-
Six Golden Security Rules
For getting started, we are proud to present you with the Six Golden Security Rules, we recommend to all our users. General After installing Teamviewer and setting up your TeamViewer Account, the first thing you want to set up is your individual security level based on your demand. 1. Set up Two-factor authentication a.)…
-
Set up unattended access
Even though we walked through the Six Golden Security Rules in the chapter before that already discussed secure unattended access, we´d like to focus on it once more to have a proper starting point for you: General If you plan to use unattended access for TeamViewer, you have to think about security, as your devices will…
-
Restrict access
In general, it is only possible to make a connection to a device if the TeamViewer ID and the associated password is known or if the access is confirmed via Easy Access or the connection partner confirmed the access manually. If non of the above points is given, it is not possible to access a device. Depending on where you…
-
Beware of Social Engineering
Unfortunately, there have been some instances of malicious use of our software, TeamViewer. Scammers attempt to sell their services via phone by claiming that your device is infected by malware. TeamViewer Germany GmbH is a legitimate software development company. We take the privacy and security of our customers’ and…
-
Five Rules to protect against Social Engineering
This article applies to everyone! General At TeamViewer, we want to help you to be prepared for any potential scam attacks. Therefore we released our Five Rules to protect against Social Engineering. The original source is the Blog post The danger of Social Engineering 1. Recognize it is real The first thing is to make…