{"id":8626,"date":"2018-07-12T12:42:00","date_gmt":"2018-07-12T12:42:00","guid":{"rendered":"https:\/\/www.realvnc.com\/en\/?post_type=blog&#038;p=8626"},"modified":"2022-03-24T15:13:02","modified_gmt":"2022-03-24T15:13:02","slug":"how-to-maintain-a-secure-and-compliant-remote-access-strategy","status":"publish","type":"blog","link":"https:\/\/www.realvnc.com\/en\/blog\/how-to-maintain-a-secure-and-compliant-remote-access-strategy\/","title":{"rendered":"How to maintain a compliant remote access strategy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8626\" class=\"elementor elementor-8626\" data-elementor-post-type=\"blog\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-307c4971 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"307c4971\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-67da345c\" data-id=\"67da345c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-325abf28 elementor-widget elementor-widget-text-editor\" data-id=\"325abf28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To achieve compliance there are multiple considerations that must be addressed in relation to security, privacy and visibility.<\/p><p>Compliance regulations such as\u00a0<u><a href=\"https:\/\/searchhealthit.techtarget.com\/definition\/HIPAA\">HIPAA<\/a><\/u>,\u00a0<a href=\"https:\/\/www.pcisecuritystandards.org\/\" rel=\"noopener\"><u>PCI-DSS<\/u>\u00a0<\/a>and\u00a0<a href=\"https:\/\/gdpr-info.eu\/\" rel=\"noopener\"><u>GDPR<\/u><\/a>\u00a0have stringent requirements when it comes to the handling and processing of corporate and personal data.<\/p><p>What\u2019s more, data security is a priority for most organizations. When you establish connections with third parties and gain some control over their data (or relinquish some control over yours), robust security measures around the processes need to be in place.<\/p><p>This post aims to break down some of the aspects of a secure remote access strategy in relation to compliance regulations.<\/p><p>The safety and security of your data and the data you hold are important to your compliance commitments.<\/p><p>It\u2019s essential to make sure your remote access software has the correct\u00a0<a href=\"https:\/\/www.realvnc.com\/en\/connect\/security\/\" rel=\"noopener\">security<\/a>\u00a0and control features to help you comply. This should include:<\/p><h2>Multi-factor authentication<\/h2><p>All remote access sessions should be authenticated as or before they start.<\/p><p><a href=\"https:\/\/discover.realvnc.com\/blog\/multi-factor-authentication-is-it-worth-it\" rel=\"noopener\">Multi-factor authentication\u00a0<\/a>refers to the use of two or more separate methods for validating your identity. This could be as simple as username and password as the first factor, and a one-time validation code or key-chain\u00a0that gets sent to your email account or phone.<\/p><p>Using multiple factors of authentication is much more secure than only using one. If one of the authentication factors is compromised, there is an additional layer of security to protect the user and their data.<\/p><h2>Session encryption<\/h2><p>Remote access sessions should be\u00a0<a href=\"https:\/\/discover.realvnc.com\/blog\/all-you-need-to-know-about-remote-desktop-encryption\" rel=\"noopener\">encrypted end-to-end<\/a>. The minimum encryption level to look for is 128-bit, though 256-bit will give you a higher level of protection and may be mandated for industry compliance.<\/p><h2>Remote access log and PCI-DSS compliance<\/h2><p>Establishing compliance may require that you demonstrate log and audit history of everyone who has accessed your network remotely. This is often one of the first things an investigator will ask for during a review or if a breach has occurred.<\/p><p>Log and audit records are an essential part of your compliance strategy. Not just for GDPR, but for a variety of industry and government regulations, for example,\u00a0<u><a href=\"http:\/\/www.iso27001security.com\/html\/27002.html\">ISO 27002<\/a><\/u>\u00a0and PCI-DSS.<\/p><h2>Granular access rights<\/h2><p>Ideally your remote access software should give you fine-grained control over each user\u2019s access rights. You should be able to give each user the appropriate privileges they need, and to control the devices they can access through some type of group or management structure.<\/p><h2>GDPR and your remote access policy<\/h2><p>Privacy is perhaps the most crucial remote access related issue in your quest to\u00a0<a href=\"https:\/\/discover.realvnc.com\/blog\/four-reasons-to-be-happy-about-gdpr\">achieve compliance with GDPR<\/a>\u00a0or other regulations. Are you clear about how you handle and process the data that is captured during remote sessions?<\/p><p>If you\u2019re using\u00a0<a href=\"https:\/\/www.realvnc.com\/en\/\" rel=\"noopener\">remote access software<\/a>, data about your sessions will likely be collected for logging purposes. Information such as IP address, local user name, results of activities and chat transcripts may be captured and stored.<\/p><p>You should understand what this information is and how it is handled by your remote access software provider. Also, you may need to declare this in your own privacy policy to comply with regulations like GDPR, especially if you are using the remote access software to provide services for employees, customers and other third parties.<\/p><p>Data minimization is also an important aspect of remote access compliance: namely, being able to demonstrate that the data being used is essential for the requirements of the action being performed.<\/p><h2>Remote user interfaces<\/h2><p>Here, deliberate and controlled limitations need to be considered. For example, if a technician is accessing a desktop remotely with the intention of assisting in configuring the printer, they should only have access to the necessary data required to fulfill the task, not the wider network of information.\u00a0<\/p><p>With due diligence and robust internal procedures, efforts to maintain regulatory compliance pay off in the long run. For growing companies in particular, it\u2019s essential to develop a best practice-culture at an earlier stage, so that compliance and security are inherent in every remote access session, no matter how much you scale.<\/p><p>Ultimately, security and compliance are at the heart of protecting the reputation and future of your business.<\/p><p><a href=\"https:\/\/discover.realvnc.com\/all-you-need-to-know-about-vnc-remote-access-technology\" rel=\"noopener\">VNC\u00a0<\/a>Connect remote access software enables\u00a0<a href=\"https:\/\/static.realvnc.com\/media\/documents\/vncconnect-pci-dss.pdf\" target=\"_blank\" rel=\"noopener\">PCI-DSS<\/a>,\u00a0<a href=\"https:\/\/static.realvnc.com\/media\/documents\/vncconnect-hipaa.pdf\" target=\"_blank\" rel=\"noopener\">HIPAA<\/a>, and\u00a0<a href=\"https:\/\/static.realvnc.com\/media\/documents\/vncconnect-gdpr.pdf\" target=\"_blank\" rel=\"noopener\">GDPR<\/a>\u00a0compliance, meeting all of the provided guidelines. Every connection is end-to-end encrypted with up to 256-bit AES encryption, 2048-bit RSA keys, and perfect forward secrecy, so sessions are entirely private to you now and in the future.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>When deploying a remote access strategy, regulatory compliance will be a consideration for many industries.<\/p>\n","protected":false},"author":19,"featured_media":8559,"template":"","blog_category":[264,258],"class_list":["post-8626","blog","type-blog","status-publish","has-post-thumbnail","hentry","blog_category-compliance","blog_category-strategy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to maintain a compliant remote access strategy<\/title>\n<meta name=\"description\" content=\"When deploying a remote access strategy, regulatory compliance will be a consideration for many industries. To achieve compliance there are multiple considerations that must be addressed in relation to security, privacy and visibility.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.realvnc.com\/en\/blog\/how-to-maintain-a-secure-and-compliant-remote-access-strategy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to maintain a compliant remote access strategy\" \/>\n<meta property=\"og:description\" content=\"When deploying a remote access strategy, regulatory compliance will be a consideration for many industries. To achieve compliance there are multiple considerations that must be addressed in relation to security, privacy and visibility.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.realvnc.com\/en\/blog\/how-to-maintain-a-secure-and-compliant-remote-access-strategy\/\" \/>\n<meta property=\"og:site_name\" content=\"RealVNC\u00ae\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/realvnc\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-24T15:13:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/RemoteAccessStrategyBlog-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1042\" \/>\n\t<meta property=\"og:image:height\" content=\"696\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@realvnc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/how-to-maintain-a-secure-and-compliant-remote-access-strategy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/how-to-maintain-a-secure-and-compliant-remote-access-strategy\\\/\"},\"author\":{\"name\":\"David\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/c61fa30b0c79c5b2c0f969f1882547f6\"},\"headline\":\"How to maintain a compliant remote access strategy\",\"datePublished\":\"2018-07-12T12:42:00+00:00\",\"dateModified\":\"2022-03-24T15:13:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/how-to-maintain-a-secure-and-compliant-remote-access-strategy\\\/\"},\"wordCount\":744,\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/how-to-maintain-a-secure-and-compliant-remote-access-strategy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/RemoteAccessStrategyBlog-1.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/how-to-maintain-a-secure-and-compliant-remote-access-strategy\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/how-to-maintain-a-secure-and-compliant-remote-access-strategy\\\/\",\"name\":\"How to maintain a compliant remote access strategy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/how-to-maintain-a-secure-and-compliant-remote-access-strategy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/how-to-maintain-a-secure-and-compliant-remote-access-strategy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/RemoteAccessStrategyBlog-1.jpg\",\"datePublished\":\"2018-07-12T12:42:00+00:00\",\"dateModified\":\"2022-03-24T15:13:02+00:00\",\"description\":\"When deploying a remote access strategy, regulatory compliance will be a consideration for many industries. To achieve compliance there are multiple considerations that must be addressed in relation to security, privacy and visibility.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/how-to-maintain-a-secure-and-compliant-remote-access-strategy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/how-to-maintain-a-secure-and-compliant-remote-access-strategy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/how-to-maintain-a-secure-and-compliant-remote-access-strategy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/RemoteAccessStrategyBlog-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/RemoteAccessStrategyBlog-1.jpg\",\"width\":1042,\"height\":696,\"caption\":\"RemoteAccessStrategyBlog\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/how-to-maintain-a-secure-and-compliant-remote-access-strategy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to maintain a compliant remote access strategy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"name\":\"RealVNC\u00ae\",\"description\":\"The world&#039;s safest remote access software\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\",\"name\":\"RealVNC\u00ae\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"width\":300,\"height\":41,\"caption\":\"RealVNC\u00ae\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/realvnc\",\"https:\\\/\\\/x.com\\\/realvnc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/realvnc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/RealVNCLtd\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/RealVNC\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/c61fa30b0c79c5b2c0f969f1882547f6\",\"name\":\"David\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g\",\"caption\":\"David\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to maintain a compliant remote access strategy","description":"When deploying a remote access strategy, regulatory compliance will be a consideration for many industries. To achieve compliance there are multiple considerations that must be addressed in relation to security, privacy and visibility.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.realvnc.com\/en\/blog\/how-to-maintain-a-secure-and-compliant-remote-access-strategy\/","og_locale":"en_US","og_type":"article","og_title":"How to maintain a compliant remote access strategy","og_description":"When deploying a remote access strategy, regulatory compliance will be a consideration for many industries. To achieve compliance there are multiple considerations that must be addressed in relation to security, privacy and visibility.","og_url":"https:\/\/www.realvnc.com\/en\/blog\/how-to-maintain-a-secure-and-compliant-remote-access-strategy\/","og_site_name":"RealVNC\u00ae","article_publisher":"https:\/\/www.facebook.com\/realvnc","article_modified_time":"2022-03-24T15:13:02+00:00","og_image":[{"width":1042,"height":696,"url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/RemoteAccessStrategyBlog-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@realvnc","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.realvnc.com\/en\/blog\/how-to-maintain-a-secure-and-compliant-remote-access-strategy\/#article","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/how-to-maintain-a-secure-and-compliant-remote-access-strategy\/"},"author":{"name":"David","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/c61fa30b0c79c5b2c0f969f1882547f6"},"headline":"How to maintain a compliant remote access strategy","datePublished":"2018-07-12T12:42:00+00:00","dateModified":"2022-03-24T15:13:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/how-to-maintain-a-secure-and-compliant-remote-access-strategy\/"},"wordCount":744,"publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/how-to-maintain-a-secure-and-compliant-remote-access-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/RemoteAccessStrategyBlog-1.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.realvnc.com\/en\/blog\/how-to-maintain-a-secure-and-compliant-remote-access-strategy\/","url":"https:\/\/www.realvnc.com\/en\/blog\/how-to-maintain-a-secure-and-compliant-remote-access-strategy\/","name":"How to maintain a compliant remote access strategy","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/how-to-maintain-a-secure-and-compliant-remote-access-strategy\/#primaryimage"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/how-to-maintain-a-secure-and-compliant-remote-access-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/RemoteAccessStrategyBlog-1.jpg","datePublished":"2018-07-12T12:42:00+00:00","dateModified":"2022-03-24T15:13:02+00:00","description":"When deploying a remote access strategy, regulatory compliance will be a consideration for many industries. To achieve compliance there are multiple considerations that must be addressed in relation to security, privacy and visibility.","breadcrumb":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/how-to-maintain-a-secure-and-compliant-remote-access-strategy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.realvnc.com\/en\/blog\/how-to-maintain-a-secure-and-compliant-remote-access-strategy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/blog\/how-to-maintain-a-secure-and-compliant-remote-access-strategy\/#primaryimage","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/RemoteAccessStrategyBlog-1.jpg","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/RemoteAccessStrategyBlog-1.jpg","width":1042,"height":696,"caption":"RemoteAccessStrategyBlog"},{"@type":"BreadcrumbList","@id":"https:\/\/www.realvnc.com\/en\/blog\/how-to-maintain-a-secure-and-compliant-remote-access-strategy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.realvnc.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blogs","item":"https:\/\/www.realvnc.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"How to maintain a compliant remote access strategy"}]},{"@type":"WebSite","@id":"https:\/\/www.realvnc.com\/en\/#website","url":"https:\/\/www.realvnc.com\/en\/","name":"RealVNC\u00ae","description":"The world&#039;s safest remote access software","publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.realvnc.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.realvnc.com\/en\/#organization","name":"RealVNC\u00ae","url":"https:\/\/www.realvnc.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","width":300,"height":41,"caption":"RealVNC\u00ae"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/realvnc","https:\/\/x.com\/realvnc","https:\/\/www.linkedin.com\/company\/realvnc\/","https:\/\/www.youtube.com\/RealVNCLtd","https:\/\/en.wikipedia.org\/wiki\/RealVNC"]},{"@type":"Person","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/c61fa30b0c79c5b2c0f969f1882547f6","name":"David","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g","caption":"David"}}]}},"_links":{"self":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/8626","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/users\/19"}],"version-history":[{"count":0,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/8626\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media\/8559"}],"wp:attachment":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media?parent=8626"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog_category?post=8626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}