{"id":8685,"date":"2018-08-23T13:21:00","date_gmt":"2018-08-23T13:21:00","guid":{"rendered":"https:\/\/www.realvnc.com\/en\/?post_type=blog&#038;p=8685"},"modified":"2022-03-24T15:12:51","modified_gmt":"2022-03-24T15:12:51","slug":"what-can-hollywood-teach-us-about-remote-access-security","status":"publish","type":"blog","link":"https:\/\/www.realvnc.com\/en\/blog\/what-can-hollywood-teach-us-about-remote-access-security\/","title":{"rendered":"What can Hollywood teach us about remote access security?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8685\" class=\"elementor elementor-8685\" data-elementor-post-type=\"blog\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-78c925d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"78c925d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-32907343\" data-id=\"32907343\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-424b8c8d elementor-widget elementor-widget-text-editor\" data-id=\"424b8c8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To counter these threats we are spending billions of dollars every year deploying technology to mitigate risk.<\/p><p>Gartner estimates that\u00a0<a href=\"https:\/\/www.gartner.com\/newsroom\/id\/3836563\">we spent $85 billion in 2017 on IT security products<\/a>\u00a0and many experts expect double-digit market growth through 2025.<\/p><p>Because remote access is all about connecting to and controlling remote devices, security is an absolutely critical consideration. Without a highly secure remote access product and well-disciplined procedures, your remote access software could expose you to even more risks.<\/p><p>So what does the cybersecurity market have to do with Hollywood? On the surface, not a lot. After all, global box office sales were a mere $40 billion in 2017 and the industry is declining as other entertainment sources encroach on their traditional customers. But, it\u2019s not the entertainment industry itself we can learn from, but the content it creates.<\/p><p>Movies entertain us through engaging stories, but more importantly, they show us new ways of looking at the world and teach us lessons. In this blog we make a light-hearted attempt to show how movies provide direct, and perhaps not so direct, insights into the challenges we face in managing digital security as it relates to remote access. Lights, camera, action\u2026<\/p><h2>Terminator 2 \u2013 The evolving threat<\/h2><p>That fact that security risks are a \u201cmoving target\u201d makes reacting to threats incredibly challenging. On top of this, your IT ecosystem is constantly changing, so attack vectors are relentlessly transforming.<\/p><p>Security threats are like the T-1000 android in the classic Sci-fi action thriller Terminator 2 \u2013 Judgement Day. No matter how hard you try to destroy a threat, it morphs into a new and increasing sinister menace. Instead of fighting a losing battle with the T-1000, think outside the box and attack the threat at the source. Successful security is all about establishing a broader strategy because you will never be successful if you are constantly reacting to morphing threats.<\/p><h2>Shrek \u2013 The strategy<\/h2><p>To quote Shrek, \u201cOnions have layers. Ogres have layers.\u201d A security strategy should be like an onion too, it should have layers. There is no one bit of technology that will resolve your security challenges. Instead, it requires a strategy made up of layers, with each layer protecting against a specific threat or defining a best practice.<\/p><p>Credible and effective protection is created only by the combination of all the layers. Just like an Ogre, a successful security strategy is an onion.<\/p><h2>Star Wars \u201cA New Hope\u201d \u2013 Encryption<\/h2><p>Think back to the seminal scene from \u201cA New Hope\u201d when Luke Skywalker is cleaning up his newly acquired R2-D2 droid. While removing some grit, Luke uncovers a holographic message from Princess Leia calling for help from Obi-Wan Kenobi.<\/p><p>Given the importance of this message, Luke\u2019s ability to view this message demonstrates a grievous lack of data encryption. If the message had been encrypted in transport (i.e. inside R2-D2), Luke would not have been able to view the actual transmission after he stumbled across it.<\/p><p>The analogy demonstrates the importance of end-to-end encryption for remote access sessions. Protecting your real-time remote access sessions demands a high standard of data encryption (128-bit or 256-bit AES) to ensure session content is not compromised in transit by forces of evil.<\/p><p>Princess Leia should have given more thought to encrypting her message and verifying Luke\u2019s identity before allowing access would have also been a good idea (more about authentication below). However, we have to concede that we wouldn\u2019t have a story if it wasn\u2019t for this amateur breach in Rebel Alliance security best practice. A missing layer of the security onion, but we will forgive George Lucas for the sake of the franchise.<\/p><h2>Avatar \u2013 Multi-factor authentication<\/h2><p>In Avatar the greedy corporate bosses are determined to exploit the natural resources of the peaceful Na\u2019vi community. The evil Parker Selfridge\u2019s route into the Na\u2019vi society is through a breach in authentication. By hijacking avatars originally established to help the Na\u2019vi population, they are able to hatch their despicable plans.<\/p><p>The unsuspecting Na\u2019vi have no way of verifying the actual identity and intent of interlopers, leaving their society open to the spreading virus. This dark story highlights the importance of knowing exactly who you\u2019re dealing with when establishing connections in your remote access sessions.<\/p><p>If the Na\u2019vi would have had some form of multi-factor authentication in place when engaging with new member of the tribe , they would have been able to detect the arrival of the human impostors earlier is the storyline. This would have saved them a lot of time and grief. Authentication is another important layer of the onion.<\/p><h2>The Matrix &#8211; Firewalls and connectivity<\/h2><p>Think of your company as the Matrix. All it takes to compromise your business is for someone to infiltrate your matrix. A computer hacker like Neo just needs to find an easy way in through your firewall. It doesn\u2019t matter how good your anti-virus and procedures are (aka Mr. Smith), once Neo, Trinity and Morpheus are in, they will do damage.<\/p><p>Thankfully, there isn\u2019t a red pill that allows hackers to come and go through your firewall, but they will exploit vulnerabilities if you give them a chance, the same way Neo managed to make its way in and out of the Matrix by using the phones and hard lines scattered around the company.<\/p><p>These hard lines are like holes in your firewalls: they need to be defended, in your case by using direct TCP to avoid leaving a gap. This is why when choosing your remote access connectivity strategy, it\u2019s best to have as many options as possible. The ability to choose between direct and cloud brokered connections allows you to optimize your service and control your firewall security. Don\u2019t let Neo and his pals into your matrix.<\/p><h2>Game of Thrones \u2013 Groups and teams<\/h2><p>Ok, Game of Thrones is not technically a Hollywood production, but it\u2019s popular enough that we\u2019re going to go ahead and use it for the next metaphor. So, put yourself in Jon Snow\u2019s shoes. You have just been elected the 998<sup>th<\/sup>\u00a0Lord Commander of the Night\u2019s Watch and are trying to get a grip on your new, rather high-pressure, job.<\/p><p>Being Lord Commander means that you\u2019re not only responsible for preventing the White Walkers from turning the Seven Kingdoms into an army of undead, but also to manage the smooth running of the Wall. And when a recruit joins the team, you must assign him to one of the three orders of the Night\u2019s Watch: the Rangers, the Stewards and the Builders.<\/p><p>Like Jon Snow, you may also be in charge of supporting large teams, with different duties, responsibilities and security clearances. Good remote access group management tools allow you to do just that, dividing responsibility for remote computers among the people in your team by assigning permissions and deciding who can connect to which computer.<\/p><p>Controlling teams, groups and permissions improves the efficiency of your kingdom and reduces security risks, \u201c<em>for this night and all the nights to come<\/em>\u201d.<\/p><h2>Harry Potter &#8211; Audit management<\/h2><p>Dumbledore lived a long and full life, until (spoiler alert!) it was suddenly ended by Severus Snape that fateful night up on the Astronomy Tower. In fact, he died at the age of 116 \u2013 that\u2019s many decades of Hogwarts-running, Horcrux-hunting, Voldemort-fighting adventures. And despite his legendary memory, Dumbledore found himself needing the help of a magical tool to recollect his previous experiences: the Pensieve.<\/p><p>The Pensieve is a stone basin where memories can be magically stored and accessed at a later stage. In J.K Rowling\u2019s saga, Dumbledore would use this tool every time he needed to view scenes he witnessed many years before to find the clarity needed to navigate tricky situations.\u00a0<\/p><p>While there is no real magic in remote access, most solutions will include audit tools that enable the users to keep a record, or log, of the usage. Remote sessions can be recorded, and a logged session history highlights all the activities performed by every user. It\u2019s a good way to record all the \u201cremote access memories\u201d, so you can meet your compliance and best-practice objectives. Just make sure to add multiple layers of security, such as MFA, so unauthorized users won\u2019t be able to access your precious memories. Or nosey teenager with a lightning-shaped scar on their forehead. \u00a0<\/p><p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/p><p>A good understanding of how all the aspects of remote access security can protect your organization from risk. When considering the threats you face, it may be helpful to recall the T-1000 from Terminator and when designing your security strategy, taking some advice from Shrek about onions and layers. Whether it\u2019s Star Wars, Avatar, The Matrix, Game of Thrones or Harry Potter, Hollywood provides us with entertainment, but also lessons we can apply in our personal and business lives. If you look hard enough, Hollywood even has things to teach us about remote access security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Businesses today face major digital security risks that range from external hackers to internal theft and data breaches.<\/p>\n","protected":false},"author":19,"featured_media":8636,"template":"","blog_category":[257,258],"class_list":["post-8685","blog","type-blog","status-publish","has-post-thumbnail","hentry","blog_category-security","blog_category-strategy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What can Hollywood teach us about remote access security?<\/title>\n<meta name=\"description\" content=\"Movies entertain us through engaging stories, and show us new ways of looking at the world and teach us lessons. In this blog we make a light-hearted attempt to show how movies provide direct, and perhaps not so direct, insights into the challenges we face in managing digital security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.realvnc.com\/en\/blog\/what-can-hollywood-teach-us-about-remote-access-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What can Hollywood teach us about remote access security?\" \/>\n<meta property=\"og:description\" content=\"Movies entertain us through engaging stories, and show us new ways of looking at the world and teach us lessons. In this blog we make a light-hearted attempt to show how movies provide direct, and perhaps not so direct, insights into the challenges we face in managing digital security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.realvnc.com\/en\/blog\/what-can-hollywood-teach-us-about-remote-access-security\/\" \/>\n<meta property=\"og:site_name\" content=\"RealVNC\u00ae\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/realvnc\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-24T15:12:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/star-wars-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"693\" \/>\n\t<meta property=\"og:image:height\" content=\"462\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@realvnc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/what-can-hollywood-teach-us-about-remote-access-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/what-can-hollywood-teach-us-about-remote-access-security\\\/\"},\"author\":{\"name\":\"David\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/c61fa30b0c79c5b2c0f969f1882547f6\"},\"headline\":\"What can Hollywood teach us about remote access security?\",\"datePublished\":\"2018-08-23T13:21:00+00:00\",\"dateModified\":\"2022-03-24T15:12:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/what-can-hollywood-teach-us-about-remote-access-security\\\/\"},\"wordCount\":1504,\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/what-can-hollywood-teach-us-about-remote-access-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/star-wars-1.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/what-can-hollywood-teach-us-about-remote-access-security\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/what-can-hollywood-teach-us-about-remote-access-security\\\/\",\"name\":\"What can Hollywood teach us about remote access security?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/what-can-hollywood-teach-us-about-remote-access-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/what-can-hollywood-teach-us-about-remote-access-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/star-wars-1.jpg\",\"datePublished\":\"2018-08-23T13:21:00+00:00\",\"dateModified\":\"2022-03-24T15:12:51+00:00\",\"description\":\"Movies entertain us through engaging stories, and show us new ways of looking at the world and teach us lessons. In this blog we make a light-hearted attempt to show how movies provide direct, and perhaps not so direct, insights into the challenges we face in managing digital security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/what-can-hollywood-teach-us-about-remote-access-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/what-can-hollywood-teach-us-about-remote-access-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/what-can-hollywood-teach-us-about-remote-access-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/star-wars-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/star-wars-1.jpg\",\"width\":693,\"height\":462,\"caption\":\"star-wars-1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/what-can-hollywood-teach-us-about-remote-access-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What can Hollywood teach us about remote access security?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"name\":\"RealVNC\u00ae\",\"description\":\"The world&#039;s safest remote access software\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\",\"name\":\"RealVNC\u00ae\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"width\":300,\"height\":41,\"caption\":\"RealVNC\u00ae\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/realvnc\",\"https:\\\/\\\/x.com\\\/realvnc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/realvnc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/RealVNCLtd\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/RealVNC\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/c61fa30b0c79c5b2c0f969f1882547f6\",\"name\":\"David\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g\",\"caption\":\"David\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What can Hollywood teach us about remote access security?","description":"Movies entertain us through engaging stories, and show us new ways of looking at the world and teach us lessons. In this blog we make a light-hearted attempt to show how movies provide direct, and perhaps not so direct, insights into the challenges we face in managing digital security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.realvnc.com\/en\/blog\/what-can-hollywood-teach-us-about-remote-access-security\/","og_locale":"en_US","og_type":"article","og_title":"What can Hollywood teach us about remote access security?","og_description":"Movies entertain us through engaging stories, and show us new ways of looking at the world and teach us lessons. In this blog we make a light-hearted attempt to show how movies provide direct, and perhaps not so direct, insights into the challenges we face in managing digital security.","og_url":"https:\/\/www.realvnc.com\/en\/blog\/what-can-hollywood-teach-us-about-remote-access-security\/","og_site_name":"RealVNC\u00ae","article_publisher":"https:\/\/www.facebook.com\/realvnc","article_modified_time":"2022-03-24T15:12:51+00:00","og_image":[{"width":693,"height":462,"url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/star-wars-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@realvnc","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.realvnc.com\/en\/blog\/what-can-hollywood-teach-us-about-remote-access-security\/#article","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/what-can-hollywood-teach-us-about-remote-access-security\/"},"author":{"name":"David","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/c61fa30b0c79c5b2c0f969f1882547f6"},"headline":"What can Hollywood teach us about remote access security?","datePublished":"2018-08-23T13:21:00+00:00","dateModified":"2022-03-24T15:12:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/what-can-hollywood-teach-us-about-remote-access-security\/"},"wordCount":1504,"publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/what-can-hollywood-teach-us-about-remote-access-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/star-wars-1.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.realvnc.com\/en\/blog\/what-can-hollywood-teach-us-about-remote-access-security\/","url":"https:\/\/www.realvnc.com\/en\/blog\/what-can-hollywood-teach-us-about-remote-access-security\/","name":"What can Hollywood teach us about remote access security?","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/what-can-hollywood-teach-us-about-remote-access-security\/#primaryimage"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/what-can-hollywood-teach-us-about-remote-access-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/star-wars-1.jpg","datePublished":"2018-08-23T13:21:00+00:00","dateModified":"2022-03-24T15:12:51+00:00","description":"Movies entertain us through engaging stories, and show us new ways of looking at the world and teach us lessons. In this blog we make a light-hearted attempt to show how movies provide direct, and perhaps not so direct, insights into the challenges we face in managing digital security.","breadcrumb":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/what-can-hollywood-teach-us-about-remote-access-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.realvnc.com\/en\/blog\/what-can-hollywood-teach-us-about-remote-access-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/blog\/what-can-hollywood-teach-us-about-remote-access-security\/#primaryimage","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/star-wars-1.jpg","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/star-wars-1.jpg","width":693,"height":462,"caption":"star-wars-1"},{"@type":"BreadcrumbList","@id":"https:\/\/www.realvnc.com\/en\/blog\/what-can-hollywood-teach-us-about-remote-access-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.realvnc.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blogs","item":"https:\/\/www.realvnc.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"What can Hollywood teach us about remote access security?"}]},{"@type":"WebSite","@id":"https:\/\/www.realvnc.com\/en\/#website","url":"https:\/\/www.realvnc.com\/en\/","name":"RealVNC\u00ae","description":"The world&#039;s safest remote access software","publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.realvnc.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.realvnc.com\/en\/#organization","name":"RealVNC\u00ae","url":"https:\/\/www.realvnc.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","width":300,"height":41,"caption":"RealVNC\u00ae"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/realvnc","https:\/\/x.com\/realvnc","https:\/\/www.linkedin.com\/company\/realvnc\/","https:\/\/www.youtube.com\/RealVNCLtd","https:\/\/en.wikipedia.org\/wiki\/RealVNC"]},{"@type":"Person","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/c61fa30b0c79c5b2c0f969f1882547f6","name":"David","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g","caption":"David"}}]}},"_links":{"self":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/8685","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/users\/19"}],"version-history":[{"count":0,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/8685\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media\/8636"}],"wp:attachment":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media?parent=8685"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog_category?post=8685"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}