{"id":20180,"date":"2023-08-24T08:07:48","date_gmt":"2023-08-24T08:07:48","guid":{"rendered":"https:\/\/www.realvnc.com\/en\/?post_type=blog&#038;p=20180"},"modified":"2024-02-19T15:15:39","modified_gmt":"2024-02-19T15:15:39","slug":"state-remote-access-2023-cyberattacks","status":"publish","type":"blog","link":"https:\/\/www.realvnc.com\/en\/blog\/state-remote-access-2023-cyberattacks\/","title":{"rendered":"The State of Remote Access in 2023 Cyberattacks"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"20180\" class=\"elementor elementor-20180\" data-elementor-post-type=\"blog\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5f94ba53 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5f94ba53\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4f89a3f5\" data-id=\"4f89a3f5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7a54e57b elementor-widget elementor-widget-text-editor\" data-id=\"7a54e57b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>You\u2019d think remote access was a non-issue today; even after the need to utilize easy remote access during the pandemic, the continued misuse of externally facing remote access over the last three years should serve as enough of a lesson that insecure remote access (whether Microsoft\u2019s basic RDP or otherwise) should be nonexistent in today\u2019s networks.<\/p><p>But that\u2019s just not the case.\u00a0 <em>In short, insecure remote access is alive and well.<\/em><\/p><p>To make the point, I wanted to take the time to look at a few pieces of industry research that highlight the continued existence of the problem of insecure remote access, as well as how remote access is being misused.<\/p><p>We all are aware that ransomware is the more prevalent and pervasive type of cyberattack today. For example, these kinds of attacks are so damaging that the U.S. Government\u2019s Cybersecurity &amp; Infrastructure Security Agency (CISA) continually puts out advisories on specific ransomware variants \u2013 such as the <a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa23-061a\">advisory covering Royal Ransomware earlier this year<\/a>.<\/p><p>Remote access plays a role in many of these attacks (e.g., the attackers behind Royal themselves used RDP as the initial attack vector in 13% of their attacks). But there are many other examples of industry data pointing out the use of remote access.<\/p><ul><li>According to this year\u2019s newly-release <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/2023-data-breach-investigations-report-dbir.pdf\">Verizon Data Breach Investigation\u2019s Report<\/a>, just above one-quarter (28%) of ransomware attacks that involved system intrusion included the use of <a href=\"https:\/\/www.realvnc.com\/en\/discover\/remote-desktop\/\">desktop sharing software<\/a>.<\/li><li>Additionally, according to cybersecurity vendor Fortinet, in 51% of ransomware attacks, the <a href=\"https:\/\/www.fortinet.com\/content\/dam\/fortinet\/assets\/reports\/report-2023-ransomware-global-research.pdf\">exploiting of remote desktop protocol<\/a> was involved \u2013 this is a very real problem today.<\/li><\/ul><p>So, how is this remote access being leveraged by threat actors?\u00a0 In many cases, it serves as the initial access for attacks (as shown in the Fortinet data). The availability of remote access is so prevalent that, according to cybercrime monitoring and analysis vendor KELA, the <a href=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/04\/KELA_Research_Q1-2023_ransomware-and-network-access-sales.pdf\">most common type of access offered by initial access brokers was RDP<\/a> (Remote Desktop Protocol) accompanied by compromised credentials.<\/p><p>I think it should be mentioned that I see a lot of industry data focused on RDP (that is, Microsoft\u2019s remote desktop protocol). In general, I feel like the reports are more trying to make the point that externally-accessible remote access (from <em>any <\/em>software vendor) should be grouped under the umbrella of \u201cremote desktop protocol\u201d, and that this isn\u2019t just a bashing of RDP specifically.<\/p><p>The problem here is that organizations of all sizes continue to enable their remote workforces with remote access solutions (again, RDP and otherwise) that are focused more on productivity than on security, putting the organization at risk; 75% of security experts believe that <a href=\"https:\/\/sosafe-awareness.com\/resources\/reports\/human-risk-review\/\">remote\/hybrid work actually <em>increases<\/em> the risk of cyberattacks<\/a>, citing the reliance on remote connectivity as a contributing factor.<\/p><h2>Not Just Remote Access, but <em>Secure <\/em>Remote Access<\/h2><p>Assuming we\u2019re not going to get away from having remote workers needing to access corporate resources remotely for the foreseeable future, it\u2019s imperative that the remote access solutions used actually <em>improve<\/em> the security stance of the organization. \u00a0So, what does that look like?\u00a0 Let\u2019s use some of the current data points made here to outline the future of your secure remote access.<\/p><ul><li><strong>No externally-facing RDP. Period.<\/strong> Threat actors are well-aware of how to scan for and open RDP session (even if you change the port address). So, unless you put security controls around RDP, it can\u2019t be your solution to enable remote users to access the corporate network. Otherwise, it\u2019s apparent from the data above, it will also end up helping threat actors too.<\/li><li><strong>No internal RDP either.<\/strong> This isn\u2019t an RDP hate-fest; this is really about the insecurity of the default remote desktop services. There are no real security controls except for the requirement for a username and password \u2013 and that\u2019s not enough.\u00a0 Given the data above outlines how RDP seems to be the remote access focus for most threat actors, it makes sense that \u2013 if nothing else \u2013 stop helping the bad guys by leaving it enabled even internally, as it only helps lateral movement.<\/li><li><strong>Put secure remote access in place.<\/strong> This goes for both external and internal access purposes. What makes remote access secure is the layers of controls put in place that ensure the correct person is using the correct credential to access only the approved systems with the exact sanctioned level of permissions. So, the types of controls necessary would equate practically to:<ul><li><strong>Multi-factor authentication<\/strong> \u2013 go beyond username\/password combinations and make certain the user of a credential is also its <em>owner<\/em>.<\/li><li><strong>Granular Access<\/strong> \u2013 your remote access solution has the potential to allow a user to access just about any system. So, there should be some level of control over which users can gain access to which systems.<\/li><li><strong>Centralized Control<\/strong> \u2013 the same solution used to enable remote workers to access the corporate network should also enable sanctioned users within the network to remotely access systems within the network. This way you can centrally establish policies, perform deployments, and control remote sessions all from a single solution.<\/li><\/ul><\/li><\/ul><p>The use of remote access solutions in cyberattacks isn\u2019t going to be going anywhere anytime soon; the bad guys need to access systems in the same way you do so they can perform the same kinds of actions\u2026 they just do it with malicious intent.\u00a0 So, the goal here is to maintain the spirit of remote access (enabling users to be productive and get their work done remotely \u2013 whether than be internally or externally) but do so in a way that doesn\u2019t assist the threat actor by using a solution without any kind of security controls in place.<\/p><p>And the only way to really accomplish this is to acknowledge the risk remote access creates and make certain that the solution used by remote workers and IT alike is one that enhances the organization\u2019s security while also elevating its productivity.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>With remote workforces still reliant on insecure remote access to facilitate connectivity, threat actors continue to leverage this attack vector (for as long as you\u2019ll let them).<\/p>\n","protected":false},"author":20,"featured_media":20184,"template":"","blog_category":[280,281,270],"class_list":["post-20180","blog","type-blog","status-publish","has-post-thumbnail","hentry","blog_category-featured","blog_category-remote-access","blog_category-technology-trends"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The State of Remote Access in 2023 Cyberattacks<\/title>\n<meta name=\"description\" content=\"With remote workforces still reliant on insecure remote access to facilitate connectivity, threat actors continue to leverage it if allowed.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.realvnc.com\/en\/blog\/state-remote-access-2023-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The State of Remote Access in 2023 Cyberattacks\" \/>\n<meta property=\"og:description\" content=\"With remote workforces still reliant on insecure remote access to facilitate connectivity, threat actors continue to leverage it if allowed.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.realvnc.com\/en\/blog\/state-remote-access-2023-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"RealVNC\u00ae\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/realvnc\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-19T15:15:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/06\/State-of-remote-access-cyberattacks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@realvnc\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/state-remote-access-2023-cyberattacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/state-remote-access-2023-cyberattacks\\\/\"},\"author\":{\"name\":\"Nick Cavalancia, 4-time Microsoft MVP\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/01b6bf08521717030ba8b5904cbdfc49\"},\"headline\":\"The State of Remote Access in 2023 Cyberattacks\",\"datePublished\":\"2023-08-24T08:07:48+00:00\",\"dateModified\":\"2024-02-19T15:15:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/state-remote-access-2023-cyberattacks\\\/\"},\"wordCount\":995,\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/state-remote-access-2023-cyberattacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/State-of-remote-access-cyberattacks.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/state-remote-access-2023-cyberattacks\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/state-remote-access-2023-cyberattacks\\\/\",\"name\":\"The State of Remote Access in 2023 Cyberattacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/state-remote-access-2023-cyberattacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/state-remote-access-2023-cyberattacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/State-of-remote-access-cyberattacks.jpg\",\"datePublished\":\"2023-08-24T08:07:48+00:00\",\"dateModified\":\"2024-02-19T15:15:39+00:00\",\"description\":\"With remote workforces still reliant on insecure remote access to facilitate connectivity, threat actors continue to leverage it if allowed.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/state-remote-access-2023-cyberattacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/state-remote-access-2023-cyberattacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/state-remote-access-2023-cyberattacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/State-of-remote-access-cyberattacks.jpg\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/State-of-remote-access-cyberattacks.jpg\",\"width\":1600,\"height\":900,\"caption\":\"State of remote access cyberattacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/state-remote-access-2023-cyberattacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The State of Remote Access in 2023 Cyberattacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"name\":\"RealVNC\u00ae\",\"description\":\"The world&#039;s safest remote access software\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\",\"name\":\"RealVNC\u00ae\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"width\":300,\"height\":41,\"caption\":\"RealVNC\u00ae\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/realvnc\",\"https:\\\/\\\/x.com\\\/realvnc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/realvnc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/RealVNCLtd\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/RealVNC\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/01b6bf08521717030ba8b5904cbdfc49\",\"name\":\"Nick Cavalancia, 4-time Microsoft MVP\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g\",\"caption\":\"Nick Cavalancia, 4-time Microsoft MVP\"},\"description\":\"Nick Cavalancia is a four-time Microsoft MVP, has over 28 years of enterprise IT experience, is an accomplished consultant, speaker, trainer, writer, and columnist, and has achieved industry certifications including MCSE, MCT, Master CNE, and Master CNI. He has authored, co-authored and contributed to dozens of books on various technologies. Nick regularly speaks, writes and blogs for some of the most recognized tech companies today on topics including cybersecurity, cloud adoption, business continuity, and compliance.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The State of Remote Access in 2023 Cyberattacks","description":"With remote workforces still reliant on insecure remote access to facilitate connectivity, threat actors continue to leverage it if allowed.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.realvnc.com\/en\/blog\/state-remote-access-2023-cyberattacks\/","og_locale":"en_US","og_type":"article","og_title":"The State of Remote Access in 2023 Cyberattacks","og_description":"With remote workforces still reliant on insecure remote access to facilitate connectivity, threat actors continue to leverage it if allowed.","og_url":"https:\/\/www.realvnc.com\/en\/blog\/state-remote-access-2023-cyberattacks\/","og_site_name":"RealVNC\u00ae","article_publisher":"https:\/\/www.facebook.com\/realvnc","article_modified_time":"2024-02-19T15:15:39+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/06\/State-of-remote-access-cyberattacks.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@realvnc","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.realvnc.com\/en\/blog\/state-remote-access-2023-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/state-remote-access-2023-cyberattacks\/"},"author":{"name":"Nick Cavalancia, 4-time Microsoft MVP","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/01b6bf08521717030ba8b5904cbdfc49"},"headline":"The State of Remote Access in 2023 Cyberattacks","datePublished":"2023-08-24T08:07:48+00:00","dateModified":"2024-02-19T15:15:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/state-remote-access-2023-cyberattacks\/"},"wordCount":995,"publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/state-remote-access-2023-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/06\/State-of-remote-access-cyberattacks.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.realvnc.com\/en\/blog\/state-remote-access-2023-cyberattacks\/","url":"https:\/\/www.realvnc.com\/en\/blog\/state-remote-access-2023-cyberattacks\/","name":"The State of Remote Access in 2023 Cyberattacks","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/state-remote-access-2023-cyberattacks\/#primaryimage"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/state-remote-access-2023-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/06\/State-of-remote-access-cyberattacks.jpg","datePublished":"2023-08-24T08:07:48+00:00","dateModified":"2024-02-19T15:15:39+00:00","description":"With remote workforces still reliant on insecure remote access to facilitate connectivity, threat actors continue to leverage it if allowed.","breadcrumb":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/state-remote-access-2023-cyberattacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.realvnc.com\/en\/blog\/state-remote-access-2023-cyberattacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/blog\/state-remote-access-2023-cyberattacks\/#primaryimage","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/06\/State-of-remote-access-cyberattacks.jpg","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/06\/State-of-remote-access-cyberattacks.jpg","width":1600,"height":900,"caption":"State of remote access cyberattacks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.realvnc.com\/en\/blog\/state-remote-access-2023-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.realvnc.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blogs","item":"https:\/\/www.realvnc.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"The State of Remote Access in 2023 Cyberattacks"}]},{"@type":"WebSite","@id":"https:\/\/www.realvnc.com\/en\/#website","url":"https:\/\/www.realvnc.com\/en\/","name":"RealVNC\u00ae","description":"The world&#039;s safest remote access software","publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.realvnc.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.realvnc.com\/en\/#organization","name":"RealVNC\u00ae","url":"https:\/\/www.realvnc.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","width":300,"height":41,"caption":"RealVNC\u00ae"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/realvnc","https:\/\/x.com\/realvnc","https:\/\/www.linkedin.com\/company\/realvnc\/","https:\/\/www.youtube.com\/RealVNCLtd","https:\/\/en.wikipedia.org\/wiki\/RealVNC"]},{"@type":"Person","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/01b6bf08521717030ba8b5904cbdfc49","name":"Nick Cavalancia, 4-time Microsoft MVP","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g","caption":"Nick Cavalancia, 4-time Microsoft MVP"},"description":"Nick Cavalancia is a four-time Microsoft MVP, has over 28 years of enterprise IT experience, is an accomplished consultant, speaker, trainer, writer, and columnist, and has achieved industry certifications including MCSE, MCT, Master CNE, and Master CNI. He has authored, co-authored and contributed to dozens of books on various technologies. Nick regularly speaks, writes and blogs for some of the most recognized tech companies today on topics including cybersecurity, cloud adoption, business continuity, and compliance."}]}},"_links":{"self":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/20180","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/users\/20"}],"version-history":[{"count":0,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/20180\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media\/20184"}],"wp:attachment":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media?parent=20180"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog_category?post=20180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}