{"id":18589,"date":"2023-06-01T10:19:42","date_gmt":"2023-06-01T10:19:42","guid":{"rendered":"https:\/\/www.realvnc.com\/en\/?post_type=blog&#038;p=18589"},"modified":"2024-02-20T14:35:41","modified_gmt":"2024-02-20T14:35:41","slug":"remote-pc","status":"publish","type":"blog","link":"https:\/\/www.realvnc.com\/en\/blog\/remote-pc\/","title":{"rendered":"Enhancing Remote PC Security With a Remote Access Policy: What it is and Why it\u2019s Important"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"18589\" class=\"elementor elementor-18589\" data-elementor-post-type=\"blog\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-23cfb394 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"23cfb394\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fb00ab3\" data-id=\"fb00ab3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2ece36ea elementor-widget elementor-widget-text-editor\" data-id=\"2ece36ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Cybercriminals were extremely quick to capitalize on the new opportunities that remote working offered them. Between January and April 2020, the world saw an astonishing <\/span><a href=\"https:\/\/www.hipaajournal.com\/attacks-on-cloud-services-increased-by-630-jan-apr-2020\/\"><span style=\"font-weight: 400;\">630% increase in cloud-based cyberattacks<\/span><\/a><span style=\"font-weight: 400;\">. While businesses have worked hard to close potential gateways for such attacks, cybercrime is not going anywhere.<\/span><\/p><p><span style=\"font-weight: 400;\">Between February 2020 and February 2023, 20% of all US companies <\/span><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2020\/08\/20-percent-of-organizations-experienced-breach-due-to-remote-worker-labs-report-reveals\"><span style=\"font-weight: 400;\">experienced a security breach caused or enabled by remote workers<\/span><\/a><span style=\"font-weight: 400;\">. A huge increase in phishing emails and malware targeting remote employees has also been noticed by cybersecurity-conscious businesses.<\/span><\/p><p><span style=\"font-weight: 400;\">So, it\u2019s vital that businesses take robust action to address the potential threats associated with remote working.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Combining a <a href=\"https:\/\/www.realvnc.com\/en\/discover\/remote-access\/\">remote access<\/a> policy with sophisticated access solutions, such as those provided by RealVNC, can help protect your business, your employees, and your customers from cyberattacks. In this article, we\u2019ll explain what a remote access policy is, how it works, and how it can benefit you.<\/span><\/p><h2><span style=\"font-weight: 400;\">What is a remote access policy?<\/span><\/h2><p><span style=\"font-weight: 400;\">A remote access policy is a set of guidelines and protocols for people remotely connecting to your network. A remote access policy will often expand on your in-office network access guidelines and update them for remote employees.<\/span><\/p><p><span style=\"font-weight: 400;\">For example, a remote access policy could set password controls, limit access to certain databases or network systems, lay down access and security protocols, or define which devices and operating systems can access the network.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">In many cases, a remote access policy will use a need-to-know basis. This means that remote workers will be granted the minimum amount of access needed in order to do their jobs. The fewer people that can access sensitive data, the lower the risk of that data being compromised.<\/span><\/p><p><span style=\"font-weight: 400;\">A<\/span><span style=\"font-weight: 400;\"> remote PC desktop<\/span><span style=\"font-weight: 400;\"> policy is important for ensuring <\/span><a href=\"https:\/\/www.realvnc.com\/en\/blog\/breaking-down-rdp-vs-secure-remote-access\/\"><span style=\"font-weight: 400;\">secure remote access<\/span><\/a><span style=\"font-weight: 400;\">, which, in turn, will keep everyone safer from cybercrime.<\/span><\/p><h3><span style=\"font-weight: 400;\">Remote access terminology<\/span><\/h3><p><span style=\"font-weight: 400;\">There are a lot of acronyms and complex terms surrounding remote access, so it\u2019s worth clarifying some of the more common ones.<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">VPN: VPN stands for Virtual Private Network. A VPN provides a secure network that computers can connect to.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">VNC: <\/span><a href=\"https:\/\/discover.realvnc.com\/what-is-vnc-remote-access-technology\"><span style=\"font-weight: 400;\">VNC<\/span><\/a><span style=\"font-weight: 400;\"> stands for Virtual Network Computing. VNC is used to allow machines and devices to view and control one another remotely. The VNC protocol may use a VPN for the initial connection.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">RDP: RDP stands for Remote Desktop Protocol. Like VNC, an RDP allows users to connect with and control devices remotely. However, as proprietary software, RDP can only be used with specific operating systems. In comparison, VNC is open-source and can be used universally. Also, questions regarding the <\/span><a href=\"https:\/\/www.realvnc.com\/en\/blog\/three-reasons-why-time-to-ditch-your-vpn-rdp-strategy\/\"><span style=\"font-weight: 400;\">safety of RDP connections<\/span><\/a><span style=\"font-weight: 400;\"> have been asked in later years.\u00a0<\/span><\/li><\/ul><h2><span style=\"font-weight: 400;\">Why is having a remote access policy important for organizations with remote PC solutions?<\/span><\/h2><p><span style=\"font-weight: 400;\">A remote access policy helps to close a lot of the loopholes that cybercriminals use to access and exploit corporate networks. It also clarifies remote access permissions and protocols for everyone in your business network. This helps to reduce uncertainty and confirm key responsibilities.<\/span><\/p><h2><span style=\"font-weight: 400;\">What are the security risks of remote PC access?<\/span><\/h2><h3><span style=\"font-weight: 400;\">Ineffective remote access policies<\/span><\/h3><p><span style=\"font-weight: 400;\">If it is too easy to obtain a <a href=\"https:\/\/www.realvnc.com\/en\/discover\/remote-access\/\">remote computer access<\/a>, attackers will quickly be able to exploit your network, which could be disastrous. For example, an attacker who compromises a VPN could very quickly gain access to your entire system.<\/span><\/p><p><span style=\"font-weight: 400;\">By bolstering remote access policies and ensuring they are effective, you can protect your network and data from expensive breaches.<\/span><\/p><h3><span style=\"font-weight: 400;\">Password reuse<\/span><\/h3><p><span style=\"font-weight: 400;\">It is not uncommon for people to reuse the same passwords for multiple applications. People also tend to pick passwords that are easy for them to remember. Common passwords include the names of pets or family members, which are much easier to remember than a string of numbers and symbols.<\/span><\/p><p><span style=\"font-weight: 400;\">Unfortunately, this means that employees are logging into remote networks with easily hackable, reused passwords. This can make your network extremely vulnerable to cybercriminals, who trade in hacked passwords on the dark web.<\/span><\/p><p><span style=\"font-weight: 400;\">Adding password protocols to your remote access policy can slash the risk associated with weak and reused passwords.\u00a0<\/span><\/p><h3><span style=\"font-weight: 400;\">Restricted visibility<\/span><\/h3><p><span style=\"font-weight: 400;\">Without remote management software, it is hard for security teams or managers to adequately monitor remote user activities. This means that they cannot pinpoint whether users are behaving in risky ways or are under attack by malware.<\/span><\/p><p><span style=\"font-weight: 400;\">Security teams need good remote visibility to gain insight into performance, traffic, activities, and security status. Remote work that\u2019s not covered by a comprehensive remote access policy makes this hard.<\/span><\/p><h3><span style=\"font-weight: 400;\">Utilizing personal devices<\/span><\/h3><p><span style=\"font-weight: 400;\">BYOD (Bring Your Own Device) is a popular strategy for both managers and employees. It saves companies from having to overspend on tech, and it gives employees the freedom and comfort of using devices they are familiar with.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">However, mixing business and pleasure should be done with great care, and using personal devices for work purposes is no different.<\/span><\/p><p><span style=\"font-weight: 400;\">BYOD presents several challenges for security teams. First, they must ensure that each device is malware free, has the right security features, can connect to remote PC networks, and is compatible with corporate systems. They must also train employees on how to connect to work networks on a wide variety of devices and operating systems.<\/span><\/p><p><span style=\"font-weight: 400;\">Remote access policies can help users and security teams set up, use and monitor devices in a way that works for both the employees and the company.\u00a0<\/span><\/p><h3><span style=\"font-weight: 400;\">Having vulnerable backups<\/span><\/h3><p><span style=\"font-weight: 400;\">If users don\u2019t properly back up endpoint data, that data can quickly become vulnerable.<\/span><\/p><p><span style=\"font-weight: 400;\">It is important that data is regularly backed up on secure, up-to-date media. For example, it is not uncommon for remote workers to back up data on USB hard drives and\/or consumer cloud services (like Google Drive). The problem with this is that USB drives can easily be lost or stolen, and consumer cloud storage may not be as secure as corporate storage solutions.<\/span><\/p><p><span style=\"font-weight: 400;\">Remote access policies can solve this problem by defining how and where files should be backed up as well as prohibiting insecure backup methods.<\/span><\/p><h3><span style=\"font-weight: 400;\">Phishing attacks<\/span><\/h3><p><span style=\"font-weight: 400;\">Phishing attacks are getting more prolific and sophisticated every day. Remote workers are particularly vulnerable to phishing and its cousins, \u2018smishing\u2019 (SMS phishing) and \u2018vishing\u2019 (Voice over IP phishing).<\/span><\/p><p><span style=\"font-weight: 400;\">The increase in <\/span><a href=\"https:\/\/www.realvnc.com\/en\/blog\/the-role-of-remote-access-in-cyberattacks-and-what-you-can-do-about-it\/\"><span style=\"font-weight: 400;\">remote access and cyberattacks<\/span><\/a><span style=\"font-weight: 400;\"> has been echoed by an increase in phishing scams. The combination of insecure devices, weak passwords, different operating systems, and the distractions of remote work has created a perfect environment for these scams.<\/span><\/p><p><span style=\"font-weight: 400;\">Because of phishing, some businesses insist that all online work is done in-office, over secure networks. However, a remote pc alternative is to protect yourself with a good remote access policy, which should outline how to spot and avoid phishing attacks before they become a problem.<\/span><\/p><h2><span style=\"font-weight: 400;\">How to mitigate the security risks associated with remote access<\/span><\/h2><h3><span style=\"font-weight: 400;\">Technical controls<\/span><\/h3><p><span style=\"font-weight: 400;\">Platforms like RealVNC<\/span><span style=\"font-weight: 400;\">\u00ae<\/span><span style=\"font-weight: 400;\"> or other remote PC controllers, give security teams and managers technical control over remote devices. Depending on your remote access policy, security teams can use RealVNC software to monitor, access, and even take control of <a href=\"https:\/\/www.realvnc.com\/en\/discover\/remote-device\/\">remote devices<\/a>.<\/span><\/p><p><span style=\"font-weight: 400;\">Ensuring that your security experts can maintain control and oversight eliminates many of the risks associated with remote working.<\/span><\/p><h3><span style=\"font-weight: 400;\">User visibility<\/span><\/h3><p><span style=\"font-weight: 400;\">Visibility is incredibly useful for remote work. When security teams and managers can monitor user activity and device performance, they are more able to spot threats, mistakes, and burgeoning vulnerabilities before they become problems.<\/span><\/p><h3><span style=\"font-weight: 400;\">Proper training\u00a0<\/span><\/h3><p><span style=\"font-weight: 400;\">Training might be the most effective thing you can do to make remote work secure. A huge amount of system vulnerabilities occur due to simple human error &#8211; people either don\u2019t realize what they are doing wrong or don\u2019t have the education needed to correct their errors.<\/span><\/p><p><span style=\"font-weight: 400;\">A good cybersecurity training program can massively reduce the risks associated with human error. Teaching your remote staff about things like password security, secure backups, and more will make a huge difference to your cybersecurity.<\/span><\/p><h2><span style=\"font-weight: 400;\">How can a remote access policy secure your remote desktop?<\/span><\/h2><p><span style=\"font-weight: 400;\">A remote access policy is vital for any company with remote workers. A good one will:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Define the conditions needed to access any network;<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Set out access permissions;<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Assign responsibilities for networks, databases, etc.;<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Delineate data and <\/span><a href=\"https:\/\/www.realvnc.com\/en\/blog\/all-you-need-to-know-about-remote-desktop-encryption\/%C2%A0\"><span style=\"font-weight: 400;\">remote desktop encryption<\/span><\/a><span style=\"font-weight: 400;\"> standards;<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Set out privacy and confidentiality standards;<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Explain the company\u2019s remote monitoring policies and practices;<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Clarify devices and operating systems that can be used to connect to corporate networks;<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Explain password security requirements;<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Define acceptable usage protocols;<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">List trusted and non-trusted sources;<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Set out compliance, governance, and enforcement policies;<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Lay out equipment ownership guidelines.\u00a0<\/span><\/li><\/ul><p><span style=\"font-weight: 400;\">With a good remote access policy, you can counteract many of the risks associated with remote working. When combined with a good remote management platform, such as VNC Connect, it will be a game-changer for your business security.<\/span><\/p><h2><span style=\"font-weight: 400;\">Ensure a safe remote PC connection with a remote access solution from RealVNC<\/span><\/h2><p><span style=\"font-weight: 400;\">RealVNC offers secure, customizable, and intuitive remote access solutions. No matter where you or your workers are, they can connect to a remote PC and other work devices securely.<\/span><\/p><p><span style=\"font-weight: 400;\">RealVNC software also allows security teams and managers to control remote worker devices. This is an enormous help when it comes to securing important data and keeping performance strong.<\/span><\/p><p><span style=\"font-weight: 400;\">To learn more about how RealVNC can benefit your business, why not participate in our 14-day free trial?<\/span><\/p><h2><span style=\"font-weight: 400;\">FAQs about remote PC access<\/span><\/h2><h3><span style=\"font-weight: 400;\">Can you remotely access a PC or desktop with multiple monitors?<\/span><\/h3><p><span style=\"font-weight: 400;\">It is possible to remotely access a PC or desktop with multiple monitors. However, you may need to adjust your device settings, for example, you may need to set up your screen display to show the monitor feeds intelligibly. Multiple monitor modes may also need to be enabled within your remote management platform settings.<\/span><\/p><h3><span style=\"font-weight: 400;\">What are the three main types of access control?<\/span><\/h3><p><span style=\"font-weight: 400;\">There are three major types of remote access control:<\/span><\/p><ol><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Direct remote access involves connecting directly to a computer or device via the internet;<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Indirect remote access goes through an intermediary server or platform. Messages and controls are relayed between two or more machines via the intermediary;<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A VPN (Virtual Private Network) is a secure, private network that devices can connect to remotely.<\/span><\/li><\/ol><h3><span style=\"font-weight: 400;\">Can users remotely access a smart TV?<\/span><\/h3><p><span style=\"font-weight: 400;\">Most smart TVs can be accessed remotely &#8211; either through a specialized app or general remote access technology. If you want to access your smart TV remotely, the best way to do so is to look into your TV&#8217;s specifications and instructions.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybercriminals were extremely quick to capitalize on the new opportunities that remote working offered them. Between January and April 2020, the world saw an astonishing 630% increase in cloud-based cyberattacks. While businesses have worked hard to close potential gateways for such attacks, cybercrime is not going anywhere. Between February 2020 and February 2023, 20% of &#8230; <a title=\"Enhancing Remote PC Security With a Remote Access Policy: What it is and Why it\u2019s Important\" class=\"read-more\" href=\"https:\/\/www.realvnc.com\/en\/blog\/remote-pc\/\" aria-label=\"Read more about Enhancing Remote PC Security With a Remote Access Policy: What it is and Why it\u2019s Important\">Read more<\/a><\/p>\n","protected":false},"author":31,"featured_media":18564,"template":"","blog_category":[281,257,258],"class_list":["post-18589","blog","type-blog","status-publish","has-post-thumbnail","hentry","blog_category-remote-access","blog_category-security","blog_category-strategy"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Enhancing Remote PC Security With a Remote Access Policy: What it is and Why it\u2019s Important<\/title>\n<meta name=\"description\" content=\"The increase in remote working has also given cybercriminals new avenues to explore, apart from helping businesses thrive.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.realvnc.com\/en\/blog\/remote-pc\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Enhancing Remote PC Security With a Remote Access Policy: What it is and Why it\u2019s Important\" \/>\n<meta property=\"og:description\" content=\"The increase in remote working has also given cybercriminals new avenues to explore, apart from helping businesses thrive.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.realvnc.com\/en\/blog\/remote-pc\/\" \/>\n<meta property=\"og:site_name\" content=\"RealVNC\u00ae\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/realvnc\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-20T14:35:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/remote-access-policy-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1203\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@realvnc\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/remote-pc\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/remote-pc\\\/\"},\"author\":{\"name\":\"RealVNC\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/505d415578d7c153d5d004b19f33b53f\"},\"headline\":\"Enhancing Remote PC Security With a Remote Access Policy: What it is and Why it\u2019s Important\",\"datePublished\":\"2023-06-01T10:19:42+00:00\",\"dateModified\":\"2024-02-20T14:35:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/remote-pc\\\/\"},\"wordCount\":1735,\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/remote-pc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/remote-access-policy-1.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/remote-pc\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/remote-pc\\\/\",\"name\":\"Enhancing Remote PC Security With a Remote Access Policy: What it is and Why it\u2019s Important\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/remote-pc\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/remote-pc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/remote-access-policy-1.jpg\",\"datePublished\":\"2023-06-01T10:19:42+00:00\",\"dateModified\":\"2024-02-20T14:35:41+00:00\",\"description\":\"The increase in remote working has also given cybercriminals new avenues to explore, apart from helping businesses thrive.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/remote-pc\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/remote-pc\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/remote-pc\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/remote-access-policy-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/remote-access-policy-1.jpg\",\"width\":1600,\"height\":1203,\"caption\":\"remote access policy\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/remote-pc\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Enhancing Remote PC Security With a Remote Access Policy: What it is and Why it\u2019s Important\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"name\":\"RealVNC\u00ae\",\"description\":\"The world&#039;s safest remote access software\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\",\"name\":\"RealVNC\u00ae\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"width\":300,\"height\":41,\"caption\":\"RealVNC\u00ae\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/realvnc\",\"https:\\\/\\\/x.com\\\/realvnc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/realvnc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/RealVNCLtd\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/RealVNC\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/505d415578d7c153d5d004b19f33b53f\",\"name\":\"RealVNC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g\",\"caption\":\"RealVNC\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Enhancing Remote PC Security With a Remote Access Policy: What it is and Why it\u2019s Important","description":"The increase in remote working has also given cybercriminals new avenues to explore, apart from helping businesses thrive.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.realvnc.com\/en\/blog\/remote-pc\/","og_locale":"en_US","og_type":"article","og_title":"Enhancing Remote PC Security With a Remote Access Policy: What it is and Why it\u2019s Important","og_description":"The increase in remote working has also given cybercriminals new avenues to explore, apart from helping businesses thrive.","og_url":"https:\/\/www.realvnc.com\/en\/blog\/remote-pc\/","og_site_name":"RealVNC\u00ae","article_publisher":"https:\/\/www.facebook.com\/realvnc","article_modified_time":"2024-02-20T14:35:41+00:00","og_image":[{"width":1600,"height":1203,"url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/remote-access-policy-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@realvnc","twitter_misc":{"Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.realvnc.com\/en\/blog\/remote-pc\/#article","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/remote-pc\/"},"author":{"name":"RealVNC","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/505d415578d7c153d5d004b19f33b53f"},"headline":"Enhancing Remote PC Security With a Remote Access Policy: What it is and Why it\u2019s Important","datePublished":"2023-06-01T10:19:42+00:00","dateModified":"2024-02-20T14:35:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/remote-pc\/"},"wordCount":1735,"publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/remote-pc\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/remote-access-policy-1.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.realvnc.com\/en\/blog\/remote-pc\/","url":"https:\/\/www.realvnc.com\/en\/blog\/remote-pc\/","name":"Enhancing Remote PC Security With a Remote Access Policy: What it is and Why it\u2019s Important","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/remote-pc\/#primaryimage"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/remote-pc\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/remote-access-policy-1.jpg","datePublished":"2023-06-01T10:19:42+00:00","dateModified":"2024-02-20T14:35:41+00:00","description":"The increase in remote working has also given cybercriminals new avenues to explore, apart from helping businesses thrive.","breadcrumb":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/remote-pc\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.realvnc.com\/en\/blog\/remote-pc\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/blog\/remote-pc\/#primaryimage","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/remote-access-policy-1.jpg","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/remote-access-policy-1.jpg","width":1600,"height":1203,"caption":"remote access policy"},{"@type":"BreadcrumbList","@id":"https:\/\/www.realvnc.com\/en\/blog\/remote-pc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.realvnc.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blogs","item":"https:\/\/www.realvnc.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"Enhancing Remote PC Security With a Remote Access Policy: What it is and Why it\u2019s Important"}]},{"@type":"WebSite","@id":"https:\/\/www.realvnc.com\/en\/#website","url":"https:\/\/www.realvnc.com\/en\/","name":"RealVNC\u00ae","description":"The world&#039;s safest remote access software","publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.realvnc.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.realvnc.com\/en\/#organization","name":"RealVNC\u00ae","url":"https:\/\/www.realvnc.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","width":300,"height":41,"caption":"RealVNC\u00ae"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/realvnc","https:\/\/x.com\/realvnc","https:\/\/www.linkedin.com\/company\/realvnc\/","https:\/\/www.youtube.com\/RealVNCLtd","https:\/\/en.wikipedia.org\/wiki\/RealVNC"]},{"@type":"Person","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/505d415578d7c153d5d004b19f33b53f","name":"RealVNC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g","caption":"RealVNC"}}]}},"_links":{"self":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/18589","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/users\/31"}],"version-history":[{"count":0,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/18589\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media\/18564"}],"wp:attachment":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media?parent=18589"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog_category?post=18589"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}