{"id":9341,"date":"2018-11-15T13:30:00","date_gmt":"2018-11-15T13:30:00","guid":{"rendered":"https:\/\/www.realvnc.com\/en\/?post_type=blog&#038;p=9341"},"modified":"2025-02-25T11:40:06","modified_gmt":"2025-02-25T11:40:06","slug":"is-security-worth-the-headache","status":"publish","type":"blog","link":"https:\/\/www.realvnc.com\/en\/blog\/is-security-worth-the-headache\/","title":{"rendered":"Is security worth the headache?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"9341\" class=\"elementor elementor-9341\" data-elementor-post-type=\"blog\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-507a57d3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"507a57d3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-60e0a744\" data-id=\"60e0a744\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1c1095c5 elementor-widget elementor-widget-text-editor\" data-id=\"1c1095c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>It all started with the Big Yahoo Hack of 2013, the biggest data breach of the 21<sup>st<\/sup>\u00a0century, which compromised over 3 billion user accounts in a one-year period. The Yahoo data breach went down in history for its scale, the extensive TV coverage, and for reminding people all over the world of the existence of old email addresses created during their teenage years and abandoned later in adulthood.<\/p><p>Then, plenty more breaches followed: Adobe, eBay, Dropbox, and, more recently, British Airways and Facebook. These days, a week rarely goes by without a major data breach making the news. And, unfortunately, people are bored of it.<\/p><p>The overload of security warnings mixed with the tech jargon that comes with it means that people are becoming victims of cybersecurity fatigue. As a result, people are getting overwhelmed and desensitized to IT security, and by doing so they are at an even greater risk of lowering their guard and falling for the latest security threat.<\/p><p>But what can be done to fight cybersecurity fatigue?\u00a0<\/p><p>A\u00a0<a href=\"https:\/\/www.computer.org\/csdl\/mags\/it\/2016\/05\/mit2016050026-abs.html\">recent study conducted by the National Institute of Standards and Technology<\/a>\u00a0(NIST) found that a majority of the people who they interviewed reported some form of cybersecurity fatigue, which was getting in the way of safe computer behavior, both at home and in a working environment.<\/p><p>The research started as a qualitative study about the perception computer users have of cybersecurity and online privacy. While the researchers were not looking specifically for fatigue-related problem, these spontaneously emerged from the interviews as issues experienced by more than half of the participants.<\/p><p>One of the drivers of the feeling of fatigue was reported to be the struggle to remember an increasing number of PINs and passwords. The older generations are the ones most affected by this problem, as years ago one or two passwords were enough to restrict access to sensitive data at work or at home.<\/p><p>These days, users have on average\u00a0<a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/security-world-password-day\/\">23 personal password-protected accounts to keep up with<\/a>, and 31% of them only uses two or three passwords across the board, a practice that weakens the security process dramatically. And hackers are making the most of it.<\/p><p>It\u2019s becoming clear that the omnipresence of threats means that \u201ckeeping an eye out\u201d alone is no longer enough. And here\u2019s how users can overcome the most common fatigue-related problems:<\/p><h2>Make your life (and your authentication) easier<\/h2><div><p>If having way too many passwords to remember triggers the feeling of fatigue, the first step to overcome this issue should be making them easier to recall.<\/p><p>And by this, we don\u2019t mean that you should pick the name of your Miniature Dachshund as the password to access your bank account, nor that you should write them all down in your favourite notepad to make sure you don\u2019t forget them.<\/p><p>What you should do, instead, is to get yourself a password manager. With a password manager, you can safely create and store random, unique passwords featuring a combination of letters, digits, and special characters.<\/p><p>Password management tools can normally be accessed with one &#8220;master&#8221; password that unlocks all of the credentials stored in the database, so instead of trying to remember two dozen mediocre passwords, you can get away with keeping in mind a single, strong one, as in the good old, more cyber-secure, times.<\/p><h2>Keep yourself informed, but avoid information overload<\/h2><p>We are all about cybersecurity awareness \u2013 in fact, we have written a number of blog posts about it. But it\u2019s also true that information overload can do more damage than good, as it might make people feel tired, burned out, or overwhelmed.<\/p><p>So here\u2019s what we suggest: make a compromise. Allow yourself the time to read a good article or news story on the subject once or twice a week, to ensure you know enough about what\u2019s going on in the cybersecurity world to avoid falling for the latest scam. But it\u2019s perfectly fine, every once in a while, to tune these news stories out and give yourself a break (unless you are a CISO, or a cybersecurity expert. In that case it\u2019s called a holiday).<\/p><p>\u00a0You will find that keeping up with a smaller selection of high quality information from reputable sources will work out better in the long run and will not make you want to scream every time a TV reporter utters the words \u201chigh-profile data breach\u201d.<\/p><\/div><div><p>\u00a0<\/p><h2>Enable automatic virus scan<\/h2><p>If the option is not already enabled by default, you\u2019ll want to schedule regular and automatic virus scans on your devices. Most reputable antivirus applications will also allow you to enable automatic software updates, to ensure you\u2019re always protected against the latest malware.\u00a0<\/p><p>\u00a0You can decide to schedule different levels of virus scans on a regular basis (say daily, weekly, or monthly) at the time that is most convenient for you. Knowing that your antivirus software will do some of the hard work for you is a good way to provide some peace of mind.<\/p><p>Similarly, it might be worth scheduling automatic data backups, so if anything happens to your device or anyone gains access to it, a copy of all your valuable files will be stored safely<\/p><\/div><div><p>\u00a0<\/p><h2>Once and for all, let go of your old accounts<\/h2><p>You know when we mentioned the Yahoo breach reminding people of their old accounts from their teenage years? While nobody wants to be reminded of being the owner of an email address along the lines of iLuvNickelback94@xyz.com (no offense \u2013 we\u2019ve all been there), this is a perfect example of why you should always deactivate the accounts you\u2019re not using.\u00a0\u00a0<\/p><p>The reason is simple: the more active accounts you have, the higher the chances of being hacked, especially if you have re-used your passwords. There are a few handy tools out there to help you track down all the accounts associated with each of your email addresses, so you can narrow them down to the ones you actually need with just a few clicks (we\u2019re a fan of\u00a0Deseat.me).<\/p><p>\u00a0Reviewing and closing your old accounts is one of those tasks that might take you an hour of your time once every few months in return for much-needed peace of mind. In our opinion, it\u2019s definitely worth the trade-off.<\/p><h2>Share the burden<\/h2><p>When it comes to major data breaches hitting large corporations, many employees wrongly assume that the job of keeping everyone safe from cyber threats should fall on the shoulders of a specific person or team within the organization. This is a very dangerous misconception, as security is and always will be a shared responsibility.<\/p><p>For this reason, it\u2019s important that organizations encourage a culture mindful of security, educating all employees about basic cybersecurity best practices that enable them to be in control of their data.<\/p><p>Knowing that each of your colleagues and family members are also doing their part watching out for cyber threats will relieve some of the burden, making it much harder for the hackers to breach your defences.<\/p><p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-\u00a0<\/p><p>Cybersecurity fatigue is a real, collective issue fueled by the omnipresence of insidious cyber threats. While we can\u2019t just make it go away by remaining blissfully oblivious to security menaces and data breaches, there are a few measures you can take to remain vigilant without feeling overwhelmed.\u00a0<\/p><p>And if you\u2019re a user of VNC\u00ae\u00a0\u00a0Connect remote access software, you\u2019ll be happy to know our Engineering Team has developed cybersecurity fatigue immunity and worked hard to make our software as secure as possible, so you have one less thing to worry about.<\/p><p>(The proof is in our\u00a0<a href=\"https:\/\/www.realvnc.com\/en\/connect\/vnc-connect-security-whitepaper\/\">Security Whitepaper<\/a>, but if you\u2019re not up to reading it just yet we\u2019ll understand \u2013 just know that it\u2019s there if you need it!)<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>If we could get a dollar every time we hear the word \u201chacked\u201d, we wouldn\u2019t be here writing this blog, but probably somewhere in the Maldives, thousands of miles away from this keyboard.<\/p>\n","protected":false},"author":19,"featured_media":9320,"template":"","blog_category":[267,257,258],"class_list":["post-9341","blog","type-blog","status-publish","has-post-thumbnail","hentry","blog_category-privacy","blog_category-security","blog_category-strategy"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Is security worth the headache?<\/title>\n<meta name=\"description\" content=\"The overload of security warnings mixed with the tech jargon that comes with it means that people are becoming victims of cybersecurity fatigue, and by doing so they are at an even greater risk of lowering their guard and falling for the latest security threat. But what can be done to fight cybersecurity fatigue?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.realvnc.com\/en\/blog\/is-security-worth-the-headache\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is security worth the headache?\" \/>\n<meta property=\"og:description\" content=\"The overload of security warnings mixed with the tech jargon that comes with it means that people are becoming victims of cybersecurity fatigue, and by doing so they are at an even greater risk of lowering their guard and falling for the latest security threat. But what can be done to fight cybersecurity fatigue?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.realvnc.com\/en\/blog\/is-security-worth-the-headache\/\" \/>\n<meta property=\"og:site_name\" content=\"RealVNC\u00ae\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/realvnc\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-25T11:40:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/fatigue.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"693\" \/>\n\t<meta property=\"og:image:height\" content=\"463\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@realvnc\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/is-security-worth-the-headache\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/is-security-worth-the-headache\\\/\"},\"author\":{\"name\":\"David\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/c61fa30b0c79c5b2c0f969f1882547f6\"},\"headline\":\"Is security worth the headache?\",\"datePublished\":\"2018-11-15T13:30:00+00:00\",\"dateModified\":\"2025-02-25T11:40:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/is-security-worth-the-headache\\\/\"},\"wordCount\":1309,\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/is-security-worth-the-headache\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/fatigue.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/is-security-worth-the-headache\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/is-security-worth-the-headache\\\/\",\"name\":\"Is security worth the headache?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/is-security-worth-the-headache\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/is-security-worth-the-headache\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/fatigue.jpg\",\"datePublished\":\"2018-11-15T13:30:00+00:00\",\"dateModified\":\"2025-02-25T11:40:06+00:00\",\"description\":\"The overload of security warnings mixed with the tech jargon that comes with it means that people are becoming victims of cybersecurity fatigue, and by doing so they are at an even greater risk of lowering their guard and falling for the latest security threat. But what can be done to fight cybersecurity fatigue?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/is-security-worth-the-headache\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/is-security-worth-the-headache\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/is-security-worth-the-headache\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/fatigue.jpg\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/fatigue.jpg\",\"width\":693,\"height\":463,\"caption\":\"fatigue\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/is-security-worth-the-headache\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Is security worth the headache?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"name\":\"RealVNC\u00ae\",\"description\":\"The world&#039;s safest remote access software\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\",\"name\":\"RealVNC\u00ae\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"width\":300,\"height\":41,\"caption\":\"RealVNC\u00ae\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/realvnc\",\"https:\\\/\\\/x.com\\\/realvnc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/realvnc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/RealVNCLtd\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/RealVNC\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/c61fa30b0c79c5b2c0f969f1882547f6\",\"name\":\"David\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g\",\"caption\":\"David\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Is security worth the headache?","description":"The overload of security warnings mixed with the tech jargon that comes with it means that people are becoming victims of cybersecurity fatigue, and by doing so they are at an even greater risk of lowering their guard and falling for the latest security threat. But what can be done to fight cybersecurity fatigue?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.realvnc.com\/en\/blog\/is-security-worth-the-headache\/","og_locale":"en_US","og_type":"article","og_title":"Is security worth the headache?","og_description":"The overload of security warnings mixed with the tech jargon that comes with it means that people are becoming victims of cybersecurity fatigue, and by doing so they are at an even greater risk of lowering their guard and falling for the latest security threat. But what can be done to fight cybersecurity fatigue?","og_url":"https:\/\/www.realvnc.com\/en\/blog\/is-security-worth-the-headache\/","og_site_name":"RealVNC\u00ae","article_publisher":"https:\/\/www.facebook.com\/realvnc","article_modified_time":"2025-02-25T11:40:06+00:00","og_image":[{"width":693,"height":463,"url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/fatigue.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@realvnc","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.realvnc.com\/en\/blog\/is-security-worth-the-headache\/#article","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/is-security-worth-the-headache\/"},"author":{"name":"David","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/c61fa30b0c79c5b2c0f969f1882547f6"},"headline":"Is security worth the headache?","datePublished":"2018-11-15T13:30:00+00:00","dateModified":"2025-02-25T11:40:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/is-security-worth-the-headache\/"},"wordCount":1309,"publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/is-security-worth-the-headache\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/fatigue.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.realvnc.com\/en\/blog\/is-security-worth-the-headache\/","url":"https:\/\/www.realvnc.com\/en\/blog\/is-security-worth-the-headache\/","name":"Is security worth the headache?","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/is-security-worth-the-headache\/#primaryimage"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/is-security-worth-the-headache\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/fatigue.jpg","datePublished":"2018-11-15T13:30:00+00:00","dateModified":"2025-02-25T11:40:06+00:00","description":"The overload of security warnings mixed with the tech jargon that comes with it means that people are becoming victims of cybersecurity fatigue, and by doing so they are at an even greater risk of lowering their guard and falling for the latest security threat. But what can be done to fight cybersecurity fatigue?","breadcrumb":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/is-security-worth-the-headache\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.realvnc.com\/en\/blog\/is-security-worth-the-headache\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/blog\/is-security-worth-the-headache\/#primaryimage","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/fatigue.jpg","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/fatigue.jpg","width":693,"height":463,"caption":"fatigue"},{"@type":"BreadcrumbList","@id":"https:\/\/www.realvnc.com\/en\/blog\/is-security-worth-the-headache\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.realvnc.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blogs","item":"https:\/\/www.realvnc.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"Is security worth the headache?"}]},{"@type":"WebSite","@id":"https:\/\/www.realvnc.com\/en\/#website","url":"https:\/\/www.realvnc.com\/en\/","name":"RealVNC\u00ae","description":"The world&#039;s safest remote access software","publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.realvnc.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.realvnc.com\/en\/#organization","name":"RealVNC\u00ae","url":"https:\/\/www.realvnc.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","width":300,"height":41,"caption":"RealVNC\u00ae"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/realvnc","https:\/\/x.com\/realvnc","https:\/\/www.linkedin.com\/company\/realvnc\/","https:\/\/www.youtube.com\/RealVNCLtd","https:\/\/en.wikipedia.org\/wiki\/RealVNC"]},{"@type":"Person","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/c61fa30b0c79c5b2c0f969f1882547f6","name":"David","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g","caption":"David"}}]}},"_links":{"self":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/9341","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/users\/19"}],"version-history":[{"count":0,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/9341\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media\/9320"}],"wp:attachment":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media?parent=9341"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog_category?post=9341"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}