{"id":22272,"date":"2023-08-23T12:03:23","date_gmt":"2023-08-23T12:03:23","guid":{"rendered":"https:\/\/www.realvnc.com\/en\/?post_type=blog&#038;p=22272"},"modified":"2024-02-20T10:54:01","modified_gmt":"2024-02-20T10:54:01","slug":"accessibility-security-remote-desktop-access","status":"publish","type":"blog","link":"https:\/\/www.realvnc.com\/en\/blog\/accessibility-security-remote-desktop-access\/","title":{"rendered":"Balancing Accessibility and Security in Remote Desktop Access"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"22272\" class=\"elementor elementor-22272\" data-elementor-post-type=\"blog\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f920ed9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f920ed9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6b4c57e\" data-id=\"6b4c57e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f7ed1c2 elementor-widget elementor-widget-text-editor\" data-id=\"f7ed1c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>There\u2019s no doubt that the days of the classic office are behind us. Working remotely allows your employees to have greater flexibility while maintaining their productivity levels and <a href=\"https:\/\/www.realvnc.com\/en\/discover\/remote-desktop\/\">remote desktop access<\/a> is one tool that supports the modern workplace.<\/p>\n<p>Remote access allows your employees to work from home while ensuring that they still have access to the desktops used in the office. The productivity benefits are obvious, however, you also must be aware of the cybersecurity and compliance challenges.<\/p>\n<p>When adopting remote desktop access, you must remain compliant with data privacy and security regulations. With customer and employee data security covered by stringent regulations such as GDPR, HIPAA, CCPA, and more, it\u2019s crucial that you don\u2019t allow your remote access systems to open up vulnerabilities in your data privacy policies.<\/p>\n<p>Fortunately, it\u2019s possible to maintain accessibility for your remote employees while keeping your network secure\u2014read on to find out how.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-becc57d elementor-widget elementor-widget-heading\" data-id=\"becc57d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is remote desktop access and why could it pose a challenge for your IT security?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-060ca3f elementor-widget elementor-widget-text-editor\" data-id=\"060ca3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>If your company uses a remote working system, then remote desktop access and other remote access tech should be part of your <a href=\"https:\/\/www.auditboard.com\/blog\/what-is-a-risk-assessment-matrix\/\" target=\"_blank\" rel=\"noopener\">IT risk assessment matrix<\/a>, but what do we mean when we say remote desktop access?<\/p><p>Well, imagine that you want to access some files stored on your work desktop from the comfort of your home office\u2014<a href=\"https:\/\/www.realvnc.com\/en\/blog\/remote-access\/\">remote access<\/a> is what enables you to do this. This has been around for a while (remote desktop access was first included with Windows in 2001), but the recent increase in working from home has meant that more organizations are relying on this technology.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d5251b elementor-widget elementor-widget-image\" data-id=\"1d5251b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1009\" height=\"754\" src=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/08\/organization-utilize-remote-desktops.png\" class=\"attachment-full size-full wp-image-22279\" alt=\"\" srcset=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/08\/organization-utilize-remote-desktops.png 1009w, https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/08\/organization-utilize-remote-desktops-300x224.png 300w, https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/08\/organization-utilize-remote-desktops-768x574.png 768w\" sizes=\"(max-width: 1009px) 100vw, 1009px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image sourced from <a href=\"https:\/\/www.statista.com\/statistics\/1368456\/global-remote-desktop-usage\/\" target=\"_blank\" rel=\"noopener\">Statista<\/a><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af5cda3 elementor-widget elementor-widget-text-editor\" data-id=\"af5cda3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>You&#8217;ve probably heard of Remote Desktop Protocol (RDP). It&#8217;s the de facto technology for remote access in Windows. RDP means that your employees are able to access their desktops from anywhere in the world, letting them work just as if they were in the office.<\/p>\n<p>However, RDP\u2019s default settings weren\u2019t designed for the type of large-scale use that many organizations are implementing as they transition to a world of working from home. Without extra protections, remote desktop access can open your network and databases to cyberattacks.<\/p>\n<p>All of this means that using remote access can risk your organization\u2019s data security. If your remote desktop access is running on an unsecured network, for instance, anyone using that network could potentially have access to your data. In an age of stringent privacy regulations, this could have significant consequences.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ddca3f elementor-widget elementor-widget-heading\" data-id=\"2ddca3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How to make sure that your remote desktop access is secure<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52c344b elementor-widget elementor-widget-text-editor\" data-id=\"52c344b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Despite the cybersecurity risks that can come with remote desktop access, if you want to have a flexible and modern organization it\u2019s not an option to stop using remote access technology.<\/p>\n<p>So, how can you set up safeguards to ensure that your employees are accessing your networks safely and securely?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af30b00 elementor-widget elementor-widget-heading\" data-id=\"af30b00\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1) Use Multi-Factor Authentication<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8596212 elementor-widget elementor-widget-text-editor\" data-id=\"8596212\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Multi-Factor Authentication (MFA) ensures that employees can only access their accounts after they\u2019ve confirmed their credentials through an app or by verifying their identity with an email or through their mobile number.<\/p>\n<p>At first, MFA can seem frustrating or time-consuming, but you can mitigate this by only requiring verification once a week or every time that an employee uses a new device. Any interference, however, is worth it\u2014MFA is the best way to make sure that you really know who is using your network through remote access.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb431f8 elementor-widget elementor-widget-heading\" data-id=\"eb431f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2) Connect via secure networks<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e30be09 elementor-widget elementor-widget-image\" data-id=\"e30be09\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/08\/connect-secure-networks-1024x683.png\" class=\"attachment-large size-large wp-image-22285\" alt=\"\" srcset=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/08\/connect-secure-networks-1024x683.png 1024w, https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/08\/connect-secure-networks-300x200.png 300w, https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/08\/connect-secure-networks-768x512.png 768w, https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/08\/connect-secure-networks.png 1170w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7cb47bb elementor-widget elementor-widget-text-editor\" data-id=\"7cb47bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As much as you might want to do your work at the nice coffee shop down the road, it\u2019s much safer to use remote desktop access on networks that you know are fully secure. This can include home WiFi networks, wired internet connections, or a 4G\/5G connection.<\/p>\n<p>Connecting remotely via public WiFi is a common mistake. Anyone else on the network may be able to intercept any data that you\u2019re sending while working. It\u2019s imperative that you only use secured networks if you want to ensure compliance when using remote desktop access.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c5eb415 elementor-widget elementor-widget-heading\" data-id=\"c5eb415\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3) Consider using a VPN<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-356db70 elementor-widget elementor-widget-text-editor\" data-id=\"356db70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Despite this, there is a way to use public WiFi networks securely: By using a <a href=\"https:\/\/www.realvnc.com\/en\/blog\/remote-access-vpn\/\">remote access VPN<\/a>. You should think of a VPN (a Virtual Private Network) as a tunnel through which any data that you send and receive travels, thus hiding it from anyone else on a WiFi network.<\/p><p>VPNs will not only encrypt your data but also mask your IP address. Using one will make it much more difficult for potential hackers to access your data when working remotely.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-140f35a elementor-widget elementor-widget-heading\" data-id=\"140f35a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">4) Keep your software and hardware up-to-date<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a1b6b8b elementor-widget elementor-widget-text-editor\" data-id=\"a1b6b8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity is a constantly evolving battle, with developers continually responding to new threats and vulnerabilities. Software updates almost always include security patches, while it\u2019s also crucial that your hardware uses the latest drivers to overcome any security vulnerabilities.<\/p><p>Any device that you use for remote access must use the latest software. You can use <a href=\"https:\/\/www.auditboard.com\/product\/sox-management\/\">compliance auditing software<\/a> to keep tabs on your software and make sure that you\u2019re always up-to-date.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c1d06a elementor-widget elementor-widget-heading\" data-id=\"8c1d06a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">5) Monitor access<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eebc933 elementor-widget elementor-widget-text-editor\" data-id=\"eebc933\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>One of the most important principles for any organization that uses remote access is to always ensure that you know who\u2019s using your network.<\/p>\n<p>Login attempts should be logged, while you should also stay on top of user behaviors so that any unusual activity can be recognized and responded to.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae6c900 elementor-widget elementor-widget-heading\" data-id=\"ae6c900\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">6) Use strong passwords and encryption<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-244711f elementor-widget elementor-widget-text-editor\" data-id=\"244711f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>If all of your employees are using \u2018\u2019password\u2019\u2019 as their passwords, you shouldn\u2019t be surprised if your data is breached.<\/p>\n<p>You should encourage your workforce to use strong passwords, including numbers and special characters, on any device that they use to remotely access your network.<\/p>\n<p>As well as this, another basic practice that can vastly improve your security for remote desktop access is encryption. Protection against data interception will never be perfect, so making sure that all of your data is encrypted will make it much more difficult for hackers to read or use your data.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b648a1 elementor-widget elementor-widget-heading\" data-id=\"4b648a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">7) Implement firewall protection<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fdd44af elementor-widget elementor-widget-text-editor\" data-id=\"fdd44af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Another fundamental part of any <a href=\"https:\/\/www.realvnc.com\/en\/blog\/remote-pc\/\">remote access policy<\/a> is the use of firewalls. These are essentially barriers that can filter any threats that enter an internal network.<\/p>\n<p>This means that you can use a firewall to make sure that any incoming traffic, such as via a <a href=\"https:\/\/www.realvnc.com\/en\/discover\/remote-desktop\/\">remote desktop<\/a>, is vetted, preventing any unauthorized access.<\/p>\n<p>As well as this, most modern firewall software comes with advanced cybersecurity measures such as malware protection. Using firewall protection is one of the best ways to use remote access safely.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3961e21 elementor-widget elementor-widget-heading\" data-id=\"3961e21\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">8) Move on from RDP<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5235b6b elementor-widget elementor-widget-text-editor\" data-id=\"5235b6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As we highlighted earlier, RDP is one of the classic ways for organizations to use remote access. However, there are many examples of man-in-the-middle attacks (where a hacker secretly intercepts data) that exploit the weaknesses in RDP, while it is also vulnerable to malware attacks.<\/p>\n<p>To protect yourself against these threats, it\u2019s best to use a more up-to-date remote access solution that places greater importance on the cybersecurity of large organizations.<\/p>\n<p>There is a good choice of such solutions, and you should take time to find the one that best suits your company\u2019s requirements. For instance, VNC Connect is remote access software that works securely across multiple platforms.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-caba0dd elementor-widget elementor-widget-heading\" data-id=\"caba0dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">9) Train your staff<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ddd77aa elementor-widget elementor-widget-image\" data-id=\"ddd77aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1169\" height=\"780\" src=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/08\/train-your-staff.png\" class=\"attachment-full size-full wp-image-22293\" alt=\"\" srcset=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/08\/train-your-staff.png 1169w, https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/08\/train-your-staff-300x200.png 300w, https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/08\/train-your-staff-1024x683.png 1024w, https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/08\/train-your-staff-768x512.png 768w\" sizes=\"(max-width: 1169px) 100vw, 1169px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d5ccee1 elementor-widget elementor-widget-text-editor\" data-id=\"d5ccee1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Of course, all of these practices would be useless if your employees aren\u2019t aware of them or choose not to follow them. You must emphasize the risks that come with using remote desktop access so that they take care to protect themselves against its vulnerabilities.<\/p>\n<p>Remote access tools, such as the software that your organization uses to enable employees to connect from home, should be introduced with extensive training.<\/p>\n<p>As well as this, you should educate all of your employees about how to spot phishing scams\u2014there are usually tell-tale signs that can protect you from this form of hacking.<\/p>\n<p>Training should be a continual process. Cyberthreats evolve over time and employees should be regularly updated about how to spot the latest problems. Having a well-informed workforce can act as a human firewall on top of the technical solutions that are an integral part of ensuring compliance for remote desktop access.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41e0743 elementor-widget elementor-widget-heading\" data-id=\"41e0743\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Keeping remote desktop access secure in the future of work<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-596a5d3 elementor-widget elementor-widget-text-editor\" data-id=\"596a5d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In our digital age, more and more organizations are becoming ever more reliant on digital technology and data. At the same time, however, we\u2019re also becoming unshackled from the office. This combination has meant more employees are using remote desktop access.<\/p>\n<p>This means that it\u2019s never been more important to ensure that remote access is fully compliant with data privacy policies and regulations. While software such as RDP brings with it a number of cybersecurity challenges, it\u2019s possible to use remote access securely.<\/p>\n<p>You can achieve this in your organization by following the practices in this article, including using secure networks, encrypting your data, choosing fully secure remote access software, and using firewalls and VPNs. All to ensure compliance in the age of remote desktop access.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>There\u2019s no doubt that the days of the classic office are behind us. Working remotely allows your employees to have greater flexibility while maintaining their productivity levels and remote desktop access is one tool that supports the modern workplace. Remote access allows your employees to work from home while ensuring that they still have access &#8230; <a title=\"Balancing Accessibility and Security in Remote Desktop Access\" class=\"read-more\" href=\"https:\/\/www.realvnc.com\/en\/blog\/accessibility-security-remote-desktop-access\/\" aria-label=\"Read more about Balancing Accessibility and Security in Remote Desktop Access\">Read more<\/a><\/p>\n","protected":false},"author":31,"featured_media":22273,"template":"","blog_category":[354],"class_list":["post-22272","blog","type-blog","status-publish","has-post-thumbnail","hentry","blog_category-industry-thoughts"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Balancing Accessibility and Security in Remote Desktop Access - RealVNC\u00ae<\/title>\n<meta name=\"description\" content=\"This guide explains how your organization can ensure compliance for remote desktop access, and protect your data through firewalls and VPNs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.realvnc.com\/en\/blog\/accessibility-security-remote-desktop-access\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Balancing Accessibility and Security in Remote Desktop Access - RealVNC\u00ae\" \/>\n<meta property=\"og:description\" content=\"This guide explains how your organization can ensure compliance for remote desktop access, and protect your data through firewalls and VPNs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.realvnc.com\/en\/blog\/accessibility-security-remote-desktop-access\/\" \/>\n<meta property=\"og:site_name\" content=\"RealVNC\u00ae\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/realvnc\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-20T10:54:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/08\/balancing-accessiblity-security-remote-desktop-access.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1027\" \/>\n\t<meta property=\"og:image:height\" content=\"820\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@realvnc\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/accessibility-security-remote-desktop-access\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/accessibility-security-remote-desktop-access\\\/\"},\"author\":{\"name\":\"RealVNC\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/505d415578d7c153d5d004b19f33b53f\"},\"headline\":\"Balancing Accessibility and Security in Remote Desktop Access\",\"datePublished\":\"2023-08-23T12:03:23+00:00\",\"dateModified\":\"2024-02-20T10:54:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/accessibility-security-remote-desktop-access\\\/\"},\"wordCount\":1494,\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/accessibility-security-remote-desktop-access\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/balancing-accessiblity-security-remote-desktop-access.png\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/accessibility-security-remote-desktop-access\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/accessibility-security-remote-desktop-access\\\/\",\"name\":\"Balancing Accessibility and Security in Remote Desktop Access - RealVNC\u00ae\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/accessibility-security-remote-desktop-access\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/accessibility-security-remote-desktop-access\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/balancing-accessiblity-security-remote-desktop-access.png\",\"datePublished\":\"2023-08-23T12:03:23+00:00\",\"dateModified\":\"2024-02-20T10:54:01+00:00\",\"description\":\"This guide explains how your organization can ensure compliance for remote desktop access, and protect your data through firewalls and VPNs.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/accessibility-security-remote-desktop-access\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/accessibility-security-remote-desktop-access\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/accessibility-security-remote-desktop-access\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/balancing-accessiblity-security-remote-desktop-access.png\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/balancing-accessiblity-security-remote-desktop-access.png\",\"width\":1027,\"height\":820},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/accessibility-security-remote-desktop-access\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Balancing Accessibility and Security in Remote Desktop Access\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"name\":\"RealVNC\u00ae\",\"description\":\"The world&#039;s safest remote access software\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\",\"name\":\"RealVNC\u00ae\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"width\":300,\"height\":41,\"caption\":\"RealVNC\u00ae\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/realvnc\",\"https:\\\/\\\/x.com\\\/realvnc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/realvnc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/RealVNCLtd\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/RealVNC\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/505d415578d7c153d5d004b19f33b53f\",\"name\":\"RealVNC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g\",\"caption\":\"RealVNC\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Balancing Accessibility and Security in Remote Desktop Access - RealVNC\u00ae","description":"This guide explains how your organization can ensure compliance for remote desktop access, and protect your data through firewalls and VPNs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.realvnc.com\/en\/blog\/accessibility-security-remote-desktop-access\/","og_locale":"en_US","og_type":"article","og_title":"Balancing Accessibility and Security in Remote Desktop Access - RealVNC\u00ae","og_description":"This guide explains how your organization can ensure compliance for remote desktop access, and protect your data through firewalls and VPNs.","og_url":"https:\/\/www.realvnc.com\/en\/blog\/accessibility-security-remote-desktop-access\/","og_site_name":"RealVNC\u00ae","article_publisher":"https:\/\/www.facebook.com\/realvnc","article_modified_time":"2024-02-20T10:54:01+00:00","og_image":[{"width":1027,"height":820,"url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/08\/balancing-accessiblity-security-remote-desktop-access.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@realvnc","twitter_misc":{"Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.realvnc.com\/en\/blog\/accessibility-security-remote-desktop-access\/#article","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/accessibility-security-remote-desktop-access\/"},"author":{"name":"RealVNC","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/505d415578d7c153d5d004b19f33b53f"},"headline":"Balancing Accessibility and Security in Remote Desktop Access","datePublished":"2023-08-23T12:03:23+00:00","dateModified":"2024-02-20T10:54:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/accessibility-security-remote-desktop-access\/"},"wordCount":1494,"publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/accessibility-security-remote-desktop-access\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/08\/balancing-accessiblity-security-remote-desktop-access.png","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.realvnc.com\/en\/blog\/accessibility-security-remote-desktop-access\/","url":"https:\/\/www.realvnc.com\/en\/blog\/accessibility-security-remote-desktop-access\/","name":"Balancing Accessibility and Security in Remote Desktop Access - RealVNC\u00ae","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/accessibility-security-remote-desktop-access\/#primaryimage"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/accessibility-security-remote-desktop-access\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/08\/balancing-accessiblity-security-remote-desktop-access.png","datePublished":"2023-08-23T12:03:23+00:00","dateModified":"2024-02-20T10:54:01+00:00","description":"This guide explains how your organization can ensure compliance for remote desktop access, and protect your data through firewalls and VPNs.","breadcrumb":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/accessibility-security-remote-desktop-access\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.realvnc.com\/en\/blog\/accessibility-security-remote-desktop-access\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/blog\/accessibility-security-remote-desktop-access\/#primaryimage","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/08\/balancing-accessiblity-security-remote-desktop-access.png","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/08\/balancing-accessiblity-security-remote-desktop-access.png","width":1027,"height":820},{"@type":"BreadcrumbList","@id":"https:\/\/www.realvnc.com\/en\/blog\/accessibility-security-remote-desktop-access\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.realvnc.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blogs","item":"https:\/\/www.realvnc.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"Balancing Accessibility and Security in Remote Desktop Access"}]},{"@type":"WebSite","@id":"https:\/\/www.realvnc.com\/en\/#website","url":"https:\/\/www.realvnc.com\/en\/","name":"RealVNC\u00ae","description":"The world&#039;s safest remote access software","publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.realvnc.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.realvnc.com\/en\/#organization","name":"RealVNC\u00ae","url":"https:\/\/www.realvnc.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","width":300,"height":41,"caption":"RealVNC\u00ae"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/realvnc","https:\/\/x.com\/realvnc","https:\/\/www.linkedin.com\/company\/realvnc\/","https:\/\/www.youtube.com\/RealVNCLtd","https:\/\/en.wikipedia.org\/wiki\/RealVNC"]},{"@type":"Person","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/505d415578d7c153d5d004b19f33b53f","name":"RealVNC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g","caption":"RealVNC"}}]}},"_links":{"self":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/22272","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/users\/31"}],"version-history":[{"count":0,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/22272\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media\/22273"}],"wp:attachment":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media?parent=22272"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog_category?post=22272"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}