{"id":12458,"date":"2022-06-17T14:15:06","date_gmt":"2022-06-17T14:15:06","guid":{"rendered":"https:\/\/www.realvnc.com\/?post_type=blog&#038;p=12458"},"modified":"2024-02-20T16:22:17","modified_gmt":"2024-02-20T16:22:17","slug":"current-state-remote-access-modern-day-data-breaches","status":"publish","type":"blog","link":"https:\/\/www.realvnc.com\/en\/blog\/current-state-remote-access-modern-day-data-breaches\/","title":{"rendered":"The Current State of Remote Access in Modern-Day Data Breaches"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"12458\" class=\"elementor elementor-12458\" data-elementor-post-type=\"blog\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-26720ff4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"26720ff4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5f7f6110\" data-id=\"5f7f6110\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5d6203fe elementor-widget elementor-widget-text-editor\" data-id=\"5d6203fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As ransomware gangs shift their focus from holding data for ransom to exfiltrating it and extorting payment from victim organizations, the data breach seems to be gaining steam as the threat action of choice.&nbsp; This evolution of ransomware makes the annual <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\">Verizon Data Breach Investigations Report<\/a> (which uses tens of thousands of potential and confirmed data breaches to establish what modern-day data breaches look like) all the more valuable this year.&nbsp;<\/p>\n<p>In its 15<sup>th<\/sup> year, this report provides insight into how data breaches occur, and how long they take to detect; it also gives you an idea of where to place your focus when strengthening your cybersecurity posture.<\/p>\n<p>In this year\u2019s report, there is a recurring theme worth mentioning around the use of \u201cdesktop sharing\u201d software as part of data breach attacks \u2013 which Verizon defines as including \u201cRemote Desktop Protocol (RDP) and third-party software that allows users to remotely access another computer via the Internet.\u201d &nbsp;With 80% of data breaches involving an external threat actor, that bad guy needs to gain entrance into the victim network somehow.&nbsp;<\/p>\n<p>And in the case of \u201cDesktop Sharing\u201d software (which is, in essence, any kind of remote access solution, including RDP), many organizations are simply handing the attacker the keys. Plenty of Dark Web forums list credentials for sale \u2013 no doubt stolen previously in phishing and social engineering attacks. So, by simply putting together a credential from the Dark Web, and a <a href=\"https:\/\/www.realvnc.com\/en\/discover\/remote-access\/\">remote access<\/a> solution externally accessible, the cybercriminals have all they need to begin the process of stealing data from an organization.<\/p>\n<p>According to the report, this use of \u201cdesktop sharing\u201d within data breaches is material: abuse of remote access solutions is the #4 initial attack vector in data breaches (with the expected hacking and phishing being at the top of the list). It\u2019s also the #3 initial attack vector in Intrusion-related data breaches and is utilized in 40% of all ransomware incidents.<\/p>\n<p>This should come as no surprise, given that remote access solutions provide threat actors with interactive access to a desktop on an endpoint, allowing them to take advantage of any credentialed access the currently logged-on user has.<\/p>\n<p>The Verizon data should serve as a warning of just how threat actors see remote access\/desktop sharing as a tool to take advantage of should it be present.&nbsp; So, what steps can you take to secure your organization while still allowing externally facing remote access to internal resources?<\/p>\n<p>There are a number of proactive steps you can take that will minimize the threat surface that remote access creates:<\/p>\n<ul>\n<li><strong>Stop using the basic Remote Desktop Protocol (RDP)<\/strong> \u2013 I\u2019ve <a href=\"https:\/\/www.realvnc.com\/en\/blog\/breaking-down-rdp-vs-secure-remote-access\/\">written about this several times already<\/a>. Any organization that has RDP (not to be confused with Microsoft\u2019s Remote Desktop Services) exposed to the Internet to make it \u201ceasy\u201d for employees to log onto company resources is also making it easy for the attacker. And changing ports does nothing to stop attackers, as they scan every accessible port and look for an RDP response.<\/li>\n<li><strong>Use secure, supported remote access software<\/strong> \u2013 the Verizon report discusses attacks in which zero-day vulnerabilities in remote access solutions were used to facilitate initial access. Be certain the remote access solutions you use are both supported and tested for vulnerabilities.<\/li>\n<li><strong>Use Secure Authentication<\/strong> \u2013 This is probably the most important, as the previous two recommendations may just cause you to put another remote access\/desktop sharing solution in place that may introduce the very same risks \u2013 just with another solution. According to Verizon, the top threat action in actual breaches is the use of stolen credentials. So, if the remote access solution used only requires a username and password, it\u2019s relatively easy for threat actors to log on. The inclusion of multi-factor authentication is a sure-fire way to make it impossible for threat actors to leverage existing desktop sharing for malicious purposes.<\/li>\n<li><strong>Realize there\u2019s a Human Element in data breaches<\/strong> \u2013 According to Verizon, the human element (that is where a person contributes to the success of a data breach whether intentionally or unwittingly) is present in 82% of all data breaches. This stat alone tells you that your basic productivity-centric remote access (that is, an implementation without the safeguards mentioned above) is going to eventually result in a threat actor gaining access \u2013 whether that be via a user falling for a credential theft phishing scam, using an insecure password that can be guessed during a password spray attack, etc. So, it&#8217;s necessary to consider the security measures in the previous bullets.<\/li>\n<\/ul>\n<h2>Minimizing the Risk of Remote Access-Based Data Breaches<\/h2>\n<p>Data breaches are quickly becoming the norm again, with many gangs exchanging out the disruptive nature of ransomware attacks (which generally attract the attention of law enforcement and even government entities) for simple exfiltration and threatening to publish or sell the data. So, if you have a remote access solution in place, it\u2019s time to realize the potential risk it poses to the organization and take steps to secure it properly. By following the steps above, you can eliminate the use of remote access as an asset for threat actors\u2019 intent on breaching your organization\u2019s data while maintaining operations for remote workers who rely on remote access daily.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Remote Access to internal endpoints continues to be leveraged by threat actors involved in data breaches. But exactly how much a problem is it, and how can you put a stop to it?<\/p>\n","protected":false},"author":20,"featured_media":12459,"template":"","blog_category":[280,281,257],"class_list":["post-12458","blog","type-blog","status-publish","has-post-thumbnail","hentry","blog_category-featured","blog_category-remote-access","blog_category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Current State of Remote Access in Modern-Day Data Breaches<\/title>\n<meta name=\"description\" content=\"Remote Access to internal endpoints continues to be leveraged by threat actors involved in data breaches. How big of a problem is it, though?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.realvnc.com\/en\/blog\/current-state-remote-access-modern-day-data-breaches\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Current State of Remote Access in Modern-Day Data Breaches\" \/>\n<meta property=\"og:description\" content=\"Remote Access to internal endpoints continues to be leveraged by threat actors involved in data breaches. How big of a problem is it, though?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.realvnc.com\/en\/blog\/current-state-remote-access-modern-day-data-breaches\/\" \/>\n<meta property=\"og:site_name\" content=\"RealVNC\u00ae\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/realvnc\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-20T16:22:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/06\/remote-access-vnc-connect-data-breach.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1365\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@realvnc\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/current-state-remote-access-modern-day-data-breaches\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/current-state-remote-access-modern-day-data-breaches\\\/\"},\"author\":{\"name\":\"Nick Cavalancia, 4-time Microsoft MVP\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/01b6bf08521717030ba8b5904cbdfc49\"},\"headline\":\"The Current State of Remote Access in Modern-Day Data Breaches\",\"datePublished\":\"2022-06-17T14:15:06+00:00\",\"dateModified\":\"2024-02-20T16:22:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/current-state-remote-access-modern-day-data-breaches\\\/\"},\"wordCount\":883,\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/current-state-remote-access-modern-day-data-breaches\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/remote-access-vnc-connect-data-breach.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/current-state-remote-access-modern-day-data-breaches\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/current-state-remote-access-modern-day-data-breaches\\\/\",\"name\":\"The Current State of Remote Access in Modern-Day Data Breaches\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/current-state-remote-access-modern-day-data-breaches\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/current-state-remote-access-modern-day-data-breaches\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/remote-access-vnc-connect-data-breach.jpg\",\"datePublished\":\"2022-06-17T14:15:06+00:00\",\"dateModified\":\"2024-02-20T16:22:17+00:00\",\"description\":\"Remote Access to internal endpoints continues to be leveraged by threat actors involved in data breaches. How big of a problem is it, though?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/current-state-remote-access-modern-day-data-breaches\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/current-state-remote-access-modern-day-data-breaches\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/current-state-remote-access-modern-day-data-breaches\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/remote-access-vnc-connect-data-breach.jpg\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/remote-access-vnc-connect-data-breach.jpg\",\"width\":1365,\"height\":768,\"caption\":\"remote access VNC Connect data breach\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/current-state-remote-access-modern-day-data-breaches\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Current State of Remote Access in Modern-Day Data Breaches\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"name\":\"RealVNC\u00ae\",\"description\":\"The world&#039;s safest remote access software\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\",\"name\":\"RealVNC\u00ae\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"width\":300,\"height\":41,\"caption\":\"RealVNC\u00ae\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/realvnc\",\"https:\\\/\\\/x.com\\\/realvnc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/realvnc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/RealVNCLtd\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/RealVNC\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/01b6bf08521717030ba8b5904cbdfc49\",\"name\":\"Nick Cavalancia, 4-time Microsoft MVP\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g\",\"caption\":\"Nick Cavalancia, 4-time Microsoft MVP\"},\"description\":\"Nick Cavalancia is a four-time Microsoft MVP, has over 28 years of enterprise IT experience, is an accomplished consultant, speaker, trainer, writer, and columnist, and has achieved industry certifications including MCSE, MCT, Master CNE, and Master CNI. He has authored, co-authored and contributed to dozens of books on various technologies. Nick regularly speaks, writes and blogs for some of the most recognized tech companies today on topics including cybersecurity, cloud adoption, business continuity, and compliance.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Current State of Remote Access in Modern-Day Data Breaches","description":"Remote Access to internal endpoints continues to be leveraged by threat actors involved in data breaches. How big of a problem is it, though?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.realvnc.com\/en\/blog\/current-state-remote-access-modern-day-data-breaches\/","og_locale":"en_US","og_type":"article","og_title":"The Current State of Remote Access in Modern-Day Data Breaches","og_description":"Remote Access to internal endpoints continues to be leveraged by threat actors involved in data breaches. How big of a problem is it, though?","og_url":"https:\/\/www.realvnc.com\/en\/blog\/current-state-remote-access-modern-day-data-breaches\/","og_site_name":"RealVNC\u00ae","article_publisher":"https:\/\/www.facebook.com\/realvnc","article_modified_time":"2024-02-20T16:22:17+00:00","og_image":[{"width":1365,"height":768,"url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/06\/remote-access-vnc-connect-data-breach.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@realvnc","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.realvnc.com\/en\/blog\/current-state-remote-access-modern-day-data-breaches\/#article","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/current-state-remote-access-modern-day-data-breaches\/"},"author":{"name":"Nick Cavalancia, 4-time Microsoft MVP","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/01b6bf08521717030ba8b5904cbdfc49"},"headline":"The Current State of Remote Access in Modern-Day Data Breaches","datePublished":"2022-06-17T14:15:06+00:00","dateModified":"2024-02-20T16:22:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/current-state-remote-access-modern-day-data-breaches\/"},"wordCount":883,"publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/current-state-remote-access-modern-day-data-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/06\/remote-access-vnc-connect-data-breach.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.realvnc.com\/en\/blog\/current-state-remote-access-modern-day-data-breaches\/","url":"https:\/\/www.realvnc.com\/en\/blog\/current-state-remote-access-modern-day-data-breaches\/","name":"The Current State of Remote Access in Modern-Day Data Breaches","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/current-state-remote-access-modern-day-data-breaches\/#primaryimage"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/current-state-remote-access-modern-day-data-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/06\/remote-access-vnc-connect-data-breach.jpg","datePublished":"2022-06-17T14:15:06+00:00","dateModified":"2024-02-20T16:22:17+00:00","description":"Remote Access to internal endpoints continues to be leveraged by threat actors involved in data breaches. How big of a problem is it, though?","breadcrumb":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/current-state-remote-access-modern-day-data-breaches\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.realvnc.com\/en\/blog\/current-state-remote-access-modern-day-data-breaches\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/blog\/current-state-remote-access-modern-day-data-breaches\/#primaryimage","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/06\/remote-access-vnc-connect-data-breach.jpg","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/06\/remote-access-vnc-connect-data-breach.jpg","width":1365,"height":768,"caption":"remote access VNC Connect data breach"},{"@type":"BreadcrumbList","@id":"https:\/\/www.realvnc.com\/en\/blog\/current-state-remote-access-modern-day-data-breaches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.realvnc.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blogs","item":"https:\/\/www.realvnc.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"The Current State of Remote Access in Modern-Day Data Breaches"}]},{"@type":"WebSite","@id":"https:\/\/www.realvnc.com\/en\/#website","url":"https:\/\/www.realvnc.com\/en\/","name":"RealVNC\u00ae","description":"The world&#039;s safest remote access software","publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.realvnc.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.realvnc.com\/en\/#organization","name":"RealVNC\u00ae","url":"https:\/\/www.realvnc.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","width":300,"height":41,"caption":"RealVNC\u00ae"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/realvnc","https:\/\/x.com\/realvnc","https:\/\/www.linkedin.com\/company\/realvnc\/","https:\/\/www.youtube.com\/RealVNCLtd","https:\/\/en.wikipedia.org\/wiki\/RealVNC"]},{"@type":"Person","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/01b6bf08521717030ba8b5904cbdfc49","name":"Nick Cavalancia, 4-time Microsoft MVP","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g","caption":"Nick Cavalancia, 4-time Microsoft MVP"},"description":"Nick Cavalancia is a four-time Microsoft MVP, has over 28 years of enterprise IT experience, is an accomplished consultant, speaker, trainer, writer, and columnist, and has achieved industry certifications including MCSE, MCT, Master CNE, and Master CNI. He has authored, co-authored and contributed to dozens of books on various technologies. Nick regularly speaks, writes and blogs for some of the most recognized tech companies today on topics including cybersecurity, cloud adoption, business continuity, and compliance."}]}},"_links":{"self":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/12458","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/users\/20"}],"version-history":[{"count":0,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/12458\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media\/12459"}],"wp:attachment":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media?parent=12458"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog_category?post=12458"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}