-
Golden Security Rules
After installing Teamviewer and creating your TeamViewer account, you first want to set up your individual security level based on your demand. Set up two-factor authentication for your account Two-factor authentication helps to stop hackers from getting into your accounts, even if they have your password. Two-factor…
-
Set up unattended access
If you plan to use unattended access for TeamViewer, you have to think about security, as your devices will be accessible all the time. Please follow the instructions below to make sure your Host is protected from unauthorized access at any time. Manage your device and grant Easy Access To guarantee the most secure remote…
-
Restrict access
In general, it is only possible to make a connection to a device if the TeamViewer ID and the associated password are known or if the access is confirmed via Easy Access or the connection partner confirmed the access manually. If none of the above points is given, accessing a device is impossible. Depending on where you…
-
Beware of Social Engineering
Unfortunately, there have been some instances of malicious use of our software, TeamViewer. Scammers attempt to sell their services via phone by claiming that their device is infected by malware. TeamViewer Germany GmbH is a legitimate software development company. We take the privacy and security of our customers and…
-
Rules to protect against Social Engineering
At TeamViewer, we want to help you to be prepared for any potential scam attacks. Therefore, we released our Five Rules to protect against Social Engineering. The original source is the blog post: the danger of social engineering. This article applies to all TeamViewer users. 1. Recognize it is real First, make yourself…