{"id":16748,"date":"2023-03-23T08:08:57","date_gmt":"2023-03-23T08:08:57","guid":{"rendered":"https:\/\/www.realvnc.com\/en\/?post_type=blog&#038;p=16748"},"modified":"2024-02-20T12:27:39","modified_gmt":"2024-02-20T12:27:39","slug":"three-ways-session-recording-is-a-critical-part-of-your-cybersecurity-and-remote-access-strategy","status":"publish","type":"blog","link":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-session-recording-is-a-critical-part-of-your-cybersecurity-and-remote-access-strategy\/","title":{"rendered":"Three Ways Session Recording is a Critical Part of your Cybersecurity and Remote Access Strategy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"16748\" class=\"elementor elementor-16748\" data-elementor-post-type=\"blog\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5dcce32b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5dcce32b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3c04005\" data-id=\"3c04005\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5abf3e4 elementor-widget elementor-widget-text-editor\" data-id=\"5abf3e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>With just slightly under <a href=\"https:\/\/www.zippia.com\/advice\/remote-work-statistics\/\">two-thirds of U.S. employees working remotely at least part-time<\/a>, the <a href=\"https:\/\/blog.talosintelligence.com\/quarterly-report-incident-response-trends-in-q3-2022\/\">focus for threat actors has been to shift to obtaining valid credentials<\/a>. This may be the result of a few factors that cybercriminals are benefitting from:<\/p>\n<ul>\n<li><strong>It\u2019s the lowest hanging \u201cfruit\u201d for a cyberattack<\/strong> \u2013 The obtaining of a user\u2019s credentials is a simple matter of creating some urgency within a phishing attack and convincing the victim that they need to log onto, say, Microsoft 365, in order to see the relevant attachment, link, etc. using an impersonated logon page that actually just captures credentials.<\/li>\n<li><strong>Credentials provide access to cloud and on-prem resources. <\/strong>With the majority of organizations using Microsoft 365 and a majority of those syncing credentials to their on-premises Active Directory, the same credential could be used as part of a hybrid attack that spans cloud-based applications, services, and data, as well as entr\u00e9e to internal resources once remote access is established.<\/li>\n<li><strong>Credentials are a Dark Web commodity<\/strong> \u2013 Some threat actor is buying valid compromised credentials at any given moment somewhere on the Dark Web that allows access to an RDP session, a compromised corporate endpoint, or a cloud-based platform.<\/li>\n<\/ul>\n<p>The reality today is that there\u2019s a need to no longer assume that the <em>user <\/em>of a credential is actually the <em>owner<\/em> of the credential.&nbsp; Multi-Factor Authentication (MFA) will assist in verifying this, but there are far too many cases of \u201c<a href=\"https:\/\/blog.knowbe4.com\/mfa-fatigue-attacks\">MFA fatigue<\/a>\u201d where threat actors continue to prompt the credential owner repeatedly after business hours in order to get them to respond to an MFA request just to get the requests to stop (with the threat actor gaining access).<\/p>\n<p><\/p>\n<p>So, what does all this have to do with session recording?<\/p>\n<p>In a world where remote access is still used today to provide legitimate access to internal corporate resources to external users, as well as facilitate access to remote resources by users already logically residing within the corporate network, it\u2019s no longer a given that just because someone authenticated as a specific user, it\u2019s actually them \u2013 in other words, an external threat actor with control of a credential. On the other hand, don\u2019t forget insider threat actors who may be the credential owner but are no longer acting in a manner that benefits the organization.&nbsp;<\/p>\n<p>As an additional precaution to ensure a proper state of cybersecurity, it\u2019s necessary for organizations to have the ability to record and review remote sessions to assess and determine the validity of the actions taken. While not all Remote Access solutions have a session recording functionality, it\u2019s this capability that will facilitate a Security team\u2019s review of suspect remote sessions. In practical use, there are three ways \u2013 listed below \u2013 that having replayable recordings of all remote access sessions can strengthen your organization\u2019s cybersecurity stance.<\/p>\n<h2>Insight<\/h2>\n<p>Simply knowing that a given credential established a remote session to a certain endpoint is just a piece of information.&nbsp; There\u2019s no intelligence there that determines whether the session is suspect (other than, perhaps, seeing that a session is established, say, well outside normal working hours \u2013 something the user <em>never<\/em> does).&nbsp; SIEM solutions tend to be the typical solution that will point this kind of thing out.&nbsp;<\/p>\n<p>But even if you are made aware that there\u2019s a suspect remote access session in progress, it\u2019s only through playback of session recordings (or even <a href=\"https:\/\/www.realvnc.com\/en\/blog\/screen-recording-available-vnc-connect\/\">session auditing<\/a>, if your Remote Access solution supports it) that you can gain the proper insight into each and every action that was taken during the remote session.<\/p>\n<h2>Context<\/h2>\n<p>If you were told that a user copied 500 critical files to a cloud-based file-sharing platform, is that a problem? The correct answer is <em>you don\u2019t know<\/em>.&nbsp; Without proper context \u2013 such as the user reading an email from their boss just before asking them to do it, or, conversely, the user downloading hacking tools and malware just before exfiltrating all the files \u2013 you can\u2019t correctly judge the single action.&nbsp;<\/p>\n<p>The playback of session recordings provides unequivocal evidence to be used to establish context; the actions are taken before and after an activity in question are what\u2019s going to help determine whether you have a cybersecurity issue on your hands or not.<\/p>\n<h2>Incident Response<\/h2>\n<p>And with the context, you also can determine the impact and scope of any and all actions taken during the session, providing the needed details to establish the necessary incident response actions that need to be taken.<\/p>\n<p>For example, if an external threat actor remotely accessed a desktop and used that to access a number of other endpoints via SMB shares, Active Directory via LDAP, and used a number of hacking tools in the process, the Security team member reviewing the session now has a much better idea of the actions taken, the systems affected, the services impacted, and \u2013 in most attacks today \u2013 the data stolen.<\/p>\n<h2>Your Cybersecurity Strategy Needs to Include Session Recording<\/h2>\n<p>Any solutions used within your cybersecurity strategy usually play into one or more of three parts of the strategy \u2013 <em>prevent<\/em>, <em>detect<\/em>, and <em>respond<\/em>. The goal of anything involved in detecting usually involves gathering as many insightful details as possible.&nbsp; And while <a href=\"https:\/\/www.realvnc.com\/en\/discover\/remote-access\/\">remote access<\/a> session recording most definitely is <em>not<\/em> a security solution, it does provide Security teams with valuable insight into threat actions taken and fits rather well as a toolset in the <em>respond<\/em> category.<\/p>\n<p>So, as you consider ways to best leverage remote access, keep in mind this capability that takes the simple extending of productivity to remote users and crosses over the value to your cybersecurity initiatives with tons more context and detail than even the best SIEM can provide on its own.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>At a time when organizations are worried about malicious actions taken by both internal and external threat actors, remote access without an ability to review activity presents a security risk. <\/p>\n","protected":false},"author":20,"featured_media":16753,"template":"","blog_category":[280,281,260],"class_list":["post-16748","blog","type-blog","status-publish","has-post-thumbnail","hentry","blog_category-featured","blog_category-remote-access","blog_category-screen-recording"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Three Ways Session Recording is a Critical Part of your Cybersecurity and Remote Access Strategy<\/title>\n<meta name=\"description\" content=\"As organizations are worried about malicious actions taken by both internal and external threat actors, remote access review is needed.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.realvnc.com\/en\/blog\/three-ways-session-recording-is-a-critical-part-of-your-cybersecurity-and-remote-access-strategy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Three Ways Session Recording is a Critical Part of your Cybersecurity and Remote Access Strategy\" \/>\n<meta property=\"og:description\" content=\"As organizations are worried about malicious actions taken by both internal and external threat actors, remote access review is needed.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.realvnc.com\/en\/blog\/three-ways-session-recording-is-a-critical-part-of-your-cybersecurity-and-remote-access-strategy\/\" \/>\n<meta property=\"og:site_name\" content=\"RealVNC\u00ae\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/realvnc\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-20T12:27:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/03\/Session-recording-vnc-connect.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@realvnc\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-session-recording-is-a-critical-part-of-your-cybersecurity-and-remote-access-strategy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-session-recording-is-a-critical-part-of-your-cybersecurity-and-remote-access-strategy\\\/\"},\"author\":{\"name\":\"Nick Cavalancia, 4-time Microsoft MVP\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/01b6bf08521717030ba8b5904cbdfc49\"},\"headline\":\"Three Ways Session Recording is a Critical Part of your Cybersecurity and Remote Access Strategy\",\"datePublished\":\"2023-03-23T08:08:57+00:00\",\"dateModified\":\"2024-02-20T12:27:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-session-recording-is-a-critical-part-of-your-cybersecurity-and-remote-access-strategy\\\/\"},\"wordCount\":976,\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-session-recording-is-a-critical-part-of-your-cybersecurity-and-remote-access-strategy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Session-recording-vnc-connect.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-session-recording-is-a-critical-part-of-your-cybersecurity-and-remote-access-strategy\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-session-recording-is-a-critical-part-of-your-cybersecurity-and-remote-access-strategy\\\/\",\"name\":\"Three Ways Session Recording is a Critical Part of your Cybersecurity and Remote Access Strategy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-session-recording-is-a-critical-part-of-your-cybersecurity-and-remote-access-strategy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-session-recording-is-a-critical-part-of-your-cybersecurity-and-remote-access-strategy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Session-recording-vnc-connect.jpg\",\"datePublished\":\"2023-03-23T08:08:57+00:00\",\"dateModified\":\"2024-02-20T12:27:39+00:00\",\"description\":\"As organizations are worried about malicious actions taken by both internal and external threat actors, remote access review is needed.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-session-recording-is-a-critical-part-of-your-cybersecurity-and-remote-access-strategy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-session-recording-is-a-critical-part-of-your-cybersecurity-and-remote-access-strategy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-session-recording-is-a-critical-part-of-your-cybersecurity-and-remote-access-strategy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Session-recording-vnc-connect.jpg\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Session-recording-vnc-connect.jpg\",\"width\":1600,\"height\":900,\"caption\":\"Session recording VNC Connect\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-session-recording-is-a-critical-part-of-your-cybersecurity-and-remote-access-strategy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Three Ways Session Recording is a Critical Part of your Cybersecurity and Remote Access Strategy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"name\":\"RealVNC\u00ae\",\"description\":\"The world&#039;s safest remote access software\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\",\"name\":\"RealVNC\u00ae\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"width\":300,\"height\":41,\"caption\":\"RealVNC\u00ae\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/realvnc\",\"https:\\\/\\\/x.com\\\/realvnc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/realvnc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/RealVNCLtd\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/RealVNC\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/01b6bf08521717030ba8b5904cbdfc49\",\"name\":\"Nick Cavalancia, 4-time Microsoft MVP\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g\",\"caption\":\"Nick Cavalancia, 4-time Microsoft MVP\"},\"description\":\"Nick Cavalancia is a four-time Microsoft MVP, has over 28 years of enterprise IT experience, is an accomplished consultant, speaker, trainer, writer, and columnist, and has achieved industry certifications including MCSE, MCT, Master CNE, and Master CNI. He has authored, co-authored and contributed to dozens of books on various technologies. Nick regularly speaks, writes and blogs for some of the most recognized tech companies today on topics including cybersecurity, cloud adoption, business continuity, and compliance.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Three Ways Session Recording is a Critical Part of your Cybersecurity and Remote Access Strategy","description":"As organizations are worried about malicious actions taken by both internal and external threat actors, remote access review is needed.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-session-recording-is-a-critical-part-of-your-cybersecurity-and-remote-access-strategy\/","og_locale":"en_US","og_type":"article","og_title":"Three Ways Session Recording is a Critical Part of your Cybersecurity and Remote Access Strategy","og_description":"As organizations are worried about malicious actions taken by both internal and external threat actors, remote access review is needed.","og_url":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-session-recording-is-a-critical-part-of-your-cybersecurity-and-remote-access-strategy\/","og_site_name":"RealVNC\u00ae","article_publisher":"https:\/\/www.facebook.com\/realvnc","article_modified_time":"2024-02-20T12:27:39+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/03\/Session-recording-vnc-connect.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@realvnc","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-session-recording-is-a-critical-part-of-your-cybersecurity-and-remote-access-strategy\/#article","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-session-recording-is-a-critical-part-of-your-cybersecurity-and-remote-access-strategy\/"},"author":{"name":"Nick Cavalancia, 4-time Microsoft MVP","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/01b6bf08521717030ba8b5904cbdfc49"},"headline":"Three Ways Session Recording is a Critical Part of your Cybersecurity and Remote Access Strategy","datePublished":"2023-03-23T08:08:57+00:00","dateModified":"2024-02-20T12:27:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-session-recording-is-a-critical-part-of-your-cybersecurity-and-remote-access-strategy\/"},"wordCount":976,"publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-session-recording-is-a-critical-part-of-your-cybersecurity-and-remote-access-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/03\/Session-recording-vnc-connect.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-session-recording-is-a-critical-part-of-your-cybersecurity-and-remote-access-strategy\/","url":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-session-recording-is-a-critical-part-of-your-cybersecurity-and-remote-access-strategy\/","name":"Three Ways Session Recording is a Critical Part of your Cybersecurity and Remote Access Strategy","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-session-recording-is-a-critical-part-of-your-cybersecurity-and-remote-access-strategy\/#primaryimage"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-session-recording-is-a-critical-part-of-your-cybersecurity-and-remote-access-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/03\/Session-recording-vnc-connect.jpg","datePublished":"2023-03-23T08:08:57+00:00","dateModified":"2024-02-20T12:27:39+00:00","description":"As organizations are worried about malicious actions taken by both internal and external threat actors, remote access review is needed.","breadcrumb":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-session-recording-is-a-critical-part-of-your-cybersecurity-and-remote-access-strategy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.realvnc.com\/en\/blog\/three-ways-session-recording-is-a-critical-part-of-your-cybersecurity-and-remote-access-strategy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-session-recording-is-a-critical-part-of-your-cybersecurity-and-remote-access-strategy\/#primaryimage","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/03\/Session-recording-vnc-connect.jpg","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/03\/Session-recording-vnc-connect.jpg","width":1600,"height":900,"caption":"Session recording VNC Connect"},{"@type":"BreadcrumbList","@id":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-session-recording-is-a-critical-part-of-your-cybersecurity-and-remote-access-strategy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.realvnc.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blogs","item":"https:\/\/www.realvnc.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"Three Ways Session Recording is a Critical Part of your Cybersecurity and Remote Access Strategy"}]},{"@type":"WebSite","@id":"https:\/\/www.realvnc.com\/en\/#website","url":"https:\/\/www.realvnc.com\/en\/","name":"RealVNC\u00ae","description":"The world&#039;s safest remote access software","publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.realvnc.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.realvnc.com\/en\/#organization","name":"RealVNC\u00ae","url":"https:\/\/www.realvnc.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","width":300,"height":41,"caption":"RealVNC\u00ae"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/realvnc","https:\/\/x.com\/realvnc","https:\/\/www.linkedin.com\/company\/realvnc\/","https:\/\/www.youtube.com\/RealVNCLtd","https:\/\/en.wikipedia.org\/wiki\/RealVNC"]},{"@type":"Person","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/01b6bf08521717030ba8b5904cbdfc49","name":"Nick Cavalancia, 4-time Microsoft MVP","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g","caption":"Nick Cavalancia, 4-time Microsoft MVP"},"description":"Nick Cavalancia is a four-time Microsoft MVP, has over 28 years of enterprise IT experience, is an accomplished consultant, speaker, trainer, writer, and columnist, and has achieved industry certifications including MCSE, MCT, Master CNE, and Master CNI. He has authored, co-authored and contributed to dozens of books on various technologies. Nick regularly speaks, writes and blogs for some of the most recognized tech companies today on topics including cybersecurity, cloud adoption, business continuity, and compliance."}]}},"_links":{"self":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/16748","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/users\/20"}],"version-history":[{"count":0,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/16748\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media\/16753"}],"wp:attachment":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media?parent=16748"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog_category?post=16748"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}