Audit your network for systems using RDP, close unused RDP ports, apply MFA wherever possible, and log RDP login attempts.Audit network configurations and isolate computer systems that cannot be updated.Ensure antivirus, spam filters and firewalls are up to date and properly configured.Use strong passwords to protect Remote Desktop Protocol (RDP) credentials.The FBI recommends the following steps to better protect remote access: In this era of remote working, remote access is mandatory, but so is monitoring for access and ensuring you are protecting remote access. The change was noticed and reversed quickly, but the incident underscored the potential to do harm remotely in other venues. The computers used to control the water system were reportedly unpatched Windows 7 machines and using the TeamViewer desktop sharing software. As a recent example, attackers took control of software at a US water treatment facility and changed the amount of chemicals entering the system. Attackers often gain entry to your systems via remote access.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |