{"id":32314,"date":"2024-02-05T14:12:54","date_gmt":"2024-02-05T14:12:54","guid":{"rendered":"https:\/\/www.realvnc.com\/en\/?post_type=blog&#038;p=32314"},"modified":"2024-02-05T16:34:58","modified_gmt":"2024-02-05T16:34:58","slug":"anydesk-security-breach","status":"publish","type":"blog","link":"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach\/","title":{"rendered":"AnyDesk security breach is a stark reminder of the imperative for truly secure remote access"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"32314\" class=\"elementor elementor-32314\" data-elementor-post-type=\"blog\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-47e74a5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"47e74a5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-03c82df\" data-id=\"03c82df\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ff75837 elementor-widget elementor-widget-text-editor\" data-id=\"ff75837\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AnyDesk has announced that, following a security audit, they found their production systems have been compromised. Here\u2019s what this should tell you about why a truly secure remote access solution is an imperative.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d9aaf4 elementor-widget elementor-widget-heading\" data-id=\"5d9aaf4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The AnyDesk breach: What do we know so far?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cbb2c4d elementor-widget elementor-widget-text-editor\" data-id=\"cbb2c4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>According to an <a href=\"https:\/\/anydesk.com\/en\/public-statement\" target=\"_blank\" rel=\"noopener\">incident response by AnyDesk<\/a>, a security audit found some of the company&#8217;s systems have been compromised. The incident is said to not be related to ransomware.<\/p><p>AnyDesk has downplayed the incident, claiming that the situation is under control. However, users have been urged to reset their passwords if also used elsewhere. The timing of maintenance in the days before the public announcement, as well as the late Friday afternoon press release from AnyDesk, would indicate that the breach occurred several days before public acknowledgment was given.<\/p><p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/anydesk-says-hackers-breached-its-production-servers-reset-passwords\/\" target=\"_blank\" rel=\"noopener\">BleepingComputer<\/a> has discovered that the attackers stole source code and private code signing keys.<\/p><p>To make things even worse, <a href=\"https:\/\/www.resecurity.com\/blog\/article\/following-the-anydesk-incident-customer-credentials-leaked-and-published-for-sale-on-the-dark-web\" target=\"_blank\" rel=\"noopener\">a recent report from Resecurity suggests that AnyDesk user credentials have made their way onto the Dark Web<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-537c938 elementor-widget elementor-widget-heading\" data-id=\"537c938\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why should you take the AnyDesk attack seriously?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c5f4ad elementor-widget elementor-widget-text-editor\" data-id=\"2c5f4ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>If you&#8217;re an AnyDesk user, you should take this news very seriously. And even if you&#8217;re using another remote access solution, this needs to make you challenge its security credentials.<\/p><p>Unfortunately, this is not the first time that something like this has happened. As we said at the time of <a href=\"https:\/\/www.realvnc.com\/en\/blog\/what-recent-goto-security-incident-says-remote-access-software-industry\/\">the GoTo security incident<\/a>, when security is not the first priority, customers are the ones who end up suffering.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2eebfc2 elementor-widget elementor-widget-heading\" data-id=\"2eebfc2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">RealVNC: The commitment to security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-546ab2a elementor-widget elementor-widget-text-editor\" data-id=\"546ab2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>At RealVNC, security is at the heart of everything we do. We do our best to mitigate such risks, and to keep your data as secure as possible. Here are some of the things we do to make sure that your data never ends up in the wrong hands.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-749cf61 elementor-widget elementor-widget-heading\" data-id=\"749cf61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">RealVNC's ISO27001 certification: managing data security risks<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab3530c elementor-widget elementor-widget-text-editor\" data-id=\"ab3530c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our security experts understand the implications of stringent security requirements.<\/p><p><a href=\"https:\/\/www.realvnc.com\/en\/blog\/realvnc-iso27001-certification-what-it-is-why-it-matters\/\">Our ISO27001 certification<\/a> is our commitment to uphold the highest standards of information security management. When we say that our systems are fortified, we are not speaking lightly. This certification means we engage in continuous risk assessment, employ comprehensive security controls throughout all areas of operations in our company, and ensure that our staff is trained in best practices for information security.<\/p><p>What sets an ISO27001 certified provider apart in today\u2019s digital landscape? It shows that we have a proactive approach to data protection throughout the entire company. We don&#8217;t just respond to threats; we anticipate them and prepare for them.<\/p><p>If your remote access provider doesn&#8217;t have this certification, question them on it!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-44d302a elementor-widget elementor-widget-heading\" data-id=\"44d302a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">RealVNC's fundamental security principles<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e4a69e1 elementor-widget elementor-widget-text-editor\" data-id=\"e4a69e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.realvnc.com\/en\/connect\/security\/\">Our security principles<\/a> are essential to the service we provide to you. They ensure that your data is as secure as possible, at all times:<\/p><ul><li><strong>High-trust services<\/strong> &#8211; this means that you don&#8217;t have to trust RealVNC as a company to trust our software and services.<\/li><li><strong>Secure data storage<\/strong> &#8211; RealVNC doesn&#8217;t record your sessions. Your data can&#8217;t be decrypted, either. Not now, not ever.<\/li><li><strong>Secure environment<\/strong> &#8211; we treat every connection as if it is made in an hostile environment.<\/li><li><strong>Connection control<\/strong> &#8211; the one ultimately deciding who is able to connect is the owner of the remote computer.<\/li><\/ul><p>These principles serve as a guideline for everything we do, ensuring the security of your data.<\/p><p>Here\u2019s a quick example of how these principles work in practice. The username\/password you use to log into our portal cannot by itself be used to gain access to remote machines.<\/p><p>Each remote machine will have a further, separate set of credentials (usually platform-native authentication, like Active Directory etc). You are required to enter this before taking control.<\/p><p>Having at least two sets of credentials required to make a connection does, admittedly, cause slight UI\/UX friction. However, it&#8217;s something we hold dear, as it means that we don&#8217;t ever store the credentials that ultimately give you access to a remote device on our systems. Also, the portal credentials we do store are never stored in plaintext, and are one-way hashed.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-67570d3 elementor-widget elementor-widget-heading\" data-id=\"67570d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">The importance of independent security audits<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fdb32bd elementor-widget elementor-widget-text-editor\" data-id=\"fdb32bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This is another one of RealVNC&#8217;s many security initiatives, designed to keep your data secure. An <a href=\"https:\/\/www.realvnc.com\/en\/blog\/cure53-security-audit-reaffirms-realvnc-strong-security-stance\/\">extensive white-box security audit, done by respected Berlin-based firm Cure53<\/a>, has confirmed RealVNC&#8217;s strong security stance.<\/p><p>We&#8217;ve urged the industry to confirm its software&#8217;s security with more than just words ever since. As we said numerous times, when this doesn&#8217;t happen, the end users are the ones paying the price.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e04472 elementor-widget elementor-widget-heading\" data-id=\"5e04472\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Your data - in safe hands with RealVNC<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dbd17c9 elementor-widget elementor-widget-text-editor\" data-id=\"dbd17c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We would also like to take this opportunity to confirm for our users that everything security-related at RealVNC is working as intended. We are unaffected by any data breaches and we can assure you that your data is in safe hands. We will continue to work hard to keep it that way.<\/p><p>This is what RealVNC CEO Adam Greenwood-Byrne had to say:<\/p><p>\u00a0<\/p><blockquote><p><span class=\"ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\">I&#8217;m proud of RealVNC&#8217;s unblemished security record, and we continue to invest in systems and services that ensure we remain on the strongest footing. Customers who have been with us for years, including government departments around the world, recognise the value of our security stance just as well as we recognise the trust they place in us as their remote access vendor of choice.\u00a0<\/span><\/p><p><span class=\"ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\">We value those relationships tremendously at RealVNC and our team works tirelessly to ensure our customers have what they need to feel safe. The Internet is a much more dangerous place than it was 20 years ago and we are committed to evolving and adapting accordingly.<\/span><\/p><\/blockquote><p>Also, if the events of the last few days have made you considered switching to a truly secure remote access solution, <a href=\"https:\/\/www.realvnc.com\/en\/contact-us\/\">get in touch<\/a>!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>AnyDesk has announced that, following a security audit, they found their production systems have been compromised. Here\u2019s what this should tell you about why a truly secure remote access solution is an imperative. The AnyDesk breach: What do we know so far? According to an incident response by AnyDesk, a security audit found some of &#8230; <a title=\"AnyDesk security breach is a stark reminder of the imperative for truly secure remote access\" class=\"read-more\" href=\"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach\/\" aria-label=\"Read more about AnyDesk security breach is a stark reminder of the imperative for truly secure remote access\">Read more<\/a><\/p>\n","protected":false},"author":31,"featured_media":32328,"template":"","blog_category":[264,267,257],"class_list":["post-32314","blog","type-blog","status-publish","has-post-thumbnail","hentry","blog_category-compliance","blog_category-privacy","blog_category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AnyDesk security breach is a stark reminder of the imperative for truly secure remote access<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AnyDesk security breach is a stark reminder of the imperative for truly secure remote access\" \/>\n<meta property=\"og:description\" content=\"AnyDesk has announced that, following a security audit, they found their production systems have been compromised. Here\u2019s what this should tell you about why a truly secure remote access solution is an imperative. The AnyDesk breach: What do we know so far? According to an incident response by AnyDesk, a security audit found some of ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"RealVNC\u00ae\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/realvnc\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-05T16:34:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2024\/02\/anydesk-security-breach-hero-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1067\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@realvnc\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/anydesk-security-breach\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/anydesk-security-breach\\\/\"},\"author\":{\"name\":\"RealVNC\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/505d415578d7c153d5d004b19f33b53f\"},\"headline\":\"AnyDesk security breach is a stark reminder of the imperative for truly secure remote access\",\"datePublished\":\"2024-02-05T14:12:54+00:00\",\"dateModified\":\"2024-02-05T16:34:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/anydesk-security-breach\\\/\"},\"wordCount\":984,\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/anydesk-security-breach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/anydesk-security-breach-hero-image.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/anydesk-security-breach\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/anydesk-security-breach\\\/\",\"name\":\"AnyDesk security breach is a stark reminder of the imperative for truly secure remote access\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/anydesk-security-breach\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/anydesk-security-breach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/anydesk-security-breach-hero-image.jpg\",\"datePublished\":\"2024-02-05T14:12:54+00:00\",\"dateModified\":\"2024-02-05T16:34:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/anydesk-security-breach\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/anydesk-security-breach\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/anydesk-security-breach\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/anydesk-security-breach-hero-image.jpg\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/anydesk-security-breach-hero-image.jpg\",\"width\":1600,\"height\":1067,\"caption\":\"Anydesk security breach\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/anydesk-security-breach\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"AnyDesk security breach is a stark reminder of the imperative for truly secure remote access\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"name\":\"RealVNC\u00ae\",\"description\":\"The world&#039;s safest remote access software\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\",\"name\":\"RealVNC\u00ae\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"width\":300,\"height\":41,\"caption\":\"RealVNC\u00ae\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/realvnc\",\"https:\\\/\\\/x.com\\\/realvnc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/realvnc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/RealVNCLtd\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/RealVNC\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/505d415578d7c153d5d004b19f33b53f\",\"name\":\"RealVNC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g\",\"caption\":\"RealVNC\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AnyDesk security breach is a stark reminder of the imperative for truly secure remote access","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach\/","og_locale":"en_US","og_type":"article","og_title":"AnyDesk security breach is a stark reminder of the imperative for truly secure remote access","og_description":"AnyDesk has announced that, following a security audit, they found their production systems have been compromised. Here\u2019s what this should tell you about why a truly secure remote access solution is an imperative. The AnyDesk breach: What do we know so far? According to an incident response by AnyDesk, a security audit found some of ... Read more","og_url":"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach\/","og_site_name":"RealVNC\u00ae","article_publisher":"https:\/\/www.facebook.com\/realvnc","article_modified_time":"2024-02-05T16:34:58+00:00","og_image":[{"width":1600,"height":1067,"url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2024\/02\/anydesk-security-breach-hero-image.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@realvnc","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach\/#article","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach\/"},"author":{"name":"RealVNC","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/505d415578d7c153d5d004b19f33b53f"},"headline":"AnyDesk security breach is a stark reminder of the imperative for truly secure remote access","datePublished":"2024-02-05T14:12:54+00:00","dateModified":"2024-02-05T16:34:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach\/"},"wordCount":984,"publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2024\/02\/anydesk-security-breach-hero-image.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach\/","url":"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach\/","name":"AnyDesk security breach is a stark reminder of the imperative for truly secure remote access","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach\/#primaryimage"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2024\/02\/anydesk-security-breach-hero-image.jpg","datePublished":"2024-02-05T14:12:54+00:00","dateModified":"2024-02-05T16:34:58+00:00","breadcrumb":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach\/#primaryimage","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2024\/02\/anydesk-security-breach-hero-image.jpg","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2024\/02\/anydesk-security-breach-hero-image.jpg","width":1600,"height":1067,"caption":"Anydesk security breach"},{"@type":"BreadcrumbList","@id":"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.realvnc.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blogs","item":"https:\/\/www.realvnc.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"AnyDesk security breach is a stark reminder of the imperative for truly secure remote access"}]},{"@type":"WebSite","@id":"https:\/\/www.realvnc.com\/en\/#website","url":"https:\/\/www.realvnc.com\/en\/","name":"RealVNC\u00ae","description":"The world&#039;s safest remote access software","publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.realvnc.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.realvnc.com\/en\/#organization","name":"RealVNC\u00ae","url":"https:\/\/www.realvnc.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","width":300,"height":41,"caption":"RealVNC\u00ae"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/realvnc","https:\/\/x.com\/realvnc","https:\/\/www.linkedin.com\/company\/realvnc\/","https:\/\/www.youtube.com\/RealVNCLtd","https:\/\/en.wikipedia.org\/wiki\/RealVNC"]},{"@type":"Person","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/505d415578d7c153d5d004b19f33b53f","name":"RealVNC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g","caption":"RealVNC"}}]}},"_links":{"self":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/32314","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/users\/31"}],"version-history":[{"count":0,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/32314\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media\/32328"}],"wp:attachment":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media?parent=32314"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog_category?post=32314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}