{"version":"1.0","provider_name":"RealVNC\u00ae","provider_url":"https:\/\/www.realvnc.com\/en\/","author_name":"David","author_url":"https:\/\/www.realvnc.com\/en\/news\/author\/david\/","title":"5 common misconceptions about remote access security","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"MmvZRHLwif\"><a href=\"https:\/\/www.realvnc.com\/en\/blog\/5-common-misconceptions-about-remote-access-security\/\">5 common misconceptions about remote access security<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.realvnc.com\/en\/blog\/5-common-misconceptions-about-remote-access-security\/embed\/#?secret=MmvZRHLwif\" width=\"600\" height=\"338\" title=\"&#8220;5 common misconceptions about remote access security&#8221; &#8212; RealVNC\u00ae\" data-secret=\"MmvZRHLwif\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.realvnc.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/Hacker.jpg","thumbnail_width":693,"thumbnail_height":512,"description":"What\u00e2\u20ac\u2122s preventing your company using remote access software? As it turns out, some companies are put off using remote access software because of existing misconceptions about security risks, missing out on the many significant benefits offered by this technology"}