\/en-ca\/uncategorized\/2020\/06\/30\/empowering-canadian-healthcare-teams-with-new-remote-working-tools\/\" data-cke-saved-href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fcloudblogs.microsoft.com%2Findustry-blog%2Fen-ca%2Funcategorized%2F2020%2F06%2F30%2Fempowering-canadian-healthcare-teams-with-new-remote-working-tools%2F&data=02%7C01%7Cv-laplac%40microsoft.com%7Cb35e07507b174d62a0ca08d829bb2621%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637305231092403412&sdata=Ox6ftnkf8PHOoHuKhPQoO0iCKW6LiyK9k2zSmkQTzUQ%3D&reserved=0\">Empowering Canadian healthcare teams with new remote working tools<\/a><\/li>\n<li><a href=\"https:\/\/cloudblogs.microsoft.com\/industry-blog\/en-ca\/uncategorized\/2020\/06\/30\/secure-remote-working-solutions-for-government-agencies\/\" data-cke-saved-href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fcloudblogs.microsoft.com%2Findustry-blog%2Fen-ca%2Funcategorized%2F2020%2F06%2F30%2Fsecure-remote-working-solutions-for-government-agencies%2F&data=02%7C01%7Cv-laplac%40microsoft.com%7Cb35e07507b174d62a0ca08d829bb2621%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637305231092403412&sdata=yYiTpDa40a%2BF%2Fuc6ArPfGRHIVkDBc3jJWDZ0DaRHEos%3D&reserved=0\">Secure remote working solutions for government agencies<\/a><\/li>\n<li><a href=\"https:\/\/cloudblogs.microsoft.com\/industry-blog\/en-ca\/uncategorized\/2020\/06\/30\/secure-remote-working-for-human-resources-teams\/\" data-cke-saved-href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fcloudblogs.microsoft.com%2Findustry-blog%2Fen-ca%2Funcategorized%2F2020%2F06%2F30%2Fsecure-remote-working-for-human-resources-teams%2F&data=02%7C01%7Cv-laplac%40microsoft.com%7Cb35e07507b174d62a0ca08d829bb2621%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637305231092413402&sdata=GzKKCReOIBl2bJMjPAqiXcKdedh%2FRT3tPoMK3Ay3hXY%3D&reserved=0\">Secure remote working for human resources teams<\/a><\/li>\n<\/ol>","protected":false},"excerpt":{"rendered":"<p>Cyberthreats represent a clear and present threat to Canadian organizations of all sizes, in both the private and public sector. &nbsp; Security risks on the rise Unfortunately, cybercriminals prey on fear and uncertainty; during times like these, hackers run scams and commit fraud like, but not limited to, email attacks, fake websites, and text scams. [&hellip;]<\/p>\n","protected":false},"author":1656,"featured_media":82043,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-82042","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Your security checklist to help protect your employees working from home - Digital Main Street<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/digitalmainstreet.ca\/fr\/your-security-checklist-to-help-protect-your-employees-working-from-home\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Your security checklist to help protect your employees working from home\" \/>\n<meta property=\"og:description\" content=\"Cyberthreats represent a clear and present threat to Canadian organizations of all sizes, in both the private and public sector. &nbsp; Security risks on the rise Unfortunately, cybercriminals prey on fear and uncertainty; during times like these, hackers run scams and commit fraud like, but not limited to, email attacks, fake websites, and text scams. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/digitalmainstreet.ca\/fr\/your-security-checklist-to-help-protect-your-employees-working-from-home\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Main Street\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalMainStreet\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-10T23:42:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-10T23:58:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/digitalmainstreet.ca\/wp-content\/uploads\/2020\/08\/Win18a_HPSpectreX2_PowerPoint_0077.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Microsoft\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@digital_mainst\" \/>\n<meta name=\"twitter:site\" content=\"@digital_mainst\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimation du temps de lecture\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/digitalmainstreet.ca\\\/fr\\\/your-security-checklist-to-help-protect-your-employees-working-from-home\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digitalmainstreet.ca\\\/fr\\\/your-security-checklist-to-help-protect-your-employees-working-from-home\\\/\"},\"author\":{\"name\":\"Microsoft\",\"@id\":\"https:\\\/\\\/digitalmainstreet.ca\\\/#\\\/schema\\\/person\\\/d1e244e2525266e816560c9ab17b4ea7\"},\"headline\":\"Your security checklist to help protect your employees working from home\",\"datePublished\":\"2020-08-10T23:42:13+00:00\",\"dateModified\":\"2020-08-10T23:58:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/digitalmainstreet.ca\\\/fr\\\/your-security-checklist-to-help-protect-your-employees-working-from-home\\\/\"},\"wordCount\":1270,\"publisher\":{\"@id\":\"https:\\\/\\\/digitalmainstreet.ca\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/digitalmainstreet.ca\\\/fr\\\/your-security-checklist-to-help-protect-your-employees-working-from-home\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digitalmainstreet.ca\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Win18a_HPSpectreX2_PowerPoint_0077.jpg\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"fr-CA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/digitalmainstreet.ca\\\/fr\\\/your-security-checklist-to-help-protect-your-employees-working-from-home\\\/\",\"url\":\"https:\\\/\\\/digitalmainstreet.ca\\\/fr\\\/your-security-checklist-to-help-protect-your-employees-working-from-home\\\/\",\"name\":\"Your security checklist to help protect your employees working from home - Digital Main Street\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digitalmainstreet.ca\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/digitalmainstreet.ca\\\/fr\\\/your-security-checklist-to-help-protect-your-employees-working-from-home\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/digitalmainstreet.ca\\\/fr\\\/your-security-checklist-to-help-protect-your-employees-working-from-home\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digitalmainstreet.ca\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Win18a_HPSpectreX2_PowerPoint_0077.jpg\",\"datePublished\":\"2020-08-10T23:42:13+00:00\",\"dateModified\":\"2020-08-10T23:58:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/digitalmainstreet.ca\\\/fr\\\/your-security-checklist-to-help-protect-your-employees-working-from-home\\\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/digitalmainstreet.ca\\\/fr\\\/your-security-checklist-to-help-protect-your-employees-working-from-home\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/digitalmainstreet.ca\\\/fr\\\/your-security-checklist-to-help-protect-your-employees-working-from-home\\\/#primaryimage\",\"url\":\"https:\\\/\\\/digitalmainstreet.ca\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Win18a_HPSpectreX2_PowerPoint_0077.jpg\",\"contentUrl\":\"https:\\\/\\\/digitalmainstreet.ca\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Win18a_HPSpectreX2_PowerPoint_0077.jpg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/digitalmainstreet.ca\\\/fr\\\/your-security-checklist-to-help-protect-your-employees-working-from-home\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/digitalmainstreet.ca\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Your security checklist to help protect your employees working from home\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/digitalmainstreet.ca\\\/#website\",\"url\":\"https:\\\/\\\/digitalmainstreet.ca\\\/\",\"name\":\"Digital Main Street\",\"description\":\"Digital Main Street\",\"publisher\":{\"@id\":\"https:\\\/\\\/digitalmainstreet.ca\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/digitalmainstreet.ca\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/digitalmainstreet.ca\\\/#organization\",\"name\":\"Digital Main Street\",\"url\":\"https:\\\/\\\/digitalmainstreet.ca\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/digitalmainstreet.ca\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/digitalmainstreet.ca\\\/wp-content\\\/uploads\\\/2017\\\/04\\\/dms_logo_colour_boxed-e1492625281888.jpg\",\"contentUrl\":\"https:\\\/\\\/digitalmainstreet.ca\\\/wp-content\\\/uploads\\\/2017\\\/04\\\/dms_logo_colour_boxed-e1492625281888.jpg\",\"width\":533,\"height\":533,\"caption\":\"Digital Main Street\"},\"image\":{\"@id\":\"https:\\\/\\\/digitalmainstreet.ca\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalMainStreet\\\/\",\"https:\\\/\\\/x.com\\\/digital_mainst\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/digitalmainstreet.ca\\\/#\\\/schema\\\/person\\\/d1e244e2525266e816560c9ab17b4ea7\",\"name\":\"Microsoft\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/digitalmainstreet.ca\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/Microsoft-Logo1-150x150.jpg\",\"url\":\"https:\\\/\\\/digitalmainstreet.ca\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/Microsoft-Logo1-150x150.jpg\",\"contentUrl\":\"https:\\\/\\\/digitalmainstreet.ca\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/Microsoft-Logo1-150x150.jpg\",\"caption\":\"Microsoft\"},\"url\":\"https:\\\/\\\/digitalmainstreet.ca\\\/fr\\\/author\\\/microsoft\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Your security checklist to help protect your employees working from home - Digital Main Street","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/digitalmainstreet.ca\/fr\/your-security-checklist-to-help-protect-your-employees-working-from-home\/","og_locale":"fr_CA","og_type":"article","og_title":"Your security checklist to help protect your employees working from home","og_description":"Cyberthreats represent a clear and present threat to Canadian organizations of all sizes, in both the private and public sector. &nbsp; Security risks on the rise Unfortunately, cybercriminals prey on fear and uncertainty; during times like these, hackers run scams and commit fraud like, but not limited to, email attacks, fake websites, and text scams. [&hellip;]","og_url":"https:\/\/digitalmainstreet.ca\/fr\/your-security-checklist-to-help-protect-your-employees-working-from-home\/","og_site_name":"Digital Main Street","article_publisher":"https:\/\/www.facebook.com\/DigitalMainStreet\/","article_published_time":"2020-08-10T23:42:13+00:00","article_modified_time":"2020-08-10T23:58:03+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/digitalmainstreet.ca\/wp-content\/uploads\/2020\/08\/Win18a_HPSpectreX2_PowerPoint_0077.jpg","type":"image\/jpeg"}],"author":"Microsoft","twitter_card":"summary_large_image","twitter_creator":"@digital_mainst","twitter_site":"@digital_mainst","twitter_misc":{"\u00c9crit par":"Microsoft","Estimation du temps de lecture":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/digitalmainstreet.ca\/fr\/your-security-checklist-to-help-protect-your-employees-working-from-home\/#article","isPartOf":{"@id":"https:\/\/digitalmainstreet.ca\/fr\/your-security-checklist-to-help-protect-your-employees-working-from-home\/"},"author":{"name":"Microsoft","@id":"https:\/\/digitalmainstreet.ca\/#\/schema\/person\/d1e244e2525266e816560c9ab17b4ea7"},"headline":"Your security checklist to help protect your employees working from home","datePublished":"2020-08-10T23:42:13+00:00","dateModified":"2020-08-10T23:58:03+00:00","mainEntityOfPage":{"@id":"https:\/\/digitalmainstreet.ca\/fr\/your-security-checklist-to-help-protect-your-employees-working-from-home\/"},"wordCount":1270,"publisher":{"@id":"https:\/\/digitalmainstreet.ca\/#organization"},"image":{"@id":"https:\/\/digitalmainstreet.ca\/fr\/your-security-checklist-to-help-protect-your-employees-working-from-home\/#primaryimage"},"thumbnailUrl":"https:\/\/digitalmainstreet.ca\/wp-content\/uploads\/2020\/08\/Win18a_HPSpectreX2_PowerPoint_0077.jpg","articleSection":["Uncategorized"],"inLanguage":"fr-CA"},{"@type":"WebPage","@id":"https:\/\/digitalmainstreet.ca\/fr\/your-security-checklist-to-help-protect-your-employees-working-from-home\/","url":"https:\/\/digitalmainstreet.ca\/fr\/your-security-checklist-to-help-protect-your-employees-working-from-home\/","name":"Your security checklist to help protect your employees working from home - Digital Main Street","isPartOf":{"@id":"https:\/\/digitalmainstreet.ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/digitalmainstreet.ca\/fr\/your-security-checklist-to-help-protect-your-employees-working-from-home\/#primaryimage"},"image":{"@id":"https:\/\/digitalmainstreet.ca\/fr\/your-security-checklist-to-help-protect-your-employees-working-from-home\/#primaryimage"},"thumbnailUrl":"https:\/\/digitalmainstreet.ca\/wp-content\/uploads\/2020\/08\/Win18a_HPSpectreX2_PowerPoint_0077.jpg","datePublished":"2020-08-10T23:42:13+00:00","dateModified":"2020-08-10T23:58:03+00:00","breadcrumb":{"@id":"https:\/\/digitalmainstreet.ca\/fr\/your-security-checklist-to-help-protect-your-employees-working-from-home\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/digitalmainstreet.ca\/fr\/your-security-checklist-to-help-protect-your-employees-working-from-home\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/digitalmainstreet.ca\/fr\/your-security-checklist-to-help-protect-your-employees-working-from-home\/#primaryimage","url":"https:\/\/digitalmainstreet.ca\/wp-content\/uploads\/2020\/08\/Win18a_HPSpectreX2_PowerPoint_0077.jpg","contentUrl":"https:\/\/digitalmainstreet.ca\/wp-content\/uploads\/2020\/08\/Win18a_HPSpectreX2_PowerPoint_0077.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/digitalmainstreet.ca\/fr\/your-security-checklist-to-help-protect-your-employees-working-from-home\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/digitalmainstreet.ca\/"},{"@type":"ListItem","position":2,"name":"Your security checklist to help protect your employees working from home"}]},{"@type":"WebSite","@id":"https:\/\/digitalmainstreet.ca\/#website","url":"https:\/\/digitalmainstreet.ca\/","name":"Digital Main Street","description":"Digital Main Street","publisher":{"@id":"https:\/\/digitalmainstreet.ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/digitalmainstreet.ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/digitalmainstreet.ca\/#organization","name":"Digital Main Street","url":"https:\/\/digitalmainstreet.ca\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/digitalmainstreet.ca\/#\/schema\/logo\/image\/","url":"https:\/\/digitalmainstreet.ca\/wp-content\/uploads\/2017\/04\/dms_logo_colour_boxed-e1492625281888.jpg","contentUrl":"https:\/\/digitalmainstreet.ca\/wp-content\/uploads\/2017\/04\/dms_logo_colour_boxed-e1492625281888.jpg","width":533,"height":533,"caption":"Digital Main Street"},"image":{"@id":"https:\/\/digitalmainstreet.ca\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalMainStreet\/","https:\/\/x.com\/digital_mainst"]},{"@type":"Person","@id":"https:\/\/digitalmainstreet.ca\/#\/schema\/person\/d1e244e2525266e816560c9ab17b4ea7","name":"Microsoft","image":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/digitalmainstreet.ca\/wp-content\/uploads\/2017\/10\/Microsoft-Logo1-150x150.jpg","url":"https:\/\/digitalmainstreet.ca\/wp-content\/uploads\/2017\/10\/Microsoft-Logo1-150x150.jpg","contentUrl":"https:\/\/digitalmainstreet.ca\/wp-content\/uploads\/2017\/10\/Microsoft-Logo1-150x150.jpg","caption":"Microsoft"},"url":"https:\/\/digitalmainstreet.ca\/fr\/author\/microsoft\/"}]}},"_links":{"self":[{"href":"https:\/\/digitalmainstreet.ca\/fr\/wp-json\/wp\/v2\/posts\/82042","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digitalmainstreet.ca\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/digitalmainstreet.ca\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/digitalmainstreet.ca\/fr\/wp-json\/wp\/v2\/users\/1656"}],"replies":[{"embeddable":true,"href":"https:\/\/digitalmainstreet.ca\/fr\/wp-json\/wp\/v2\/comments?post=82042"}],"version-history":[{"count":0,"href":"https:\/\/digitalmainstreet.ca\/fr\/wp-json\/wp\/v2\/posts\/82042\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/digitalmainstreet.ca\/fr\/wp-json\/wp\/v2\/media\/82043"}],"wp:attachment":[{"href":"https:\/\/digitalmainstreet.ca\/fr\/wp-json\/wp\/v2\/media?parent=82042"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/digitalmainstreet.ca\/fr\/wp-json\/wp\/v2\/categories?post=82042"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/digitalmainstreet.ca\/fr\/wp-json\/wp\/v2\/tags?post=82042"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}