The risks of fixed passwords and alternatives for secure unattended access

Options
JeanK
JeanK Posts: 6,989 Community Manager 🌍
edited April 18 in Blog

Remote access solutions have become indispensable for businesses and individuals alike. Whether it's troubleshooting technical issues, accessing files, or collaborating with colleagues, the ability to remotely connect to devices is invaluable. However, as convenience increases, so do security concerns. One of the primary areas of vulnerability lies in the use of fixed passwords for unattended access. Let's dive into the risks associated with fixed passwords and explore more secure alternatives offered by TeamViewer. 


Risks of fixed passwords for unattended access 

Fixed passwords have long been used as a means of establishing unattended access to remote devices. This method involves setting a fixed password on the remote device, allowing authorized users to connect without requiring explicit permission from the device's owner. While seemingly convenient, relying solely on fixed passwords poses significant security risks: 

  1. Vulnerability to password guessing: Fixed passwords, especially if not sufficiently complex, are susceptible to password guessing. 
  2. Limited security measures: Fixed passwords lack the robust security features of modern authentication methods. They provide no inherent protection against unauthorized access attempts and offer minimal control over who can connect to the device. 
  3. Single point of failure: Since fixed passwords grant access to the device, compromising the password compromises the entire system. This creates a single point of failure, putting the device and its data at risk of exploitation or manipulation. 


Our best practices for unattended access 

TeamViewer recognizes the vulnerabilities associated with fixed passwords and offers secure alternatives to enhance the protection of remote devices and data.


Connect via Easy Access 

Instead of relying on fixed passwords, TeamViewer recommends assigning remote devices to user accounts or company profiles and using Easy Access for connections. Easy Access is a permission you assign to the manager of the device, allowing them to connect with a double-click without entering any TeamViewer ID or password. By associating devices with user accounts, the security extends beyond a simple password to the entire account, which can be fortified with additional layers of protection such as two-factor authentication

To learn the best practices on how to set up unattended access for your remote devices and how to enable two-factor authentication for your account, please read the following articles: 


Protect your remote devices with two-factor authentication for connections 

TeamViewer offers an additional layer of security through two-factor authentication for connections. This feature empowers users to bolster their authentication process beyond the classic TeamViewer ID and password connection method. With two-factor authentication for connections enabled, users can receive push notifications on their mobile devices, allowing them to promptly approve or deny connection attempts. By integrating this mobile-based verification, TeamViewer enhances security by requiring not only the fixed password but also real-time confirmation from the authorized user. Consequently, even if the fixed password is compromised, unauthorized access attempts can be thwarted through this secondary verification step. Learn how to set up two-factor authentication for connections now by reading this article

 

Elevate security with Conditional Access and Bring your own certificate 

For organizations looking to elevate their connection control to a higher level, TeamViewer offers Conditional Access. Conditional Access (available exclusively with TeamViewer Tensor) empowers organizations to control which devices, users, and user groups using TeamViewer Tensor have access to which data sources, services, and applications in your organization. With centralized oversight, administrators maintain control from a single location. Centralized rules management, accessible via the TeamViewer client interface or web app, offers flexibility in assigning permissions for remote sessions, file transfers, and meetings at the account, group, or device level. 

Moreover, to fortify the TeamViewer ecosystem, we provide the Bring your own certificate (BYOC) feature. All connections between TeamViewer clients utilize certificates to authenticate the identity of participants. BYOC enables users to utilize their own certificates for authentication, enhancing security independent of and complementary to TeamViewer certificates. Configurable for both incoming and outgoing connections, BYOC restricts connections to specific devices, bolstering security within the TeamViewer environment. 

Learn more about Conditional Access and Bring Your Own Certificate here.

Community Manager

Leave a Comment

Rich Text Editor. To edit a paragraph's style, hit tab to get to the paragraph menu. From there you will be able to pick one style. Nothing defaults to paragraph. An inline formatting menu will show up when you select text. Hit tab to get into that menu. Some elements, such as rich link embeds, images, loading indicators, and error messages may get inserted into the editor. You may navigate to these using the arrow keys inside of the editor and delete them with the delete or backspace key.