{"id":13061,"date":"2022-08-19T11:48:44","date_gmt":"2022-08-19T11:48:44","guid":{"rendered":"https:\/\/www.realvnc.com\/?post_type=blog&#038;p=13061"},"modified":"2022-08-19T14:22:52","modified_gmt":"2022-08-19T14:22:52","slug":"how-vnc-connect-protects-organization-against-threats-default","status":"publish","type":"blog","link":"https:\/\/www.realvnc.com\/en\/blog\/how-vnc-connect-protects-organization-against-threats-default\/","title":{"rendered":"How VNC Connect protects your organization against threats, by default"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"13061\" class=\"elementor elementor-13061\" data-elementor-post-type=\"blog\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3d7a93b7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3d7a93b7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8b3186f\" data-id=\"8b3186f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-15a90d4e elementor-widget elementor-widget-text-editor\" data-id=\"15a90d4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>You can <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/over-9-000-vnc-servers-exposed-online-without-a-password\/\">read the article here, on Bleeping Computer<\/a>.\u00a0<\/p><p>We cannot comment specifically on the security of other VNC-based remote access solutions; no two software solutions are the same. However, it\u2019s paramount that IT teams implement a secure remote access strategy to ensure they have selected a properly configured solution. This needs to be supported by a well enforced IT policy, that meets the business\u2019s security requirements.<\/p><p>Informed by <a href=\"https:\/\/www.realvnc.com\/en\/connect\/security\/\">our four security principles<\/a>, VNC Connect is built to be secure by design, helping protect your company from malicious actors. For starters, a RealVNC VNC Server requires users to set a password.<\/p><h2>Ensuring you have a secure solution out-of-the-box<\/h2><p>All VNC Connect plans include cloud access control, where users \u2013 or groups of users &#8211; are granted access to devices. Without this access control granted, nobody can discover devices or attempt to connect to them.<\/p><p>Our VNC Connect paid plans are equipped with <strong>OS-based authentication by default<\/strong>, allowing users on Windows-based machines, for example, to authenticate remotely using their existing Windows \/ ActiveDirectory credentials. Remote access servers should never be configured for use with no authentication method, even on internal networks. It is important to note here that it is ultimately the device running RealVNC&#8217;s VNC Server that decides who can connect and with what permissions.<\/p><p>The article mentions, <em>&#8220;If poorly secured servers whose passwords are easy to crack were included in the investigation, the number of potentially vulnerable instances would be much more significant.&#8221; <\/em><\/p><p>Even where public direct connections are in use, all RealVNC products include rate-limiting by default (also known as blacklisting). It strengthens security by blocking further connection requests after several failed attempts, hampering any authentication brute-force attacks. Your business can also configure rules to allow or deny connections at an IP address or subnet level.<\/p><p>The best line of defense is to enable multi-factor authentication. Several <a href=\"https:\/\/help.realvnc.com\/hc\/en-us\/articles\/360002250077-Introduction-to-Multi-Factor-Authentication-\">multi-factor authentication schemes<\/a> are supported by VNC Connect &#8211; such as <a href=\"https:\/\/help.realvnc.com\/hc\/en-us\/articles\/360002253538-Setting-up-RADIUS-Authentication-\">RADIUS<\/a>, Duo, and smartcard\/certificate. All these reduce the sole reliance on keeping your passwords from being compromised and force you to authenticate with something you know and have, meaning only valid users can connect.<\/p><p>Further on, the article says: <em>&#8220;On that front, it is essential to remember that many VNC products do not support passwords longer than eight characters, so they are inherently insecure even when the sessions and passwords are encrypted.&#8221;<\/em><\/p><p>The 8-character password limit is restricted to the legacy <em>VNC Auth<\/em> authentication type and not enabled by default in VNC Connect. To enable this setup, a VNC Connect user would not only have to manually switch to this authentication type but also disable encryption.<\/p><p>If a user were to do this, they would be warned by an on-screen message warning them against proceeding with this setup.<\/p><h2>Transparent security<\/h2><p>We at RealVNC are proud of our security stance, and a recent external <a href=\"https:\/\/www.realvnc.com\/en\/blog\/cure53-security-audit-reaffirms-realvnc-strong-security-stance\/\">white-box security audit has verified our security claims for VNC Connect.<\/a> Cure53, a Berlin-based IT security consultancy, had full access to the product source code, internal documentation\/APIs, and a direct line to our developers, allowing them to verify our security and secure development practices. We&#8217;ll be talking more about the importance of security in remote access while exhibiting at Infosecurity World 2022 in September, which we&#8217;ll announce soon.<\/p><p>You can download the full report <a href=\"https:\/\/www.realvnc.com\/en\/cure53-report-download\/\">here<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>In the world of remote access, security threats are always lurking on the horizon. A recent article regarding the safety of VNC servers has once again highlighted that fact, reaffirming the importance of organizations having robust security in place.<\/p>\n","protected":false},"author":10,"featured_media":13056,"template":"","blog_category":[280,257,255],"class_list":["post-13061","blog","type-blog","status-publish","has-post-thumbnail","hentry","blog_category-featured","blog_category-security","blog_category-vnc-connect"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How VNC Connect protects your organization against threats, by default<\/title>\n<meta name=\"description\" content=\"Informed by our four security principles, VNC Connect is built to be secure by design, helping protect your company from malicious actors.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.realvnc.com\/en\/blog\/how-vnc-connect-protects-organization-against-threats-default\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How VNC Connect protects your organization against threats, by default\" \/>\n<meta property=\"og:description\" content=\"Informed by our four security principles, VNC Connect is built to be secure by design, helping protect your company from malicious actors.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.realvnc.com\/en\/blog\/how-vnc-connect-protects-organization-against-threats-default\/\" \/>\n<meta property=\"og:site_name\" content=\"RealVNC\u00ae\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/realvnc\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-19T14:22:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/08\/VNC-Connect-secure-by-default.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1256\" \/>\n\t<meta property=\"og:image:height\" content=\"835\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@realvnc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/how-vnc-connect-protects-organization-against-threats-default\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/how-vnc-connect-protects-organization-against-threats-default\\\/\"},\"author\":{\"name\":\"Ben May\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/45177f2aad9f69d2e4c699c8fec53fe9\"},\"headline\":\"How VNC Connect protects your organization against threats, by default\",\"datePublished\":\"2022-08-19T11:48:44+00:00\",\"dateModified\":\"2022-08-19T14:22:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/how-vnc-connect-protects-organization-against-threats-default\\\/\"},\"wordCount\":562,\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/how-vnc-connect-protects-organization-against-threats-default\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/VNC-Connect-secure-by-default.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/how-vnc-connect-protects-organization-against-threats-default\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/how-vnc-connect-protects-organization-against-threats-default\\\/\",\"name\":\"How VNC Connect protects your organization against threats, by default\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/how-vnc-connect-protects-organization-against-threats-default\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/how-vnc-connect-protects-organization-against-threats-default\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/VNC-Connect-secure-by-default.jpg\",\"datePublished\":\"2022-08-19T11:48:44+00:00\",\"dateModified\":\"2022-08-19T14:22:52+00:00\",\"description\":\"Informed by our four security principles, VNC Connect is built to be secure by design, helping protect your company from malicious actors.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/how-vnc-connect-protects-organization-against-threats-default\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/how-vnc-connect-protects-organization-against-threats-default\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/how-vnc-connect-protects-organization-against-threats-default\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/VNC-Connect-secure-by-default.jpg\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/VNC-Connect-secure-by-default.jpg\",\"width\":1256,\"height\":835,\"caption\":\"VNC Connect secure by default\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/how-vnc-connect-protects-organization-against-threats-default\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How VNC Connect protects your organization against threats, by default\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"name\":\"RealVNC\u00ae\",\"description\":\"The world&#039;s safest remote access software\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\",\"name\":\"RealVNC\u00ae\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"width\":300,\"height\":41,\"caption\":\"RealVNC\u00ae\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/realvnc\",\"https:\\\/\\\/x.com\\\/realvnc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/realvnc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/RealVNCLtd\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/RealVNC\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/45177f2aad9f69d2e4c699c8fec53fe9\",\"name\":\"Ben May\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0acb79a8bf37eb0c60e57425e9f80989ca6095db9a704a8108d6152f27a693d4?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0acb79a8bf37eb0c60e57425e9f80989ca6095db9a704a8108d6152f27a693d4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0acb79a8bf37eb0c60e57425e9f80989ca6095db9a704a8108d6152f27a693d4?s=96&d=mm&r=g\",\"caption\":\"Ben May\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How VNC Connect protects your organization against threats, by default","description":"Informed by our four security principles, VNC Connect is built to be secure by design, helping protect your company from malicious actors.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.realvnc.com\/en\/blog\/how-vnc-connect-protects-organization-against-threats-default\/","og_locale":"en_US","og_type":"article","og_title":"How VNC Connect protects your organization against threats, by default","og_description":"Informed by our four security principles, VNC Connect is built to be secure by design, helping protect your company from malicious actors.","og_url":"https:\/\/www.realvnc.com\/en\/blog\/how-vnc-connect-protects-organization-against-threats-default\/","og_site_name":"RealVNC\u00ae","article_publisher":"https:\/\/www.facebook.com\/realvnc","article_modified_time":"2022-08-19T14:22:52+00:00","og_image":[{"width":1256,"height":835,"url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/08\/VNC-Connect-secure-by-default.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@realvnc","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.realvnc.com\/en\/blog\/how-vnc-connect-protects-organization-against-threats-default\/#article","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/how-vnc-connect-protects-organization-against-threats-default\/"},"author":{"name":"Ben May","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/45177f2aad9f69d2e4c699c8fec53fe9"},"headline":"How VNC Connect protects your organization against threats, by default","datePublished":"2022-08-19T11:48:44+00:00","dateModified":"2022-08-19T14:22:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/how-vnc-connect-protects-organization-against-threats-default\/"},"wordCount":562,"publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/how-vnc-connect-protects-organization-against-threats-default\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/08\/VNC-Connect-secure-by-default.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.realvnc.com\/en\/blog\/how-vnc-connect-protects-organization-against-threats-default\/","url":"https:\/\/www.realvnc.com\/en\/blog\/how-vnc-connect-protects-organization-against-threats-default\/","name":"How VNC Connect protects your organization against threats, by default","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/how-vnc-connect-protects-organization-against-threats-default\/#primaryimage"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/how-vnc-connect-protects-organization-against-threats-default\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/08\/VNC-Connect-secure-by-default.jpg","datePublished":"2022-08-19T11:48:44+00:00","dateModified":"2022-08-19T14:22:52+00:00","description":"Informed by our four security principles, VNC Connect is built to be secure by design, helping protect your company from malicious actors.","breadcrumb":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/how-vnc-connect-protects-organization-against-threats-default\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.realvnc.com\/en\/blog\/how-vnc-connect-protects-organization-against-threats-default\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/blog\/how-vnc-connect-protects-organization-against-threats-default\/#primaryimage","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/08\/VNC-Connect-secure-by-default.jpg","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/08\/VNC-Connect-secure-by-default.jpg","width":1256,"height":835,"caption":"VNC Connect secure by default"},{"@type":"BreadcrumbList","@id":"https:\/\/www.realvnc.com\/en\/blog\/how-vnc-connect-protects-organization-against-threats-default\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.realvnc.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blogs","item":"https:\/\/www.realvnc.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"How VNC Connect protects your organization against threats, by default"}]},{"@type":"WebSite","@id":"https:\/\/www.realvnc.com\/en\/#website","url":"https:\/\/www.realvnc.com\/en\/","name":"RealVNC\u00ae","description":"The world&#039;s safest remote access software","publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.realvnc.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.realvnc.com\/en\/#organization","name":"RealVNC\u00ae","url":"https:\/\/www.realvnc.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","width":300,"height":41,"caption":"RealVNC\u00ae"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/realvnc","https:\/\/x.com\/realvnc","https:\/\/www.linkedin.com\/company\/realvnc\/","https:\/\/www.youtube.com\/RealVNCLtd","https:\/\/en.wikipedia.org\/wiki\/RealVNC"]},{"@type":"Person","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/45177f2aad9f69d2e4c699c8fec53fe9","name":"Ben May","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0acb79a8bf37eb0c60e57425e9f80989ca6095db9a704a8108d6152f27a693d4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0acb79a8bf37eb0c60e57425e9f80989ca6095db9a704a8108d6152f27a693d4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0acb79a8bf37eb0c60e57425e9f80989ca6095db9a704a8108d6152f27a693d4?s=96&d=mm&r=g","caption":"Ben May"}}]}},"_links":{"self":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/13061","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/users\/10"}],"version-history":[{"count":0,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/13061\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media\/13056"}],"wp:attachment":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media?parent=13061"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog_category?post=13061"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}