Know the security risks of desktop sharing solutions
Desktop sharing technologies have evolved to fix the many shortcomings of VPN solutions, which are complex to set up and lack detailed visibility into user activity on the network. But it’s important for organizations to understand the limitations of desktop sharing.
While desktop sharing can be great for training or support in smaller companies, these solutions don’t really scale to enterprise needs. Plus, desktop sharing can leave endpoints open to attack if a malicious user installs an exploit that can find its way into other systems on the network. What’s needed are more granular solutions that can provide a more detailed audit trail of who accessed which system, when, and other key data.