{"id":12829,"date":"2022-07-20T15:22:32","date_gmt":"2022-07-20T15:22:32","guid":{"rendered":"https:\/\/www.realvnc.com\/?post_type=blog&#038;p=12829"},"modified":"2024-02-20T16:45:38","modified_gmt":"2024-02-20T16:45:38","slug":"why-remote-access-solution-security-matters","status":"publish","type":"blog","link":"https:\/\/www.realvnc.com\/en\/blog\/why-remote-access-solution-security-matters\/","title":{"rendered":"Why Your Remote Access Solution\u2019s Own Security Really Matters"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"12829\" class=\"elementor elementor-12829\" data-elementor-post-type=\"blog\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-69cf47f2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"69cf47f2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-67eaf795\" data-id=\"67eaf795\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-47891aab elementor-widget elementor-widget-text-editor\" data-id=\"47891aab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>No matter what method of <a href=\"https:\/\/www.realvnc.com\/en\/discover\/remote-access\/\">remote access<\/a> your organization utilizes, it\u2019s created and supported by a third-party vendor. That makes the vendor (and Remote Access solution) part of your supply chain \u2013 which should be a concern within the context of your organization\u2019s cybersecurity stance. Cybercriminals are looking for exploits in the software supply chain now more than ever, with dark web posts offering millions of dollars for zero-day exploits.<\/p>\n<p>Recent industry data agrees that:<\/p>\n<ul>\n<li>The supply chain was responsible for <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\">62% of System Intrusion data breach incidents<\/a><\/li>\n<li>Vulnerability exploitation was the <a href=\"https:\/\/www.ibm.com\/downloads\/cas\/ADLMYLAZ\">top infection vector in 34% of cyberattacks<\/a><\/li>\n<li>The primary infection vector in <a href=\"https:\/\/www.cybereason.com\/blog\/report-ransomware-attacks-and-the-true-cost-to-business-2022\">64% of successful ransomware attacks in the last 24 months was third-party supply chain compromise<\/a><\/li>\n<\/ul>\n<p>The <a href=\"https:\/\/attack.mitre.org\/\">MITRE ATT&amp;CK Framework<\/a> defines an exploit as \u201ca software vulnerability to take advantage of a programming error in a program, service, or within the operating system software or the kernel itself.\u201d The framework cites the use of <em>exploits<\/em> for a number of malicious reasons in Enterprise environments:<\/p>\n<ul>\n<li>Privilege Escalation (<a href=\"https:\/\/attack.mitre.org\/techniques\/T1068\/\">MITRE Technique T1068<\/a>)<\/li>\n<li>Client Execution (<a href=\"https:\/\/attack.mitre.org\/techniques\/T1203\/\">MITRE Technique T1203<\/a>)<\/li>\n<li>Defense Evasion (<a href=\"https:\/\/attack.mitre.org\/techniques\/T1211\/\">MITRE Technique T1211<\/a>)<\/li>\n<li>Credential Access (<a href=\"https:\/\/attack.mitre.org\/techniques\/T1212\/\">MITRE Technique T1212<\/a>)<\/li>\n<\/ul>\n<p>Remote Access is so important to cybercriminals that MITRE mentions the malicious use of \u201cremote services\u201d a number of times within the Framework (as demonstrated above), including the specific exploitation of solutions providing remote access for lateral movement (<a href=\"https:\/\/attack.mitre.org\/techniques\/T1210\/\">Exploitation of Remote Services T1210<\/a>).<\/p>\n<p>So, it becomes somewhat evident that solutions providing Remote Access functionality should be a bit more important to the security of your software supply chain. Sure, every piece of software in your supply chain is important to secure. But taking MITRE\u2019s lead, any \u201cremote services\u201d are already a focus for cybercriminals and, therefore, present a higher degree of risk, requiring you to ensure your Remote Access solution is secure.<\/p>\n<p>There are two high-level concerns you should be reviewing to ensure your Remote Access solution is secure.&nbsp; One revolves around the security state of the solution itself, and the other has to do with how the solution is used.<\/p>\n<h2>Your Remote Access Solution Should Be Invulnerable<\/h2>\n<p>It\u2019s a tall order, as zero-day exploits conceptually exist. But continually striving to reach the goal of keeping your Remote Access solutions as invulnerable to attacks as possible is key.&nbsp; This starts with keeping any solution that is part of your software supply chain continually updated.&nbsp;<\/p>\n<p>Many cybersecurity standards, cyber insurance requirements, and regulatory frameworks are all adding in the need for organizations like yours to consider, assess, and manage any supply chain risk that may exist. So, it becomes important to also inquire with your Remote Access vendor about the current state of the security of their solution, its architecture, services, executables, etc.<\/p>\n<p>Credible external validation of your vendor\u2019s security provides substantial evidence of any claim that a Remote Access solution is secure.&nbsp; For example, RealVNC recently <a href=\"https:\/\/www.realvnc.com\/en\/blog\/cure53-security-audit-reaffirms-realvnc-strong-security-stance\/\">underwent an external security audit of their solution<\/a> by security analysis vendor <a href=\"https:\/\/cure53.de\/\">Cure53<\/a>. This analysis included both white-box penetration testing, as well as an audit of the source code. This included all solution clients, applications, servers, and related backend APIs.<\/p>\n<p>This is a great example of not just a vendor establishing their solution is secure, but also of the kind of documentation that is helpful in circumstances where your organization needs to demonstrate low or no risk in the software supply chain.<\/p>\n<h2>Your Remote Access Authentication Should Also Be Secure<\/h2>\n<p>It\u2019s important to truly know the solutions your organization relies on are secure, but it\u2019s also just as critical to know that the way you use your Remote Access solution reduces the attack surface by threat actors. &nbsp;There are a number of <a href=\"https:\/\/www.realvnc.com\/en\/blog\/counteracting-remote-access-mitre-threat-actions-vnc\/\">specific threat techniques used to take advantage of existing Remote Access services in place<\/a>.&nbsp; In most of these cases, the threat actor either has a compromised set of credentials in their possession or is using a password spraying technique to guess the password of a given credential.<\/p>\n<p>To counteract this, the use of your Remote Access solution should include secure authentication that looks beyond simple username-password combinations. Integration with external directory services (such as Active Directory and cloud-based identity stores) is a good starting point and can help ensure complex passwords that are difficult to guess are used via password policies.&nbsp; The <a href=\"https:\/\/www.realvnc.com\/en\/blog\/3-reasons-why-mfa-remote-access-strategy\/\">use of multi-factor authentication is probably the most important<\/a>, as it mitigates attacks via Remote Access regardless of whether the credentials are compromised or if password spraying is used. It\u2019s also important to note here that this use of MFA is important regardless of whether the Remote Access is exposed to the Internet or used internally, as threat actors use each for different purposes during a cyberattack.<\/p>\n<h2>Remote Access Security Can Determine Organizational Security<\/h2>\n<p>With Remote Access connecting users directly to internal resources, a vulnerable Remote Access solution can be the sole difference between a secure and insecure environment. So, it\u2019s critical that organizations assess the risk a Remote Access solution introduces. Whether it\u2019s due to the potential security state of the solution itself, or how that solution is configured to be used, any increased risk to the organization must be identified and mitigated.&nbsp;<\/p>\n<p>By verifying that your Remote Access solution has been externally validated as being secure from both a code review and penetration testing perspective, you effectively minimize the software supply chain risk your chosen solution poses. And by introducing secure authentication \u2013 specifically multi-factor authentication \u2013 you, at a minimum, make it incredibly difficult for Remote Access to be used for nefarious purposes if not stop them completely.<\/p>\n<p>Remote Access will continue to be a necessity for organizations.&nbsp; But so will threat actors and cybercriminal groups that assume you have some form of Remote Access in place and are looking to take advantage of it. By looking to ensure your Remote Access solution is secure, you minimize the threat surface that Remote Access inherently introduces for both externally-, and internally facing remote services.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>With third-party Remote Access solutions providing access to internal resources and elevated privileges, knowing the solution you employ is truly secure should be a critical part of your security strategy.<\/p>\n","protected":false},"author":20,"featured_media":12830,"template":"","blog_category":[280,281,257],"class_list":["post-12829","blog","type-blog","status-publish","has-post-thumbnail","hentry","blog_category-featured","blog_category-remote-access","blog_category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why Your Remote Access Solution\u2019s Own Security Really Matters<\/title>\n<meta name=\"description\" content=\"Knowing your remote access solution is truly secure is essential to your security strategy, as it accesses critical internal resources.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.realvnc.com\/en\/blog\/why-remote-access-solution-security-matters\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Your Remote Access Solution\u2019s Own Security Really Matters\" \/>\n<meta property=\"og:description\" content=\"Knowing your remote access solution is truly secure is essential to your security strategy, as it accesses critical internal resources.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.realvnc.com\/en\/blog\/why-remote-access-solution-security-matters\/\" \/>\n<meta property=\"og:site_name\" content=\"RealVNC\u00ae\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/realvnc\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-20T16:45:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/07\/Why-remote-access-solution-security-matters-VNC-Connect.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1366\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@realvnc\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/why-remote-access-solution-security-matters\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/why-remote-access-solution-security-matters\\\/\"},\"author\":{\"name\":\"Nick Cavalancia, 4-time Microsoft MVP\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/01b6bf08521717030ba8b5904cbdfc49\"},\"headline\":\"Why Your Remote Access Solution\u2019s Own Security Really Matters\",\"datePublished\":\"2022-07-20T15:22:32+00:00\",\"dateModified\":\"2024-02-20T16:45:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/why-remote-access-solution-security-matters\\\/\"},\"wordCount\":1007,\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/why-remote-access-solution-security-matters\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Why-remote-access-solution-security-matters-VNC-Connect.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/why-remote-access-solution-security-matters\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/why-remote-access-solution-security-matters\\\/\",\"name\":\"Why Your Remote Access Solution\u2019s Own Security Really Matters\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/why-remote-access-solution-security-matters\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/why-remote-access-solution-security-matters\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Why-remote-access-solution-security-matters-VNC-Connect.jpg\",\"datePublished\":\"2022-07-20T15:22:32+00:00\",\"dateModified\":\"2024-02-20T16:45:38+00:00\",\"description\":\"Knowing your remote access solution is truly secure is essential to your security strategy, as it accesses critical internal resources.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/why-remote-access-solution-security-matters\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/why-remote-access-solution-security-matters\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/why-remote-access-solution-security-matters\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Why-remote-access-solution-security-matters-VNC-Connect.jpg\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Why-remote-access-solution-security-matters-VNC-Connect.jpg\",\"width\":1366,\"height\":768,\"caption\":\"Why remote access solution security matters VNC Connect\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/why-remote-access-solution-security-matters\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Why Your Remote Access Solution\u2019s Own Security Really Matters\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"name\":\"RealVNC\u00ae\",\"description\":\"The world&#039;s safest remote access software\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\",\"name\":\"RealVNC\u00ae\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"width\":300,\"height\":41,\"caption\":\"RealVNC\u00ae\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/realvnc\",\"https:\\\/\\\/x.com\\\/realvnc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/realvnc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/RealVNCLtd\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/RealVNC\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/01b6bf08521717030ba8b5904cbdfc49\",\"name\":\"Nick Cavalancia, 4-time Microsoft MVP\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g\",\"caption\":\"Nick Cavalancia, 4-time Microsoft MVP\"},\"description\":\"Nick Cavalancia is a four-time Microsoft MVP, has over 28 years of enterprise IT experience, is an accomplished consultant, speaker, trainer, writer, and columnist, and has achieved industry certifications including MCSE, MCT, Master CNE, and Master CNI. He has authored, co-authored and contributed to dozens of books on various technologies. Nick regularly speaks, writes and blogs for some of the most recognized tech companies today on topics including cybersecurity, cloud adoption, business continuity, and compliance.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Your Remote Access Solution\u2019s Own Security Really Matters","description":"Knowing your remote access solution is truly secure is essential to your security strategy, as it accesses critical internal resources.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.realvnc.com\/en\/blog\/why-remote-access-solution-security-matters\/","og_locale":"en_US","og_type":"article","og_title":"Why Your Remote Access Solution\u2019s Own Security Really Matters","og_description":"Knowing your remote access solution is truly secure is essential to your security strategy, as it accesses critical internal resources.","og_url":"https:\/\/www.realvnc.com\/en\/blog\/why-remote-access-solution-security-matters\/","og_site_name":"RealVNC\u00ae","article_publisher":"https:\/\/www.facebook.com\/realvnc","article_modified_time":"2024-02-20T16:45:38+00:00","og_image":[{"width":1366,"height":768,"url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/07\/Why-remote-access-solution-security-matters-VNC-Connect.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@realvnc","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.realvnc.com\/en\/blog\/why-remote-access-solution-security-matters\/#article","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/why-remote-access-solution-security-matters\/"},"author":{"name":"Nick Cavalancia, 4-time Microsoft MVP","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/01b6bf08521717030ba8b5904cbdfc49"},"headline":"Why Your Remote Access Solution\u2019s Own Security Really Matters","datePublished":"2022-07-20T15:22:32+00:00","dateModified":"2024-02-20T16:45:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/why-remote-access-solution-security-matters\/"},"wordCount":1007,"publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/why-remote-access-solution-security-matters\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/07\/Why-remote-access-solution-security-matters-VNC-Connect.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.realvnc.com\/en\/blog\/why-remote-access-solution-security-matters\/","url":"https:\/\/www.realvnc.com\/en\/blog\/why-remote-access-solution-security-matters\/","name":"Why Your Remote Access Solution\u2019s Own Security Really Matters","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/why-remote-access-solution-security-matters\/#primaryimage"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/why-remote-access-solution-security-matters\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/07\/Why-remote-access-solution-security-matters-VNC-Connect.jpg","datePublished":"2022-07-20T15:22:32+00:00","dateModified":"2024-02-20T16:45:38+00:00","description":"Knowing your remote access solution is truly secure is essential to your security strategy, as it accesses critical internal resources.","breadcrumb":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/why-remote-access-solution-security-matters\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.realvnc.com\/en\/blog\/why-remote-access-solution-security-matters\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/blog\/why-remote-access-solution-security-matters\/#primaryimage","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/07\/Why-remote-access-solution-security-matters-VNC-Connect.jpg","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/07\/Why-remote-access-solution-security-matters-VNC-Connect.jpg","width":1366,"height":768,"caption":"Why remote access solution security matters VNC Connect"},{"@type":"BreadcrumbList","@id":"https:\/\/www.realvnc.com\/en\/blog\/why-remote-access-solution-security-matters\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.realvnc.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blogs","item":"https:\/\/www.realvnc.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"Why Your Remote Access Solution\u2019s Own Security Really Matters"}]},{"@type":"WebSite","@id":"https:\/\/www.realvnc.com\/en\/#website","url":"https:\/\/www.realvnc.com\/en\/","name":"RealVNC\u00ae","description":"The world&#039;s safest remote access software","publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.realvnc.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.realvnc.com\/en\/#organization","name":"RealVNC\u00ae","url":"https:\/\/www.realvnc.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","width":300,"height":41,"caption":"RealVNC\u00ae"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/realvnc","https:\/\/x.com\/realvnc","https:\/\/www.linkedin.com\/company\/realvnc\/","https:\/\/www.youtube.com\/RealVNCLtd","https:\/\/en.wikipedia.org\/wiki\/RealVNC"]},{"@type":"Person","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/01b6bf08521717030ba8b5904cbdfc49","name":"Nick Cavalancia, 4-time Microsoft MVP","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g","caption":"Nick Cavalancia, 4-time Microsoft MVP"},"description":"Nick Cavalancia is a four-time Microsoft MVP, has over 28 years of enterprise IT experience, is an accomplished consultant, speaker, trainer, writer, and columnist, and has achieved industry certifications including MCSE, MCT, Master CNE, and Master CNI. He has authored, co-authored and contributed to dozens of books on various technologies. Nick regularly speaks, writes and blogs for some of the most recognized tech companies today on topics including cybersecurity, cloud adoption, business continuity, and compliance."}]}},"_links":{"self":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/12829","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/users\/20"}],"version-history":[{"count":0,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/12829\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media\/12830"}],"wp:attachment":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media?parent=12829"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog_category?post=12829"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}