HUB TechMinutes

Work smarter with the latest business technology news, tips and events.

HUB TechMinutes

Better business through better information.
2 minutes reading time (325 words)

Why Remote Users' Connection to Your Office May Be Bad, Really Bad

Why Remote Users' Connection to Your Office May Be Bad, Really Bad

Remote desktop access is a great way to enable workers to work remotely. No doubt about that. However, the technology they are using to connect into your office may be putting your entire organization at risk. The fact is, there are a lot of businesses that utilize direct Remote Desktop Protocol (RDP) as a simple and cheap means of giving users access to the corporate network with or without knowing how risky it is. Direct RDP utilizes an open port in your firewall, without the protection of data encryption or secure virtual private network (VPN).

Consequently, any attackers who scan firewalls for open ports can easily find the vulnerability. Once found, hackers can instantly launch a brute force attack against an organization's server(s) resulting in 1000s of authentication attempts with random usernames and dictionary passwords to see if any of them matches and passes the authentication. This attack can not only degrade your server's performance significantly, but if a match is found, the attacker is in. And everyone knows what that means (ransomware deployment).

The Best Solution
In environments where security is a primary concern, which nowadays ought to be every environment, there are best practices to follow for setting up network access for remote users. One practice is to set up a secure VPN connection which creates encrypted tunnels between the office network and remote users, thus eliminating the need for RDP ports be open on the firewall (this will also serve to prevent brute force and man-in-the-middle attacks).

A second option would be to set up an RDP proxy gateway to secure the connections with a secure sockets layer (SSL) certificate (this requires an SSL certificate to be purchased).

Bottom-line, always use best practices in your network environment as unsecure methods of direct RDP can be very costly. To determine if your business is vulnerable to attack via RDP or to learn more about properly securing your business against hacker attacks, contact us today!

Make Your Business Better with HUB's BeSure IT Ass...
Technology Basics: Blue Screen of Death

Related Posts

 

Comments

No comments made yet. Be the first to submit a comment
Guest
Thursday, January 17, 2019

Captcha Image

Happy Clients

Don't Miss Our Next Newsletter!

Subscribe to our free monthly newsletter! It's packed with valuable information, useful tips, and important security alerts.
* indicates required
Your email address is secure with us - we never share our subscriber information.

HUB Tech Minutes

16 January 2019
We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who u...
14 January 2019
Let’s face it; the office isn’t the most engaging place at all times. Repetitive tasks can make attention to detail difficult to maintain. While this might throw a wrench into operational plans, it’s not the end of the world. A major threat like rans...
11 January 2019
Windows 10 received its second update in 2018. While some experts believe that this second update is too much, others look at it and are happy that more features and functionality is being added. Today, we’re going to dig into the details about this ...