{"id":8609,"date":"2020-01-23T12:32:00","date_gmt":"2020-01-23T12:32:00","guid":{"rendered":"https:\/\/www.realvnc.com\/en\/?post_type=blog&#038;p=8609"},"modified":"2022-03-24T15:13:02","modified_gmt":"2022-03-24T15:13:02","slug":"multi-factor-authentication-is-it-worth-it","status":"publish","type":"blog","link":"https:\/\/www.realvnc.com\/en\/blog\/multi-factor-authentication-is-it-worth-it\/","title":{"rendered":"Remote Access and Multi-factor Authentication &#8211; is it worth it?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8609\" class=\"elementor elementor-8609\" data-elementor-post-type=\"blog\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6015d6fc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6015d6fc\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2c08eea0\" data-id=\"2c08eea0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-149b3934 elementor-widget elementor-widget-text-editor\" data-id=\"149b3934\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>They are the most commonly used access control elements of digital security architecture, but also the most vulnerable.<\/p><p>According to\u00a0<a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/dbir\/\">Verizon\u2019s 2019 Data Breach Investigations Report (DBIR)<\/a>, 80% of hacking-related breaches involve compromised and weak credentials \u2013 this same figure was given in the\u00a0<a href=\"https:\/\/www.verizondigitalmedia.com\/blog\/2017\/07\/2017-verizon-data-breach-investigations-report\/\">2017 DBIR<\/a>\u00a0report, and indicates that it\u2019s still a problem worth talking about. Hackers with criminal intent exploit the poor password practices of the masses, and can use existing passwords and creation patterns to model user routine, deducing new passwords based on past formats.<\/p><p>So why are passwords vulnerable? The main reason is the fact that they don\u2019t actually provide any information on the unique identity of the user. Passwords can be shared around and exploited by anyone who gets a hold of them, whether they have consent or not. The security level of a password also lies in the hands of the account holders, often opting for easy-to-remember words and phrases over unique strings of numbers, symbols and odd characters. All too often, users trade off strength for convenience, just closing the latch without locking the deadbolt.<\/p><p>The fallible nature of humans can explain why more and more organizations are implementing two-factor authentication (2FA) or even multi-factor authentication (MFA) to tighten their security and provide greater protection from cyber-attacks.<\/p><h2>How does multi-factor authentication work?<\/h2><p>Multi-factor authentication (MFA) is a more secure access control procedure that combines multiple credentials unique to an individual to verify the user\u2019s identity. A MFA combination involves two or more of the following credentials:<\/p><ul><li>Something the user\u00a0<em>knows\u00a0<\/em>\u2013 this could be a password, PIN, or the answer to a security question<\/li><li>Something the user\u00a0<em>has\u00a0<\/em>\u2013 a device, a smart card, a key fob etc.<\/li><li>Something the user\u00a0<em>is\u00a0<\/em>\u2013 a voice, a fingerprint, maybe even an iris scan?<\/li><\/ul><p>The additional layers of verification in MFA means that even if one of the authentication factors is compromised, anyone trying to obtain illegitimate access is impeded by further obstacles. For example, if a password is compromised for any reason, the account cannot be breached without further credentials.<\/p><p><span data-contrast=\"none\">So<\/span><span data-contrast=\"none\">\u00a0what are the two factors used in two-factor\u00a0<\/span><span data-contrast=\"none\">authentication?<\/span><span data-contrast=\"none\">\u00a0The first one is usually something the\u00a0<\/span><span data-contrast=\"none\">user knows \u2013 a password for\u00a0<\/span><span data-contrast=\"none\">an online account, or the PIN to a credit card.<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"none\">The second factor can be anything the user has or is \u2013 a text to a device, a\u00a0<\/span><span data-contrast=\"none\">physical card<\/span><span data-contrast=\"none\">, a fingerprint<\/span><span data-contrast=\"none\">, or any of the other options listed above (and more!).<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p><p><span data-contrast=\"none\">Given the nature of\u00a0<\/span><a href=\"https:\/\/www.realvnc.com\/en\/\" rel=\"noopener\"><span data-contrast=\"none\">remote access<\/span><\/a><span data-contrast=\"none\">\u00a0activities, security is of paramount importance, and MFA adds a very strong additional defense to any criminal attacks. It should be a mandatory part of any enterprise remote access strategy.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p><p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">Read more:\u00a0<a href=\"https:\/\/discover.realvnc.com\/remote-access-all-you-need-to-know\" target=\"_blank\" rel=\"noopener\">How to remotely access another computer<\/a><\/span><\/p><h2>Two-factor authentication vs multi-factor authentication<\/h2><p><span lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\">The\u00a0<\/span><span lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\">most commonly used<\/span><span lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\">\u00a0form of multi-factor authentication is two-factor authentication (2FA), probably because it\u2019s the simplest way to add an extra layer. 2FA is currently available for most social media platforms and SaaS business applications, as well as for many offline services. If you think you\u2019ve never used 2FA, think again \u2013\u00a0<\/span><span lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\">have you ever<\/span><span lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\">\u00a0withdraw<\/span><span lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\">n<\/span><span lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\">\u00a0cash from an ATM<\/span><span lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\">?<\/span><span lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\">\u00a0You have the\u00a0<\/span><span lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\">card,<\/span><span lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\">\u00a0you have the PIN \u2013 two factors to authenticate your access to the money in a specific account. Most online services will ask for two\u00a0<\/span><span lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\">digital<\/span><span lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\">\u00a0authentication factors, such as a password and a code sent as a text to a linked personal device.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span>MFA and 2FA\u2019s differences are minute in terms of factors and layers of authentication. 2FA is actually just a subset of MFA \u2013 all 2FA are MFA, but not vice-versa. Each additional authentication factor provides a further level of security.<\/p><p>Using 2FA is the first step towards a fully secure software stack, and should be the absolute minimum required when it comes to accessing business-critical systems. Multi-factor authentication is then the next logical step when you\u2019re taking security to the next level.<\/p><h2>Multi-factor authentication helps support compliance<\/h2><p>Regardless of what you are using it for, remote access system implemented in an environment with industry regulations to meet should comply, or support compliance with those regulations. Currently, many compliance standards specifically mandate the use of multi-factor authentication across all devices. In most cases, even when using MFA is not specified, it is still best practice when aiming to meet security requirements demanding a strong and well-defined security architecture.<\/p><p>For example, to be compliant with the Payment Card Industry Data Security Standard (PCI DSS), any accounts with access to any systems handling cardholder data must be secured by MFA.<\/p><p>Failing to meet compliance standards can be catastrophic for an organization, causing loss of trust and reputation, disruption to business, and significant fines.<\/p><h2>Are the benefits of MFA worth the hassle?<\/h2><p>Multi-factor authentication systems offer many essential security benefits, but they do come at a small price. End users can find them awkward, often needing to re-authenticate on a regular basis. This can quickly become burdensome with additional authentication factors, making simply logging onto a system time consuming.<\/p><p>Despite the potential inconvenience to end users using MFA for remote access, we strongly recommend using MFA where possible, and believe that the benefits vastly outweigh the costs. The uptick in cyber crime over recent years means that relying on a combination of usernames and passwords alone for business-critical services presents an extremely high security risk that organizations cannot afford to take.<\/p><p>Unfortunately even the most complex, randomly-generated passwords aren\u2019t safe enough, and can be snatched by hackers through phishing attacks and data breaches. While no security system is fool proof, MFA provides essential additional layers of security to protect an organization against cyber crime.<\/p><hr \/><p><span lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\">Looking for a remote access solution with\u00a0<\/span><span lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\">multi-factor authentication, up to 256-bit AES encryption,\u00a0<\/span><span lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\">and support for\u00a0<\/span><a href=\"https:\/\/www.realvnc.com\/en\/connect\/security\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span data-ccp-charstyle=\"Hyperlink\">industry compliance standards<\/span><\/span><\/a><span lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\">? Take a\u00a0<\/span><a href=\"https:\/\/www.realvnc.com\/en\/connect\/trial\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span data-ccp-charstyle=\"Hyperlink\">free trial of VNC\u00a0<\/span><\/span><span lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span data-ccp-charstyle=\"Hyperlink\">Connect<\/span><\/span><\/a><span lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\">, and<\/span><span lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\">\u00a0see why millions of users\u00a0<\/span><span lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\">trust our service for their remote access needs.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Pretty much everyone has created a password at some point, and most of us have forgotten one (or more) too.<\/p>\n","protected":false},"author":19,"featured_media":8554,"template":"","blog_category":[263,257,258],"class_list":["post-8609","blog","type-blog","status-publish","has-post-thumbnail","hentry","blog_category-remote-working","blog_category-security","blog_category-strategy"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Remote Access and Multi-factor Authentication - is it worth it?<\/title>\n<meta name=\"description\" content=\"Multi-factor authentication can be an inconvenience, but a major security breach in your organization is even less convenient. Find out why 2FA\/MFA is essential for your privacy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.realvnc.com\/en\/blog\/multi-factor-authentication-is-it-worth-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Remote Access and Multi-factor Authentication - is it worth it?\" \/>\n<meta property=\"og:description\" content=\"Multi-factor authentication can be an inconvenience, but a major security breach in your organization is even less convenient. Find out why 2FA\/MFA is essential for your privacy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.realvnc.com\/en\/blog\/multi-factor-authentication-is-it-worth-it\/\" \/>\n<meta property=\"og:site_name\" content=\"RealVNC\u00ae\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/realvnc\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-24T15:13:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/MFAWhy-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"693\" \/>\n\t<meta property=\"og:image:height\" content=\"463\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@realvnc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/multi-factor-authentication-is-it-worth-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/multi-factor-authentication-is-it-worth-it\\\/\"},\"author\":{\"name\":\"David\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/c61fa30b0c79c5b2c0f969f1882547f6\"},\"headline\":\"Remote Access and Multi-factor Authentication &#8211; is it worth it?\",\"datePublished\":\"2020-01-23T12:32:00+00:00\",\"dateModified\":\"2022-03-24T15:13:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/multi-factor-authentication-is-it-worth-it\\\/\"},\"wordCount\":987,\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/multi-factor-authentication-is-it-worth-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/MFAWhy-1.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/multi-factor-authentication-is-it-worth-it\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/multi-factor-authentication-is-it-worth-it\\\/\",\"name\":\"Remote Access and Multi-factor Authentication - is it worth it?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/multi-factor-authentication-is-it-worth-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/multi-factor-authentication-is-it-worth-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/MFAWhy-1.jpg\",\"datePublished\":\"2020-01-23T12:32:00+00:00\",\"dateModified\":\"2022-03-24T15:13:02+00:00\",\"description\":\"Multi-factor authentication can be an inconvenience, but a major security breach in your organization is even less convenient. Find out why 2FA\\\/MFA is essential for your privacy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/multi-factor-authentication-is-it-worth-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/multi-factor-authentication-is-it-worth-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/multi-factor-authentication-is-it-worth-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/MFAWhy-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/MFAWhy-1.jpg\",\"width\":693,\"height\":463,\"caption\":\"MFAWhy\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/multi-factor-authentication-is-it-worth-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Remote Access and Multi-factor Authentication &#8211; is it worth it?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"name\":\"RealVNC\u00ae\",\"description\":\"The world&#039;s safest remote access software\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\",\"name\":\"RealVNC\u00ae\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"width\":300,\"height\":41,\"caption\":\"RealVNC\u00ae\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/realvnc\",\"https:\\\/\\\/x.com\\\/realvnc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/realvnc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/RealVNCLtd\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/RealVNC\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/c61fa30b0c79c5b2c0f969f1882547f6\",\"name\":\"David\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g\",\"caption\":\"David\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Remote Access and Multi-factor Authentication - is it worth it?","description":"Multi-factor authentication can be an inconvenience, but a major security breach in your organization is even less convenient. Find out why 2FA\/MFA is essential for your privacy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.realvnc.com\/en\/blog\/multi-factor-authentication-is-it-worth-it\/","og_locale":"en_US","og_type":"article","og_title":"Remote Access and Multi-factor Authentication - is it worth it?","og_description":"Multi-factor authentication can be an inconvenience, but a major security breach in your organization is even less convenient. Find out why 2FA\/MFA is essential for your privacy.","og_url":"https:\/\/www.realvnc.com\/en\/blog\/multi-factor-authentication-is-it-worth-it\/","og_site_name":"RealVNC\u00ae","article_publisher":"https:\/\/www.facebook.com\/realvnc","article_modified_time":"2022-03-24T15:13:02+00:00","og_image":[{"width":693,"height":463,"url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/MFAWhy-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@realvnc","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.realvnc.com\/en\/blog\/multi-factor-authentication-is-it-worth-it\/#article","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/multi-factor-authentication-is-it-worth-it\/"},"author":{"name":"David","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/c61fa30b0c79c5b2c0f969f1882547f6"},"headline":"Remote Access and Multi-factor Authentication &#8211; is it worth it?","datePublished":"2020-01-23T12:32:00+00:00","dateModified":"2022-03-24T15:13:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/multi-factor-authentication-is-it-worth-it\/"},"wordCount":987,"publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/multi-factor-authentication-is-it-worth-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/MFAWhy-1.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.realvnc.com\/en\/blog\/multi-factor-authentication-is-it-worth-it\/","url":"https:\/\/www.realvnc.com\/en\/blog\/multi-factor-authentication-is-it-worth-it\/","name":"Remote Access and Multi-factor Authentication - is it worth it?","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/multi-factor-authentication-is-it-worth-it\/#primaryimage"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/multi-factor-authentication-is-it-worth-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/MFAWhy-1.jpg","datePublished":"2020-01-23T12:32:00+00:00","dateModified":"2022-03-24T15:13:02+00:00","description":"Multi-factor authentication can be an inconvenience, but a major security breach in your organization is even less convenient. Find out why 2FA\/MFA is essential for your privacy.","breadcrumb":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/multi-factor-authentication-is-it-worth-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.realvnc.com\/en\/blog\/multi-factor-authentication-is-it-worth-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/blog\/multi-factor-authentication-is-it-worth-it\/#primaryimage","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/MFAWhy-1.jpg","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/MFAWhy-1.jpg","width":693,"height":463,"caption":"MFAWhy"},{"@type":"BreadcrumbList","@id":"https:\/\/www.realvnc.com\/en\/blog\/multi-factor-authentication-is-it-worth-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.realvnc.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blogs","item":"https:\/\/www.realvnc.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"Remote Access and Multi-factor Authentication &#8211; is it worth it?"}]},{"@type":"WebSite","@id":"https:\/\/www.realvnc.com\/en\/#website","url":"https:\/\/www.realvnc.com\/en\/","name":"RealVNC\u00ae","description":"The world&#039;s safest remote access software","publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.realvnc.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.realvnc.com\/en\/#organization","name":"RealVNC\u00ae","url":"https:\/\/www.realvnc.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","width":300,"height":41,"caption":"RealVNC\u00ae"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/realvnc","https:\/\/x.com\/realvnc","https:\/\/www.linkedin.com\/company\/realvnc\/","https:\/\/www.youtube.com\/RealVNCLtd","https:\/\/en.wikipedia.org\/wiki\/RealVNC"]},{"@type":"Person","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/c61fa30b0c79c5b2c0f969f1882547f6","name":"David","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g","caption":"David"}}]}},"_links":{"self":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/8609","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/users\/19"}],"version-history":[{"count":0,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/8609\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media\/8554"}],"wp:attachment":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media?parent=8609"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog_category?post=8609"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}