TeamViewer is a popular brand of remote access software, boasting over 400,000 downloads a day and 2 billion installations to date. However, it has come in for some criticism over the years for the role it has unwittingly played in online scams, serving as a popular tool for fraudsters to use to access victims' computers.
So, is TeamViewer safe? Absolutely – like any tool, it can be dangerous in the wrong hands, but with a little awareness about best practice, it provides a fast and easy to use remote access solution.
R/teamviewer: Cross-platform remote desktop access for PC to PC, mobile to PC, and PC to mobile connections that support Windows, Mac OS, Linux Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcuts. Currently, the TeamViewer license price ranges from $749 to $2,839, depending on the plan you choose. Business Edition– $749; This plan comes with a single-user license, device management, customizable customer modules, meetings & presentations, PC to PC, and mobile to PC connections. TeamViewer: How does it work? TeamViewer is a comprehensive remote access application of easy deployment and simple operation. Once the file containing TeamViewer is downloaded to a device, the user will be able to navigate in an easy-to-use interface where he will have access to the various functions of the application. How much data do I need? With more and more apps requiring access to data services, it can be hard to work out what apps use how much data. You can check exact usage on your phone. Remote Desktop Data Usage; How Much Bandwidth Does Teamviewer Use Per Hour; Here are some numbers I possess gathered for you and their utilization so you can get a good idea1.It is dependent on the utilization.While you click on something to download new factors it might go to 30-50KB/sec(depends on your upload and download velocity at both ends) various other times it stays at 1-3KB/sec.
On this page:
What is TeamViewer?
TeamViewer is remote access software, and probably the most popular of its kind. It has a variety of uses, but its two main functions are usually within customer service roles, allowing companies to access customers' computers directly, or for staff working remotely to access their own data that is located on another computer. This use case has no doubt rocketed in 2020, with many of us now working from home.
Pros of TeamViewer
There are plenty of reasons to like TeamViewer – flexibility and a strong feature list make it compelling, as does an appealing cost. Throw in the strong security options, such as two-factor authentication and 256-bit AES encryption, and its clear why TeamViewer has a user base of 2.5 billion connected devices.
There are no issues with platform types – TeamViewer works cross-platform, across PC, Mac, Linux and mobile devices.
Cons of TeamViewer
The main potential issue to be aware of with TeamViewer is that, if used incorrectly, it could leave your devices open to abuse from third parties. While TeamViewer connections are encrypted, if anyone is able to log into your session, they would have unfettered access to your data. However, this opportunity can be practically eliminated when following best practice. We’ve highlighted some tips further down the page.
Core Features of TeamViewer
As well as connecting to the device of choice remotely, TeamViewer also allows for screen sharing, restarting and installing applications, file sharing, remote printing, and administrating and reporting tools.
TeamViewer offers users remote access to devices, with extensive built-in features such as VPN, two-factor authentication and reporting tools. TeamViewer is competitively priced compared to its rivals.
How Safe is TeamViewer?
TeamViewer’s Security Settings
TeamViewer offers a wide selection of security settings, all designed to ensure that the person accessing the device is who they say they are, and not a hacker or scammer. It goes without saying that unfettered access to a company device could spell disaster for many organizations, with sensitive data either leaked, or used as blackmail. It could even open up company devices for malware scams, where data is threatened with deletion unless a fee is paid.
As such, TeamViewer offers two-factor authentication, block listing, a built-in VPN, and more. We’ll go into more detail on these below.
Problems with TeamViewer
TeamViewer has had its name slightly sullied in the past, through no fault of its own, thanks to scammers using it to access victims' computers. With a free version available and an easy to use system, it has in the past been an easy way for scammers to remotely control computers, usually alongside traditional fraud methods such as confidence tricking. For example, one popular scam is for the fraudster to contact the victim, claiming to be their bank, ISP, or technical help, and convince the person to let them access their computer.
However, it should be noted that here, TeamViewer is in no way complicit, and simply being used as a tool.
However, TeamViewer itself has been a victim of a hack. In 2019, it transpired that the company had been breached by Chinese hackers. In a statement, it claimed that the attack was quickly identified, and that no data was compromised.
How to Keep TeamViewer Safe
In order to ensure your device isn't compromised when using TeamViewer, follow our tips below:
Run Only When Needed
To avoid the chance of third parties accessing your device illicitly, only run TeamViewer when you need to use it, and terminate the connection once you have finished.
Create Strong Passwords
Any online system is only as strong as its password, which means that if yours is easily crackable, then you’re putting yourself in danger. Ditch the easy-to-guess passwords, and don’t reuse the same password across multiple sites. If you’ve got a password manager, then use the password generator to come up with a secure one. If not, read our advice on creating a robust password.
Read our guide to the best Password Managers of 2020
How Much Data Does A Teamviewer Session Use
Two-Factor Authentication
TeamViewer allows for two-factor authentication (2FA), a way of ensuring that the person trying to access the account is the person they claim to be. With this system, users need to download a compatible app to their mobile device, such as Google Authenticator. When enabled, TeamViewer will ask the user to verify their identity with the authentication app on a mobile device, before a connection can be made.
Update TeamViewer
As with all software, it’s essential to keep TeamViewer up to date. A product like TeamViewer is a goldmine for scammers, and they're likely to be constantly looking for holes in the software that they can exploit. Software updates from TeamViewer will include tighter security measures as and when they become aware of any potential vulnerabilities, which is why it’s essential to ensure that you are always running the latest version.
Advanced Security Options
There are a number of extra security measures that TeamViewer adopts to ensure that your data is secure – some of which we've expanded on below, such as trusted devices and block listing.
In addition, when TeamViewer is active, the icon is always displayed in the system tray, meaning that the user is always aware if another person is accessing their computer. This means that it is not a suitable solution for monitoring employee activity, as this is not its intention.
In addition, it’s possible for the TeamViewer administrator to control different tiers of access for individuals within a company, to ensure that only those who need access can have it.
Verify Trusted Devices
Trusted Devices is an extra layer of security you can add to your TeamViewer experience. When a device tries to access your computer for the first time, it must be authorized first – when this occurs, an email is sent to the account owner, who has to accept or reject the request. At this point, it’s possible to confirm that you are happy for this device to access the computer indefinitely, or as a one off.
It is also possible to accept any future connection requests from the IP address, even if they are using a different device.
Use a VPN
Many users and companies use a VPN as an extra layer of security. TeamViewer actually has a VPN built-in, but despite its name, it doesn’t function like a regular VPN. In the case of TeamViewer, the VPN mode effectively places all devices into a virtual private network.
A traditional VPN, such as NordVPN, actively routes your traffic through a different server to your ISP, making it much harder to trace your activity. It’s fine to use both your own VPN and the TeamViewer VPN in tandem, as they carry out different roles.
Privacy Screens / Turn Off Screen
When remotely accessing a device, it will act exactly as if you were sat in front of it, meaning that the screen will display the documents you are opening, files and so on. If anyone is in the vicinity, they would be able to see the potentially sensitive data in real time.
There are a couple of ways to mitigate this issue. Firstly, TeamViewer actually has an option built in which enables the screen to be turned off.
You may also wish to fit a privacy screen to your monitor. This is a physical screen that covers your display with plastic that becomes opaque when viewed side on, and is only viewable straight on.
Disable Easy Access
Easy Access is a TeamViewer feature which, as the name suggests, allows a simpler way to connect to certain devices. It does this through removing the need to enter a password, instead verifying access through the user’s ID. Stripping away a security measure like this isn’t recommended, and we’d suggest that this feature is disabled.
Enable Block Listing
Block listing is a manual measure that enables the user to curate a list of people that they don’t want to access their device. This could be via an email, or by company. This can be especially useful for company accounts where information may be sensitive to a particular department.
Similarly, TeamViewer also has an Allow list option. This does the opposite, allowing the creation of a list of users who you are happy to give access permission to.
Quit Session When Finished
When quitting your session using a connected device, it terminates the TeamViewer software and closes access until you are ready to connect again. It’s even possible to end your session, but allow other, verified users to continue with their access.
TeamViewer Alternatives
GoToMyPC
GoToMyPC, unlike TeamViewer, doesn’t offer a free tier for personal users. It does have a trial, though, meaning you can give it a shot before you commit.
In terms of features, its two business tiers – Pro and Corporate – offer a good range of tools, although not as comprehensive as TeamViewer. With Pro, which is $66 per month, businesses get administration rights, usage monitoring, and reporting.
At the Corporate tier (starting at $140 per month), users are also offered a dedicated account manager, and more than one administrator.
LogMeIn
LogMeIn is another popular remote access tool, and actually purchased rival GoToMyPC in 2017. As you might expect, there’s little to separate the two services feature-wise, although it should be noted that LogMeIn does include a subscription to password manager LastPass for its users.
LogMeIn Pro is the company’s nearest comparison to TeamViewer, and offers three tiers – Individuals ($30 per month), Power Users ($70), and Small Businesses ($129). The actual feature set for these tiers is more or less identical, but the number of users and LastPass accounts increases with the price.
As well as solutions for users to access computers remotely, LogMeIn also has a number of products for businesses focused on IT problem shooting, such as GoToAssist and Rescue Lens.
Verdict
In some ways, TeamViewer has been a victim of its own success, and the few high profile scams that include using TeamViewer as a tool should not put you off as a business. The software itself is extremely secure, especially when used correctly, and admin-level permissions mean that companies can ensure their employees are using best practice.
TeamViewer isn’t a new product, although it’s likely that the pandemic of 2020 has caused many companies to look into remote access solutions for the first time. There are other options out there, but TeamViewer’s combination of price and features make it one that's hard to pass over.
TeamViewer is a popular brand of remote access software, boasting over 400,000 downloads a day and 2 billion installations to date. However, it has come in for some criticism over the years for the role it has unwittingly played in online scams, serving as a popular tool for fraudsters to use to access victims' computers.
So, is TeamViewer safe? Absolutely – like any tool, it can be dangerous in the wrong hands, but with a little awareness about best practice, it provides a fast and easy to use remote access solution.
On this page:
What is TeamViewer?
TeamViewer is remote access software, and probably the most popular of its kind. It has a variety of uses, but its two main functions are usually within customer service roles, allowing companies to access customers' computers directly, or for staff working remotely to access their own data that is located on another computer. This use case has no doubt rocketed in 2020, with many of us now working from home.
Pros of TeamViewer
There are plenty of reasons to like TeamViewer – flexibility and a strong feature list make it compelling, as does an appealing cost. Throw in the strong security options, such as two-factor authentication and 256-bit AES encryption, and its clear why TeamViewer has a user base of 2.5 billion connected devices.
There are no issues with platform types – TeamViewer works cross-platform, across PC, Mac, Linux and mobile devices.
Cons of TeamViewer
The main potential issue to be aware of with TeamViewer is that, if used incorrectly, it could leave your devices open to abuse from third parties. While TeamViewer connections are encrypted, if anyone is able to log into your session, they would have unfettered access to your data. However, this opportunity can be practically eliminated when following best practice. We’ve highlighted some tips further down the page.
Core Features of TeamViewer
As well as connecting to the device of choice remotely, TeamViewer also allows for screen sharing, restarting and installing applications, file sharing, remote printing, and administrating and reporting tools.
TeamViewer offers users remote access to devices, with extensive built-in features such as VPN, two-factor authentication and reporting tools. TeamViewer is competitively priced compared to its rivals.
How Safe is TeamViewer?
TeamViewer’s Security Settings
TeamViewer offers a wide selection of security settings, all designed to ensure that the person accessing the device is who they say they are, and not a hacker or scammer. It goes without saying that unfettered access to a company device could spell disaster for many organizations, with sensitive data either leaked, or used as blackmail. It could even open up company devices for malware scams, where data is threatened with deletion unless a fee is paid.
As such, TeamViewer offers two-factor authentication, block listing, a built-in VPN, and more. We’ll go into more detail on these below.
Problems with TeamViewer
TeamViewer has had its name slightly sullied in the past, through no fault of its own, thanks to scammers using it to access victims' computers. With a free version available and an easy to use system, it has in the past been an easy way for scammers to remotely control computers, usually alongside traditional fraud methods such as confidence tricking. For example, one popular scam is for the fraudster to contact the victim, claiming to be their bank, ISP, or technical help, and convince the person to let them access their computer.
However, it should be noted that here, TeamViewer is in no way complicit, and simply being used as a tool.
However, TeamViewer itself has been a victim of a hack. In 2019, it transpired that the company had been breached by Chinese hackers. In a statement, it claimed that the attack was quickly identified, and that no data was compromised.
How to Keep TeamViewer Safe
In order to ensure your device isn't compromised when using TeamViewer, follow our tips below:
Run Only When Needed
To avoid the chance of third parties accessing your device illicitly, only run TeamViewer when you need to use it, and terminate the connection once you have finished.
Create Strong Passwords
Any online system is only as strong as its password, which means that if yours is easily crackable, then you’re putting yourself in danger. Ditch the easy-to-guess passwords, and don’t reuse the same password across multiple sites. If you’ve got a password manager, then use the password generator to come up with a secure one. If not, read our advice on creating a robust password.
Read our guide to the best Password Managers of 2020
Two-Factor Authentication
TeamViewer allows for two-factor authentication (2FA), a way of ensuring that the person trying to access the account is the person they claim to be. With this system, users need to download a compatible app to their mobile device, such as Google Authenticator. When enabled, TeamViewer will ask the user to verify their identity with the authentication app on a mobile device, before a connection can be made.
Update TeamViewer
As with all software, it’s essential to keep TeamViewer up to date. A product like TeamViewer is a goldmine for scammers, and they're likely to be constantly looking for holes in the software that they can exploit. Software updates from TeamViewer will include tighter security measures as and when they become aware of any potential vulnerabilities, which is why it’s essential to ensure that you are always running the latest version.
Advanced Security Options
There are a number of extra security measures that TeamViewer adopts to ensure that your data is secure – some of which we've expanded on below, such as trusted devices and block listing.
In addition, when TeamViewer is active, the icon is always displayed in the system tray, meaning that the user is always aware if another person is accessing their computer. This means that it is not a suitable solution for monitoring employee activity, as this is not its intention.
In addition, it’s possible for the TeamViewer administrator to control different tiers of access for individuals within a company, to ensure that only those who need access can have it.
How To Use Teamviewer Free
Verify Trusted Devices
Trusted Devices is an extra layer of security you can add to your TeamViewer experience. When a device tries to access your computer for the first time, it must be authorized first – when this occurs, an email is sent to the account owner, who has to accept or reject the request. At this point, it’s possible to confirm that you are happy for this device to access the computer indefinitely, or as a one off.
It is also possible to accept any future connection requests from the IP address, even if they are using a different device.
Use a VPN
Many users and companies use a VPN as an extra layer of security. TeamViewer actually has a VPN built-in, but despite its name, it doesn’t function like a regular VPN. In the case of TeamViewer, the VPN mode effectively places all devices into a virtual private network.
A traditional VPN, such as NordVPN, actively routes your traffic through a different server to your ISP, making it much harder to trace your activity. It’s fine to use both your own VPN and the TeamViewer VPN in tandem, as they carry out different roles.
Privacy Screens / Turn Off Screen
When remotely accessing a device, it will act exactly as if you were sat in front of it, meaning that the screen will display the documents you are opening, files and so on. If anyone is in the vicinity, they would be able to see the potentially sensitive data in real time.
There are a couple of ways to mitigate this issue. Firstly, TeamViewer actually has an option built in which enables the screen to be turned off.
You may also wish to fit a privacy screen to your monitor. This is a physical screen that covers your display with plastic that becomes opaque when viewed side on, and is only viewable straight on.
Disable Easy Access
Easy Access is a TeamViewer feature which, as the name suggests, allows a simpler way to connect to certain devices. It does this through removing the need to enter a password, instead verifying access through the user’s ID. Stripping away a security measure like this isn’t recommended, and we’d suggest that this feature is disabled.
Enable Block Listing
Block listing is a manual measure that enables the user to curate a list of people that they don’t want to access their device. This could be via an email, or by company. This can be especially useful for company accounts where information may be sensitive to a particular department.
Similarly, TeamViewer also has an Allow list option. This does the opposite, allowing the creation of a list of users who you are happy to give access permission to.
Quit Session When Finished
When quitting your session using a connected device, it terminates the TeamViewer software and closes access until you are ready to connect again. It’s even possible to end your session, but allow other, verified users to continue with their access.
TeamViewer Alternatives
GoToMyPC
GoToMyPC, unlike TeamViewer, doesn’t offer a free tier for personal users. It does have a trial, though, meaning you can give it a shot before you commit.
In terms of features, its two business tiers – Pro and Corporate – offer a good range of tools, although not as comprehensive as TeamViewer. With Pro, which is $66 per month, businesses get administration rights, usage monitoring, and reporting.
At the Corporate tier (starting at $140 per month), users are also offered a dedicated account manager, and more than one administrator.
LogMeIn
LogMeIn is another popular remote access tool, and actually purchased rival GoToMyPC in 2017. As you might expect, there’s little to separate the two services feature-wise, although it should be noted that LogMeIn does include a subscription to password manager LastPass for its users.
How To Use Teamviewer Youtube
LogMeIn Pro is the company’s nearest comparison to TeamViewer, and offers three tiers – Individuals ($30 per month), Power Users ($70), and Small Businesses ($129). The actual feature set for these tiers is more or less identical, but the number of users and LastPass accounts increases with the price.
How Do You Use Teamviewer
As well as solutions for users to access computers remotely, LogMeIn also has a number of products for businesses focused on IT problem shooting, such as GoToAssist and Rescue Lens.
Verdict
In some ways, TeamViewer has been a victim of its own success, and the few high profile scams that include using TeamViewer as a tool should not put you off as a business. The software itself is extremely secure, especially when used correctly, and admin-level permissions mean that companies can ensure their employees are using best practice.
How Much Data Does Teamviewer Username
TeamViewer isn’t a new product, although it’s likely that the pandemic of 2020 has caused many companies to look into remote access solutions for the first time. There are other options out there, but TeamViewer’s combination of price and features make it one that's hard to pass over.