{"id":86669,"date":"2024-08-29T11:51:47","date_gmt":"2024-08-29T03:51:47","guid":{"rendered":"https:\/\/version-2.com\/?p=86669"},"modified":"2024-08-27T11:56:32","modified_gmt":"2024-08-27T03:56:32","slug":"remote-workers-security-enabling-device-access-with-smart-remote-access","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/08\/remote-workers-security-enabling-device-access-with-smart-remote-access\/","title":{"rendered":"Remote workers\u2019 security: Enabling device access with Smart Remote Access"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"86669\" class=\"elementor elementor-86669\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-medium\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5gpZc0CtRwBBIEbXhJx6Lc\/f300d44c9da34c8c30ac42ebe465c8bd\/Enabling_device_access_with_Smart_Remote_Access_blog_cover.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"617\" \/><\/p><article class=\"RichText_root__1_CNu BlogPostContent_richText__rG0U1\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">It is often tough for both IT admins and companies to enable remote access. IT admins struggle to establish secure connections and manage remote personal devices. Companies, on the other hand, worry about security risks, high costs, and keeping up with regulations.\u00a0<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">These challenges are even greater for <b>businesses with strict device security policies<\/b> that require devices to stay in the office while allowing remote working. Organizations that outsource their workforce also face increased security risks of data breaches and difficulty controlling devices.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">That&#8217;s why<b> remote work security<\/b> is key. In this article, we\u2019ll explain how NordLayer\u2019s <b>Smart Remote Access (SRA) <\/b>functionality secures authorized device access, protects data with encryption, and simplifies remote device management.<\/p><h2 id=\"what-is-remote-work-security\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">What is remote work security?<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Securing a remote workforce means putting strong security measures in place to protect company devices and company data from being accessed by the wrong users. This strategy helps protect your data and systems when employees, including outsourced or temporary ones, work from outside the office. That\u2019s why super strict device security is a must. This way, you can prevent unauthorized access and ensure that only approved devices can connect to the company network.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The challenge is <b>finding a balance between strict security and remote work<\/b>. Businesses can use security measures that fit remote setups. One practical approach is implementing solutions that control device access and ensure compliance with security policies. In other words, you need to cover all bases while securely enabling remote device access.<\/p><p><img decoding=\"async\" class=\"alignnone size-medium\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3ny0sepBcQ0bxFtmTC2XZr\/fadfd8f5c70936884b7fff016ad88d64\/Smart_Remote_Access_Tip_1.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"406\" \/><img decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3ny0sepBcQ0bxFtmTC2XZr\/fadfd8f5c70936884b7fff016ad88d64\/Smart_Remote_Access_Tip_1.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3ny0sepBcQ0bxFtmTC2XZr\/fadfd8f5c70936884b7fff016ad88d64\/Smart_Remote_Access_Tip_1.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/3ny0sepBcQ0bxFtmTC2XZr\/fadfd8f5c70936884b7fff016ad88d64\/Smart_Remote_Access_Tip_1.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/3ny0sepBcQ0bxFtmTC2XZr\/fadfd8f5c70936884b7fff016ad88d64\/Smart_Remote_Access_Tip_1.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/3ny0sepBcQ0bxFtmTC2XZr\/fadfd8f5c70936884b7fff016ad88d64\/Smart_Remote_Access_Tip_1.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/3ny0sepBcQ0bxFtmTC2XZr\/fadfd8f5c70936884b7fff016ad88d64\/Smart_Remote_Access_Tip_1.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/3ny0sepBcQ0bxFtmTC2XZr\/fadfd8f5c70936884b7fff016ad88d64\/Smart_Remote_Access_Tip_1.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/3ny0sepBcQ0bxFtmTC2XZr\/fadfd8f5c70936884b7fff016ad88d64\/Smart_Remote_Access_Tip_1.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Smart Remote Access Tip 1\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">3 pillars of remote work security<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">To keep <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/secure-remote-workers\/\">your employees<\/a>, data, and systems safe, focus on three main areas. These key elements will help you stay ahead of potential threats and ensure smooth remote operations:<\/p><h4 class=\"Heading_root__vbfeI Heading_heading10__WX42n Heading_primary__3VZgz Heading_normal__hJuNy RichText_h4__aEhVR\" data-testid=\"heading\">Pillar 1: Securing access to SaaS applications<\/h4><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Remote work security is all about protecting collaboration and productivity tools, along with any other tools that store sensitive business, employee, or customer data. Make sure that only authorized users can access them.<\/p><h4 class=\"Heading_root__vbfeI Heading_heading10__WX42n Heading_primary__3VZgz Heading_normal__hJuNy RichText_h4__aEhVR\" data-testid=\"heading\">Pillar 2: Defense against web threats<\/h4><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Safeguard against security risks from general web access, such as malware and phishing attacks, by implementing a Secure Web Gateway (SWG) framework.<\/p><h4 class=\"Heading_root__vbfeI Heading_heading10__WX42n Heading_primary__3VZgz Heading_normal__hJuNy RichText_h4__aEhVR\" data-testid=\"heading\">Pillar 3: Managing applications via ZTNA<\/h4><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Manage company software, whether hosted on-premise or in the cloud, using solutions that contribute to Zero Trust Network Access (ZTNA) for secure and controlled access.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">By covering these bases, you&#8217;ll keep your remote work environment secure and running smoothly.<\/p><h2 id=\"most-common-remote-work-security-risks\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Most common remote work security risks<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">As remote device access becomes more common, businesses face several critical threats. From unauthorized access to <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/learn\/network-security\/threats\/\">phishing and malware infections<\/a>, these risks can severely impact security. Weak password policies, regulatory non-compliance, unmanaged personal devices, and insecure cloud access contribute to the growing list of challenges.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">To put it plainly, it\u2019s like trying to fix a flat tire with a piece of string\u2014it&#8217;s not going to hold up without a proper solution. Let\u2019s have a closer look at these challenges:<\/p><h4 class=\"Heading_root__vbfeI Heading_heading10__WX42n Heading_primary__3VZgz Heading_normal__hJuNy RichText_h4__aEhVR\" data-testid=\"heading\">Unauthorized access<\/h4><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">One of the biggest risks businesses face with remote work is unauthorized access, which often results in data breaches.<\/p><h4 class=\"Heading_root__vbfeI Heading_heading10__WX42n Heading_primary__3VZgz Heading_normal__hJuNy RichText_h4__aEhVR\" data-testid=\"heading\">Phishing<\/h4><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Attackers send fake messages and emails to trick users into revealing confidential information using social engineering techniques.<\/p><h4 class=\"Heading_root__vbfeI Heading_heading10__WX42n Heading_primary__3VZgz Heading_normal__hJuNy RichText_h4__aEhVR\" data-testid=\"heading\">Malware infections<\/h4><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Remote personal devices are always at risk if not well-protected. If a remote device gets malware, it could infect the entire network and compromise far more sensitive data than expected.<\/p><h4 class=\"Heading_root__vbfeI Heading_heading10__WX42n Heading_primary__3VZgz Heading_normal__hJuNy RichText_h4__aEhVR\" data-testid=\"heading\">Weak password security<\/h4><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Poor password policies can lead to unauthorized access.<\/p><h4 class=\"Heading_root__vbfeI Heading_heading10__WX42n Heading_primary__3VZgz Heading_normal__hJuNy RichText_h4__aEhVR\" data-testid=\"heading\">Unsecured cloud and SaaS access<\/h4><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Using insecure alternatives to VPN endangers your data security and exposes it to cyber-attacks.<\/p><h2 id=\"best-practices-for-remote-work-security\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Best practices for remote work security<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Can employees (and their devices) be 100% secure while working remotely? Can they have secure access to company resources? It&#8217;s tough, but following these steps can help reduce security risks.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Choose Smart Remote Access (SRA) for remote device control<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">With <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/features\/smart-remote-access\/\">SRA<\/a>, IT admins create <b>a secure connection policy<\/b> that provides virtual access to a specific company device.<a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/features\/smart-remote-access\/\"> Smart Remote Access<\/a> makes managing diverse devices easier. For example, it helps troubleshoot devices, install or delete apps, or change a remote user\u2019s laptop settings. It also ensures compliance with company security policies and industry regulations.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/794d0Sc93YMV75eE5zR6yC\/f8b999dacafb75bd6d2171bc17dd7c0d\/Quote_2.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/794d0Sc93YMV75eE5zR6yC\/f8b999dacafb75bd6d2171bc17dd7c0d\/Quote_2.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/794d0Sc93YMV75eE5zR6yC\/f8b999dacafb75bd6d2171bc17dd7c0d\/Quote_2.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/794d0Sc93YMV75eE5zR6yC\/f8b999dacafb75bd6d2171bc17dd7c0d\/Quote_2.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/794d0Sc93YMV75eE5zR6yC\/f8b999dacafb75bd6d2171bc17dd7c0d\/Quote_2.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/794d0Sc93YMV75eE5zR6yC\/f8b999dacafb75bd6d2171bc17dd7c0d\/Quote_2.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/794d0Sc93YMV75eE5zR6yC\/f8b999dacafb75bd6d2171bc17dd7c0d\/Quote_2.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/794d0Sc93YMV75eE5zR6yC\/f8b999dacafb75bd6d2171bc17dd7c0d\/Quote_2.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Quote 2\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/794d0Sc93YMV75eE5zR6yC\/f8b999dacafb75bd6d2171bc17dd7c0d\/Quote_2.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"454\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">What\u2019s great about using SRA is that it is <b>intuitive and user-friendly<\/b>. To enable it, simply <b><i>add gateways<\/i><\/b><b> <\/b>in the Smart Remote Access settings in the Control Panel.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5vfoqHb22btfgpZpEV1Ist\/e48e7683b9f2f05567d91194b2a54c9f\/Screenshot_1.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5vfoqHb22btfgpZpEV1Ist\/e48e7683b9f2f05567d91194b2a54c9f\/Screenshot_1.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/5vfoqHb22btfgpZpEV1Ist\/e48e7683b9f2f05567d91194b2a54c9f\/Screenshot_1.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/5vfoqHb22btfgpZpEV1Ist\/e48e7683b9f2f05567d91194b2a54c9f\/Screenshot_1.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/5vfoqHb22btfgpZpEV1Ist\/e48e7683b9f2f05567d91194b2a54c9f\/Screenshot_1.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/5vfoqHb22btfgpZpEV1Ist\/e48e7683b9f2f05567d91194b2a54c9f\/Screenshot_1.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/5vfoqHb22btfgpZpEV1Ist\/e48e7683b9f2f05567d91194b2a54c9f\/Screenshot_1.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/5vfoqHb22btfgpZpEV1Ist\/e48e7683b9f2f05567d91194b2a54c9f\/Screenshot_1.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Screenshot 1\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5vfoqHb22btfgpZpEV1Ist\/e48e7683b9f2f05567d91194b2a54c9f\/Screenshot_1.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"505\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Next, to set up secure connections, just connect to the same gateway, name your devices, and make a few configuration changes. choose a Virtual Private Gateway and click <b>Enable<\/b>.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/2M1C0rRuLVMrWM6uw7yc6e\/87f272798303dc6ac9e3c17e7189dd28\/Screenshot_2.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/2M1C0rRuLVMrWM6uw7yc6e\/87f272798303dc6ac9e3c17e7189dd28\/Screenshot_2.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/2M1C0rRuLVMrWM6uw7yc6e\/87f272798303dc6ac9e3c17e7189dd28\/Screenshot_2.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/2M1C0rRuLVMrWM6uw7yc6e\/87f272798303dc6ac9e3c17e7189dd28\/Screenshot_2.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/2M1C0rRuLVMrWM6uw7yc6e\/87f272798303dc6ac9e3c17e7189dd28\/Screenshot_2.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/2M1C0rRuLVMrWM6uw7yc6e\/87f272798303dc6ac9e3c17e7189dd28\/Screenshot_2.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/2M1C0rRuLVMrWM6uw7yc6e\/87f272798303dc6ac9e3c17e7189dd28\/Screenshot_2.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/2M1C0rRuLVMrWM6uw7yc6e\/87f272798303dc6ac9e3c17e7189dd28\/Screenshot_2.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Screenshot 2\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/2M1C0rRuLVMrWM6uw7yc6e\/87f272798303dc6ac9e3c17e7189dd28\/Screenshot_2.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1280\" height=\"590\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Once you <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"https:\/\/www.youtube.com\/watch?v=eYGxVDwcd4Q\" target=\"_blank\" rel=\"noopener\">enable the feature<\/a> for your Virtual Private Gateway, a local network (LAN) will be set up between all devices connected to that private gateway. This makes it easy for team members to collaborate on projects or share files securely.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Boosting remote work security<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">SRA allows you to <b>create secure connection policies to access<\/b> company resources easily. What\u2019s the best way to create <b>an even more robust security framework<\/b> that protects remote work environments? Combine Smart Remote Access with<a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/blog\/multi-factor-authentication-best-practices\/\"> multi-factor authentication<\/a> (MFA). These two solutions contribute to the <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/learn\/zero-trust\/what-is-ztna\/\">Zero Trust Network Access<\/a> (ZTNA) framework and enhance overall security.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/BIde3wGJ00CQUQq3czTQY\/c635ff014c44474144c0b90ab7d39e07\/Smart_Remote_Access_Tip_2.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/BIde3wGJ00CQUQq3czTQY\/c635ff014c44474144c0b90ab7d39e07\/Smart_Remote_Access_Tip_2.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/BIde3wGJ00CQUQq3czTQY\/c635ff014c44474144c0b90ab7d39e07\/Smart_Remote_Access_Tip_2.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/BIde3wGJ00CQUQq3czTQY\/c635ff014c44474144c0b90ab7d39e07\/Smart_Remote_Access_Tip_2.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/BIde3wGJ00CQUQq3czTQY\/c635ff014c44474144c0b90ab7d39e07\/Smart_Remote_Access_Tip_2.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/BIde3wGJ00CQUQq3czTQY\/c635ff014c44474144c0b90ab7d39e07\/Smart_Remote_Access_Tip_2.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/BIde3wGJ00CQUQq3czTQY\/c635ff014c44474144c0b90ab7d39e07\/Smart_Remote_Access_Tip_2.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/BIde3wGJ00CQUQq3czTQY\/c635ff014c44474144c0b90ab7d39e07\/Smart_Remote_Access_Tip_2.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Smart Remote Access Tip 2\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/BIde3wGJ00CQUQq3czTQY\/c635ff014c44474144c0b90ab7d39e07\/Smart_Remote_Access_Tip_2.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1280\" height=\"524\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">MFA adds an extra security layer by requiring multiple verification factors for access. SRA ensures that only authenticated and authorized users can access specific applications and resources.<\/p><h2 id=\"smart-remote-access-and-rdpvnc-why-encryption-matters\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Smart Remote Access and RDP\/VNC: Why encryption matters<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Virtual Network Computing (VNC) allows users to remotely access and control another computer&#8217;s desktop interface over a network. RDP, or Remote Desktop Protocol, developed by Microsoft, lets users <b>connect to another computer over a network<\/b>. With RDP, you can see and interact with the remote computer\u2019s desktop as if you were sitting right in front of it.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/515yWQFWeEzIkFub81FhjX\/308562395d579406725c76c16a65e6cb\/Quote_1.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/515yWQFWeEzIkFub81FhjX\/308562395d579406725c76c16a65e6cb\/Quote_1.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/515yWQFWeEzIkFub81FhjX\/308562395d579406725c76c16a65e6cb\/Quote_1.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/515yWQFWeEzIkFub81FhjX\/308562395d579406725c76c16a65e6cb\/Quote_1.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/515yWQFWeEzIkFub81FhjX\/308562395d579406725c76c16a65e6cb\/Quote_1.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/515yWQFWeEzIkFub81FhjX\/308562395d579406725c76c16a65e6cb\/Quote_1.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/515yWQFWeEzIkFub81FhjX\/308562395d579406725c76c16a65e6cb\/Quote_1.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/515yWQFWeEzIkFub81FhjX\/308562395d579406725c76c16a65e6cb\/Quote_1.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Quote 1\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/515yWQFWeEzIkFub81FhjX\/308562395d579406725c76c16a65e6cb\/Quote_1.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1280\" height=\"538\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Now, what\u2019s the difference between SRA, RDP, and VNC? SRA uses <b>robust encryption protocols<\/b>, ensuring data integrity and confidentiality during remote access. It also integrates VPN technology, adding extra protection. This setup protects sensitive data and prevents unauthorized device access. That\u2019s why SRA is a better choice than basic RDP and VNC.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3GFBbyyRqkxEf9XoomRrUp\/49205aceffc6a1310b64c73371bb601d\/Smart_Remote_Access_Tip_3.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3GFBbyyRqkxEf9XoomRrUp\/49205aceffc6a1310b64c73371bb601d\/Smart_Remote_Access_Tip_3.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/3GFBbyyRqkxEf9XoomRrUp\/49205aceffc6a1310b64c73371bb601d\/Smart_Remote_Access_Tip_3.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/3GFBbyyRqkxEf9XoomRrUp\/49205aceffc6a1310b64c73371bb601d\/Smart_Remote_Access_Tip_3.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/3GFBbyyRqkxEf9XoomRrUp\/49205aceffc6a1310b64c73371bb601d\/Smart_Remote_Access_Tip_3.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/3GFBbyyRqkxEf9XoomRrUp\/49205aceffc6a1310b64c73371bb601d\/Smart_Remote_Access_Tip_3.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/3GFBbyyRqkxEf9XoomRrUp\/49205aceffc6a1310b64c73371bb601d\/Smart_Remote_Access_Tip_3.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/3GFBbyyRqkxEf9XoomRrUp\/49205aceffc6a1310b64c73371bb601d\/Smart_Remote_Access_Tip_3.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Smart Remote Access Tip 3\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3GFBbyyRqkxEf9XoomRrUp\/49205aceffc6a1310b64c73371bb601d\/Smart_Remote_Access_Tip_3.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1280\" height=\"476\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">It also helps you avoid \u201cnaked,\u201d unprotected connections and gives you peace of mind when it comes to secure remote device access.<\/p><h2 id=\"how-nordlayer-can-help\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">How NordLayer can help<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">NordLayer offers solutions to secure your remote workforce, integrating advanced security measures like encrypted connections, multi-factor authentication (MFA), Virtual Private Network (VPN) technology, and Identity and Access Management (IAM) to ensure robust protection against cyber threats and data breaches.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/features\/smart-remote-access\/\"><b>Smart Remote Access<\/b><\/a><b> is key to securing remote work environments<\/b>. By addressing common risks and following best practices, businesses can protect their sensitive data and keep operations running smoothly in an increasingly remote world.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Want to try out our adaptive and user-friendly solutions? <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/contact-sales\/\">Contact our team<\/a> to find out more.<\/p><\/article>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cf03edf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cf03edf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b576c6d\" data-id=\"b576c6d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bfd91ca elementor-widget elementor-widget-shortcode\" data-id=\"bfd91ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63561\" class=\"elementor elementor-63561\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9e34e91 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"9e34e91\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bb2c932\" data-id=\"bb2c932\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c6a493c elementor-widget elementor-widget-text-editor\" data-id=\"c6a493c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>It is often tough for both IT admins and companies to e [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1130,1273,973,61],"tags":[1132,1272,974],"class_list":["post-86669","post","type-post","status-publish","format-standard","hentry","category-nordlayer","category-1273","category-nord-security","category-press-release","tag-nordlayer","tag-1272","tag-nord-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Remote workers\u2019 security: Enabling device access with Smart Remote Access - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordlayer.com\/blog\/enabling-device-access-with-sra\/#most-common-remote-work-security-risks\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Remote workers\u2019 security: Enabling device access with Smart Remote Access - Version 2\" \/>\n<meta property=\"og:description\" content=\"It is often tough for both IT admins and companies to e [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordlayer.com\/blog\/enabling-device-access-with-sra\/#most-common-remote-work-security-risks\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-29T03:51:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5gpZc0CtRwBBIEbXhJx6Lc\/f300d44c9da34c8c30ac42ebe465c8bd\/Enabling_device_access_with_Smart_Remote_Access_blog_cover.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/enabling-device-access-with-sra\\\/#most-common-remote-work-security-risks#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/08\\\/remote-workers-security-enabling-device-access-with-smart-remote-access\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Remote workers\u2019 security: Enabling device access with Smart Remote Access\",\"datePublished\":\"2024-08-29T03:51:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/08\\\/remote-workers-security-enabling-device-access-with-smart-remote-access\\\/\"},\"wordCount\":1182,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/enabling-device-access-with-sra\\\/#most-common-remote-work-security-risks#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/5gpZc0CtRwBBIEbXhJx6Lc\\\/f300d44c9da34c8c30ac42ebe465c8bd\\\/Enabling_device_access_with_Smart_Remote_Access_blog_cover.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\",\"keywords\":[\"NordLayer\",\"2024\",\"Nord Security\"],\"articleSection\":[\"NordLayer\",\"2024\",\"Nord Security\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/08\\\/remote-workers-security-enabling-device-access-with-smart-remote-access\\\/\",\"url\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/enabling-device-access-with-sra\\\/#most-common-remote-work-security-risks\",\"name\":\"Remote workers\u2019 security: Enabling device access with Smart Remote Access - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/enabling-device-access-with-sra\\\/#most-common-remote-work-security-risks#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/enabling-device-access-with-sra\\\/#most-common-remote-work-security-risks#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/5gpZc0CtRwBBIEbXhJx6Lc\\\/f300d44c9da34c8c30ac42ebe465c8bd\\\/Enabling_device_access_with_Smart_Remote_Access_blog_cover.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\",\"datePublished\":\"2024-08-29T03:51:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/enabling-device-access-with-sra\\\/#most-common-remote-work-security-risks#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/enabling-device-access-with-sra\\\/#most-common-remote-work-security-risks\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/enabling-device-access-with-sra\\\/#most-common-remote-work-security-risks#primaryimage\",\"url\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/5gpZc0CtRwBBIEbXhJx6Lc\\\/f300d44c9da34c8c30ac42ebe465c8bd\\\/Enabling_device_access_with_Smart_Remote_Access_blog_cover.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\",\"contentUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/5gpZc0CtRwBBIEbXhJx6Lc\\\/f300d44c9da34c8c30ac42ebe465c8bd\\\/Enabling_device_access_with_Smart_Remote_Access_blog_cover.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/enabling-device-access-with-sra\\\/#most-common-remote-work-security-risks#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Remote workers\u2019 security: Enabling device access with Smart Remote Access\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Remote workers\u2019 security: Enabling device access with Smart Remote Access - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordlayer.com\/blog\/enabling-device-access-with-sra\/#most-common-remote-work-security-risks","og_locale":"zh_HK","og_type":"article","og_title":"Remote workers\u2019 security: Enabling device access with Smart Remote Access - Version 2","og_description":"It is often tough for both IT admins and companies to e [&hellip;]","og_url":"https:\/\/nordlayer.com\/blog\/enabling-device-access-with-sra\/#most-common-remote-work-security-risks","og_site_name":"Version 2","article_published_time":"2024-08-29T03:51:47+00:00","og_image":[{"url":"https:\/\/images.ctfassets.net\/5natoedl294r\/5gpZc0CtRwBBIEbXhJx6Lc\/f300d44c9da34c8c30ac42ebe465c8bd\/Enabling_device_access_with_Smart_Remote_Access_blog_cover.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"9 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordlayer.com\/blog\/enabling-device-access-with-sra\/#most-common-remote-work-security-risks#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/08\/remote-workers-security-enabling-device-access-with-smart-remote-access\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Remote workers\u2019 security: Enabling device access with Smart Remote Access","datePublished":"2024-08-29T03:51:47+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/08\/remote-workers-security-enabling-device-access-with-smart-remote-access\/"},"wordCount":1182,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/enabling-device-access-with-sra\/#most-common-remote-work-security-risks#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/5gpZc0CtRwBBIEbXhJx6Lc\/f300d44c9da34c8c30ac42ebe465c8bd\/Enabling_device_access_with_Smart_Remote_Access_blog_cover.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","keywords":["NordLayer","2024","Nord Security"],"articleSection":["NordLayer","2024","Nord Security","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/08\/remote-workers-security-enabling-device-access-with-smart-remote-access\/","url":"https:\/\/nordlayer.com\/blog\/enabling-device-access-with-sra\/#most-common-remote-work-security-risks","name":"Remote workers\u2019 security: Enabling device access with Smart Remote Access - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordlayer.com\/blog\/enabling-device-access-with-sra\/#most-common-remote-work-security-risks#primaryimage"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/enabling-device-access-with-sra\/#most-common-remote-work-security-risks#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/5gpZc0CtRwBBIEbXhJx6Lc\/f300d44c9da34c8c30ac42ebe465c8bd\/Enabling_device_access_with_Smart_Remote_Access_blog_cover.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","datePublished":"2024-08-29T03:51:47+00:00","breadcrumb":{"@id":"https:\/\/nordlayer.com\/blog\/enabling-device-access-with-sra\/#most-common-remote-work-security-risks#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordlayer.com\/blog\/enabling-device-access-with-sra\/#most-common-remote-work-security-risks"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/nordlayer.com\/blog\/enabling-device-access-with-sra\/#most-common-remote-work-security-risks#primaryimage","url":"https:\/\/images.ctfassets.net\/5natoedl294r\/5gpZc0CtRwBBIEbXhJx6Lc\/f300d44c9da34c8c30ac42ebe465c8bd\/Enabling_device_access_with_Smart_Remote_Access_blog_cover.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","contentUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/5gpZc0CtRwBBIEbXhJx6Lc\/f300d44c9da34c8c30ac42ebe465c8bd\/Enabling_device_access_with_Smart_Remote_Access_blog_cover.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/nordlayer.com\/blog\/enabling-device-access-with-sra\/#most-common-remote-work-security-risks#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Remote workers\u2019 security: Enabling device access with Smart Remote Access"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-mxT","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/86669","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=86669"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/86669\/revisions"}],"predecessor-version":[{"id":86674,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/86669\/revisions\/86674"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=86669"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=86669"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=86669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}