TeamViewer Remote Control App Gets A Security Upgrade

As many businesses and government agencies have settled in to a work-from-home reality, remote work has also made employees and companies alike more vulnerable to cyber-attacks.

There is an immediate need for mobile apps and other resources to support remote employees.

In particular, knowledge workers who are away from the office frequently use sensitive information and files outside of the corporate firewall.  They are also using many SaaS apps and cloud services and these developments demand a remote work platform that is secure by design. 

One of the tools enabling remote work is the possibility to gain remote access to computers and other devices for administration and technical support. TeamViewer Remote Control app is one of them, widely available and used for remotely controlling computers, tablets, smartphones, and other devices from a mobile device.  After a severe TeamViewer vulnerability allowed attackers to steal system credentials in what proved an unsuccessful attempt to contaminate a water supply station. Its not known how many other such exploits may have succeeded.

In response, the company has recently added another layer of security to its app, along with several new usability improvements. 

This new security feature leverages native biometrics face and fingerprint authentication on Apple and Android mobile devices.  The TeamViewer Remote Control app can now be locked behind biometric authentication, which prevents unauthorised access even if the mobile device is left unlocked. Unauthorised access can similarly be blocked on the account-level in TeamViewer with two-factor authentication (TFA) and incoming connections can also be verified via TFA push notificationsAdditional embedded security features include a ‘black screen’ for connections from mobile devices, keeping the information being accessed on the remotely located device private. 

After one or multiple mobile devices are registered, users will be asked to allow or deny each connection via the registered devices. 

A secure, agile, and effective digital workforce is a requirement for business success. Firms that can’t support work-from-anywhere needs while eliminating barriers to apps and data will find themselves at a competitive disadvantage. In addition, they’ll be hard-pressed to hire and retain top talent. Cyber security investments like this are paying off  for companies that modernise their infrastructures and train their people for remote work quickly, without compromising security.

Microsoft:       HelpNet Security:    Now Secure:   PWC:    Techtarget:     I-HLS

You Might Also Read: 

Industrial Control System Security Is Overlooked:

« Learn how to detect and respond to insider threats
CYRIN's New Cyber Security Training Partnership »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Zerto

Zerto

Zerto provides enterprise-class disaster recovery and business continuity software specifically for virtualized data centers and cloud environments.

Cyber Security Centre - University of Hertfordshire

Cyber Security Centre - University of Hertfordshire

The Cyber Security Centre provides training, teaching and research in the fast paced topics of cyber security and digital forensics.

Compass Security

Compass Security

Compass Security is a specialist IT Security consultancy firm based in Switzerland. Services include pentesting, security assessments, digital forensics and security training.

Dataprovider.com

Dataprovider.com

Our Brand Protection Suite gives you the tools to discover trademark infringement on the Internet, such as websites selling counterfeit products, even when this is not immediately noticeable.

Mphasis

Mphasis

Mphasis is a leading applied technology services company applying next-generation technology to help enterprises transform businesses globally.

Aurora Systems Consulting

Aurora Systems Consulting

Aurora is a Cybersecurity solutions provider with a portfolio consisting of security consulting, products and services that proactively prevent, secure and manage advanced threats and malware.

StateRAMP

StateRAMP

StateRAMP reduces risk from unsecure cloud solutions and protects data by providing State and local governments a standardized approach for verifying and monitoring security postures.

Advantex Network Solutions

Advantex Network Solutions

Advantex Network Solutions are a leading provider in Mitel, IT Solutions, Networking, and iP surveillance.

Coralogix

Coralogix

Coralogix are rebuilding the path to observability using a real-time streaming analytics pipeline that provides monitoring, visualization, and alerting capabilities without the burden of indexing.

Pionen

Pionen

Pionen are a specialist information security consultancy with excellent people and proven security delivery methodologies at its core.

AB Handshake

AB Handshake

AB Handshake offers a game-changing solution for telecom service providers that eliminates fraud on inbound and outbound voice traffic.

Quzara

Quzara

Quzara provides trusted advisory services and highly adaptive cybersecurity services to federal, commercial and Defense Industrial Base customers to meet their security compliance and cyber needs.

Cyber1

Cyber1

CYBER1 is a leader in cyber security advisory and solutions. We are uniquely placed to help customers achieve cyber resilience and thus, safeguard reputation and value.

Contextal

Contextal

Contextal develops cutting-edge open-source cybersecurity solutions, designed to connect the dots and detect complex threats, which slip through the existing protections.

Issue53

Issue53

We empower organizations to thrive in the digital landscape. Strengthen your defenses, enhance resilience – Choose Issue53 for a secure and future-ready IT environment.

WillCo Tech

WillCo Tech

WillCo Tech works to enhance national security and force readiness for military and commercial enterprises with a suite of software capabilities surrounding the human element of cybersecurity.