{"id":57857,"date":"2022-09-07T09:01:27","date_gmt":"2022-09-07T01:01:27","guid":{"rendered":"https:\/\/version-2.com\/?p=57857"},"modified":"2022-09-29T17:41:08","modified_gmt":"2022-09-29T09:41:08","slug":"how-to-appropriately-protect-remote-access-from-cyberattacks","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2022\/09\/how-to-appropriately-protect-remote-access-from-cyberattacks\/","title":{"rendered":"How to Appropriately Protect Remote Access from Cyberattacks"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"57857\" class=\"elementor elementor-57857\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-980bf1e elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p align=\"center\"><img decoding=\"async\" class=\"head-img\" src=\"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-5e87fe1\/wp-content\/uploads\/2022\/08\/How-to-Appropriately-Protect-Remote-Access-from-Cyberattacks.png\" alt=\"\" ><\/p>\n\n<p>The Covid-19 pandemic has brought the need for many companies to join remote work with it. The mass adoption of this modality resulted in a significant increase in cyberattacks on IT business structures through breaches in the security of remote accesses.<\/p> <p>The malicious action of these attacks impacts businesses of all industries and sizes, whether interfering with the operation of companies, damaging their image, stealing or leaking sensitive data.<\/p> <p>With this in mind, we will show you 5 important security measures you can take to protect remote access:<\/p> <p>&nbsp;<\/p> <h2><b>Use VPNs<\/b><\/h2> <p>Using a Virtual Private Network (VPN) is a great way to increase security in remote access, especially if you are using public networks or unsecured connections.&nbsp;<\/p> <p>The VPN\u2019s role is to encrypt all your Internet traffic, creating a secure end-to-end tunnel between your device and the company\u2019s, preventing Internet providers, government agencies, or cyber criminals from tracking your activities.&nbsp;<\/p> <p>However, its use can significantly impact the speed of the Internet, mainly affecting tasks that consume greater bandwidth, such as video calls. Look for reliable VPN services that offer good speed and stability.<\/p><h2><b>Implement Multi-Factor Authentication (MFA)<\/b><\/h2> <p>Multi-Factor Authentication (MFA) is a feature that allows you to add a layer of security by combining different mechanisms for user authentication, ensuring data protection that could otherwise be accessed by malicious agents or inexperienced users, which avoids financial and image disruptions and losses for the company.<\/p><h2><b>Apply the Principle of Least Privilege<\/b><\/h2> <p>The Principle of Least Privilege is a way to keep a company\u2019s confidential data secure. The application of this principle grants the user access only to the environments necessary for the performance of their job, without unnecessary permissions, thus avoiding insider threats, data theft, and unauthorized access of malicious agents to the sensitive data of a company.&nbsp;<\/p><h2><b>Implement Zero Trust-based Policies<\/b><\/h2> <p>The Zero Trust model is a security framework that works, as its name implies, based on the idea of \u201cnever trust, always verify\u201d, removing implicit trust and continuously requiring authentication of the user and their device on the network.&nbsp;<\/p> <p>The continuous Zero Trust verification is an essential security factor to protect remote cloud-based access.&nbsp;<\/p>\n\n<h2><b>Install the Latest Updates on Devices and Network Assets&nbsp;<\/b><\/h2> <p>Thinking about the frequent and annoying notifications that come up requesting system updates seems silly, right? Wrong.<\/p> <p>Software and applications you use on your devices may be vulnerable right now. Messengers, browsers and the operating system itself may expose you to cyber risks. This is because regular updates work to fix possible security flaws and instabilities. And the best part is that now it is possible to schedule most updates to take place outside the time when the device is being used, or even in the background, automatically, causing little or no interruption in your tasks.<\/p> <p>&nbsp;<\/p> <p><b>Share our content!<\/b><\/p> <p>In this article, you found out what security measures to take to keep remote access secure from cyberattacks. If you liked our content, share it with someone who might be interested in the topic.&nbsp;<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7b53ad elementor-widget elementor-widget-shortcode\" data-id=\"a7b53ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18134\" class=\"elementor elementor-18134\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a909055 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"a909055\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e3c0d4\" data-id=\"4e3c0d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10af45e elementor-widget elementor-widget-text-editor\" data-id=\"10af45e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Segura\u00ae <\/strong><br \/>Segura\u00ae strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The Covid-19 pandemic has brought the need for many com [&hellip;]<\/p>\n","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[419,488,61],"tags":[420,489],"class_list":["post-57857","post","type-post","status-publish","format-standard","hentry","category-segura","category-488","category-press-release","tag-segura","tag-489"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Appropriately Protect Remote Access from Cyberattacks - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/senhasegura.com\/how-to-appropriately-protect-remote-access-from-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Appropriately Protect Remote Access from Cyberattacks - Version 2\" \/>\n<meta property=\"og:description\" content=\"The Covid-19 pandemic has brought the need for many com [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/senhasegura.com\/how-to-appropriately-protect-remote-access-from-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-07T01:01:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-29T09:41:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-5e87fe1\/wp-content\/uploads\/2022\/08\/How-to-Appropriately-Protect-Remote-Access-from-Cyberattacks.png\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/how-to-appropriately-protect-remote-access-from-cyberattacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/09\\\/how-to-appropriately-protect-remote-access-from-cyberattacks\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"How to Appropriately Protect Remote Access from Cyberattacks\",\"datePublished\":\"2022-09-07T01:01:27+00:00\",\"dateModified\":\"2022-09-29T09:41:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/09\\\/how-to-appropriately-protect-remote-access-from-cyberattacks\\\/\"},\"wordCount\":519,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/how-to-appropriately-protect-remote-access-from-cyberattacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn-anldd.nitrocdn.com\\\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\\\/assets\\\/static\\\/optimized\\\/rev-5e87fe1\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/How-to-Appropriately-Protect-Remote-Access-from-Cyberattacks.png\",\"keywords\":[\"Segura\",\"2022\"],\"articleSection\":[\"Segura\",\"2022\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/09\\\/how-to-appropriately-protect-remote-access-from-cyberattacks\\\/\",\"url\":\"https:\\\/\\\/senhasegura.com\\\/how-to-appropriately-protect-remote-access-from-cyberattacks\\\/\",\"name\":\"How to Appropriately Protect Remote Access from Cyberattacks - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/how-to-appropriately-protect-remote-access-from-cyberattacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/how-to-appropriately-protect-remote-access-from-cyberattacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn-anldd.nitrocdn.com\\\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\\\/assets\\\/static\\\/optimized\\\/rev-5e87fe1\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/How-to-Appropriately-Protect-Remote-Access-from-Cyberattacks.png\",\"datePublished\":\"2022-09-07T01:01:27+00:00\",\"dateModified\":\"2022-09-29T09:41:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/how-to-appropriately-protect-remote-access-from-cyberattacks\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/senhasegura.com\\\/how-to-appropriately-protect-remote-access-from-cyberattacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/how-to-appropriately-protect-remote-access-from-cyberattacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cdn-anldd.nitrocdn.com\\\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\\\/assets\\\/static\\\/optimized\\\/rev-5e87fe1\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/How-to-Appropriately-Protect-Remote-Access-from-Cyberattacks.png\",\"contentUrl\":\"https:\\\/\\\/cdn-anldd.nitrocdn.com\\\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\\\/assets\\\/static\\\/optimized\\\/rev-5e87fe1\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/How-to-Appropriately-Protect-Remote-Access-from-Cyberattacks.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/how-to-appropriately-protect-remote-access-from-cyberattacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Appropriately Protect Remote Access from Cyberattacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Appropriately Protect Remote Access from Cyberattacks - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/senhasegura.com\/how-to-appropriately-protect-remote-access-from-cyberattacks\/","og_locale":"zh_HK","og_type":"article","og_title":"How to Appropriately Protect Remote Access from Cyberattacks - Version 2","og_description":"The Covid-19 pandemic has brought the need for many com [&hellip;]","og_url":"https:\/\/senhasegura.com\/how-to-appropriately-protect-remote-access-from-cyberattacks\/","og_site_name":"Version 2","article_published_time":"2022-09-07T01:01:27+00:00","article_modified_time":"2022-09-29T09:41:08+00:00","og_image":[{"url":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-5e87fe1\/wp-content\/uploads\/2022\/08\/How-to-Appropriately-Protect-Remote-Access-from-Cyberattacks.png","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"version2hk","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"4 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/senhasegura.com\/how-to-appropriately-protect-remote-access-from-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/09\/how-to-appropriately-protect-remote-access-from-cyberattacks\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"How to Appropriately Protect Remote Access from Cyberattacks","datePublished":"2022-09-07T01:01:27+00:00","dateModified":"2022-09-29T09:41:08+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/09\/how-to-appropriately-protect-remote-access-from-cyberattacks\/"},"wordCount":519,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/senhasegura.com\/how-to-appropriately-protect-remote-access-from-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-5e87fe1\/wp-content\/uploads\/2022\/08\/How-to-Appropriately-Protect-Remote-Access-from-Cyberattacks.png","keywords":["Segura","2022"],"articleSection":["Segura","2022","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/09\/how-to-appropriately-protect-remote-access-from-cyberattacks\/","url":"https:\/\/senhasegura.com\/how-to-appropriately-protect-remote-access-from-cyberattacks\/","name":"How to Appropriately Protect Remote Access from Cyberattacks - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/senhasegura.com\/how-to-appropriately-protect-remote-access-from-cyberattacks\/#primaryimage"},"image":{"@id":"https:\/\/senhasegura.com\/how-to-appropriately-protect-remote-access-from-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-5e87fe1\/wp-content\/uploads\/2022\/08\/How-to-Appropriately-Protect-Remote-Access-from-Cyberattacks.png","datePublished":"2022-09-07T01:01:27+00:00","dateModified":"2022-09-29T09:41:08+00:00","breadcrumb":{"@id":"https:\/\/senhasegura.com\/how-to-appropriately-protect-remote-access-from-cyberattacks\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/senhasegura.com\/how-to-appropriately-protect-remote-access-from-cyberattacks\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/senhasegura.com\/how-to-appropriately-protect-remote-access-from-cyberattacks\/#primaryimage","url":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-5e87fe1\/wp-content\/uploads\/2022\/08\/How-to-Appropriately-Protect-Remote-Access-from-Cyberattacks.png","contentUrl":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-5e87fe1\/wp-content\/uploads\/2022\/08\/How-to-Appropriately-Protect-Remote-Access-from-Cyberattacks.png"},{"@type":"BreadcrumbList","@id":"https:\/\/senhasegura.com\/how-to-appropriately-protect-remote-access-from-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"How to Appropriately Protect Remote Access from Cyberattacks"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/zh\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-f3b","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/57857","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=57857"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/57857\/revisions"}],"predecessor-version":[{"id":57861,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/57857\/revisions\/57861"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=57857"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=57857"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=57857"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}