TeamViewer Remote Control App Gets A Security Upgrade

As many businesses and government agencies have settled in to a work-from-home reality, remote work has also made employees and companies alike more vulnerable to cyber-attacks.

There is an immediate need for mobile apps and other resources to support remote employees.

In particular, knowledge workers who are away from the office frequently use sensitive information and files outside of the corporate firewall.  They are also using many SaaS apps and cloud services and these developments demand a remote work platform that is secure by design. 

One of the tools enabling remote work is the possibility to gain remote access to computers and other devices for administration and technical support. TeamViewer Remote Control app is one of them, widely available and used for remotely controlling computers, tablets, smartphones, and other devices from a mobile device.  After a severe TeamViewer vulnerability allowed attackers to steal system credentials in what proved an unsuccessful attempt to contaminate a water supply station. Its not known how many other such exploits may have succeeded.

In response, the company has recently added another layer of security to its app, along with several new usability improvements. 

This new security feature leverages native biometrics face and fingerprint authentication on Apple and Android mobile devices.  The TeamViewer Remote Control app can now be locked behind biometric authentication, which prevents unauthorised access even if the mobile device is left unlocked. Unauthorised access can similarly be blocked on the account-level in TeamViewer with two-factor authentication (TFA) and incoming connections can also be verified via TFA push notificationsAdditional embedded security features include a ‘black screen’ for connections from mobile devices, keeping the information being accessed on the remotely located device private. 

After one or multiple mobile devices are registered, users will be asked to allow or deny each connection via the registered devices. 

A secure, agile, and effective digital workforce is a requirement for business success. Firms that can’t support work-from-anywhere needs while eliminating barriers to apps and data will find themselves at a competitive disadvantage. In addition, they’ll be hard-pressed to hire and retain top talent. Cyber security investments like this are paying off  for companies that modernise their infrastructures and train their people for remote work quickly, without compromising security.

Microsoft:       HelpNet Security:    Now Secure:   PWC:    Techtarget:     I-HLS

You Might Also Read: 

Industrial Control System Security Is Overlooked:

« Learn how to detect and respond to insider threats
CYRIN's New Cyber Security Training Partnership »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Mielabelo

Mielabelo

Belgian consulting firm providing services in the security and compliance of information systems and IT service management.

ClearedJobs.Net

ClearedJobs.Net

ClearedJobs.Net is a career site and job fair company for professionals seeking careers in the defense, intelligence and cyber security communities.

Daon

Daon

Daon offers a universal biometric authentication platform for mobile devices.

Systancia

Systancia

Systancia offer solutions for the virtualization of applications and VDI, external access security, Privileged Access Management (PAM), Single Sign-On (SSO) and Identity and Access Management (IAM).

Giesecke+Devrient (G+D)

Giesecke+Devrient (G+D)

Giesecke+Devrient develop security technologies in four major areas: enabling secure payment, providing trusted connectivity, safeguarding identities and protecting digital infrastructures.

Kroll

Kroll

Kroll provides clients a way to build, protect and maximize value through our differentiated financial and risk advisory and intelligence.

First National Technology Solutions (FNTS)

First National Technology Solutions (FNTS)

First National Technology Solutions is a leading provider of flexible, customized hosted and remote managed services including IT security and compliance.

Sumo Logic

Sumo Logic

Sumo Logic simplifies how you collect and analyze machine data so that you can gain deep visibility across your full application and infrastructure stack.

The Cyber Security Expert

The Cyber Security Expert

The Cyber Security Expert delivers cyber security consultancy, website and cloud security monitoring services, and specialist training services.

Statice

Statice

Statice develops state-of-the-art data privacy technology that helps companies double-down on data-driven innovation while safeguarding the privacy of individuals.

MONITORAPP

MONITORAPP

MONITORAPP is responsible for complete web security. Protect your business environment with Application Security Solutions from MONTORAPP.

Foretrace

Foretrace

Foretrace aims to prevent, assess, and contain the exposure of customer accounts, domains, and systems to malicious actors.

Intrepid Solutions and Services

Intrepid Solutions and Services

Intrepid Solutions and Services provides technology solutions and professional services to key components of the intelligence and national security communities.

Cyber Insurance Academy

Cyber Insurance Academy

Cyber Insurance Academy was founded to provide insurance professionals with the knowledge needed to work in cyber-insurance and cyber-related insurance fields.

Flat6Labs

Flat6Labs

Flat6Labs is the MENA region’s leading seed and early stage venture capital firm, currently running the most renowned startup programs in the region.

Training.com.au

Training.com.au

Training.com.au is a comparison website through which those looking to learn about different aspects of cyber security can compare learning courses from training providers from across Australia.

Appknox

Appknox

Appknox is the world’s most powerful plug-and-play security platform that helps developers, security researchers, and enterprises to build a safe and secure mobile ecosystem.