Can you remote desktop to a laptop?

How To

  • Security Center
  • How To
  • Remote computer access: What is it and what are the risks?

Remote computer access: What is it and what are the risks?

  • facebookShareLinkText
  • twitterShareLinkText
  • linkedInShareLinkText
Written by Jennifer van der Kleut for NortonLifeLock

Remote computer access is the ability to access another computer or network that isnt in your physical presence. Remote computer access allows an employee to access a computer desktop and its files from a remote location. This helps enable an employee who is working from home, for instance, to work effectively.

With the 2020 outbreak of the novel coronavirus, remote computer access has taken on increased importance. Remote computer access can allow employees to continue doing their jobs away from their physical workplace, which can help keep businesses running.

Remote access to computers isnt new. It can have advantages for people at work and in their private lives. Here are two examples.

  • Remote access software is helpful when youre in a meeting at another office with your laptop or telecommuting and need an important file thats on your office computer.
  • Remote computer access can help you assist someone in your personal life who might be far away. You might want to help elderly parents finish their tax returns, for instance. Youll be able to access their computer and their financial documents if you have remote access set up on your respective computers.

It can be helpful to learn how remote computer access works, what are the possible security risks, and how you can access other computers and networks remotely and safely. Heres what you need to know.

  • What is remote computer access?
  • How does remote computer access work?
  • What are the security risks of remote access?
  • How can I protect my computer when using remote computer access?

What is remote computer access?

Many people take their laptops with them to do things like finish a business presentation while waiting for a flight at the airport. But a lot of those laptops may not have bigger, important files on them. You might leave those files at work or at home on your desktop computer.

What if you need access to those files? What if you need access to your network? If so, remote computer access can help.

Remote computer access software lets you access networks and computers remotely. It can enable file sharing. Its like having a remote control for a computer or system that isnt near you. Youll be able to remotely download files and applications from your desktop or another persons computer onto your laptop or your cell phone. Remote access also gives you control over that remote device

Remote access offers several benefits, including these.

  • The ability to troubleshoot quickly.
  • Easy monitoring and control of devices connected to the same network.
  • Efficient file-sharing.
  • The ability of your device to mirror the original device, including files and applications.

How does remote computer access work?

Remote computer access requires a reliable internet connection. Youll need to activate or install software on the device you want to access, as well as on the device or devices you want to use to get that access.

For instance, you could install the software on your home computer and another device youll use remotely. That allows you to create the remote connection that lets you to access your home desktop from anywhere

Remote access solutions fall under two categories: one, those provided by the same company as your operating system; and, two, third-party solutions.

There are a variety of third-party options on the market for remote access software. The program thats right for you may depend on your platform. For instance, there are Windows-only and Mac-only programs if your computers and devices all use the same operating system.

Remote access software options also range in price, and some are free. Here are a few options*.

TeamViewer. This is a cross-platform software solution thats free for personal use. Heres how it works. Youll need to create an account, and then download and install TeamViewer software onto both your home computer and your remote computer or device. TeamViewer can be installed on Windows, Mac OS, Linux, and Chrome OS. It also has apps for Windows Phone, Blackberry, iOS, and Android.

LogMeIn. This is another cross-platform option, available at a cost. You can only access it from a web browser, and it includes several file-sharing features.

Splashtop. This option has functionality comparable to TeamViewer, but its only free if you want local access between devices. If you arent only interested in local connections, this could be a more expensive choice. But the product features high-quality video and audio. If thats important to you, the cost could be worth it.

UltraVNC or TightVNC [available on Linux]. These are screen-sharing clients that enable you to connect from a Windows computer to a Mac computer

Both Windows and Mac operating systems have built-in remote desktop solutions.

Windows Remote Desktop Protocol [RDP] This is a built-in, remote desktop connection thats supported by Windows and third parties. If you have Windows Professional or higher, you wont need additional software. While this solution may be free, a possible downside is that set-up must be done on the home computer. If youre doing this for someone who isnt tech-savvy, the initial set-up could be challenging

Also, Windows RDP will only work on your local network. Youll need to either forward ports on your router to access it over the internet, or use a VPN. More on that, below.

Mac OS Screensharing. Mac OS X has built-in screen-sharing that enables you to share between Macs. It lets you connect in several different ways that include logging in, using your Apple ID, sending a connection request, or using a Virtual Networked Computer connection.

What are the security risks of remote access?

You might be concerned about the security of remote access. The big question? Does remote access also make it easier for cybercriminals to access your computer and personal data?

It could. Remote access solutions could leave you vulnerable. If you dont have proper security solutions in place, remote connections could act as a gateway for cybercriminals to access your devices and data.

Hackers could use remote desktop protocol [RDP] to remotely access Windows computers in particular. Remote desktop servers connect directly to the Internet when you forward ports on your router. Hackers and malware may be able to attack a weakness in those routers.

How can I protect my computer when using remote access?

There are ways to help protect your computer, network, files, and data when using remote access. Many of these ways are similar to those you would follow with other types of web activity

Here are some steps you can take to help protect your computer and data while relying on remote access.

Maintain strong passwords. Set unique and complex passwords that are made up of at least 12 characters consisting of a random combination of uppercase and lowercase letters, numbers, and symbols. Proactive steps like always resetting default passwords, changing your passwords regularly, and never sharing or using the same password, will help prevent cybercriminals from figuring them out.

Use multi-factor or two-factor authentication [2FA]. Controlling access with 2FA adds another layer of protection. 2FA will involve setting a username and password, along with a unique code that might be sent to you via SMS text message. Multi-factor authentication takes this a step further by using biometrics like facial or fingerprint recognition.

Set up an account lockout policy. To help guard against hackers implementing brute-force attacks with automated password-guessing tools, its important to set your computer to lock your accounts when someone enters an incorrect password a set number of times.

Use a secure Virtual Private Network [VPN]. If you set up a VPN, your remote desktop server wont be connected directly to the internet. It will only be exposed on your local network, which could leave it less vulnerable to hackers.

Maintain firewalls. Firewalls can be your first line of defense in network security by limiting those who have remote access. You should set up firewalls to restrict access using software or hardware or both.

Update your software regularly. Make sure your software updates automatically so youre working with the latest security fixes. This will ensure the most current security patches are running. This can help protect you from new malware and other malicious viruses.

Limit the number of remote access users. Limiting the number of users who can log in can help maintain security. One way to do this is by enabling a restricted mode for administrators.

Remote computer access can help businesses, individuals, and families in a variety of ways. But its important to make remote access secure. That way, you can enjoy the benefits and minimize the risks.

Try Norton 360FREE 30-Day Trial*- Includes Norton Secure VPN

30 days of FREE* comprehensive antivirus, device security and online privacy with Norton Secure VPN.

Join today. Cancel anytime.

*Terms Apply

Start Free Trial
Start Free Trial
Start Free Trial
Start Free Trial

* The inclusion of websites, links, products, or service providers does not imply endorsement or support of any company, product or provider listed herein. The content herein is listed to assist consumers when considering product offerings and is not intended to be a comprehensive listing of features, services, or prices which may or may not apply to each vendor listed, and features, services and prices are subject to change.


Editorial note: Our articles provide educational information for you. NortonLifeLock offerings may not cover or protect against every type of crime, fraud, or threat we write about. Our goal is to increase awareness about cyber safety. Please review complete Terms during enrollment or setup. Remember that no one can prevent all identity theft or cybercrime, and that LifeLock does not monitor all transactions at all businesses.

Copyright © 2021 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.

  • 5 reasons why general software updates and patches are important
  • How to get rid of spam emails
  • What is a VPN?
  • What is two-factor authentication [2FA] and how does it work?

Video liên quan

Chủ Đề