{"id":50261,"date":"2024-11-05T12:01:06","date_gmt":"2024-11-05T12:01:06","guid":{"rendered":"https:\/\/www.realvnc.com\/?post_type=blog&#038;p=50261"},"modified":"2026-04-13T10:44:46","modified_gmt":"2026-04-13T09:44:46","slug":"is-gotomypc-safe","status":"publish","type":"blog","link":"https:\/\/www.realvnc.com\/en\/blog\/is-gotomypc-safe\/","title":{"rendered":"Is GoToMyPC safe? A security analysis for IT professionals"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"50261\" class=\"elementor elementor-50261\" data-elementor-post-type=\"blog\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-69f4480 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"69f4480\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1df7e38\" data-id=\"1df7e38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ec21a90 elementor-widget elementor-widget-text-editor\" data-id=\"ec21a90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.realvnc.com\/en\/blog\/what-is-secure-remote-access-the-ultimate-guide\/\"><span style=\"font-weight: 400;\">Secure remote access<\/span><\/a><span style=\"font-weight: 400;\">\u2014previously confined to select IT personnel\u2014has become a must-have for businesses of various sizes as workplaces go hybrid or off-site. Flex Index&#8217;s <\/span><a href=\"https:\/\/www.canva.com\/design\/DAGERvgIWLI\/FoyrKrZxYPbQpYyGTdI7wA\/view?utm_content=DAGERvgIWLI&amp;utm_campaign=designshare&amp;utm_medium=link&amp;utm_source=editor#1\"><span style=\"font-weight: 400;\">Flex Report Q2 2024<\/span><\/a><span style=\"font-weight: 400;\"> reveals that the percentage of US-based companies that have adopted this business setup has gone up to 37% in 2024 from 20% the year before. Moreover, employees who travel, supply chain vendors, and third-party service providers often require remote access.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">The growth in the number of users accessing sensitive network resources on more devices from more locations increases the threat of security risks. IBM&#8217;s latest report pegged the global average data breach cost at <\/span><a href=\"https:\/\/newsroom.ibm.com\/2024-07-30-ibm-report-escalating-data-breach-disruption-pushes-costs-to-new-highs\"><span style=\"font-weight: 400;\">$4.88 million<\/span><\/a><span style=\"font-weight: 400;\">. Furthermore, the research shows that recovery from such breaches can take over 100 days.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">In light of these trends, employers\u2014from small businesses to global enterprises\u2014must select the most reliable remote access software to protect business data. These solutions grant exclusive access to authorized users, barring web-based threats, such as ransomware and malware.<\/span><\/p><p><span style=\"font-weight: 400;\">In this article, we\u2019ll look into one of the most popular and veteran names in the market\u2014GoToMyPC. Let&#8217;s evaluate its features to determine if it&#8217;s a viable tool for your remote support needs.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7fc1cef elementor-widget elementor-widget-heading\" data-id=\"7fc1cef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Overview of GoToMyPC's Security Features  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bac2698 elementor-widget elementor-widget-text-editor\" data-id=\"bac2698\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">GoToMyPC software\u2014launched in 2003\u2014is a product of LogMeIn, a SaaS provider of connectivity and support solutions. GoToMyPC offers individual\/personal use plans and enterprise-level (Pro and Corporate) <\/span><a href=\"https:\/\/www.realvnc.com\/en\/blog\/gotomypc-pricing\/\"><span style=\"font-weight: 400;\">packages<\/span><\/a><span style=\"font-weight: 400;\">. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8168e44 elementor-widget elementor-widget-heading\" data-id=\"8168e44\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Ensuring Authorized Access<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-255ac9b elementor-widget elementor-widget-text-editor\" data-id=\"255ac9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Two elements aim to guarantee secure GoToMyPC usage:<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ae3e9c elementor-widget elementor-widget-heading\" data-id=\"1ae3e9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Two-factor authentication (2FA)<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d131d9d elementor-widget elementor-widget-text-editor\" data-id=\"d131d9d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">GoToMyPC uses 2FA for an extra layer of identity verification. It asks users to enter a password or code sent via text message before gaining access to the platform. Moreover, the software limits the number of login attempts to avert hacker attacks.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-543fee4 elementor-widget elementor-widget-heading\" data-id=\"543fee4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Access code and passwords<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ef7516 elementor-widget elementor-widget-text-editor\" data-id=\"6ef7516\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">GoToMyPC requires passwords (at least eight alpha-numeric characters) and access codes to prevent your account from being compromised. The platform also asks you to enter a password before using it on a device where it&#8217;s installed. Then you must enter another password or access code for the device you will view or control remotely.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f9e182 elementor-widget elementor-widget-heading\" data-id=\"3f9e182\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Preventing Unauthorized Attempts<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e4dd441 elementor-widget elementor-widget-text-editor\" data-id=\"e4dd441\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">GoToMyPC prevents malicious actors from entering user accounts through these features: <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bebf901 elementor-widget elementor-widget-heading\" data-id=\"bebf901\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Encryption protocols<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02707b5 elementor-widget elementor-widget-text-editor\" data-id=\"02707b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The software uses the banking-grade 256-advanced encryption standard (AES) to ensure the privacy of user activity (chats, keyboard strokes, or mouse input) and data (file transfers or screenshots) exchanged between connected devices\u2014whether they be mobile devices or desktop units.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-39723e1 elementor-widget elementor-widget-heading\" data-id=\"39723e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Other privacy features<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d32293b elementor-widget elementor-widget-text-editor\" data-id=\"d32293b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Other security features of GoToMyPC include &#8220;screen blanking,&#8221; which turns an unattended host device&#8217;s screen black or green to prevent others from viewing your remote operations. The software can only blank out PC hosts. For added visual security, admins can enable remote computer locking to automatically lock access to the host computer after disconnecting from a remote session. They can also activate the &#8220;lock keyboard and mouse&#8221; feature while remote sessions are ongoing.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50dda5e elementor-widget elementor-widget-heading\" data-id=\"50dda5e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Examining GoToMyPC's Security Vulnerabilities <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d5c262 elementor-widget elementor-widget-text-editor\" data-id=\"0d5c262\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Despite its security infrastructure, GoToMyPC users may have to guard against the repeat of these cyber threats, which the platform experienced in recent years: <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a396a17 elementor-widget elementor-widget-heading\" data-id=\"a396a17\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Unauthorized access<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a6e4a3 elementor-widget elementor-widget-text-editor\" data-id=\"8a6e4a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">In separate cases, the company notified users to reset their passwords due to these incidents:<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc460f6 elementor-widget elementor-widget-heading\" data-id=\"bc460f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Password attacks<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad71b14 elementor-widget elementor-widget-text-editor\" data-id=\"ad71b14\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">They include &#8220;re-use attacks,&#8221; wherein cybercriminals used usernames and passwords maliciously obtained from other websites to access GoToMyPC accounts.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9464bea elementor-widget elementor-widget-heading\" data-id=\"9464bea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Man-in-the-middle (MITM) attacks<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe8ab20 elementor-widget elementor-widget-text-editor\" data-id=\"fe8ab20\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">These incidents involve hackers stealing sensitive information by eavesdropping on or intercepting communications between two parties, typically the user and the network. GoToMyPC uses &#8220;AES in cipher feedback mode&#8221; (CFB) to counter such moves. CFB prevents threat actors from generating counterfeit keys to get access remotely and interfere with communications.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-91ae048 elementor-widget elementor-widget-heading\" data-id=\"91ae048\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Software update delays<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1284a2f elementor-widget elementor-widget-text-editor\" data-id=\"1284a2f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">GoToMyPC users have also experienced slowdowns during software updates or when other programs or operating systems like Windows run their updates and affect its platform.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-108e181 elementor-widget elementor-widget-heading\" data-id=\"108e181\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Risks of delayed updates<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7fd7d21 elementor-widget elementor-widget-text-editor\" data-id=\"7fd7d21\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Feedback following GoToMyPC updates primarily shows a slowdown in business operations. Besides inconvenience and productivity loss, late updates can make users susceptible to cyberattacks, which result in financial loss and reputation damage. Unpatched security flaws make systems vulnerable to attackers looking for entry points in the remote connection.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a19f46 elementor-widget elementor-widget-heading\" data-id=\"8a19f46\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">History of GoToMyPC Security Breaches and Vulnerabilities <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9288447 elementor-widget elementor-widget-text-editor\" data-id=\"9288447\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">GoToMyPC users had suffered from two major breaches with six years between them. Read on to learn more about these incidents and how the company took action.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1eb927c elementor-widget elementor-widget-text-editor\" data-id=\"1eb927c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><b>Past incidents<\/b><\/h3><p><b><i>June 2016<\/i><\/b><\/p><p><span style=\"font-weight: 400;\">GoToMyPC admitted being hit by a &#8220;very sophisticated password attack.&#8221; Citrix\u2014which owned the platform then before being acquired by LogMeIn in 2017\u2014said it was a case of a &#8220;password reuse attack.&#8221; In such circumstances, hackers who manage to secure a password for one account try using it to log into the person&#8217;s other accounts (email, social media, and banking). Weeks before the incident, Facebook, Twitter, Netflix, Reddit, GitHub, and TeamViewer also suffered from the same attack.<\/span><\/p><p><b><i>November 2022<\/i><\/b><\/p><p><span style=\"font-weight: 400;\">GoToMyPC launched an investigation after detecting &#8220;unusual activity within our development environment and third-party cloud storage service.&#8221; Its <\/span><a href=\"https:\/\/www.realvnc.com\/en\/blog\/what-recent-goto-security-incident-says-remote-access-software-industry\/\"><span style=\"font-weight: 400;\">findings<\/span><\/a><span style=\"font-weight: 400;\"> shared in January 2024 revealed that &#8220;a threat actor exfiltrated (stole) encrypted backups&#8221; and an encryption key for a portion of these backups.<\/span><\/p><h3><b>Addressed vulnerabilities<\/b><\/h3><p><b><i>Response to the 2016 incident<\/i><\/b><\/p><p><span style=\"font-weight: 400;\">Citrix announced a mandatory password reset for all authorized GoToMyPC users. The company reminded users to create unique and strong passwords\u2014meaning they should&#8217;ve not been used for other accounts. Moreover, it encouraged enabling 2FA.<\/span><\/p><p><b><i>Response to the 2022 incident<\/i><\/b><\/p><p><span style=\"font-weight: 400;\">The company sent direct communications to affected customers containing actionable steps to &#8220;further secure their accounts.&#8221; It also authorized resetting multi-factor authentications.<\/span><\/p><p><b><i>Other security updates<\/i><\/b><\/p><p><span style=\"font-weight: 400;\">In December 2022, GoToMyPC launched the Security Center, where users can configure their security settings. These include viewer security time-out (amount of inactivity time before the Viewer disconnects), locking the host computer, blanking out the screen while connected, and locking the host computer\u2019s keyboard and mouse.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-44d90e3 elementor-widget elementor-widget-heading\" data-id=\"44d90e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Assessing Remote Access Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8fc232a elementor-widget elementor-widget-text-editor\" data-id=\"8fc232a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">A robust access control strategy can keep your workforce agile and flexible without sacrificing data security. Implementing such a game plan requires selecting, auditing, and maintaining your remote support software with care.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e57973f elementor-widget elementor-widget-heading\" data-id=\"e57973f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Checklist for evaluating remote support software<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc8221b elementor-widget elementor-widget-text-editor\" data-id=\"bc8221b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Whether you already have a service partner or you&#8217;re still contemplating your options, consider these three key factors to determine the suitability of remote desktop solutions to your current needs:<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d3381a4 elementor-widget elementor-widget-heading\" data-id=\"d3381a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Security features<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76da550 elementor-widget elementor-widget-text-editor\" data-id=\"76da550\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The best platforms should offer prompt and automated security patches and updates, multi-level authentication, end-to-end encryption of all connections, logs and session recording, and per-user level permissions management to enforce \u201cleast privilege.\u201d<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd72cac elementor-widget elementor-widget-heading\" data-id=\"cd72cac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Compliance and certifications<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c0b6781 elementor-widget elementor-widget-text-editor\" data-id=\"c0b6781\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Choose software that complies with local (such as the Service Organization Control Type 2 or SOC2 cybersecurity compliance framework in the US) and international regulations (such as the EU&#8217;s General Data Protection Regulation) and adheres to global information security management standards like the ISO 27001.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ed3a55 elementor-widget elementor-widget-heading\" data-id=\"0ed3a55\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Vendor reputation<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1eadf60 elementor-widget elementor-widget-text-editor\" data-id=\"1eadf60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Research and scrutinize your prospects&#8217; track records and customer support. Also, check other customers\u2019 reviews and feedback about their experiences with those vendors.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9c93858 elementor-widget elementor-widget-heading\" data-id=\"9c93858\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">A Safe Alternative to GoToMyPC: RealVNC Connect <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ddef861 elementor-widget elementor-widget-text-editor\" data-id=\"ddef861\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">RealVNC built its products to ensure every connection can withstand possible hostile actors through our customizable <\/span><a href=\"https:\/\/www.realvnc.com\/en\/developer\/security\/\"><span style=\"font-weight: 400;\">secure technology<\/span><\/a><span style=\"font-weight: 400;\">. Whether you use RealVNC products via LAN, the VNC cloud, or a mobile device, you benefit from these features:<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ad2d51 elementor-widget elementor-widget-heading\" data-id=\"9ad2d51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">RealVNC's Security Features<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8bacdba elementor-widget elementor-widget-heading\" data-id=\"8bacdba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">End-to-end encryption<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d71087 elementor-widget elementor-widget-text-editor\" data-id=\"4d71087\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">RealVNC uses up to 256-bit AES encryption partnered with the protocol Transport Layer Security (TLS) 1.2, which prevents decryption at any time by anyone, including RealVNC. Subscribers can adjust user permissions to view-only or limit access actions (such as file transfer or copy-pasting text).<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5fb5780 elementor-widget elementor-widget-heading\" data-id=\"5fb5780\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Endpoint integrity verification<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ef2079 elementor-widget elementor-widget-text-editor\" data-id=\"8ef2079\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">RealVNC&#8217;s 2048-bit RSA keys automatically verify identity on every touchpoint, protecting your and your client&#8217;s systems from MITM attacks. We blacklist users unable to authenticate properly to deter brute-force attacks, DoS, and dictionary attacks.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c469f83 elementor-widget elementor-widget-heading\" data-id=\"c469f83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Flexible Deployment Options: On-Premise and Cloud Solutions<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-87610c4 elementor-widget elementor-widget-text-editor\" data-id=\"87610c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Various deployment options are available, including offline licensing if you prefer on-premise usage behind your network&#8217;s firewalls instead of connecting through the VNC Cloud.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0807c7e elementor-widget elementor-widget-heading\" data-id=\"0807c7e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Commitment to Data Protection: Compliance with Standards<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14e4b2a elementor-widget elementor-widget-text-editor\" data-id=\"14e4b2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">RealVNC is ISO27001-certified and GDPR-compliant. It also adheres to the Health Insurance Portability and Accountability Act (patient data) and Payment Card Industry Data Security Standard (credit card account information).<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-92e97ba elementor-widget elementor-widget-heading\" data-id=\"92e97ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conclusion: Is GoToMyPC Safe?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ca864f elementor-widget elementor-widget-text-editor\" data-id=\"0ca864f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The recent steps taken by GoToMyPC to beef up its security provide current and future users some peace of mind, given the introduction of its Security Center. Nevertheless, as part of due diligence, give yourself time to study the platform&#8217;s features more closely to understand requirements\u2014including allowlisting for your firewall\u2014and features your customers can control. This way, you can help your workforce and clients guard against its past threats, including password re-use attacks and encryption key theft.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a1e865c elementor-widget elementor-widget-heading\" data-id=\"a1e865c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">RealVNC: A More Polished Alternative<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-31866f7 elementor-widget elementor-widget-text-editor\" data-id=\"31866f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">As a reliable remote desktop software provider, RealVNC is proactive about security. It goes beyond encryption protocols, 2FA, and screen blanking to assure users with stable and safe remote access through:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Multi-factor authentication<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Customizable permissions management<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Blacklisting<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2024\/01\/RealVNC-Penetration-Test-Report-Response-2023.pdf\"><span style=\"font-weight: 400;\">Penetration testing<\/span><\/a><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Regular third-party security risk audits<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Round-the-clock customer service support<\/span><\/li><\/ul><p><span style=\"font-weight: 400;\">RealVNC hosts its cloud service and doesn&#8217;t use a broker or third party such as AWS or Azure. Moreover, the company releases <\/span><a href=\"https:\/\/help.realvnc.com\/hc\/en-us\/articles\/360002478311-Are-there-any-known-security-vulnerabilities#cve-2022-41975-no-remote-threat-local-access-required--0-0\"><span style=\"font-weight: 400;\">vulnerability updates and fixes<\/span><\/a> <span style=\"font-weight: 400;\">regularly.<\/span><\/p><p><span style=\"font-weight: 400;\">Don&#8217;t let security challenges derail your operations and growth or mar your reputation. Check RealVNC for yourself by signing up for a <\/span><a href=\"https:\/\/www.realvnc.com\/en\/connect\/trial-remote-access\/\"><span style=\"font-weight: 400;\">free trial<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>As a remote access technology pioneer, GoToMyPC has had its share of security woes. In previous breaches, hackers exploited human\/digital vulnerabilities, which the company has resolved. Learn more about these cases and how alternatives like RealVNC can allay your hacking fears.<\/p>\n","protected":false},"author":31,"featured_media":39724,"template":"","blog_category":[354,281],"class_list":["post-50261","blog","type-blog","status-publish","has-post-thumbnail","hentry","blog_category-industry-thoughts","blog_category-remote-access"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Is GoToMyPC safe? A security analysis for IT professionals<\/title>\n<meta name=\"description\" content=\"Is GoToMyPC safe? Learn about its encryption, vulnerabilities, and expert tips to keep your remote access secured.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.realvnc.com\/en\/blog\/is-gotomypc-safe\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is GoToMyPC safe? A security analysis for IT professionals\" \/>\n<meta property=\"og:description\" content=\"Is GoToMyPC safe? Learn about its encryption, vulnerabilities, and expert tips to keep your remote access secured.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.realvnc.com\/en\/blog\/is-gotomypc-safe\/\" \/>\n<meta property=\"og:site_name\" content=\"RealVNC\u00ae\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/realvnc\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-13T09:44:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2024\/05\/gotomypc-personal-plan.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@realvnc\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/is-gotomypc-safe\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/is-gotomypc-safe\\\/\"},\"author\":{\"name\":\"RealVNC\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/505d415578d7c153d5d004b19f33b53f\"},\"headline\":\"Is GoToMyPC safe? A security analysis for IT professionals\",\"datePublished\":\"2024-11-05T12:01:06+00:00\",\"dateModified\":\"2026-04-13T09:44:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/is-gotomypc-safe\\\/\"},\"wordCount\":1529,\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/is-gotomypc-safe\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/gotomypc-personal-plan.png\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/is-gotomypc-safe\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/is-gotomypc-safe\\\/\",\"name\":\"Is GoToMyPC safe? A security analysis for IT professionals\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/is-gotomypc-safe\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/is-gotomypc-safe\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/gotomypc-personal-plan.png\",\"datePublished\":\"2024-11-05T12:01:06+00:00\",\"dateModified\":\"2026-04-13T09:44:46+00:00\",\"description\":\"Is GoToMyPC safe? Learn about its encryption, vulnerabilities, and expert tips to keep your remote access secured.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/is-gotomypc-safe\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/is-gotomypc-safe\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/is-gotomypc-safe\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/gotomypc-personal-plan.png\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/gotomypc-personal-plan.png\",\"width\":1280,\"height\":853},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/is-gotomypc-safe\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Is GoToMyPC safe? A security analysis for IT professionals\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"name\":\"RealVNC\u00ae\",\"description\":\"The world&#039;s safest remote access software\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\",\"name\":\"RealVNC\u00ae\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"width\":300,\"height\":41,\"caption\":\"RealVNC\u00ae\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/realvnc\",\"https:\\\/\\\/x.com\\\/realvnc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/realvnc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/RealVNCLtd\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/RealVNC\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/505d415578d7c153d5d004b19f33b53f\",\"name\":\"RealVNC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g\",\"caption\":\"RealVNC\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Is GoToMyPC safe? A security analysis for IT professionals","description":"Is GoToMyPC safe? Learn about its encryption, vulnerabilities, and expert tips to keep your remote access secured.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.realvnc.com\/en\/blog\/is-gotomypc-safe\/","og_locale":"en_US","og_type":"article","og_title":"Is GoToMyPC safe? A security analysis for IT professionals","og_description":"Is GoToMyPC safe? Learn about its encryption, vulnerabilities, and expert tips to keep your remote access secured.","og_url":"https:\/\/www.realvnc.com\/en\/blog\/is-gotomypc-safe\/","og_site_name":"RealVNC\u00ae","article_publisher":"https:\/\/www.facebook.com\/realvnc","article_modified_time":"2026-04-13T09:44:46+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2024\/05\/gotomypc-personal-plan.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@realvnc","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.realvnc.com\/en\/blog\/is-gotomypc-safe\/#article","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/is-gotomypc-safe\/"},"author":{"name":"RealVNC","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/505d415578d7c153d5d004b19f33b53f"},"headline":"Is GoToMyPC safe? A security analysis for IT professionals","datePublished":"2024-11-05T12:01:06+00:00","dateModified":"2026-04-13T09:44:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/is-gotomypc-safe\/"},"wordCount":1529,"publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/is-gotomypc-safe\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2024\/05\/gotomypc-personal-plan.png","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.realvnc.com\/en\/blog\/is-gotomypc-safe\/","url":"https:\/\/www.realvnc.com\/en\/blog\/is-gotomypc-safe\/","name":"Is GoToMyPC safe? A security analysis for IT professionals","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/is-gotomypc-safe\/#primaryimage"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/is-gotomypc-safe\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2024\/05\/gotomypc-personal-plan.png","datePublished":"2024-11-05T12:01:06+00:00","dateModified":"2026-04-13T09:44:46+00:00","description":"Is GoToMyPC safe? Learn about its encryption, vulnerabilities, and expert tips to keep your remote access secured.","breadcrumb":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/is-gotomypc-safe\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.realvnc.com\/en\/blog\/is-gotomypc-safe\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/blog\/is-gotomypc-safe\/#primaryimage","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2024\/05\/gotomypc-personal-plan.png","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2024\/05\/gotomypc-personal-plan.png","width":1280,"height":853},{"@type":"BreadcrumbList","@id":"https:\/\/www.realvnc.com\/en\/blog\/is-gotomypc-safe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.realvnc.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blogs","item":"https:\/\/www.realvnc.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"Is GoToMyPC safe? A security analysis for IT professionals"}]},{"@type":"WebSite","@id":"https:\/\/www.realvnc.com\/en\/#website","url":"https:\/\/www.realvnc.com\/en\/","name":"RealVNC\u00ae","description":"The world&#039;s safest remote access software","publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.realvnc.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.realvnc.com\/en\/#organization","name":"RealVNC\u00ae","url":"https:\/\/www.realvnc.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","width":300,"height":41,"caption":"RealVNC\u00ae"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/realvnc","https:\/\/x.com\/realvnc","https:\/\/www.linkedin.com\/company\/realvnc\/","https:\/\/www.youtube.com\/RealVNCLtd","https:\/\/en.wikipedia.org\/wiki\/RealVNC"]},{"@type":"Person","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/505d415578d7c153d5d004b19f33b53f","name":"RealVNC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g","caption":"RealVNC"}}]}},"_links":{"self":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/50261","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/users\/31"}],"version-history":[{"count":1,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/50261\/revisions"}],"predecessor-version":[{"id":89954,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/50261\/revisions\/89954"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media\/39724"}],"wp:attachment":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media?parent=50261"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog_category?post=50261"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}