{"id":144,"date":"2022-08-29T19:43:59","date_gmt":"2022-08-29T17:43:59","guid":{"rendered":"http:\/\/the7.dream-demo.com\/business\/?p=144"},"modified":"2023-06-04T23:11:08","modified_gmt":"2023-06-04T21:11:08","slug":"comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore","status":"publish","type":"post","link":"https:\/\/digitalpwc.com\/en\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\/","title":{"rendered":"How to secure corporate devices - PC, Mac, Mobile, and more."},"content":{"rendered":"<div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>More and more companies are offering smartphones, tablets and laptops to enable their employees to work remotely. Make sure your employees use them securely so that your company's cyber security is not compromised.<\/p>\n<p>Working remotely can bring significant benefits to both employees and businesses. It allows flexibility that provides a better work-life balance and can also increase productivity :<\/p>\n<p>&nbsp;<\/p>\n<blockquote><p>\nThere is less stress in the office and at work. People feel empowered to work in a way that suits them and the company.\n<\/p><\/blockquote>\n<p>- Daryl Wilkinson, Digital Development Group Leader at the Nationwide Building Society<\/p>\n<p>However, with the use of corporate devices in different locations, the threat of hacking is increasing, as the University of Staffordshire found in 2014 when the data of 125,000 students was stolen from a laptop left in a car.<\/p>\n<p>So how do you secure corporate devices? Here are five ways.<\/p>\n<p>&nbsp;<\/p>\n<h2>1) Secure devices through 2-step authentication<\/h2>\n<p>Two-step authentication is an excellent way to increase the security of remote devices. This typically involves the user entering a password to access the device and then entering a PIN code. The additional layer of security creates millions of password variations, making access and data theft very difficult for hackers.<\/p>\n<p>&nbsp;<\/p>\n<h2>2) Storage in the Cloud<\/h2>\n<p>Rather than asking your employees to save all their sensitive files and documents on their devices, set up a server in the cloud where all files are stored. In this case, if a device is stolen, there will be no files saved on the hard drive to take. It also means that the data is backed up, so employees won't have to worry about redoing all their hard work.<\/p>\n<p>&nbsp;<\/p>\n<h2>3) Ban unknown USB flash drives<\/h2>\n<p>USB Flash Drives are known to be an easy way for hackers to spread malware to devices in order to take control of them. In fact, you may have read in the newspapers recently that IBM has decided to ban employees from using USB devices at work. Make sure that the only USB devices to be plugged in are the ones that have been distributed by the company. If workers are using personal USB ports, make sure that IT staff examine them first to make sure that no malware is hiding in the shadows.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2>4) Educate and set the rules<\/h2>\n<p>Before distributing devices for remote use, have a written set of policies that includes the above tips. Make your employees aware of the dangers that exist in the world outside the office and make sure they are aware that working remotely requires a certain level of responsibility on their part.<\/p>\n<p>&nbsp;<\/p>\n<h2>5) Monitor all remote devices<\/h2>\n<p>As employee computer monitoring software becomes more and more advanced, you can now monitor all devices remotely from your office. Software such as DigitalPWC can be installed on all desktop devices, no matter where they are used.<\/p>\n<p>You will be able to monitor files created and accessed, as well as connected USB ports, connected networks, and sent and received emails. There is a whole range of features that, in addition to those mentioned above, will provide much needed security, which you can learn more about by clicking here <a href=\"https:\/\/digitalpwc.com\/index.php\/modules\/\">here<\/a>.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Nam et urna ante, vitae pretium lacus. Vivamus ullamcorper leo risus, non vehicula odio. In consectetur viverra ante, eget vulputate magna aliquam in.<\/p>","protected":false},"author":1,"featured_media":2080,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[9,13,14,15,16,22],"class_list":["post-144","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite-it-des-entreprises","tag-app","tag-corporate","tag-design","tag-dream-theme","tag-mobile","tag-wordpress","category-34","description-off"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to secure corporate devices - PC, Mac, Mobile, and more. - DigitalPWC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/digitalpwc.com\/en\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to secure corporate devices - PC, Mac, Mobile, and more. - DigitalPWC\" \/>\n<meta property=\"og:description\" content=\"Nam et urna ante, vitae pretium lacus. Vivamus ullamcorper leo risus, non vehicula odio. In consectetur viverra ante, eget vulputate magna aliquam in.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/digitalpwc.com\/en\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\/\" \/>\n<meta property=\"og:site_name\" content=\"DigitalPWC\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-29T17:43:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-04T21:11:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/digitalpwc.com\/wp-content\/uploads\/2014\/08\/a018.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"digital_admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"digital_admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/digitalpwc.com\\\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digitalpwc.com\\\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\\\/\"},\"author\":{\"name\":\"digital_admin\",\"@id\":\"https:\\\/\\\/digitalpwc.com\\\/#\\\/schema\\\/person\\\/edebc88e4607bc523f955e0517c58a8d\"},\"headline\":\"How to secure corporate devices &#8211; PC, Mac, Mobile, and more.\",\"datePublished\":\"2022-08-29T17:43:59+00:00\",\"dateModified\":\"2023-06-04T21:11:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/digitalpwc.com\\\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\\\/\"},\"wordCount\":552,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/digitalpwc.com\\\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digitalpwc.com\\\/wp-content\\\/uploads\\\/2014\\\/08\\\/a018.jpg\",\"keywords\":[\"app\",\"corporate\",\"design\",\"dream-theme\",\"mobile\",\"wordpress\"],\"articleSection\":[\"securit\u00e9 IT des entreprises\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/digitalpwc.com\\\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/digitalpwc.com\\\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\\\/\",\"url\":\"https:\\\/\\\/digitalpwc.com\\\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\\\/\",\"name\":\"How to secure corporate devices - PC, Mac, Mobile, and more. - DigitalPWC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digitalpwc.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/digitalpwc.com\\\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/digitalpwc.com\\\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digitalpwc.com\\\/wp-content\\\/uploads\\\/2014\\\/08\\\/a018.jpg\",\"datePublished\":\"2022-08-29T17:43:59+00:00\",\"dateModified\":\"2023-06-04T21:11:08+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/digitalpwc.com\\\/#\\\/schema\\\/person\\\/edebc88e4607bc523f955e0517c58a8d\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/digitalpwc.com\\\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/digitalpwc.com\\\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/digitalpwc.com\\\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\\\/#primaryimage\",\"url\":\"https:\\\/\\\/digitalpwc.com\\\/wp-content\\\/uploads\\\/2014\\\/08\\\/a018.jpg\",\"contentUrl\":\"https:\\\/\\\/digitalpwc.com\\\/wp-content\\\/uploads\\\/2014\\\/08\\\/a018.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/digitalpwc.com\\\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/digitalpwc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to secure corporate devices &#8211; PC, Mac, Mobile, and more.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/digitalpwc.com\\\/#website\",\"url\":\"https:\\\/\\\/digitalpwc.com\\\/\",\"name\":\"DigitalPWC\",\"description\":\"DIGITAL POWER CONTROL - SECURITY SOLUTIONS FOR DIGITAL WORD\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/digitalpwc.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/digitalpwc.com\\\/#\\\/schema\\\/person\\\/edebc88e4607bc523f955e0517c58a8d\",\"name\":\"digital_admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3f4b585f3929df44d22a45e822c34c89478c991ed295e53ad714028a3b15ad67?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3f4b585f3929df44d22a45e822c34c89478c991ed295e53ad714028a3b15ad67?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3f4b585f3929df44d22a45e822c34c89478c991ed295e53ad714028a3b15ad67?s=96&d=mm&r=g\",\"caption\":\"digital_admin\"},\"url\":\"https:\\\/\\\/digitalpwc.com\\\/en\\\/author\\\/digital_admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to secure corporate devices - PC, Mac, Mobile, and more. - DigitalPWC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/digitalpwc.com\/en\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\/","og_locale":"en_US","og_type":"article","og_title":"How to secure corporate devices - PC, Mac, Mobile, and more. - DigitalPWC","og_description":"Nam et urna ante, vitae pretium lacus. Vivamus ullamcorper leo risus, non vehicula odio. In consectetur viverra ante, eget vulputate magna aliquam in.","og_url":"https:\/\/digitalpwc.com\/en\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\/","og_site_name":"DigitalPWC","article_published_time":"2022-08-29T17:43:59+00:00","article_modified_time":"2023-06-04T21:11:08+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/digitalpwc.com\/wp-content\/uploads\/2014\/08\/a018.jpg","type":"image\/jpeg"}],"author":"digital_admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"digital_admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/digitalpwc.com\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\/#article","isPartOf":{"@id":"https:\/\/digitalpwc.com\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\/"},"author":{"name":"digital_admin","@id":"https:\/\/digitalpwc.com\/#\/schema\/person\/edebc88e4607bc523f955e0517c58a8d"},"headline":"How to secure corporate devices &#8211; PC, Mac, Mobile, and more.","datePublished":"2022-08-29T17:43:59+00:00","dateModified":"2023-06-04T21:11:08+00:00","mainEntityOfPage":{"@id":"https:\/\/digitalpwc.com\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\/"},"wordCount":552,"commentCount":0,"image":{"@id":"https:\/\/digitalpwc.com\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\/#primaryimage"},"thumbnailUrl":"https:\/\/digitalpwc.com\/wp-content\/uploads\/2014\/08\/a018.jpg","keywords":["app","corporate","design","dream-theme","mobile","wordpress"],"articleSection":["securit\u00e9 IT des entreprises"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/digitalpwc.com\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/digitalpwc.com\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\/","url":"https:\/\/digitalpwc.com\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\/","name":"How to secure corporate devices - PC, Mac, Mobile, and more. - DigitalPWC","isPartOf":{"@id":"https:\/\/digitalpwc.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/digitalpwc.com\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\/#primaryimage"},"image":{"@id":"https:\/\/digitalpwc.com\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\/#primaryimage"},"thumbnailUrl":"https:\/\/digitalpwc.com\/wp-content\/uploads\/2014\/08\/a018.jpg","datePublished":"2022-08-29T17:43:59+00:00","dateModified":"2023-06-04T21:11:08+00:00","author":{"@id":"https:\/\/digitalpwc.com\/#\/schema\/person\/edebc88e4607bc523f955e0517c58a8d"},"breadcrumb":{"@id":"https:\/\/digitalpwc.com\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/digitalpwc.com\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/digitalpwc.com\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\/#primaryimage","url":"https:\/\/digitalpwc.com\/wp-content\/uploads\/2014\/08\/a018.jpg","contentUrl":"https:\/\/digitalpwc.com\/wp-content\/uploads\/2014\/08\/a018.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/digitalpwc.com\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/digitalpwc.com\/"},{"@type":"ListItem","position":2,"name":"How to secure corporate devices &#8211; PC, Mac, Mobile, and more."}]},{"@type":"WebSite","@id":"https:\/\/digitalpwc.com\/#website","url":"https:\/\/digitalpwc.com\/","name":"DigitalPWC","description":"DIGITAL POWER CONTROL - SECURITY SOLUTIONS FOR DIGITAL WORD","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/digitalpwc.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/digitalpwc.com\/#\/schema\/person\/edebc88e4607bc523f955e0517c58a8d","name":"digital_admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3f4b585f3929df44d22a45e822c34c89478c991ed295e53ad714028a3b15ad67?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3f4b585f3929df44d22a45e822c34c89478c991ed295e53ad714028a3b15ad67?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3f4b585f3929df44d22a45e822c34c89478c991ed295e53ad714028a3b15ad67?s=96&d=mm&r=g","caption":"digital_admin"},"url":"https:\/\/digitalpwc.com\/en\/author\/digital_admin\/"}]}},"_links":{"self":[{"href":"https:\/\/digitalpwc.com\/en\/wp-json\/wp\/v2\/posts\/144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digitalpwc.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/digitalpwc.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/digitalpwc.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/digitalpwc.com\/en\/wp-json\/wp\/v2\/comments?post=144"}],"version-history":[{"count":3,"href":"https:\/\/digitalpwc.com\/en\/wp-json\/wp\/v2\/posts\/144\/revisions"}],"predecessor-version":[{"id":2317,"href":"https:\/\/digitalpwc.com\/en\/wp-json\/wp\/v2\/posts\/144\/revisions\/2317"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/digitalpwc.com\/en\/wp-json\/wp\/v2\/media\/2080"}],"wp:attachment":[{"href":"https:\/\/digitalpwc.com\/en\/wp-json\/wp\/v2\/media?parent=144"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/digitalpwc.com\/en\/wp-json\/wp\/v2\/categories?post=144"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/digitalpwc.com\/en\/wp-json\/wp\/v2\/tags?post=144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}