{"id":17681,"date":"2023-04-27T11:56:04","date_gmt":"2023-04-27T11:56:04","guid":{"rendered":"https:\/\/www.realvnc.com\/en\/?post_type=blog&#038;p=17681"},"modified":"2026-04-13T10:44:24","modified_gmt":"2026-04-13T09:44:24","slug":"brute-force-attacks","status":"publish","type":"blog","link":"https:\/\/www.realvnc.com\/en\/blog\/brute-force-attacks\/","title":{"rendered":"Brute Force Attacks Mean It\u2019s Time to Strengthen Your Remote Access Authentication"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"17681\" class=\"elementor elementor-17681\" data-elementor-post-type=\"blog\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5e6143e0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5e6143e0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5d2d407f\" data-id=\"5d2d407f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-629275f2 elementor-widget elementor-widget-text-editor\" data-id=\"629275f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-pm-slice=\"1 1 []\"><span data-color=\"transparent\">Whenever we talk about cyberattacks, there are three basic ways in which attackers gain access to a victim network:<\/span><\/p><ul><li><p><strong><span data-color=\"transparent\">Phishing<\/span><\/strong><span data-color=\"transparent\">: They use emails&#8217; ability to logically infiltrate a network, potentially giving attackers a foothold should the attack be successful in infecting an endpoint.<\/span><\/p><\/li><li><p><strong><span data-color=\"transparent\">Vulnerabilities<\/span><\/strong><span data-color=\"transparent\">: By using zero-day or known vulnerabilities (that have not been patched), attackers can gain elevated privileges on systems and applications and leverage them to access the rest of a network.<\/span><\/p><\/li><li><p><strong><span data-color=\"transparent\">RDP\/Remote Access<\/span><\/strong><span data-color=\"transparent\">: Attackers use either compromised credentials or brute force password attacks, using them as the conduit to gain entrance into a network.<\/span><\/p><\/li><\/ul><p><span data-color=\"transparent\">Companies usually focus on the first two attack vectors above. When discussing the third, they usually focus on\u00a0<\/span><a href=\"https:\/\/help.realvnc.com\/hc\/en-us\/articles\/360003301217-Using-RealVNC-Connect-to-control-a-Windows-user-s-Remote-Desktop-RDP-session\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-color=\"transparent\">RDP<\/span><\/a><span data-color=\"transparent\">\u00a0itself rather than on how insecure the authentication is once an attacker jumps onto a remote logon session.<\/span><\/p><p><span data-color=\"transparent\">So, in this article, we want to explore what happens when an attacker finds and utilizes a <\/span><a href=\"https:\/\/www.realvnc.com\/en\/discover\/remote-access\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-color=\"transparent\">remote access<\/span><\/a><span data-color=\"transparent\"> session (RDP or otherwise, herein generically referred to as\u00a0<\/span><em><span data-color=\"transparent\">remote access<\/span><\/em><span data-color=\"transparent\">).<\/span><\/p><p><span data-color=\"transparent\">We&#8217;ll take a look at the brute force attack methods used to compromise a credential, how prevalent it is, why users are actually making it easy for the attacker, and what you can do about it.<\/span><\/p><h2 data-pm-slice=\"1 3 []\">What is a Brute Force Attack?<\/h2><p><span data-color=\"transparent\">A brute force attack is a type of cyber attack where an attacker uses trial and error to guess or crack a user\u2019s password, login credentials, or encryption keys. This attack method involves systematically trying all possible combinations of characters, numbers, and special characters to gain unauthorized access to a user\u2019s account, system, or network.<\/span><\/p><p><span data-color=\"transparent\">Brute force attacks can be performed manually or using automated software tools, making them popular among hackers.<\/span><\/p><h3>Types of Brute Force Attacks<\/h3><p><span data-color=\"transparent\">There are several types of brute force attacks, including:<\/span><\/p><ul><li><p><strong><span data-color=\"transparent\">Simple Brute Force Attack<\/span><\/strong><span data-color=\"transparent\">: Involves trying all possible combinations of letters, numbers, and special characters to guess a user\u2019s password.<\/span><\/p><\/li><li><p><strong><span data-color=\"transparent\">Reverse Brute Force Attack<\/span><\/strong><span data-color=\"transparent\">: The attacker starts with a known password and tries to find a matching username.<\/span><\/p><\/li><li><p><strong><span data-color=\"transparent\">Dictionary Attack<\/span><\/strong><span data-color=\"transparent\">: Attackers try a list of words, phrases, and common passwords to guess a user\u2019s password.<\/span><\/p><\/li><li><p><strong><span data-color=\"transparent\">Hybrid Brute Force Attack<\/span><\/strong><span data-color=\"transparent\">: This type of attack combines a dictionary attack with a traditional brute force attack.<\/span><\/p><\/li><li><p><strong><span data-color=\"transparent\">Credential Stuffing<\/span><\/strong><span data-color=\"transparent\">: Involves using a list of stolen usernames and passwords to gain unauthorized access to multiple accounts.<\/span><\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23bd933 elementor-widget elementor-widget-image\" data-id=\"23bd933\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/04\/motives-1024x682.jpg\" class=\"attachment-large size-large wp-image-55865\" alt=\"\" srcset=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/04\/motives-1024x682.jpg 1024w, https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/04\/motives-300x200.jpg 300w, https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/04\/motives-768x512.jpg 768w, https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/04\/motives.jpg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6acd74e elementor-widget elementor-widget-text-editor\" data-id=\"6acd74e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-pm-slice=\"1 1 []\">Motives Behind Brute Force Attacks<\/h2><p>Understanding the motives behind brute force attacks is essential for evaluating risks and implementing effective security measures. Cybercriminals rarely act without purpose. Their goals often include financial gain, espionage, or disrupting operations. For example, industries handling sensitive data, like <a href=\"https:\/\/www.realvnc.com\/en\/industry\/healthcare\/\" target=\"_blank\" rel=\"noopener noreferrer\">healthcare<\/a> or finance, face higher risks of espionage, while smaller businesses may be targeted for ransomware or credential theft due to limited IT budgets.<\/p><p>Here\u2019s a closer look at why attackers employ brute force tactics:<\/p><h3>Credentials Theft for Profit<\/h3><p>One of the most common reasons behind brute force attacks is to steal user credentials, such as usernames and passwords. Once obtained, these credentials can be sold on dark web marketplaces, often as part of large data dumps, or used to gain unauthorized access to valuable systems. For instance, an attacker might sell login details to an organization&#8217;s internal systems, enabling others to launch targeted attacks like ransomware or data theft.<\/p><h3>Ransomware Deployment<\/h3><p>Brute force attacks are frequently used as an entry point for deploying ransomware. By gaining access to systems via compromised credentials, attackers can encrypt critical data and demand a ransom for its release. This motive has been amplified by the increase in remote work, which often relies on remote desktop protocols (RDP) or other remote access solutions that are vulnerable to brute force attacks.<\/p><h3>Espionage and Data Extraction<\/h3><p>Brute force attacks are used by cybercriminals with motives tied to corporate or state-sponsored espionage. They allow attackers to infiltrate networks and extract sensitive data. Attackers can target intellectual property, trade secrets, or classified information. They use weak authentication methods to access high-value systems.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b6dbd62 elementor-widget elementor-widget-image\" data-id=\"b6dbd62\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1280\" height=\"800\" src=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/04\/data-extraction.jpg\" class=\"attachment-full size-full wp-image-55870\" alt=\"\" srcset=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/04\/data-extraction.jpg 1280w, https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/04\/data-extraction-300x188.jpg 300w, https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/04\/data-extraction-1024x640.jpg 1024w, https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/04\/data-extraction-768x480.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-01dbe29 elementor-widget elementor-widget-text-editor\" data-id=\"01dbe29\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3 data-pm-slice=\"1 1 []\">System Disruption<\/h3><p>Sometimes, the goal isn&#8217;t to steal data or money but to disrupt an organization&#8217;s operations. Brute force attacks can be a part of larger campaigns to overload systems, cause downtime, or erode customer trust. In these cases, the attackers aim to damage an organization&#8217;s reputation or capabilities rather than derive direct financial benefit.<\/p><h3>Testing and Exploiting Security Weaknesses<\/h3><p>Brute force attacks often serve as reconnaissance tools. Attackers may use them to probe an organization&#8217;s defenses, identifying weak points in authentication systems. This information can then be used to craft more sophisticated and targeted attacks.<\/p><h3>Credential Reuse Across Platforms<\/h3><p>Many people reuse passwords across multiple accounts. Knowing this, cybercriminals exploit brute force attacks to access not only one account but potentially an entire network of interconnected services. This tactic, known as credential stuffing, is especially problematic when a single compromised password can lead to broader breaches.<\/p><h3>Initial Access Brokering<\/h3><p>In some cases, brute force attacks are conducted by initial access brokers, cybercriminals who specialize in breaking into networks and selling access to other attackers. These brokers use weak authentication systems to gain entry and sell credentials to those looking to carry out large-scale attacks like espionage or ransomware.<\/p><p>Understanding these objectives can help organizations prioritize their defenses, such as enhanced authentication, routine security audits, and employee training, to mitigate vulnerabilities effectively.<\/p><h2>Online and Offline Brute Force Attacks<\/h2><p>Brute force attacks fall into two main categories: online and offline, each posing unique challenges.<\/p><h3>Online Brute Force Attacks<\/h3><p>These attacks target live systems or networks. Attackers repeatedly guess passwords using automated tools. They occur in real time, making them detectable by monitoring for unusual login attempts, such as repeated failures from a single IP address.<\/p><p>Mitigation strategies include rate limiting to slow attempts, CAPTCHA challenges to block bots, and multi-factor authentication (MFA) to enhance security.<\/p><h3>Offline Brute Force Attacks<\/h3><p>Offline attacks involve cracking stolen password hashes without interacting with live systems. Attackers use powerful tools to test combinations, making detection difficult.<\/p><p>Defense measures include securing password storage with salted hashes and using strong encryption. Regular system updates are also essential to patch vulnerabilities.<\/p><h2>Why are Brute Force Attacks a Problem?<\/h2><p><span data-color=\"transparent\">Anytime you see a story or an industry stat about <\/span><a href=\"https:\/\/www.realvnc.com\/en\/blog\/rdp-is-compromised-a-practical-look-threat-actions\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-color=\"transparent\">RDP being involved in a cyberattack<\/span><\/a><span data-color=\"transparent\">, keep in mind that, at the time of the attack, the attacker either did or did not have a working username and password with which to log on.\u00a0\u00a0<\/span><\/p><p><span data-color=\"transparent\">In scenarios where the attacker is starting from scratch\u2014as with initial access brokers\u2014the goal is to not just gain access but also derive a working credential set that will either be used in the current attack or sold on the dark web to another attacker looking for initial access. <\/span><\/p><p><span data-color=\"transparent\">That means that sometimes attackers need to use brute force password attacks to figure out the password associated with a given username.<\/span><\/p><p><span data-color=\"transparent\">Brute force attack tools are designed to automate the process of guessing credentials, making it faster and more efficient for attackers.<\/span><\/p><p><span data-color=\"transparent\">According to the MITRE ATT&amp;CK Framework (pronounced \u201cATTACK\u201d) that outlines nearly every malicious tactic, technique, and procedure used by cybercriminals, there are four types of brute force attack methods:<\/span><\/p><ul><li><p><strong><span data-color=\"transparent\">Password Guessing:<\/span><\/strong><span data-color=\"transparent\"> Systematically guessing passwords using a repetitive or iterative mechanism based on a list of common passwords.<\/span><\/p><\/li><li><p><strong><span data-color=\"transparent\">Password Spraying: <\/span><\/strong><span data-color=\"transparent\">When an attacker acquires a list of usernames and attempts to log in using the same password for all of them.<\/span><\/p><\/li><li><p><strong><span data-color=\"transparent\">Password Cracking:<\/span><\/strong><span data-color=\"transparent\"> Using rainbow tables or guessing passwords and computing hashes to crack password hashes.<\/span><\/p><\/li><li><p><strong><span data-color=\"transparent\">Credential Stuffing:<\/span><\/strong><span data-color=\"transparent\"> Using credentials obtained from breach dumps of unrelated accounts to gain access to target accounts.<\/span><\/p><\/li><\/ul><p><span data-color=\"transparent\">The decision to use one method over another is largely based on whether the attacker knows any usernames and\/or passwords on the victim&#8217;s network.<\/span><\/p><p><em><span data-color=\"transparent\">But just how prevalent are brute force password attacks?<\/span><\/em><\/p><p><span data-color=\"transparent\">According to U.K. cyber insurer Hiscox,<\/span><a href=\"https:\/\/hiscoxgroup.com\/sites\/group\/files\/documents\/2022-11\/Hiscox_Cyber_readiness_mini_report_2022_EN.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-color=\"transparent\"> <u>17% of the ransomware attacks they saw as part of cyber insurance claims started with a brute force attack<\/u><\/span><\/a><span data-color=\"transparent\">. That\u2019s nearly 1 in 5. We\u2019ve also seen brute force attacks en masse in 2022 with<\/span><a href=\"https:\/\/backendnews.net\/kaspersky-blocks-47m-brute-force-attacks-targeting-remote-workers\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-color=\"transparent\"> <u>47 million attacks in Southeast Asia targeting remote workers<\/u><\/span><\/a><span data-color=\"transparent\">.<\/span><\/p><p><span data-color=\"transparent\">So, it\u2019s a very real problem\u2026for numerous reasons.<\/span><\/p><h3>1. There are Numerous Weak Password Sources<\/h3><p>Passwords used in guessing, spraying, or stuffing attacks often come from various sources. One major source is data breaches that expose usernames and email addresses. For example, the May 2016 LinkedIn breach compromised 164 million email addresses and passwords, making it a significant contributor to such attacks.<\/p><p>Another source is pwned databases that catalog commonly used passwords, many of which are surprisingly simple (e.g., \u201cP@ssw0rd!\u201d). Additionally, attackers often exploit targeted guessing opportunities by focusing on specific users, increasing the likelihood of finding weak or predictable passwords.<\/p><p><span data-color=\"transparent\">According to Spycloud\u2019s 2023 Identity Exposure Report,<\/span><a href=\"https:\/\/spycloud.com\/resource\/2023-annual-identity-exposure-report\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-color=\"transparent\">\u00a0<u>over 7 million of the compromised passwords gathered during breaches involve a love or family theme<\/u><\/span><\/a><span data-color=\"transparent\">\u00a0(e.g., if I know your spouse\u2019s name, I can begin guessing there). These attacks often involve systematically testing various password combinations to exploit weak or commonly used passwords.<\/span><\/p><h3>2. User Behavior Also Contributes to Security Risks<\/h3><p><span data-color=\"transparent\">According to the same Spycloud report, 72% of users in 2022 breaches were reusing previously exposed passwords, with 61% of users in the U.S. reusing passwords.<\/span><\/p><p><a href=\"https:\/\/lastpass.com\/resources\/reports\/password-benchmark-report\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-color=\"transparent\"><u>Passwords are reused an average of 13 times<\/u><\/span><\/a><span data-color=\"transparent\">. Part of the reason is the number of systems, applications, and platforms today\u2019s user needs to maintain a logon\u2014<\/span><a href=\"https:\/\/lastpass.com\/resources\/reports\/password-benchmark-report\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-color=\"transparent\"><u>in smaller businesses, there are an average of 85 passwords, while in larger businesses, there are only 25.<\/u><\/span><\/a><\/p><p><span data-color=\"transparent\">Using complex passwords can significantly enhance account security, making it more difficult for attackers to succeed in credential compromise efforts.<\/span><\/p><p><span data-color=\"transparent\">With computing power today allowing attackers to<\/span><a href=\"https:\/\/nordpass.com\/blog\/brute-force-attack#:~:text=Computer%20programs%20used%20for%20brute,hundred%20billion%208%2Dcharacter%20passwords.\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-color=\"transparent\">\u00a0<u>test as many as 1 billion passwords per second<\/u><\/span><\/a><span data-color=\"transparent\">\u00a0in a brute force attack, <\/span><a href=\"https:\/\/www.realvnc.com\/en\/blog\/five-great-ways-strengthen-password-security\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-color=\"transparent\">password security<\/span><\/a><span data-color=\"transparent\"> is essential.<\/span><\/p><h3>3. Remote Access Can Provide Attackers Ways to Gain Unauthorized Access<\/h3><p>Let\u2019s add remote access to the discussion, as brute force attacks are only the means of gaining unauthorized access; the real vulnerability lies in how your hybrid workforce engages with corporate resources.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d659f7d elementor-widget elementor-widget-image\" data-id=\"d659f7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1280\" height=\"717\" src=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/04\/unauthorized-access.jpg\" class=\"attachment-full size-full wp-image-55875\" alt=\"\" srcset=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/04\/unauthorized-access.jpg 1280w, https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/04\/unauthorized-access-300x168.jpg 300w, https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/04\/unauthorized-access-1024x574.jpg 1024w, https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/04\/unauthorized-access-768x430.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b880f04 elementor-widget elementor-widget-text-editor\" data-id=\"b880f04\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-pm-slice=\"1 3 []\">Some organizations are still (still!) relying on RDP (the protocol that won\u2019t die the horrible cybersecurity death it deserves!). A recent report revealed that <a href=\"https:\/\/www.sophos.com\/en-us\/press\/press-releases\/2024\/04\/cybercriminals-abuse-remote-desktop-protocol-rdp-90-attacks-handled\" target=\"_blank\" rel=\"noopener noreferrer\">cybercriminals abused RDP in 90% of incidents analyzed<\/a>, making it a critical vector for ransomware attacks. Even if you aren\u2019t using RDP, other remote access applications can also present significant risks\u201416% of data breaches began with the compromise of RDP or another remote access application.<\/p><p>This means that any method of remote access is an attack vector for cybercriminals. Since\u00a0<a href=\"https:\/\/security.imprivata.com\/rs\/413-FZZ-310\/images\/SL-Ponemon-Report-state-of-cs-and-third-party-access-risk-1122.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">50% of organizations don\u2019t rate themselves highly effective in mitigating remote access risks<\/a>, it\u2019s crucial to implement stronger authentication measures beyond simple password use to secure remote access effectively.<\/p><h2>Prevention Best Practices Against Brute Force Attacks<\/h2><p>Preventing brute force attacks requires a multi-layered approach that combines strong policies, technical safeguards, and user education. While <a href=\"https:\/\/www.realvnc.com\/en\/blog\/multi-factor-authentication-is-it-worth-it\/\" target=\"_blank\" rel=\"noopener noreferrer\">multi-factor authentication<\/a> (MFA) is the foundation of defense. It implements comprehensive strategies to ensure a more active security posture. Here&#8217;s how you can stay ahead of brute force attacks:<\/p><h3>Establish Robust Password Policies<\/h3><p>Strong password policies are the foundation of any brute force prevention strategy. Ensure that all users adhere to these best practices:<\/p><ul><li><p><strong>Length and Complexity<\/strong>: Require passwords to be at least 12 characters long, with a mix of upper and lower case letters, numbers, and special characters.<\/p><\/li><li><p><strong>Regular Updates<\/strong>: Enforce password expiration policies to limit the window of opportunity for attackers.<\/p><\/li><li><p><strong>Avoid Reuse<\/strong>: Implement systems that prevent users from recycling old passwords.<\/p><\/li><li><p><strong>Ban Common Passwords<\/strong>: Use tools to block weak or easily guessed passwords, such as &#8220;123456&#8221; or &#8220;password.&#8221;<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e576063 elementor-widget elementor-widget-image\" data-id=\"e576063\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"768\" src=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/04\/security-monitoring.jpg\" class=\"attachment-full size-full wp-image-55880\" alt=\"\" srcset=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/04\/security-monitoring.jpg 1280w, https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/04\/security-monitoring-300x180.jpg 300w, https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/04\/security-monitoring-1024x614.jpg 1024w, https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/04\/security-monitoring-768x461.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-27a5f0d elementor-widget elementor-widget-text-editor\" data-id=\"27a5f0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3 data-pm-slice=\"1 1 []\">Implement Security Monitoring Tools<\/h3><p><a href=\"https:\/\/www.realvnc.com\/en\/blog\/remote-monitoring-management\/\" target=\"_blank\" rel=\"noopener noreferrer\">Real-time monitoring<\/a> and alerting can help detect and respond to brute force attacks before they succeed. Consider deploying the following tools:<\/p><ul><li><p><strong>Intrusion Detection and Prevention Systems (IDPS)<\/strong>: Tools like Snort or Suricata can detect unusual login attempts and block suspicious activities.<\/p><\/li><li><p><strong>SIEM Solutions<\/strong>: Security Information and Event Management (SIEM) systems like Splunk or LogRhythm centralize log data and provide insights into potential brute force activity.<\/p><\/li><li><p><strong>Account Lockout Thresholds<\/strong>: Configure systems to lock accounts temporarily after a specific number of failed login attempts.<\/p><\/li><\/ul><h3>Educate Employees on Security Practices<\/h3><p>Human error is a common vulnerability that attackers exploit. Providing ongoing training ensures employees are equipped to recognize and mitigate risks:<\/p><ul><li><p><strong>Phishing Awareness<\/strong>: Train staff to identify phishing attempts that may precede brute force attacks.<\/p><\/li><li><p><strong>Password Hygiene<\/strong>: Emphasize the importance of unique, strong passwords for both work and personal accounts.<\/p><\/li><li><p><strong>Reporting Protocols<\/strong>: Encourage employees to report suspicious login attempts or system behaviors promptly.<\/p><\/li><\/ul><h3>Leverage Technical Configurations<\/h3><p>Technical safeguards can make it significantly harder for attackers to execute brute force attacks. Implement these measures:<\/p><ul><li><p><strong>Rate Limiting<\/strong>: Slow down or block IPs after a series of failed login attempts.<\/p><\/li><li><p><strong>CAPTCHA Integration<\/strong>: Add CAPTCHA challenges to login pages to prevent automated login attempts.<\/p><\/li><li><p><strong>IP Whitelisting<\/strong>: Restrict login access to specific IP ranges, particularly for sensitive systems.<\/p><\/li><li><p><strong>Encrypt Passwords<\/strong>: Use strong encryption algorithms, such as Argon2 for storing correct password hashes.<\/p><\/li><\/ul><h2>Remote Access Beyond the Password<\/h2><p>Brute force attacks continue to pose significant risks, but a proactive approach and <a href=\"https:\/\/www.realvnc.com\/en\/connect\/security\/#:~:text=RealVNC%20accounts%20are%20secured%20using,your%20entire%20RealVNC%20Connect%20Team.\" target=\"_blank\" rel=\"noopener noreferrer\">prevention strategies<\/a> can drastically reduce their impact. By implementing multi-factor authentication (MFA), enforcing strong password policies, and leveraging advanced security tools, organizations can build a robust defense against unauthorized access.<\/p><p>Even if your organization relies on older or more vulnerable remote access methods like RDP, requiring MFA for all logins is a critical first step. Beyond MFA, strategies such as using high encryption rates, salting password hashes, setting login attempt limits, and employing CAPTCHA challenges after repeated failures can thwart brute force attacks before they succeed.<\/p><p>It\u2019s also essential to educate employees, monitor suspicious activity, and deploy tools like intrusion detection systems to identify <a href=\"https:\/\/www.realvnc.com\/en\/blog\/cyber-security-trends\/\" target=\"_blank\" rel=\"noopener noreferrer\">potential threats<\/a> in real time. The goal is not just to respond to attacks but to prevent them from materializing.<\/p><p>For those who have read this article to the end, the takeaway is clear: brute force attacks can be mitigated with deliberate, layered security measures. Start with MFA\u2014it\u2019s one of the simplest yet most effective ways to secure remote access and protect your organization. Don\u2019t wait to strengthen your defenses; the time to act is now.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Attackers are laser focused on gaining access to your network \u2013 even if it means having to force their way in across your remote access. But there\u2019s something you can do to put this to a stop. <\/p>\n","protected":false},"author":31,"featured_media":17665,"template":"","blog_category":[372],"class_list":["post-17681","blog","type-blog","status-publish","has-post-thumbnail","hentry","blog_category-security-and-privacy"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Brute Force Attacks Mean It\u2019s Time to Strengthen Your Remote Access Authentication<\/title>\n<meta name=\"description\" content=\"Attackers are laser focused on gaining access to your network \u2013 even if it means forcing it across your remote access. How can you stop them?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.realvnc.com\/en\/blog\/brute-force-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Brute Force Attacks Mean It\u2019s Time to Strengthen Your Remote Access Authentication\" \/>\n<meta property=\"og:description\" content=\"Attackers are laser focused on gaining access to your network \u2013 even if it means forcing it across your remote access. How can you stop them?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.realvnc.com\/en\/blog\/brute-force-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"RealVNC\u00ae\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/realvnc\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-13T09:44:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/04\/Brute-force-attacks-authentication.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1235\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@realvnc\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/brute-force-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/brute-force-attacks\\\/\"},\"author\":{\"name\":\"RealVNC\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/505d415578d7c153d5d004b19f33b53f\"},\"headline\":\"Brute Force Attacks Mean It\u2019s Time to Strengthen Your Remote Access Authentication\",\"datePublished\":\"2023-04-27T11:56:04+00:00\",\"dateModified\":\"2026-04-13T09:44:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/brute-force-attacks\\\/\"},\"wordCount\":2366,\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/brute-force-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Brute-force-attacks-authentication.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/brute-force-attacks\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/brute-force-attacks\\\/\",\"name\":\"Brute Force Attacks Mean It\u2019s Time to Strengthen Your Remote Access Authentication\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/brute-force-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/brute-force-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Brute-force-attacks-authentication.jpg\",\"datePublished\":\"2023-04-27T11:56:04+00:00\",\"dateModified\":\"2026-04-13T09:44:24+00:00\",\"description\":\"Attackers are laser focused on gaining access to your network \u2013 even if it means forcing it across your remote access. How can you stop them?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/brute-force-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/brute-force-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/brute-force-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Brute-force-attacks-authentication.jpg\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Brute-force-attacks-authentication.jpg\",\"width\":1600,\"height\":1235,\"caption\":\"Brute force attacks authentication\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/brute-force-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Brute Force Attacks Mean It\u2019s Time to Strengthen Your Remote Access Authentication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"name\":\"RealVNC\u00ae\",\"description\":\"The world&#039;s safest remote access software\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\",\"name\":\"RealVNC\u00ae\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"width\":300,\"height\":41,\"caption\":\"RealVNC\u00ae\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/realvnc\",\"https:\\\/\\\/x.com\\\/realvnc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/realvnc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/RealVNCLtd\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/RealVNC\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/505d415578d7c153d5d004b19f33b53f\",\"name\":\"RealVNC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g\",\"caption\":\"RealVNC\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Brute Force Attacks Mean It\u2019s Time to Strengthen Your Remote Access Authentication","description":"Attackers are laser focused on gaining access to your network \u2013 even if it means forcing it across your remote access. How can you stop them?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.realvnc.com\/en\/blog\/brute-force-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Brute Force Attacks Mean It\u2019s Time to Strengthen Your Remote Access Authentication","og_description":"Attackers are laser focused on gaining access to your network \u2013 even if it means forcing it across your remote access. How can you stop them?","og_url":"https:\/\/www.realvnc.com\/en\/blog\/brute-force-attacks\/","og_site_name":"RealVNC\u00ae","article_publisher":"https:\/\/www.facebook.com\/realvnc","article_modified_time":"2026-04-13T09:44:24+00:00","og_image":[{"width":1600,"height":1235,"url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/04\/Brute-force-attacks-authentication.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@realvnc","twitter_misc":{"Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.realvnc.com\/en\/blog\/brute-force-attacks\/#article","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/brute-force-attacks\/"},"author":{"name":"RealVNC","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/505d415578d7c153d5d004b19f33b53f"},"headline":"Brute Force Attacks Mean It\u2019s Time to Strengthen Your Remote Access Authentication","datePublished":"2023-04-27T11:56:04+00:00","dateModified":"2026-04-13T09:44:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/brute-force-attacks\/"},"wordCount":2366,"publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/brute-force-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/04\/Brute-force-attacks-authentication.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.realvnc.com\/en\/blog\/brute-force-attacks\/","url":"https:\/\/www.realvnc.com\/en\/blog\/brute-force-attacks\/","name":"Brute Force Attacks Mean It\u2019s Time to Strengthen Your Remote Access Authentication","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/brute-force-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/brute-force-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/04\/Brute-force-attacks-authentication.jpg","datePublished":"2023-04-27T11:56:04+00:00","dateModified":"2026-04-13T09:44:24+00:00","description":"Attackers are laser focused on gaining access to your network \u2013 even if it means forcing it across your remote access. How can you stop them?","breadcrumb":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/brute-force-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.realvnc.com\/en\/blog\/brute-force-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/blog\/brute-force-attacks\/#primaryimage","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/04\/Brute-force-attacks-authentication.jpg","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/04\/Brute-force-attacks-authentication.jpg","width":1600,"height":1235,"caption":"Brute force attacks authentication"},{"@type":"BreadcrumbList","@id":"https:\/\/www.realvnc.com\/en\/blog\/brute-force-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.realvnc.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blogs","item":"https:\/\/www.realvnc.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"Brute Force Attacks Mean It\u2019s Time to Strengthen Your Remote Access Authentication"}]},{"@type":"WebSite","@id":"https:\/\/www.realvnc.com\/en\/#website","url":"https:\/\/www.realvnc.com\/en\/","name":"RealVNC\u00ae","description":"The world&#039;s safest remote access software","publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.realvnc.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.realvnc.com\/en\/#organization","name":"RealVNC\u00ae","url":"https:\/\/www.realvnc.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","width":300,"height":41,"caption":"RealVNC\u00ae"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/realvnc","https:\/\/x.com\/realvnc","https:\/\/www.linkedin.com\/company\/realvnc\/","https:\/\/www.youtube.com\/RealVNCLtd","https:\/\/en.wikipedia.org\/wiki\/RealVNC"]},{"@type":"Person","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/505d415578d7c153d5d004b19f33b53f","name":"RealVNC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g","caption":"RealVNC"}}]}},"_links":{"self":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/17681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/users\/31"}],"version-history":[{"count":1,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/17681\/revisions"}],"predecessor-version":[{"id":89915,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/17681\/revisions\/89915"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media\/17665"}],"wp:attachment":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media?parent=17681"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog_category?post=17681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}