{"id":83895,"date":"2023-07-13T19:45:44","date_gmt":"2023-07-13T11:45:44","guid":{"rendered":"https:\/\/dev.flydesk.com\/?p=83895"},"modified":"2023-07-14T01:17:43","modified_gmt":"2023-07-13T17:17:43","slug":"remote-work-and-cybersecurity","status":"publish","type":"post","link":"https:\/\/dev.flydesk.com\/fr\/insights\/remote-work-and-cybersecurity\/","title":{"rendered":"Travail \u00e0 distance et cybers\u00e9curit\u00e9"},"content":{"rendered":"<p><span style=\"font-weight: 400;\"  >L&#39;av\u00e8nement du travail \u00e0 distance a r\u00e9volutionn\u00e9 notre fa\u00e7on de travailler, offrant flexibilit\u00e9, productivit\u00e9 accrue et meilleur \u00e9quilibre travail-vie personnelle. Cependant, ce changement a \u00e9galement entra\u00een\u00e9 de nouveaux d\u00e9fis, en particulier dans le domaine de la cybers\u00e9curit\u00e9. \u00c0 mesure que les organisations s&#39;adaptent \u00e0 l&#39;environnement de travail distribu\u00e9, il devient crucial de mettre en \u0153uvre des mesures solides pour prot\u00e9ger les donn\u00e9es sensibles et se prot\u00e9ger contre les cybermenaces potentielles. Cet article explore l&#39;importance de la cybers\u00e9curit\u00e9 dans les contextes de travail \u00e0 distance et fournit des directives essentielles pour assurer une s\u00e9curit\u00e9 <a href=\"https:\/\/dev.flydesk.com\/fr\/app\/\" target=\"_blank\" rel=\"noopener\">environnement de travail \u00e0 distance<\/a>.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Reconna\u00eetre les risques du travail \u00e0 distance<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Le travail \u00e0 distance introduit une gamme de risques uniques que les organisations doivent g\u00e9rer pour maintenir une cybers\u00e9curit\u00e9 solide. Ces risques comprennent :<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">\u00a0 \u00a0 \u00a0 \u00a0 1. Vuln\u00e9rabilit\u00e9s du r\u00e9seau domestique<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Les r\u00e9seaux domestiques peuvent manquer du m\u00eame niveau de s\u00e9curit\u00e9 que les r\u00e9seaux de bureau, ce qui les rend plus vuln\u00e9rables aux attaques.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">\u00a0 \u00a0 \u00a0 \u00a02. S\u00e9curit\u00e9 des terminaux<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">La prolif\u00e9ration des appareils personnels utilis\u00e9s pour le travail \u00e0 distance augmente le risque de failles de s\u00e9curit\u00e9 si les appareils ne sont pas correctement prot\u00e9g\u00e9s.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">\u00a0 \u00a0 \u00a0 3. Hame\u00e7onnage et ing\u00e9nierie sociale<\/span><\/h3>\n<p><span style=\"font-weight: 400;\"  >Les travailleurs \u00e0 distance peuvent \u00eatre plus vuln\u00e9rables aux attaques de phishing et aux escroqueries d&#39;ing\u00e9nierie sociale en raison de l&#39;absence de contr\u00f4les de s\u00e9curit\u00e9 en personne.<\/span><\/p>\n<p><img decoding=\"async\"   class=\"alignnone size-large wp-image-83899\"   src=\"https:\/\/mlgucbjxeu1m.i.optimole.com\/cb:B7VA.3e989\/w:1024\/h:683\/q:mauto\/ig:avif\/f:best\/https:\/\/dev.flydesk.com\/wp-content\/uploads\/2023\/07\/jefferson-santos-9SoCnyQmkzI-unsplash.jpg\"   alt=\"\"   width=\"1024\"   height=\"683\" \/><\/p>\n<h2><span style=\"font-weight: 400;\"  >Mise en \u0153uvre des meilleures pratiques pour la cybers\u00e9curit\u00e9 du travail \u00e0 distance<\/span><\/h2>\n<h3><span style=\"font-weight: 400;\">\u00a0 \u00a0 \u00a0 \u00a01. Mots de passe forts et authentification multifacteur (MFA)<\/span><\/h3>\n<p><span style=\"font-weight: 400;\"> Encouragez les employ\u00e9s \u00e0 utiliser des mots de passe forts et uniques et activez MFA pour ajouter une couche de protection suppl\u00e9mentaire.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">\u00a0 \u00a0 \u00a0 \u00a02. Acc\u00e8s \u00e0 distance s\u00e9curis\u00e9<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Assurez-vous que les t\u00e9l\u00e9travailleurs utilisent des <a href=\"https:\/\/dev.flydesk.com\/fr\/insights\/best-vpn-for-remote-teams\/\" target=\"_blank\" rel=\"noopener\">r\u00e9seaux priv\u00e9s virtuels<\/a> (VPN) lors de l&#39;acc\u00e8s aux ressources de l&#39;entreprise pour crypter la transmission des donn\u00e9es et se prot\u00e9ger contre les acc\u00e8s non autoris\u00e9s.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\" >\u00a0 \u00a0 \u00a0 \u00a03. Mises \u00e0 jour r\u00e9guli\u00e8res du logiciel<\/span><\/h3>\n<p><span style=\"font-weight: 400;\" > Donjon <a href=\"https:\/\/dev.flydesk.com\/fr\/insights\/tool-guide-to-communications-for-remote-teams\/\"   target=\"_blank\"   rel=\"noopener\">tous les logiciels<\/a>, y compris les syst\u00e8mes d&#39;exploitation, les applications et les outils de s\u00e9curit\u00e9, \u00e0 jour pour att\u00e9nuer les vuln\u00e9rabilit\u00e9s et exploiter les risques.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">\u00a0 \u00a0 \u00a0 \u00a04. S\u00e9curit\u00e9 des terminaux<\/span><\/h3>\n<p><span style=\"font-weight: 400;\" >D\u00e9ployez des logiciels de s\u00e9curit\u00e9 complets, y compris des pare-feu, des logiciels antivirus et des solutions anti-malware, sur tous les appareils de travail \u00e0 distance.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">\u00a0 \u00a0 \u00a0 \u00a05. Cryptage des donn\u00e9es et partage de fichiers s\u00e9curis\u00e9<\/span><\/h3>\n<p><span style=\"font-weight: 400;\" > Encouragez l&#39;utilisation d&#39;outils de chiffrement pour s\u00e9curiser les donn\u00e9es sensibles au repos et en transit. Mettez en \u0153uvre des solutions de partage de fichiers s\u00e9curis\u00e9es avec des contr\u00f4les d&#39;acc\u00e8s pour emp\u00eacher le partage non autoris\u00e9.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\" >\u00a0 \u00a0 \u00a0 6. Formation de sensibilisation \u00e0 la s\u00e9curit\u00e9<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Fournissez aux t\u00e9l\u00e9travailleurs une formation r\u00e9guli\u00e8re sur l&#39;identification et la pr\u00e9vention des cybermenaces courantes telles que les e-mails de phishing, les sites Web suspects et les t\u00e9l\u00e9chargements malveillants.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">\u00c9tablir des politiques et des lignes directrices sur le travail \u00e0 distance<\/span><\/h2>\n<h3><span style=\"font-weight: 400;\">\u00a0 \u00a0 \u00a0 1. Politiques d&#39;utilisation acceptable<\/span><\/h3>\n<p><span style=\"font-weight: 400;\" >D\u00e9velopper <a href=\"https:\/\/www.timedoctor.com\/blog\/computer-usage-policy\/\"   target=\"_blank\"   rel=\"noopener nofollow\">des directives claires<\/a> sur l&#39;utilisation des appareils, des r\u00e9seaux et des ressources de l&#39;entreprise pendant le travail \u00e0 distance. D\u00e9finissez les activit\u00e9s acceptables et interdites pour vous assurer que les employ\u00e9s comprennent leurs responsabilit\u00e9s.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">\u00a0 \u00a0 \u00a0 2. R\u00e9ponse aux incidents et signalement<\/span><\/h3>\n<p><span style=\"font-weight: 400;\" >\u00c9tablissez des protocoles pour signaler les incidents de s\u00e9curit\u00e9, tels que les violations de donn\u00e9es ou les activit\u00e9s suspectes, et d\u00e9crivez les \u00e9tapes que les employ\u00e9s doivent suivre.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\"  >\u00a0 \u00a0 \u00a0 3. Canaux de communication s\u00e9curis\u00e9s<\/span><\/h3>\n<p><span style=\"font-weight: 400;\" >Encouragez l&#39;utilisation d&#39;outils de communication crypt\u00e9s, tels que les r\u00e9unions virtuelles et les plateformes de messagerie, pour prot\u00e9ger les conversations sensibles et le partage de donn\u00e9es.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\" >\u00a0 \u00a0 \u00a04. Sauvegarde des donn\u00e9es et Recovery<\/span><\/h3>\n<p><span style=\"font-weight: 400;\"  >Insistez sur l&#39;importance des sauvegardes de donn\u00e9es r\u00e9guli\u00e8res et \u00e9tablissez des protocoles permettant aux t\u00e9l\u00e9travailleurs de stocker et de r\u00e9cup\u00e9rer en toute s\u00e9curit\u00e9 les fichiers de sauvegarde.<\/span><\/p>\n<h2><img decoding=\"async\"   class=\"alignnone size-full wp-image-83900\"   src=\"https:\/\/mlgucbjxeu1m.i.optimole.com\/cb:B7VA.3e989\/w:auto\/h:auto\/q:mauto\/ig:avif\/f:best\/https:\/\/dev.flydesk.com\/wp-content\/uploads\/2023\/07\/article-cybersecurity-and-protecting-yourself-when-remote.jpg\"   alt=\"\"   width=\"1024\"   height=\"576\" \/><span style=\"font-weight: 400;\">Audits et \u00e9valuations de s\u00e9curit\u00e9 r\u00e9guliers<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Effectuez des audits et des \u00e9valuations de s\u00e9curit\u00e9 r\u00e9guliers pour identifier les vuln\u00e9rabilit\u00e9s et les lacunes dans les mesures de s\u00e9curit\u00e9 du travail \u00e0 distance. Ces \u00e9valuations peuvent aider les organisations \u00e0 faire face de mani\u00e8re proactive aux menaces \u00e9mergentes et \u00e0 apporter les ajustements n\u00e9cessaires pour am\u00e9liorer la cybers\u00e9curit\u00e9.<\/span><\/p>\n<p><span style=\"font-weight: 400;\" >Le travail \u00e0 distance offre de nombreux avantages, mais il introduit \u00e9galement de nouveaux d\u00e9fis en mati\u00e8re de cybers\u00e9curit\u00e9 auxquels les organisations doivent faire face. En mettant en \u0153uvre un cadre de cybers\u00e9curit\u00e9 robuste, les organisations peuvent prot\u00e9ger les donn\u00e9es sensibles, att\u00e9nuer les risques et garantir un environnement de travail \u00e0 distance s\u00e9curis\u00e9. Cela n\u00e9cessite une combinaison de mesures technologiques, de formation des employ\u00e9s et d&#39;application des politiques pour se prot\u00e9ger contre l&#39;\u00e9volution des cybermenaces. En restant vigilantes et proactives, les organisations peuvent adopter le travail \u00e0 distance tout en pr\u00e9servant la confidentialit\u00e9, l&#39;int\u00e9grit\u00e9 et la disponibilit\u00e9 de leurs donn\u00e9es et syst\u00e8mes.<\/span><\/p>\n<p>Adoptez la r\u00e9volution du travail \u00e0 distance en toute confiance. Visite <a href=\"https:\/\/dev.flydesk.com\/fr\/\">FLYDESK<\/a> aujourd&#39;hui et apprenez-en plus sur nos solutions de travail \u00e0 distance s\u00e9curis\u00e9es.<\/p>","protected":false},"excerpt":{"rendered":"<p>L&#39;av\u00e8nement du travail \u00e0 distance a r\u00e9volutionn\u00e9 notre fa\u00e7on de travailler, offrant flexibilit\u00e9, productivit\u00e9 accrue et meilleur \u00e9quilibre travail-vie personnelle. Cependant, ce changement a \u00e9galement entra\u00een\u00e9 de nouveaux d\u00e9fis, en particulier dans le domaine de la cybers\u00e9curit\u00e9. \u00c0 mesure que les organisations s&#39;adaptent \u00e0 l&#39;environnement de travail distribu\u00e9, il devient crucial de mettre en \u0153uvre des mesures solides pour prot\u00e9ger les donn\u00e9es sensibles et prot\u00e9ger\u2026<\/p>","protected":false},"author":7,"featured_media":83898,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47],"tags":[50,273,485,370,590,605,609,509,611,607,237,1520,608,610,606],"class_list":["post-83895","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-management","tag-coworking","tag-digital-nomad","tag-flexible-office","tag-flexible-work","tag-flexible-working","tag-happy","tag-healthy","tag-hybrid-work","tag-positive","tag-productive","tag-remote-work","tag-security","tag-wellness","tag-work-life-balance","tag-workplace"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Remote Work and Cybersecurity &mdash; FLYDESK<\/title>\n<meta name=\"description\"  content=\"This article explores the significance of cyber security in remote work and provides how to ensure a secure remote work environment.\" \/>\n<meta name=\"robots\"  content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\"  href=\"https:\/\/dev.flydesk.com\/fr\/insights\/remote-work-and-cybersecurity\/\" \/>\n<meta property=\"og:locale\"  content=\"fr_FR\" \/>\n<meta property=\"og:type\"  content=\"article\" \/>\n<meta property=\"og:title\"  content=\"Remote Work and Cybersecurity &mdash; FLYDESK\" \/>\n<meta property=\"og:description\"  content=\"This article explores the significance of cyber security in remote work and provides how to ensure a secure remote work environment.\" \/>\n<meta property=\"og:url\"  content=\"https:\/\/dev.flydesk.com\/fr\/insights\/remote-work-and-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"FLYDESK\" \/>\n<meta property=\"article:published_time\"  content=\"2023-07-13T11:45:44+00:00\" \/>\n<meta property=\"article:modified_time\"  content=\"2023-07-13T17:17:43+00:00\" \/>\n<meta property=\"og:image\"  content=\"https:\/\/mlgucbjxeu1m.i.optimole.com\/cb:B7VA.3e989\/w:auto\/h:auto\/q:mauto\/ig:avif\/f:best\/https:\/\/dev.flydesk.com\/wp-content\/uploads\/2023\/07\/cybersecurity-remote-work-1280-shutterstock_1202221816-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\"  content=\"FLYDESK\"  \/>\n\t<meta name=\"twitter:label2\"  content=\"Dur\u00e9e de lecture est.\" \/>\n\t<meta name=\"twitter:data2\"  content=\"3 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Remote Work and Cybersecurity &mdash; FLYDESK","description":"This article explores the significance of cyber security in remote work and provides how to ensure a secure remote work environment.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dev.flydesk.com\/fr\/insights\/remote-work-and-cybersecurity\/","og_locale":"fr_FR","og_type":"article","og_title":"Remote Work and Cybersecurity &mdash; FLYDESK","og_description":"This article explores the significance of cyber security in remote work and provides how to ensure a secure remote work environment.","og_url":"https:\/\/dev.flydesk.com\/fr\/insights\/remote-work-and-cybersecurity\/","og_site_name":"FLYDESK","article_published_time":"2023-07-13T11:45:44+00:00","article_modified_time":"2023-07-13T17:17:43+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/mlgucbjxeu1m.i.optimole.com\/cb:B7VA.3e989\/w:auto\/h:auto\/q:mauto\/ig:avif\/f:best\/https:\/\/dev.flydesk.com\/wp-content\/uploads\/2023\/07\/cybersecurity-remote-work-1280-shutterstock_1202221816-1.jpg","path":"\/sites\/flydesk.com\/files\/wp-content\/uploads\/2023\/07\/cybersecurity-remote-work-1280-shutterstock_1202221816-1.jpg","size":"full","id":83898,"alt":"","pixels":921600,"type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"FLYDESK","Dur\u00e9e de lecture est.":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/dev.flydesk.com\/#organization","name":"FLYDESK","url":"https:\/\/dev.flydesk.com\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/dev.flydesk.com\/#logo","inLanguage":"fr-FR","url":"","contentUrl":"","caption":"FLYDESK"},"image":{"@id":"https:\/\/dev.flydesk.com\/#logo"}},{"@type":"WebSite","@id":"https:\/\/dev.flydesk.com\/#website","url":"https:\/\/dev.flydesk.com\/","name":"FLYDESK","description":"Fly your work with style","publisher":{"@id":"https:\/\/dev.flydesk.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dev.flydesk.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"ImageObject","@id":"https:\/\/dev.flydesk.com\/insights\/remote-work-and-cybersecurity\/#primaryimage","inLanguage":"fr-FR","url":"https:\/\/mlgucbjxeu1m.i.optimole.com\/cb:B7VA.3e989\/w:auto\/h:auto\/q:mauto\/ig:avif\/f:best\/https:\/\/dev.flydesk.com\/wp-content\/uploads\/2023\/07\/cybersecurity-remote-work-1280-shutterstock_1202221816-1.jpg","contentUrl":"https:\/\/mlgucbjxeu1m.i.optimole.com\/cb:B7VA.3e989\/w:auto\/h:auto\/q:mauto\/ig:avif\/f:best\/https:\/\/dev.flydesk.com\/wp-content\/uploads\/2023\/07\/cybersecurity-remote-work-1280-shutterstock_1202221816-1.jpg","width":1280,"height":720,"caption":"Remote Work and Cybersecurity"},{"@type":"WebPage","@id":"https:\/\/dev.flydesk.com\/insights\/remote-work-and-cybersecurity\/#webpage","url":"https:\/\/dev.flydesk.com\/insights\/remote-work-and-cybersecurity\/","name":"Remote Work and Cybersecurity &mdash; FLYDESK","isPartOf":{"@id":"https:\/\/dev.flydesk.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dev.flydesk.com\/insights\/remote-work-and-cybersecurity\/#primaryimage"},"datePublished":"2023-07-13T11:45:44+00:00","dateModified":"2023-07-13T17:17:43+00:00","description":"This article explores the significance of cyber security in remote work and provides how to ensure a secure remote work environment.","breadcrumb":{"@id":"https:\/\/dev.flydesk.com\/insights\/remote-work-and-cybersecurity\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dev.flydesk.com\/insights\/remote-work-and-cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/dev.flydesk.com\/insights\/remote-work-and-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dev.flydesk.com\/"},{"@type":"ListItem","position":2,"name":"Remote Work and Cybersecurity"}]},{"@type":"Article","@id":"https:\/\/dev.flydesk.com\/insights\/remote-work-and-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/dev.flydesk.com\/insights\/remote-work-and-cybersecurity\/#webpage"},"author":{"@id":"https:\/\/dev.flydesk.com\/#\/schema\/person\/298930a0535efd94b35b8dbd19d47dbd"},"headline":"Remote Work and Cybersecurity","datePublished":"2023-07-13T11:45:44+00:00","dateModified":"2023-07-13T17:17:43+00:00","mainEntityOfPage":{"@id":"https:\/\/dev.flydesk.com\/insights\/remote-work-and-cybersecurity\/#webpage"},"wordCount":574,"commentCount":0,"publisher":{"@id":"https:\/\/dev.flydesk.com\/#organization"},"image":{"@id":"https:\/\/dev.flydesk.com\/insights\/remote-work-and-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/mlgucbjxeu1m.i.optimole.com\/cb:B7VA.3e989\/w:auto\/h:auto\/q:mauto\/ig:avif\/f:best\/https:\/\/dev.flydesk.com\/wp-content\/uploads\/2023\/07\/cybersecurity-remote-work-1280-shutterstock_1202221816-1.jpg","keywords":["Coworking space","Digital nomad","Flexible Office","Flexible work","flexible working","happy","healthy","hybrid work","positive.","productive","Remote work","security","wellness","work-life balance","workplace"],"articleSection":["Management"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/dev.flydesk.com\/insights\/remote-work-and-cybersecurity\/#respond"]}]},{"@type":"Person","@id":"https:\/\/dev.flydesk.com\/#\/schema\/person\/298930a0535efd94b35b8dbd19d47dbd","name":"FLYDESK","image":{"@type":"ImageObject","@id":"https:\/\/dev.flydesk.com\/#personlogo","inLanguage":"fr-FR","url":"https:\/\/secure.gravatar.com\/avatar\/5c58c405d216524d5ddef9079bd77ab037f9583c3cd3769a446c306b0dc1f432?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5c58c405d216524d5ddef9079bd77ab037f9583c3cd3769a446c306b0dc1f432?s=96&d=mm&r=g","caption":"FLYDESK"}}]}},"_links":{"self":[{"href":"https:\/\/dev.flydesk.com\/fr\/wp-json\/wp\/v2\/posts\/83895","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dev.flydesk.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dev.flydesk.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dev.flydesk.com\/fr\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/dev.flydesk.com\/fr\/wp-json\/wp\/v2\/comments?post=83895"}],"version-history":[{"count":3,"href":"https:\/\/dev.flydesk.com\/fr\/wp-json\/wp\/v2\/posts\/83895\/revisions"}],"predecessor-version":[{"id":83910,"href":"https:\/\/dev.flydesk.com\/fr\/wp-json\/wp\/v2\/posts\/83895\/revisions\/83910"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dev.flydesk.com\/fr\/wp-json\/wp\/v2\/media\/83898"}],"wp:attachment":[{"href":"https:\/\/dev.flydesk.com\/fr\/wp-json\/wp\/v2\/media?parent=83895"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dev.flydesk.com\/fr\/wp-json\/wp\/v2\/categories?post=83895"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dev.flydesk.com\/fr\/wp-json\/wp\/v2\/tags?post=83895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}