Download and share the infographic for free with employees.
Cybercriminals exploit one vulnerable RDP server to gain an initial foothold into an organisation and spread laterally to build their botnet. Once a network of bots is created, cybercriminals can perform a range of actions, including:
Exfiltrating login credentials and other sensitive data
Uploading Trojan malware to the server, which opens a backdoor to the system while masquerading as legitimate software
Launching Distributed Denial of Service (DDoS) attacks
Deploying ransomware attacks
We recommend the following:
Encourage users to use strong passwords that are difficult to guess with brute force attacks.
Enable access to RDP through a corporate VPN.
Facilitate Network Level Authentication (NLA) for remote network connections.
Enable Multi-Factor Authentication across the network.
Ensure that every employee is using the latest versions of Operating Systems and software.