TeamViewer Remote Control App Gets A Security Upgrade

As many businesses and government agencies have settled in to a work-from-home reality, remote work has also made employees and companies alike more vulnerable to cyber-attacks.

There is an immediate need for mobile apps and other resources to support remote employees.

In particular, knowledge workers who are away from the office frequently use sensitive information and files outside of the corporate firewall.  They are also using many SaaS apps and cloud services and these developments demand a remote work platform that is secure by design. 

One of the tools enabling remote work is the possibility to gain remote access to computers and other devices for administration and technical support. TeamViewer Remote Control app is one of them, widely available and used for remotely controlling computers, tablets, smartphones, and other devices from a mobile device.  After a severe TeamViewer vulnerability allowed attackers to steal system credentials in what proved an unsuccessful attempt to contaminate a water supply station. Its not known how many other such exploits may have succeeded.

In response, the company has recently added another layer of security to its app, along with several new usability improvements. 

This new security feature leverages native biometrics face and fingerprint authentication on Apple and Android mobile devices.  The TeamViewer Remote Control app can now be locked behind biometric authentication, which prevents unauthorised access even if the mobile device is left unlocked. Unauthorised access can similarly be blocked on the account-level in TeamViewer with two-factor authentication (TFA) and incoming connections can also be verified via TFA push notificationsAdditional embedded security features include a ‘black screen’ for connections from mobile devices, keeping the information being accessed on the remotely located device private. 

After one or multiple mobile devices are registered, users will be asked to allow or deny each connection via the registered devices. 

A secure, agile, and effective digital workforce is a requirement for business success. Firms that can’t support work-from-anywhere needs while eliminating barriers to apps and data will find themselves at a competitive disadvantage. In addition, they’ll be hard-pressed to hire and retain top talent. Cyber security investments like this are paying off  for companies that modernise their infrastructures and train their people for remote work quickly, without compromising security.

Microsoft:       HelpNet Security:    Now Secure:   PWC:    Techtarget:     I-HLS

You Might Also Read: 

Industrial Control System Security Is Overlooked:

« Learn how to detect and respond to insider threats
CYRIN's New Cyber Security Training Partnership »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

International Security Management Association (ISMA)

International Security Management Association (ISMA)

ISMA is an international security association of senior security executives from major business organizations located worldwide.

Guy Carpenter

Guy Carpenter

Guy Carpenter delivers a powerful combination of broking expertise, strategic advisory services, and industry-leading analytics.

Crossmatch

Crossmatch

Crossmatch is a world leader in risk-based composite authentication and biometric identity management.

Lynx Technology Partners

Lynx Technology Partners

Lynx Technology Partners is a full service, full life-cycle risk-based security consulting firm.

Cellopoint

Cellopoint

Cellopoint is a leading manufacturer of information security and email lifecycle management (ELM) products.

Novastor

Novastor

NovaStor® is an award-winning, international data backup and recovery software company with solutions supporting physical, virtual and cloud environments.

XPO IT Services

XPO IT Services

XPO IT Services are dedicated to providing secure, high quality IT recycling and asset disposal services.

Enzoic

Enzoic

Enzoic is an enterprise-focused cybersecurity company committed to preventing account takeover and fraud through compromised credential detection.

AdaCore

AdaCore

AdaCore is focused on helping developers build safe, secure and reliable software.

Buzz Cybersecurity

Buzz Cybersecurity

Buzz Cybersecurity systems and services are designed to proactively guard against common and uncommon cyber threats.

InnovateHer

InnovateHer

At InnovateHer, our vision is to make the tech sector more equitable, by increasing diversity across the spectrum and creating more inclusive workplaces.

Code First Girls

Code First Girls

Code First Girls are on a mission to close the gender gap in the tech industry by providing employment through free education.

Toro Solutions

Toro Solutions

Toro provide managed security & consultancy to keep governments, businesses & society resilient in the space where cyber, physical & people security converge.

Sandfly Security

Sandfly Security

Sandfly focuses on Linux security that is high performance, high stability, high compatibility, and low risk.

Cyberscope

Cyberscope

Cyberscope is a Web3 security firm specializing in smart contract audits, crypto security audits, and blockchain vulnerability assessments.

Neural Defend

Neural Defend

Neural Defend is a deepfake detection technology with proprietary algorithms and an AI agentic multi-layered of solution.