HUB TechMinutes

Work smarter with the latest business technology news, tips and events.

HUB TechMinutes

Better business through better information.
2 minutes reading time (325 words)

Why Remote Users' Connection to Your Office May Be Bad, Really Bad

Why Remote Users' Connection to Your Office May Be Bad, Really Bad

Remote desktop access is a great way to enable workers to work remotely. No doubt about that. However, the technology they are using to connect into your office may be putting your entire organization at risk. The fact is, there are a lot of businesses that utilize direct Remote Desktop Protocol (RDP) as a simple and cheap means of giving users access to the corporate network with or without knowing how risky it is. Direct RDP utilizes an open port in your firewall, without the protection of data encryption or secure virtual private network (VPN).

Consequently, any attackers who scan firewalls for open ports can easily find the vulnerability. Once found, hackers can instantly launch a brute force attack against an organization's server(s) resulting in 1000s of authentication attempts with random usernames and dictionary passwords to see if any of them matches and passes the authentication. This attack can not only degrade your server's performance significantly, but if a match is found, the attacker is in. And everyone knows what that means (ransomware deployment).

The Best Solution
In environments where security is a primary concern, which nowadays ought to be every environment, there are best practices to follow for setting up network access for remote users. One practice is to set up a secure VPN connection which creates encrypted tunnels between the office network and remote users, thus eliminating the need for RDP ports be open on the firewall (this will also serve to prevent brute force and man-in-the-middle attacks).

A second option would be to set up an RDP proxy gateway to secure the connections with a secure sockets layer (SSL) certificate (this requires an SSL certificate to be purchased).

Bottom-line, always use best practices in your network environment as unsecure methods of direct RDP can be very costly. To determine if your business is vulnerable to attack via RDP or to learn more about properly securing your business against hacker attacks, contact us today!

Make Your Business Better with HUB's BeSure IT Ass...
Technology Basics: Blue Screen of Death

Related Posts

 

Comments

No comments made yet. Be the first to submit a comment
Guest
Thursday, May 23, 2019

Captcha Image

Happy Clients

Don't Miss Our Next Newsletter!

Subscribe to our free monthly newsletter! It's packed with valuable information, useful tips, and important security alerts.
* indicates required
Your email address is secure with us - we never share our subscriber information.

HUB Tech Minutes

29 May 2019
There are often cases where businesses will implement solutions based on what they believe will be a benefit to their operations without consulting those who actually use the solutions. When implementing a new IT solution, be sure to consider the fee...
14 May 2019
“Gartner defines unified communications (UC) products (equipment, software and services) as those that facilitate the interactive use of multiple enterprise communications methods. This can include control, management and integration of these methods...
13 May 2019
Thanks to file management systems that can be digitized and stored online, filing cabinets can be considered a thing of the past. Of course, you still have to keep digital filing systems organized, but this is easier to do and more efficient than pap...