Cybersecurity in teleworking
Most teleworkers use remote access, for example, via VPN, remote desktop, etc…. When teleworking, other terminals are often used, also known as endpoints, such as desktop computers, tablets, laptops, smartphones, which can compromise the security of teleworking, since we are accessing our organization's computing resources from different external locations. of the company's facilities.