Remote access present and future insights

Subscribe to receive the latest articles helping you realise the full potential of a consolidated remote access setup for your company

By submitting this form, you agree to receive RealVNC education content, special offers, exciting news and product updates. You can withdraw your consent at any time. We respect your data, see our Privacy policy.

Topics:

All

Spooky scary cybersecurity threats to send shivers down your cables

Eden Jefford 01 Nov 2019

It’s finally the spookiest day of the year, so we thought we’d share a few terrifying tales. The monsters under our beds aren’t ghouls or goblins however, but phishing, ransomware, and *shivers*.

Read More.

Cloud vs direct connections with remote access software: which is right for your business?

Eden Jefford 24 Oct 2019
When looking for a new remote access solution, one of the top considerations will be whether you need direct or cloud connectivity. Depending on your business needs, you might even require both. Read More.

Password unprotected - 4 ways to supercharge your security

Eden Jefford 06 Aug 2019

The latest major password hack is in the news, and yet again the security breach was made possible by weak passwords. Somehow, in 2019, many of us are still using the simple passwords we created.

Read More.

Why schools and universities should adopt a consolidated remote access policy

RealVNC® Ltd 09 Jul 2019

 

 

Today’s classrooms are packed with technology, from laptops and tablets, to widescreen televisions and interactive whiteboards. Across the world the fundamental importance of digital learning.

Read More.

The Rise of SaaS - Why Software-as-a-Service is better for everyone

Eden Jefford 25 Jun 2019

 

 

 

Over the past few years, the Software-as-a-Service (SaaS) industry has been booming, with many companies moving over to this structure, or beginning with it in the first place. Gartner.

Read More.

The Dangers of Open Source VNC-based Software

Eden Jefford 28 May 2019

Everybody loves a freebie, from a sample of chocolate at the mall to a promotional stress ball, but is it always a good idea? When it comes to sweets and sundries, we’re not going to stop you.

Read More.

4 ways to protect yourself from credential stuffing

Giulia Ceccon 26 Feb 2019

Have you ever heard of credential stuffing? If not, it’s understandable: with so many different threats to online security, it’s hard to keep track of the latest techniques used by cybercriminals.

Read More.

Is security worth the headache?

Giulia Ceccon 15 Nov 2018

 

 

If we could get a dollar every time we hear the word “hacked”, we wouldn’t be here writing this blog, but probably somewhere in the Maldives, thousands of miles away from this keyboard.

It all.

Read More.

Infographic: top 5 spookiest cybersecurity threats

Giulia Ceccon 31 Oct 2018

It’s Halloween again, the time of the year where everyone is suddenly into anything spooky. Unfortunately, in the online world there are some truly scary threats lurking all year round that should.

Read More.

7 ways social engineering can get you hacked

Giulia Ceccon 30 Oct 2018

 

 

When it comes to cybersecurity, humans are the weakest link. This is because, unlike (some) machines, humans are inherently flawed: they have cognitive bias, they make unpredictable mistakes,.

Read More.