{"id":16585,"date":"2020-06-30T14:00:56","date_gmt":"2020-06-30T17:00:56","guid":{"rendered":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=16585"},"modified":"2020-06-30T12:39:19","modified_gmt":"2020-06-30T15:39:19","slug":"guide-to-enterprise-telework-remote-access-and-bring-your-own-device-byod-security","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/guide-to-enterprise-telework-remote-access-and-bring-your-own-device-byod-security\/","title":{"rendered":"Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security"},"content":{"rendered":"<p><strong><span style=\"color: #003366;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-16586\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2020\/06\/guide-to-enterprise-telework-remote-access-and-bring-your-own-device-byod-security.jpg\" alt=\"Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security\" width=\"145\" height=\"188\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2020\/06\/guide-to-enterprise-telework-remote-access-and-bring-your-own-device-byod-security.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2020\/06\/guide-to-enterprise-telework-remote-access-and-bring-your-own-device-byod-security-116x150.jpg 116w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>Murugiah Souppaya, Karen Scarfone<\/span><\/strong><\/p>\n<p><strong><span style=\"color: #003366;\">R\u00e9sum\u00e9:<\/span><\/strong> For many organizations, their employees, contractors, business partners, vendors, and\/or other users utilize enterprise telework technologies to perform work from external locations. Most of these people use remote access technologies to interface with an organization\u2019s non-public computing resources. The nature of telework and remote access technologies\u2014permitting access to protected resources from external networks and often externally controlled hosts as well\u2014generally places them at higher risk than similar technologies only accessed from inside the organization, as well as increasing the risk to the internal resources made available to users through remote access.<br \/>\nAll the components of telework and remote access solutions, including client devices, remote access servers, and internal resources accessed through remote access, should be secured against expected threats, as identified through threat models. Major security concerns include the lack of physical security controls, the use of unsecured networks, the connection of infected devices to internal networks, and the availability of internal resources to external hosts.<\/p>\n<p><a href=\"https:\/\/www.bibliotecadeseguranca.com.br\/wp-content\/uploads\/2020\/06\/guide-to-enterprise-telework-remote-access-and-bring-your-own-device-byod-security.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-12143 size-full\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/03\/download_fr.gif\" alt=\"T\u00e9l\u00e9charger\" width=\"107\" height=\"25\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Murugiah Souppaya, Karen Scarfone R\u00e9sum\u00e9: For many organizations, their employees, contractors, business partners, vendors, and\/or other users utilize enterprise telework technologies to perform work from external locations. Most of these people use remote access technologies to interface with an organization\u2019s non-public computing resources. The nature of telework and remote access technologies\u2014permitting access to protected resources from external networks and often externally controlled hosts as well\u2014generally places them at higher risk&hellip; <\/p>\n","protected":false},"author":3,"featured_media":16586,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,6,20,112],"tags":[],"class_list":["post-16585","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-livros","category-seguranca-da-informacao","category-download"],"views":123,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/16585","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=16585"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/16585\/revisions"}],"predecessor-version":[{"id":16587,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/16585\/revisions\/16587"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/16586"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=16585"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=16585"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=16585"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}