{"id":20193,"date":"2023-07-27T06:33:22","date_gmt":"2023-07-27T06:33:22","guid":{"rendered":"https:\/\/www.realvnc.com\/en\/?post_type=blog&#038;p=20193"},"modified":"2024-02-20T12:19:58","modified_gmt":"2024-02-20T12:19:58","slug":"remote-workers-guide-secure-remote-access","status":"publish","type":"blog","link":"https:\/\/www.realvnc.com\/en\/blog\/remote-workers-guide-secure-remote-access\/","title":{"rendered":"The Remote Worker\u2019s Guide to Secure Remote Access"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"20193\" class=\"elementor elementor-20193\" data-elementor-post-type=\"blog\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3499b828 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3499b828\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c398e85\" data-id=\"c398e85\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4a29d8b4 elementor-widget elementor-widget-text-editor\" data-id=\"4a29d8b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>With so many variables coming into play when allowing <a href=\"https:\/\/www.realvnc.com\/en\/discover\/remote-access\/\">remote access<\/a> to the corporate network, there are several best practices that should be followed to elevate security.<\/p>\n<p>Let\u2019s start by putting aside exactly how much of an organizations workforce is and isn\u2019t working remotely and zero in on the fact that, regardless of where an org is in the mix between completely being remote and everyone already returning to the office, <a href=\"https:\/\/blog.checkpoint.com\/security\/the-2022-workforce-security-report\/\">94% of today\u2019s organizations allow remote access to corporate apps and assets<\/a>, according to security vendor Check Point. This has the potential to create a lot of risks, so let\u2019s spend some time looking at a few aspects of a remote worker\u2019s connection to a corporate resource, and discuss some best practices to ensure the organization remains as secure as possible.<\/p>\n<p>Assuming that some of the corporate resources exist within the organization\u2019s internal network, it\u2019s safe to also assume that some or all of the remote workers connect to the corporate network, which potentially puts the organization at risk based on the following three factors:<\/p>\n<ul>\n<li>The remote worker\u2019s device<\/li>\n<li>The remote worker\u2019s method of connecting to the corporate network<\/li>\n<li>The remote worker\u2019s method of authentication<\/li>\n<\/ul>\n<p>In this article, I\u2019ll look at each one, discuss the risk they pose, and make some suggestions on how to facilitate secure remote access.<\/p>\n<h2>The remote worker\u2019s device<\/h2>\n<p>According to the Check Point data, only 17% of organizations restrict remote access to company-managed laptops.&nbsp; That means that there are a ton of personal devices in use, with varying levels of security implemented \u2013 likely none of which meet corporate security standards. The operating system probably doesn\u2019t have a hardened configuration, there\u2019s probably no antivirus (at a minimum) \u2013 let alone a business-level endpoint protection solution, and the use of the personal device tends to put the user at ease, making them far more susceptible to social engineering-based attacks.<\/p>\n<p>So, between the user and the device, what you have is a completely insecure working environment where it\u2019s relatively easy for attackers to compromise the device \u2013 particularly when it\u2019s a non-mobile operating system.<\/p>\n<h3>Securing the Device<\/h3>\n<p>Assuming we\u2019re talking about personal devices here, there are only a few options organizations have.&nbsp; The first option is conceivable whereby the remote worker is asked to allow the organization to manage the configuration of the personal device in order to harden its configuration and possibly install some form of endpoint protection.&nbsp; But that\u2019s not entirely probable.&nbsp;&nbsp; The more likely solution is to not have the worker perform their work activity (logically speaking) on the personal device but to instead remotely access an internal device and perform their work via a remote session.<\/p>\n<h2>The remote worker\u2019s method of connecting to the corporate network<\/h2>\n<p>According to the Check Point data, 73% of remote workers connect via VPN. <a href=\"https:\/\/www.realvnc.com\/en\/blog\/remote-access-vpn\/\">Using a VPN<\/a> does provide some additional levels of security.&nbsp; For one, most VPNs require the user or the device to authenticate prior to use.&nbsp; Secondly, the VPN does encrypt the communication across the channel.&nbsp;&nbsp; But there\u2019s still the issue of the (probably) insecure personal device; should a threat actor gain access to the device (waiting on the actual user to connect to the VPN) and\/or the user\u2019s credentials (through, say, a credential harvesting phishing attack and use them to authenticate through the VPN), it\u2019s conceivable that an attacker could find themselves having access to corporate resources despite having a VPN in place.<\/p>\n<h3>Securing the Connection<\/h3>\n<p>According to IBM, <a href=\"https:\/\/www.ibm.com\/reports\/threat-intelligence\">the exploitation of external remote services is one of the top initial attack vectors<\/a> in cyberattacks, demonstrating how imperative it is that organizations not just look for a way to securely connect the user to the corporate network but to find a method that decreases the risk introduced by the insecure device and network.&nbsp; VPNs are a great means of connection, but it\u2019s likely necessary to logically connect the user remotely to an internal device where there\u2019s no ability to introduce malware, exfiltrate data, etc. And, depending on the remote access solution used, there may be <a href=\"https:\/\/www.realvnc.com\/en\/blog\/three-reasons-why-time-to-ditch-your-vpn-rdp-strategy\/\">no need for the VPN at all<\/a>.<\/p>\n<h2>The remote worker\u2019s method of authentication<\/h2>\n<p>Let\u2019s start with something we can all agree upon \u2013 <em>username\/password credentials alone most definitely aren\u2019t enough<\/em>. Any organization that uses a VPN or any other type of connectivity from a remote device to the corporate network using only standard user credentials is a cyberattack time bomb waiting to go off. VPNs can leverage multi-factor authentication, but then you\u2019re still left with the previously mentioned problems the insecure device introduces.&nbsp;<\/p>\n<h3>Securing the Authentication<\/h3>\n<p>I\u2019ve already mentioned remotely-accessed sessions as a potential solution to address the insecurities found in the device and connection, but remote access only works if the solution being used also supports <a href=\"https:\/\/www.realvnc.com\/en\/blog\/3-reasons-why-mfa-remote-access-strategy\/\">multi-factor authentication<\/a> at a minimum.&nbsp; Additional controls, such as policies that define which users or devices can utilize a remote access session \u2013 or even <a href=\"https:\/\/www.realvnc.com\/en\/blog\/zero-trust-network-access-vs-remote-access\/\">potentially moving towards Zero Trust Network Access<\/a> \u2013 is likely necessary to ensure any remote access to the corporate network is as secure as possible and minimizes the risk of being misused as an attack vector as is possible.<\/p>\n<h2>Attaining True Secure Remote Access<\/h2>\n<p>Creating a state of secure access for remote workers isn\u2019t just a matter of implementing some form of secure session between the worker, the corporate network, and its resources.&nbsp; No; secure remote access is about assessing the risk introduced by each facet of the working environment, <a href=\"https:\/\/www.realvnc.com\/en\/blog\/counteracting-remote-access-mitre-threat-actions-vnc\/\">cross-referencing the threat actions taken by cybercriminals<\/a>, and finding security solutions that address both the business needs of said remote access <em>and <\/em>the security requirements established based on your risk assessment.<\/p>\n<p>Secure remote access, when implemented properly, can provide remote workers with a secure and productive working environment where the organization can rest assured that despite an attacker\u2019s best efforts, their ability to take advantage of that environment is minimized, if not mitigated.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>With so many variables coming into play when allowing remote access to the corporate network, there are several best practices that should be followed to elevate security.<\/p>\n","protected":false},"author":20,"featured_media":20195,"template":"","blog_category":[280,281,257],"class_list":["post-20193","blog","type-blog","status-publish","has-post-thumbnail","hentry","blog_category-featured","blog_category-remote-access","blog_category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Remote Worker\u2019s Guide to Secure Remote Access<\/title>\n<meta name=\"description\" content=\"With so many variables coming into play when allowing remote access to the corporate network, here are some best practices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.realvnc.com\/en\/blog\/remote-workers-guide-secure-remote-access\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Remote Worker\u2019s Guide to Secure Remote Access\" \/>\n<meta property=\"og:description\" content=\"With so many variables coming into play when allowing remote access to the corporate network, here are some best practices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.realvnc.com\/en\/blog\/remote-workers-guide-secure-remote-access\/\" \/>\n<meta property=\"og:site_name\" content=\"RealVNC\u00ae\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/realvnc\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-20T12:19:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/06\/remote-access-guide.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1067\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@realvnc\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/remote-workers-guide-secure-remote-access\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/remote-workers-guide-secure-remote-access\\\/\"},\"author\":{\"name\":\"Nick Cavalancia, 4-time Microsoft MVP\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/01b6bf08521717030ba8b5904cbdfc49\"},\"headline\":\"The Remote Worker\u2019s Guide to Secure Remote Access\",\"datePublished\":\"2023-07-27T06:33:22+00:00\",\"dateModified\":\"2024-02-20T12:19:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/remote-workers-guide-secure-remote-access\\\/\"},\"wordCount\":1023,\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/remote-workers-guide-secure-remote-access\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/remote-access-guide.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/remote-workers-guide-secure-remote-access\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/remote-workers-guide-secure-remote-access\\\/\",\"name\":\"The Remote Worker\u2019s Guide to Secure Remote Access\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/remote-workers-guide-secure-remote-access\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/remote-workers-guide-secure-remote-access\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/remote-access-guide.jpg\",\"datePublished\":\"2023-07-27T06:33:22+00:00\",\"dateModified\":\"2024-02-20T12:19:58+00:00\",\"description\":\"With so many variables coming into play when allowing remote access to the corporate network, here are some best practices.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/remote-workers-guide-secure-remote-access\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/remote-workers-guide-secure-remote-access\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/remote-workers-guide-secure-remote-access\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/remote-access-guide.jpg\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/remote-access-guide.jpg\",\"width\":1600,\"height\":1067,\"caption\":\"remote access guide\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/remote-workers-guide-secure-remote-access\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Remote Worker\u2019s Guide to Secure Remote Access\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"name\":\"RealVNC\u00ae\",\"description\":\"The world&#039;s safest remote access software\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\",\"name\":\"RealVNC\u00ae\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"width\":300,\"height\":41,\"caption\":\"RealVNC\u00ae\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/realvnc\",\"https:\\\/\\\/x.com\\\/realvnc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/realvnc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/RealVNCLtd\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/RealVNC\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/01b6bf08521717030ba8b5904cbdfc49\",\"name\":\"Nick Cavalancia, 4-time Microsoft MVP\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g\",\"caption\":\"Nick Cavalancia, 4-time Microsoft MVP\"},\"description\":\"Nick Cavalancia is a four-time Microsoft MVP, has over 28 years of enterprise IT experience, is an accomplished consultant, speaker, trainer, writer, and columnist, and has achieved industry certifications including MCSE, MCT, Master CNE, and Master CNI. He has authored, co-authored and contributed to dozens of books on various technologies. Nick regularly speaks, writes and blogs for some of the most recognized tech companies today on topics including cybersecurity, cloud adoption, business continuity, and compliance.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Remote Worker\u2019s Guide to Secure Remote Access","description":"With so many variables coming into play when allowing remote access to the corporate network, here are some best practices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.realvnc.com\/en\/blog\/remote-workers-guide-secure-remote-access\/","og_locale":"en_US","og_type":"article","og_title":"The Remote Worker\u2019s Guide to Secure Remote Access","og_description":"With so many variables coming into play when allowing remote access to the corporate network, here are some best practices.","og_url":"https:\/\/www.realvnc.com\/en\/blog\/remote-workers-guide-secure-remote-access\/","og_site_name":"RealVNC\u00ae","article_publisher":"https:\/\/www.facebook.com\/realvnc","article_modified_time":"2024-02-20T12:19:58+00:00","og_image":[{"width":1600,"height":1067,"url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/06\/remote-access-guide.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@realvnc","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.realvnc.com\/en\/blog\/remote-workers-guide-secure-remote-access\/#article","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/remote-workers-guide-secure-remote-access\/"},"author":{"name":"Nick Cavalancia, 4-time Microsoft MVP","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/01b6bf08521717030ba8b5904cbdfc49"},"headline":"The Remote Worker\u2019s Guide to Secure Remote Access","datePublished":"2023-07-27T06:33:22+00:00","dateModified":"2024-02-20T12:19:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/remote-workers-guide-secure-remote-access\/"},"wordCount":1023,"publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/remote-workers-guide-secure-remote-access\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/06\/remote-access-guide.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.realvnc.com\/en\/blog\/remote-workers-guide-secure-remote-access\/","url":"https:\/\/www.realvnc.com\/en\/blog\/remote-workers-guide-secure-remote-access\/","name":"The Remote Worker\u2019s Guide to Secure Remote Access","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/remote-workers-guide-secure-remote-access\/#primaryimage"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/remote-workers-guide-secure-remote-access\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/06\/remote-access-guide.jpg","datePublished":"2023-07-27T06:33:22+00:00","dateModified":"2024-02-20T12:19:58+00:00","description":"With so many variables coming into play when allowing remote access to the corporate network, here are some best practices.","breadcrumb":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/remote-workers-guide-secure-remote-access\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.realvnc.com\/en\/blog\/remote-workers-guide-secure-remote-access\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/blog\/remote-workers-guide-secure-remote-access\/#primaryimage","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/06\/remote-access-guide.jpg","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/06\/remote-access-guide.jpg","width":1600,"height":1067,"caption":"remote access guide"},{"@type":"BreadcrumbList","@id":"https:\/\/www.realvnc.com\/en\/blog\/remote-workers-guide-secure-remote-access\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.realvnc.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blogs","item":"https:\/\/www.realvnc.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"The Remote Worker\u2019s Guide to Secure Remote Access"}]},{"@type":"WebSite","@id":"https:\/\/www.realvnc.com\/en\/#website","url":"https:\/\/www.realvnc.com\/en\/","name":"RealVNC\u00ae","description":"The world&#039;s safest remote access software","publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.realvnc.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.realvnc.com\/en\/#organization","name":"RealVNC\u00ae","url":"https:\/\/www.realvnc.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","width":300,"height":41,"caption":"RealVNC\u00ae"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/realvnc","https:\/\/x.com\/realvnc","https:\/\/www.linkedin.com\/company\/realvnc\/","https:\/\/www.youtube.com\/RealVNCLtd","https:\/\/en.wikipedia.org\/wiki\/RealVNC"]},{"@type":"Person","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/01b6bf08521717030ba8b5904cbdfc49","name":"Nick Cavalancia, 4-time Microsoft MVP","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g","caption":"Nick Cavalancia, 4-time Microsoft MVP"},"description":"Nick Cavalancia is a four-time Microsoft MVP, has over 28 years of enterprise IT experience, is an accomplished consultant, speaker, trainer, writer, and columnist, and has achieved industry certifications including MCSE, MCT, Master CNE, and Master CNI. He has authored, co-authored and contributed to dozens of books on various technologies. Nick regularly speaks, writes and blogs for some of the most recognized tech companies today on topics including cybersecurity, cloud adoption, business continuity, and compliance."}]}},"_links":{"self":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/20193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/users\/20"}],"version-history":[{"count":0,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/20193\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media\/20195"}],"wp:attachment":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media?parent=20193"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog_category?post=20193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}