TeamViewer Remote Control App Gets A Security Upgrade

As many businesses and government agencies have settled in to a work-from-home reality, remote work has also made employees and companies alike more vulnerable to cyber-attacks.

There is an immediate need for mobile apps and other resources to support remote employees.

In particular, knowledge workers who are away from the office frequently use sensitive information and files outside of the corporate firewall.  They are also using many SaaS apps and cloud services and these developments demand a remote work platform that is secure by design. 

One of the tools enabling remote work is the possibility to gain remote access to computers and other devices for administration and technical support. TeamViewer Remote Control app is one of them, widely available and used for remotely controlling computers, tablets, smartphones, and other devices from a mobile device.  After a severe TeamViewer vulnerability allowed attackers to steal system credentials in what proved an unsuccessful attempt to contaminate a water supply station. Its not known how many other such exploits may have succeeded.

In response, the company has recently added another layer of security to its app, along with several new usability improvements. 

This new security feature leverages native biometrics face and fingerprint authentication on Apple and Android mobile devices.  The TeamViewer Remote Control app can now be locked behind biometric authentication, which prevents unauthorised access even if the mobile device is left unlocked. Unauthorised access can similarly be blocked on the account-level in TeamViewer with two-factor authentication (TFA) and incoming connections can also be verified via TFA push notificationsAdditional embedded security features include a ‘black screen’ for connections from mobile devices, keeping the information being accessed on the remotely located device private. 

After one or multiple mobile devices are registered, users will be asked to allow or deny each connection via the registered devices. 

A secure, agile, and effective digital workforce is a requirement for business success. Firms that can’t support work-from-anywhere needs while eliminating barriers to apps and data will find themselves at a competitive disadvantage. In addition, they’ll be hard-pressed to hire and retain top talent. Cyber security investments like this are paying off  for companies that modernise their infrastructures and train their people for remote work quickly, without compromising security.

Microsoft:       HelpNet Security:    Now Secure:   PWC:    Techtarget:     I-HLS

You Might Also Read: 

Industrial Control System Security Is Overlooked:

« Learn how to detect and respond to insider threats
CYRIN's New Cyber Security Training Partnership »

Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Howden Broking Group

Howden Broking Group

Howden provides a range of specialist insurance solutions to clients around the world including Cyber Liability insurance.

CANVAS Consortium

CANVAS Consortium

The CANVAS Consortium aims to unify technology developers with legal and ethical scholar and social scientists to approach the challenges of cybersecurity.

Retail & Hospitality Information Sharing & Analysis Center (RH-ISAC)

Retail & Hospitality Information Sharing & Analysis Center (RH-ISAC)

Retail & Hospitality ISAC operates as a central hub for sharing sector-specific cyber security information and intelligence.

Tevora

Tevora

Tevora is a specialized management consultancy focused on cyber security, risk, and compliance services.

Wise-Mon

Wise-Mon

Wise-Mon is expert in its field of network monitoring and control. We give solutions to huge organizations with tens of thousands of ports, as well as small companies with one switch.

Charities Security Forum (CSF)

Charities Security Forum (CSF)

The Charities Security Forum is the premier membership group for information security people working for charities and not-for-profits in the UK.

FraudScope

FraudScope

FraudScope is an AI-assisted platform that accelerates the identification of fraud, waste, and abuse.

Point Predictive

Point Predictive

Point Predictive build Predictive Models using Artificial Intelligence and Machine Learning techniques that help our customers stop fraud and early payment default (EPD).