TeamViewer Remote Control App Gets A Security Upgrade

As many businesses and government agencies have settled in to a work-from-home reality, remote work has also made employees and companies alike more vulnerable to cyber-attacks.

There is an immediate need for mobile apps and other resources to support remote employees.

In particular, knowledge workers who are away from the office frequently use sensitive information and files outside of the corporate firewall.  They are also using many SaaS apps and cloud services and these developments demand a remote work platform that is secure by design. 

One of the tools enabling remote work is the possibility to gain remote access to computers and other devices for administration and technical support. TeamViewer Remote Control app is one of them, widely available and used for remotely controlling computers, tablets, smartphones, and other devices from a mobile device.  After a severe TeamViewer vulnerability allowed attackers to steal system credentials in what proved an unsuccessful attempt to contaminate a water supply station. Its not known how many other such exploits may have succeeded.

In response, the company has recently added another layer of security to its app, along with several new usability improvements. 

This new security feature leverages native biometrics face and fingerprint authentication on Apple and Android mobile devices.  The TeamViewer Remote Control app can now be locked behind biometric authentication, which prevents unauthorised access even if the mobile device is left unlocked. Unauthorised access can similarly be blocked on the account-level in TeamViewer with two-factor authentication (TFA) and incoming connections can also be verified via TFA push notificationsAdditional embedded security features include a ‘black screen’ for connections from mobile devices, keeping the information being accessed on the remotely located device private. 

After one or multiple mobile devices are registered, users will be asked to allow or deny each connection via the registered devices. 

A secure, agile, and effective digital workforce is a requirement for business success. Firms that can’t support work-from-anywhere needs while eliminating barriers to apps and data will find themselves at a competitive disadvantage. In addition, they’ll be hard-pressed to hire and retain top talent. Cyber security investments like this are paying off  for companies that modernise their infrastructures and train their people for remote work quickly, without compromising security.

Microsoft:       HelpNet Security:    Now Secure:   PWC:    Techtarget:     I-HLS

You Might Also Read: 

Industrial Control System Security Is Overlooked:

« Learn how to detect and respond to insider threats
CYRIN's New Cyber Security Training Partnership »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Aptible

Aptible

Security Management and Compliance for Developers. Aptible helps teams pass information security audits and deploy audit-ready apps and databases.

Workz Group

Workz Group

Workz connects and protects mobile subscribers of today and tomorrow by providing secure removable or embedded SIMs and remote provisioning solutions for consumer, M2M and IOT devices.

Wipe-Global

Wipe-Global

Wipe-Global is specialized in data erasure with an international established service partner network.

Com Laude

Com Laude

Com Laude is a domain name management company that provides strategic consulting to help companies strengthen digital brand, safeguard customers & protect brand IP.

NuID

NuID

NuID is a pioneer in trustless authentication and decentralized digital identity.

High Security Center (HSC)

High Security Center (HSC)

High Security Center provide real-time threat protection. We protect your company from targeted and persistent attacks using technologies such as Machine Learning and Behavioral Analysis.

Liquid Intelligent Technologies

Liquid Intelligent Technologies

Liquid Intelligent Technologies is a leading communications solutions provider across Africa, providing reliable connectivity, hosting, co-location, and digital services including cyber security.

Qascom

Qascom

Qascom is an engineering company offering security solutions in satellite navigation and space cybersecurity. We are one of the European key players in GNSS authentication and security.

Blumira

Blumira

Blumira provides comprehensive, hybrid cloud security monitoring and reporting for organizations of all sizes, enabling them to detect and respond to cloud security threats quickly and effectively.

Appsec Phoenix

Appsec Phoenix

Appsec Phoenix is an end to end vulnerability management platform that focuses on workflows, threat feed, and real time data.

Digital Silence

Digital Silence

Digital Silence is a world-class provider of information security research and consulting services.

MoogleLabs

MoogleLabs

MoogleLabs leverage AI/ML, Blockchain, DevOps, and Data Science to come up with the best solutions for diverse businesses.

Cloudsec Asia

Cloudsec Asia

Cloudsec Asia is Thailand's top-ranked cybersecurity consultant company. We offers security services to ensure that all your IT assets are reliable, accessible, and secure.

at-yet (@-yet)

at-yet (@-yet)

at-yet are an interdisciplinary team of experts. We are all about achieving results, whatever the situation – an acute incident, risk minimisation, safeguarding or data protection.

Anetac

Anetac

Developed by seasoned cybersecurity experts, the Anetac Identity and Security Platform protects threat surface exploited via service accounts.

ITButler e-Services

ITButler e-Services

At IT Butler, our mission is crystal clear: we are dedicated to providing top-tier cybersecurity solutions and best-practice methodologies to secure and enhance your digital infrastructure’s resilienc