{"id":13030,"date":"2022-08-15T15:38:28","date_gmt":"2022-08-15T15:38:28","guid":{"rendered":"https:\/\/www.realvnc.com\/?post_type=blog&#038;p=13030"},"modified":"2022-08-16T09:58:50","modified_gmt":"2022-08-16T09:58:50","slug":"3-ways-remote-access-cyber-insurance","status":"publish","type":"blog","link":"https:\/\/www.realvnc.com\/en\/blog\/3-ways-remote-access-cyber-insurance\/","title":{"rendered":"3 Ways Remote Access Can Make or Break Obtaining Cyber Insurance"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"13030\" class=\"elementor elementor-13030\" data-elementor-post-type=\"blog\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-99edeb1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"99edeb1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5dc802c3\" data-id=\"5dc802c3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4d3770ac elementor-widget elementor-widget-text-editor\" data-id=\"4d3770ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A few years back, when cyber insurance policies were a new thing, it was a bit like the \u201cwild west\u201d, with no insurer truly having a grasp on how the insured organization\u2019s state of cybersecurity readiness played a role in whether an attack would occur and, therefore, a claim being made. \u00a0But today\u2019s insurers have taken steps to better understand where the sources of risk (that could cause them to need to payout on a claim) are\u2013 with many of those risks coming from within your own environment.<\/p><p>Because of this, in the last year, we saw <a href=\"https:\/\/blog.knowbe4.com\/wsj-cyber-insurance-went-up-a-whopping-92-in-2021\">massive increases in cyber insurance premiums<\/a> rise for policies covering cyberattacks, but <a href=\"https:\/\/panaseer.com\/reports-papers\/report\/cyber-insurance-trends\">most cyber insurers expect this trend to continue<\/a> with 74% of them saying that an inability to accurately understand a customer\u2019s security posture is having an impact on policy prices.<\/p><p>The severity and sophistication of attacks have resulted in underwriters more deeply scrutinizing an organization\u2019s security posture to determine how much risk the organization itself adds to the equation. Some of the more common aspects of your cybersecurity that fall under scrutiny include specific technologies underwriters want to see in place. \u00a0<\/p><p>A recent article written by insurance brokerage firm <em>Woodruff Sawyer<\/em> lists <a href=\"https:\/\/www.jdsupra.com\/legalnews\/6-things-underwriters-look-for-in-your-4539072\/\">six key security controls they continually see as being critical to insurers<\/a> when they are considering whether to insure your organization. \u00a0Using the context of the security controls mentioned in that article, I want to cover three ways Remote Access can actually <em>harm<\/em> your chances of obtaining cyber insurance:<\/p><ul><li><strong>Remote Access <em>Could<\/em> Bypass Multi-Factor Authentication (MFA)<\/strong> \u2013 <a href=\"https:\/\/www.realvnc.com\/en\/blog\/3-reasons-why-mfa-remote-access-strategy\/\">MFA is a key component<\/a> cyber insurers want to see implemented. Most organizations that have MFA in place tend not to have it in place organization-wide, regardless of user, location, or method of connection.\u00a0 Remote Access is one of those methodologies that seem to fall behind when MFA is implemented.\u00a0 But let me be clear \u2013 on its own merit to help protect your organization, you need to have every last user across any method of connection using MFA, period. Then as you add in the need for cyber insurance, the more broadly your MFA is implemented, the lower your risk profile will appear to your cyber insurer. So, this applies to your use of Remote Access; anytime a user connects, there <em>must<\/em> be MFA in place as part of their authentication.<\/li><li><strong>Remote Access Could Provide Access Despite Network Segmentation<\/strong> \u2013 One of the six key security controls is the segmenting of networks, subnets, etc. to help minimize the ability to laterally move during a cyberattack. Many organizations solely focus on productivity when implementing remote access, which may actually provide cross-segment access that could facilitate lateral movement. It\u2019s important to think about any segmentation policies you have in place and ensure that any remote access solution you have in place adheres to the intent of those policies.<\/li><li><strong>RDP-based Remote Access Isn\u2019t Inherently Secure<\/strong> \u2013 Cyber insurers have a decent grasp on the general state of the use of RDP, stating \u201c<em>Organizations are encouraged to turn off RDP unless absolutely necessary. If RDP is needed at any point, the connection should be secured by a combination of a VPN and multi-factor authentication.<\/em>\u201d It\u2019s not that RDP is bad; it\u2019s that most implementations aren\u2019t secure. It <em>is<\/em> possible to <a href=\"https:\/\/www.realvnc.com\/en\/blog\/breaking-down-rdp-vs-secure-remote-access\/\">implement Remote Desktop Services<\/a> (which exists separately from the built-in RDP access to Windows\u2019 endpoints) but this requires additional work to install and configure.\u00a0 Additionally, RDP inherently doesn\u2019t help address the security needed for specific types of connection scenarios \u2013 for example, even the Woodruff Sawyer folks see the need to augment an inbound RDP connection with a VPN.\u00a0 Your remote access needs to offer multiple methods of securing the authentication, connection, and even the level of access granted via the remote session to create its own defense-in-depth strategy to minimize the possibility that someone can misuse your remote access in all of its possible scenarios within your organization.<\/li><\/ul><p>It&#8217;s important to know that insurers have different requirements that define what security measures, solutions, policies, etc. need to be in place in order to obtain coverage. So, both the referenced article and the recommendations above are \u2013 by no means \u2013 a comprehensive explanation of what your remote access, in essence, shouldn\u2019t be doing in order to get coverage.\u00a0 Instead, think of the three ways listed above as guidance around what you don\u2019t want your remote access to be doing \u2013 both from a \u201cwe want to get a cyber insurance policy\u201d standpoint, as well as \u201cdon\u2019t you want your environment to be secure anyways?\u201d standpoint.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyber Insurers are scrutinizing exactly what the state of your organization\u2019s security stance looks like in order to obtain a policy \u2013 something remote access has quite a bit to say about.<\/p>\n","protected":false},"author":20,"featured_media":13031,"template":"","blog_category":[280,281,257],"class_list":["post-13030","blog","type-blog","status-publish","has-post-thumbnail","hentry","blog_category-featured","blog_category-remote-access","blog_category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>3 Ways Remote Access Can Make or Break Obtaining Cyber Insurance<\/title>\n<meta name=\"description\" content=\"Cyber Insurers are scrutinizing the state of your organization\u2019s security stance looks like before offering you a policy. Find out why!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.realvnc.com\/en\/blog\/3-ways-remote-access-cyber-insurance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 Ways Remote Access Can Make or Break Obtaining Cyber Insurance\" \/>\n<meta property=\"og:description\" content=\"Cyber Insurers are scrutinizing the state of your organization\u2019s security stance looks like before offering you a policy. Find out why!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.realvnc.com\/en\/blog\/3-ways-remote-access-cyber-insurance\/\" \/>\n<meta property=\"og:site_name\" content=\"RealVNC\u00ae\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/realvnc\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-16T09:58:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/08\/Cyberattacks-insurance-security-VNC-Connect.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1355\" \/>\n\t<meta property=\"og:image:height\" content=\"774\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@realvnc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/3-ways-remote-access-cyber-insurance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/3-ways-remote-access-cyber-insurance\\\/\"},\"author\":{\"name\":\"Nick Cavalancia, 4-time Microsoft MVP\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/01b6bf08521717030ba8b5904cbdfc49\"},\"headline\":\"3 Ways Remote Access Can Make or Break Obtaining Cyber Insurance\",\"datePublished\":\"2022-08-15T15:38:28+00:00\",\"dateModified\":\"2022-08-16T09:58:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/3-ways-remote-access-cyber-insurance\\\/\"},\"wordCount\":776,\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/3-ways-remote-access-cyber-insurance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Cyberattacks-insurance-security-VNC-Connect.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/3-ways-remote-access-cyber-insurance\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/3-ways-remote-access-cyber-insurance\\\/\",\"name\":\"3 Ways Remote Access Can Make or Break Obtaining Cyber Insurance\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/3-ways-remote-access-cyber-insurance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/3-ways-remote-access-cyber-insurance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Cyberattacks-insurance-security-VNC-Connect.jpg\",\"datePublished\":\"2022-08-15T15:38:28+00:00\",\"dateModified\":\"2022-08-16T09:58:50+00:00\",\"description\":\"Cyber Insurers are scrutinizing the state of your organization\u2019s security stance looks like before offering you a policy. Find out why!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/3-ways-remote-access-cyber-insurance\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/3-ways-remote-access-cyber-insurance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/3-ways-remote-access-cyber-insurance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Cyberattacks-insurance-security-VNC-Connect.jpg\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Cyberattacks-insurance-security-VNC-Connect.jpg\",\"width\":1355,\"height\":774,\"caption\":\"Cyberattacks insurance security VNC Connect\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/3-ways-remote-access-cyber-insurance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"3 Ways Remote Access Can Make or Break Obtaining Cyber Insurance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"name\":\"RealVNC\u00ae\",\"description\":\"The world&#039;s safest remote access software\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\",\"name\":\"RealVNC\u00ae\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"width\":300,\"height\":41,\"caption\":\"RealVNC\u00ae\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/realvnc\",\"https:\\\/\\\/x.com\\\/realvnc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/realvnc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/RealVNCLtd\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/RealVNC\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/01b6bf08521717030ba8b5904cbdfc49\",\"name\":\"Nick Cavalancia, 4-time Microsoft MVP\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g\",\"caption\":\"Nick Cavalancia, 4-time Microsoft MVP\"},\"description\":\"Nick Cavalancia is a four-time Microsoft MVP, has over 28 years of enterprise IT experience, is an accomplished consultant, speaker, trainer, writer, and columnist, and has achieved industry certifications including MCSE, MCT, Master CNE, and Master CNI. He has authored, co-authored and contributed to dozens of books on various technologies. Nick regularly speaks, writes and blogs for some of the most recognized tech companies today on topics including cybersecurity, cloud adoption, business continuity, and compliance.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3 Ways Remote Access Can Make or Break Obtaining Cyber Insurance","description":"Cyber Insurers are scrutinizing the state of your organization\u2019s security stance looks like before offering you a policy. Find out why!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.realvnc.com\/en\/blog\/3-ways-remote-access-cyber-insurance\/","og_locale":"en_US","og_type":"article","og_title":"3 Ways Remote Access Can Make or Break Obtaining Cyber Insurance","og_description":"Cyber Insurers are scrutinizing the state of your organization\u2019s security stance looks like before offering you a policy. Find out why!","og_url":"https:\/\/www.realvnc.com\/en\/blog\/3-ways-remote-access-cyber-insurance\/","og_site_name":"RealVNC\u00ae","article_publisher":"https:\/\/www.facebook.com\/realvnc","article_modified_time":"2022-08-16T09:58:50+00:00","og_image":[{"width":1355,"height":774,"url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/08\/Cyberattacks-insurance-security-VNC-Connect.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@realvnc","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.realvnc.com\/en\/blog\/3-ways-remote-access-cyber-insurance\/#article","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/3-ways-remote-access-cyber-insurance\/"},"author":{"name":"Nick Cavalancia, 4-time Microsoft MVP","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/01b6bf08521717030ba8b5904cbdfc49"},"headline":"3 Ways Remote Access Can Make or Break Obtaining Cyber Insurance","datePublished":"2022-08-15T15:38:28+00:00","dateModified":"2022-08-16T09:58:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/3-ways-remote-access-cyber-insurance\/"},"wordCount":776,"publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/3-ways-remote-access-cyber-insurance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/08\/Cyberattacks-insurance-security-VNC-Connect.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.realvnc.com\/en\/blog\/3-ways-remote-access-cyber-insurance\/","url":"https:\/\/www.realvnc.com\/en\/blog\/3-ways-remote-access-cyber-insurance\/","name":"3 Ways Remote Access Can Make or Break Obtaining Cyber Insurance","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/3-ways-remote-access-cyber-insurance\/#primaryimage"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/3-ways-remote-access-cyber-insurance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/08\/Cyberattacks-insurance-security-VNC-Connect.jpg","datePublished":"2022-08-15T15:38:28+00:00","dateModified":"2022-08-16T09:58:50+00:00","description":"Cyber Insurers are scrutinizing the state of your organization\u2019s security stance looks like before offering you a policy. Find out why!","breadcrumb":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/3-ways-remote-access-cyber-insurance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.realvnc.com\/en\/blog\/3-ways-remote-access-cyber-insurance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/blog\/3-ways-remote-access-cyber-insurance\/#primaryimage","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/08\/Cyberattacks-insurance-security-VNC-Connect.jpg","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/08\/Cyberattacks-insurance-security-VNC-Connect.jpg","width":1355,"height":774,"caption":"Cyberattacks insurance security VNC Connect"},{"@type":"BreadcrumbList","@id":"https:\/\/www.realvnc.com\/en\/blog\/3-ways-remote-access-cyber-insurance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.realvnc.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blogs","item":"https:\/\/www.realvnc.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"3 Ways Remote Access Can Make or Break Obtaining Cyber Insurance"}]},{"@type":"WebSite","@id":"https:\/\/www.realvnc.com\/en\/#website","url":"https:\/\/www.realvnc.com\/en\/","name":"RealVNC\u00ae","description":"The world&#039;s safest remote access software","publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.realvnc.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.realvnc.com\/en\/#organization","name":"RealVNC\u00ae","url":"https:\/\/www.realvnc.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","width":300,"height":41,"caption":"RealVNC\u00ae"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/realvnc","https:\/\/x.com\/realvnc","https:\/\/www.linkedin.com\/company\/realvnc\/","https:\/\/www.youtube.com\/RealVNCLtd","https:\/\/en.wikipedia.org\/wiki\/RealVNC"]},{"@type":"Person","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/01b6bf08521717030ba8b5904cbdfc49","name":"Nick Cavalancia, 4-time Microsoft MVP","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g","caption":"Nick Cavalancia, 4-time Microsoft MVP"},"description":"Nick Cavalancia is a four-time Microsoft MVP, has over 28 years of enterprise IT experience, is an accomplished consultant, speaker, trainer, writer, and columnist, and has achieved industry certifications including MCSE, MCT, Master CNE, and Master CNI. He has authored, co-authored and contributed to dozens of books on various technologies. Nick regularly speaks, writes and blogs for some of the most recognized tech companies today on topics including cybersecurity, cloud adoption, business continuity, and compliance."}]}},"_links":{"self":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/13030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/users\/20"}],"version-history":[{"count":0,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/13030\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media\/13031"}],"wp:attachment":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media?parent=13030"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog_category?post=13030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}