{"id":12272,"date":"2022-05-11T15:57:27","date_gmt":"2022-05-11T15:57:27","guid":{"rendered":"https:\/\/www.realvnc.com\/?post_type=blog&#038;p=12272"},"modified":"2024-07-24T11:53:01","modified_gmt":"2024-07-24T11:53:01","slug":"three-ways-vnc-remote-access-more-than-hackers","status":"publish","type":"blog","link":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-vnc-remote-access-more-than-hackers\/","title":{"rendered":"Three ways to use VNC&#8217;s superpowers for good"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"12272\" class=\"elementor elementor-12272\" data-elementor-post-type=\"blog\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4ab4cb20 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4ab4cb20\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-382b30a0\" data-id=\"382b30a0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b281fe4 elementor-widget elementor-widget-text-editor\" data-id=\"b281fe4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>But it should be said that VNC solutions aren\u2019t evil by design; like anything, it\u2019s all in the intent of the user.\u00a0 Take the use of threat emulation tool Cobalt Strike as the perfect parallel example \u2013 it was created so red and purple security teams could simulate attacks to test their defences, but is used today in ransomware attacks, advanced persistent threats, supply chain attacks, and more. It is regularly sold on the market to organizations for legitimate purposes but has simply been taken advantage of by cybercriminals to assist with various parts of an attack chain.<\/p><p>In reality, VNC-based remote control has been around for just over two decades and is available today in a number of flavors based on the open-source General Public License.\u00a0 Because of this, many threat actors have chosen to use this free mode of establishing <a href=\"https:\/\/www.realvnc.com\/en\/discover\/remote-access\/\">remote access<\/a> due to its availability and \u2013 depending on the implementation of VNC \u2013 functionality.<\/p><p>But, in the same way, the last 20 years of VNC\u2019s existence have also caused organizations to realize the internal value of VNC-based solutions, beyond what you read in the cybersecurity headlines. Below are three examples of how VNC is legitimately being used today, using Microsoft Remote Desktop as a comparable.<\/p><h2>1. Remote Desktop Replacement<\/h2><p>Microsoft\u2019s Remote Desktop Protocol (RDP) has given organizations an easy way to remotely access Windows desktops for years.\u00a0 But many organizations require <a href=\"https:\/\/www.realvnc.com\/en\/blog\/breaking-down-rdp-vs-secure-remote-access\/\">a more secure method of easily accessing endpoints and servers that basic RDP just doesn\u2019t offer<\/a> (without additional service implementation), but is found within some VNC solutions. This can include multi-factor authentication, single sign-on providers, RADIUS servers, and more. Additionally, those users that are relying on a single physical endpoint to connect to (rather than session-based virtualization or a virtual desktop infrastructure) use VNC as a means to securely access <em>their<\/em> system.<\/p><h2>2. Internal Secure Remote Access<\/h2><p>Accessing RDP sessions is a relatively unintelligent process, where the user connects directly to the remote desktop via name or IP address, all without concern for any security or performance ramifications. Microsoft\u2019s Remote Desktop Services can extend the use of RDP to include access via Azure, taking the remote session request across the Internet. But not all <a href=\"https:\/\/www.realvnc.com\/en\/connect\/\">remote access<\/a> sessions should traverse the Internet; the security needs of the organization may dictate that in certain circumstances, remote sessions that are internal in nature (that is, both the user and the system to be accessed exist within the corporate network) remain internal.\u00a0 Some VNC solutions are intelligent enough to take into consideration whether a session needs to traverse the Internet or remain internal, which can improve both the speed and security of a session.<\/p><h2>3. Remote Support<\/h2><p>Anyone who\u2019s worked a support desk knows there comes a time when you need to see what the user with the problem sees in order to fix the issue.\u00a0 At the core of VNC\u2019s screen-sharing technology is its <a href=\"https:\/\/en.wikipedia.org\/wiki\/RFB_protocol\">Remote Frame Buffer (RFB)<\/a> protocol, which allows the remote user to interact with the interactive user on the desktop.\u00a0 Unlike Microsoft\u2019s Native RDP (which provides the remote user with a virtual desktop session), VNC can be used by support professionals to work with users in order to solve application issues. Now, Microsoft does have Remote Desktop Session Shadowing, but that requires the user to be supported to have a virtual desktop session on an RDS server.<\/p><h2>Why VNC Gets a Bad Rap<\/h2><p>While I\u2019ve provided a few positive use-cases for VNC, the question that still remains is: \u201chow come it\u2019s used by the bad guys so often?\u201d. The answer is that because VNC was originally made as an open-source project decades ago, there are dozens of reasonably good implementations today that provide basic remote access functionality.<\/p><p>The real question is whether VNC is limited to threat actions or whether it does have a legitimate value in organizations today. A lot of that depends on which VNC-based remote access solution you\u2019re using.\u00a0 MITRE does mention a few specific implementations of VNC \u2013 usually, ones that are free to use; which makes sense, as cybercriminals aren\u2019t exactly looking to pay for the software they use and any solution that provides them the needed functionality \u2013 especially if it costs them nothing \u2013 is perfectly suited for their purposes.<\/p><h2>Seeing VNC Beyond Its Misuse<\/h2><p>The reality here is VNC itself shouldn\u2019t be measured not for how it\u2019s misused; take whatever litmus test you use to determine whether Cobalt Strike is bad and apply it here.\u00a0 Instead, consider a given VNC solution for its capabilities, security, and support, and whether it meets the organization\u2019s needs, treating it like any other software solution of any kind.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Because they have have been in the past used by cybercriminals for a variety of threat actions , there\u2019s sometimes an association that may occur in some organizations between VNC-based remote access solutions and malicious activity. However, a secure VNC solution, used as intended, can bring a lot of benefits to your organization.<\/p>\n","protected":false},"author":20,"featured_media":12283,"template":"","blog_category":[280,281,257],"class_list":["post-12272","blog","type-blog","status-publish","has-post-thumbnail","hentry","blog_category-featured","blog_category-remote-access","blog_category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Three ways to use VNC&#039;s superpowers for good<\/title>\n<meta name=\"description\" content=\"Despite what some might think, VNC solutions aren\u2019t evil by design; like anything, it\u2019s all in the intent of the user. Find out why!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.realvnc.com\/en\/blog\/three-ways-vnc-remote-access-more-than-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Three ways to use VNC&#039;s superpowers for good\" \/>\n<meta property=\"og:description\" content=\"Despite what some might think, VNC solutions aren\u2019t evil by design; like anything, it\u2019s all in the intent of the user. Find out why!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.realvnc.com\/en\/blog\/three-ways-vnc-remote-access-more-than-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"RealVNC\u00ae\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/realvnc\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-24T11:53:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/05\/VNC-not-just-for-hackers.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1254\" \/>\n\t<meta property=\"og:image:height\" content=\"836\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@realvnc\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-vnc-remote-access-more-than-hackers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-vnc-remote-access-more-than-hackers\\\/\"},\"author\":{\"name\":\"Nick Cavalancia, 4-time Microsoft MVP\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/01b6bf08521717030ba8b5904cbdfc49\"},\"headline\":\"Three ways to use VNC&#8217;s superpowers for good\",\"datePublished\":\"2022-05-11T15:57:27+00:00\",\"dateModified\":\"2024-07-24T11:53:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-vnc-remote-access-more-than-hackers\\\/\"},\"wordCount\":792,\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-vnc-remote-access-more-than-hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/VNC-not-just-for-hackers.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-vnc-remote-access-more-than-hackers\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-vnc-remote-access-more-than-hackers\\\/\",\"name\":\"Three ways to use VNC's superpowers for good\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-vnc-remote-access-more-than-hackers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-vnc-remote-access-more-than-hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/VNC-not-just-for-hackers.jpg\",\"datePublished\":\"2022-05-11T15:57:27+00:00\",\"dateModified\":\"2024-07-24T11:53:01+00:00\",\"description\":\"Despite what some might think, VNC solutions aren\u2019t evil by design; like anything, it\u2019s all in the intent of the user. Find out why!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-vnc-remote-access-more-than-hackers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-vnc-remote-access-more-than-hackers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-vnc-remote-access-more-than-hackers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/VNC-not-just-for-hackers.jpg\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/VNC-not-just-for-hackers.jpg\",\"width\":1254,\"height\":836,\"caption\":\"VNC not just for hackers\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-vnc-remote-access-more-than-hackers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Three ways to use VNC&#8217;s superpowers for good\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"name\":\"RealVNC\u00ae\",\"description\":\"The world&#039;s safest remote access software\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\",\"name\":\"RealVNC\u00ae\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"width\":300,\"height\":41,\"caption\":\"RealVNC\u00ae\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/realvnc\",\"https:\\\/\\\/x.com\\\/realvnc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/realvnc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/RealVNCLtd\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/RealVNC\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/01b6bf08521717030ba8b5904cbdfc49\",\"name\":\"Nick Cavalancia, 4-time Microsoft MVP\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g\",\"caption\":\"Nick Cavalancia, 4-time Microsoft MVP\"},\"description\":\"Nick Cavalancia is a four-time Microsoft MVP, has over 28 years of enterprise IT experience, is an accomplished consultant, speaker, trainer, writer, and columnist, and has achieved industry certifications including MCSE, MCT, Master CNE, and Master CNI. He has authored, co-authored and contributed to dozens of books on various technologies. Nick regularly speaks, writes and blogs for some of the most recognized tech companies today on topics including cybersecurity, cloud adoption, business continuity, and compliance.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Three ways to use VNC's superpowers for good","description":"Despite what some might think, VNC solutions aren\u2019t evil by design; like anything, it\u2019s all in the intent of the user. Find out why!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-vnc-remote-access-more-than-hackers\/","og_locale":"en_US","og_type":"article","og_title":"Three ways to use VNC's superpowers for good","og_description":"Despite what some might think, VNC solutions aren\u2019t evil by design; like anything, it\u2019s all in the intent of the user. Find out why!","og_url":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-vnc-remote-access-more-than-hackers\/","og_site_name":"RealVNC\u00ae","article_publisher":"https:\/\/www.facebook.com\/realvnc","article_modified_time":"2024-07-24T11:53:01+00:00","og_image":[{"width":1254,"height":836,"url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/05\/VNC-not-just-for-hackers.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@realvnc","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-vnc-remote-access-more-than-hackers\/#article","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-vnc-remote-access-more-than-hackers\/"},"author":{"name":"Nick Cavalancia, 4-time Microsoft MVP","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/01b6bf08521717030ba8b5904cbdfc49"},"headline":"Three ways to use VNC&#8217;s superpowers for good","datePublished":"2022-05-11T15:57:27+00:00","dateModified":"2024-07-24T11:53:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-vnc-remote-access-more-than-hackers\/"},"wordCount":792,"publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-vnc-remote-access-more-than-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/05\/VNC-not-just-for-hackers.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-vnc-remote-access-more-than-hackers\/","url":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-vnc-remote-access-more-than-hackers\/","name":"Three ways to use VNC's superpowers for good","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-vnc-remote-access-more-than-hackers\/#primaryimage"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-vnc-remote-access-more-than-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/05\/VNC-not-just-for-hackers.jpg","datePublished":"2022-05-11T15:57:27+00:00","dateModified":"2024-07-24T11:53:01+00:00","description":"Despite what some might think, VNC solutions aren\u2019t evil by design; like anything, it\u2019s all in the intent of the user. Find out why!","breadcrumb":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-vnc-remote-access-more-than-hackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.realvnc.com\/en\/blog\/three-ways-vnc-remote-access-more-than-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-vnc-remote-access-more-than-hackers\/#primaryimage","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/05\/VNC-not-just-for-hackers.jpg","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/05\/VNC-not-just-for-hackers.jpg","width":1254,"height":836,"caption":"VNC not just for hackers"},{"@type":"BreadcrumbList","@id":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-vnc-remote-access-more-than-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.realvnc.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blogs","item":"https:\/\/www.realvnc.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"Three ways to use VNC&#8217;s superpowers for good"}]},{"@type":"WebSite","@id":"https:\/\/www.realvnc.com\/en\/#website","url":"https:\/\/www.realvnc.com\/en\/","name":"RealVNC\u00ae","description":"The world&#039;s safest remote access software","publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.realvnc.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.realvnc.com\/en\/#organization","name":"RealVNC\u00ae","url":"https:\/\/www.realvnc.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","width":300,"height":41,"caption":"RealVNC\u00ae"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/realvnc","https:\/\/x.com\/realvnc","https:\/\/www.linkedin.com\/company\/realvnc\/","https:\/\/www.youtube.com\/RealVNCLtd","https:\/\/en.wikipedia.org\/wiki\/RealVNC"]},{"@type":"Person","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/01b6bf08521717030ba8b5904cbdfc49","name":"Nick Cavalancia, 4-time Microsoft MVP","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g","caption":"Nick Cavalancia, 4-time Microsoft MVP"},"description":"Nick Cavalancia is a four-time Microsoft MVP, has over 28 years of enterprise IT experience, is an accomplished consultant, speaker, trainer, writer, and columnist, and has achieved industry certifications including MCSE, MCT, Master CNE, and Master CNI. He has authored, co-authored and contributed to dozens of books on various technologies. Nick regularly speaks, writes and blogs for some of the most recognized tech companies today on topics including cybersecurity, cloud adoption, business continuity, and compliance."}]}},"_links":{"self":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/12272","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/users\/20"}],"version-history":[{"count":0,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/12272\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media\/12283"}],"wp:attachment":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media?parent=12272"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog_category?post=12272"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}