If you need to continue to use RDP, or are considering using it, here are eight key security steps you can take.
1 | Update software | Things to check:
|
---|---|---|
2 | Check password strength | Things to check:
|
3 | Use Network Level Authentication (NLA) | Things to check:
|
4 | Enable RDP on an ‘as-needed’ basis | Things to check:
|
5 | Set account lockout | Things to check:
|
6 | Implement multi factor authentication (MFA) | Things to check:
|
7 | Configure RDP to use TLS for authentication | Things to check:
|
8 | Implement a robust data backup plan | Things to check:
|
Your technical support team should be able to assist with these steps. If you’d like some more information or advice, visit our Security area.
Authentication | is a means of verifying that a person is who they claim to be. |
Authentication factor | is a category of authentication, where categories include ‘something you know’ (e.g. a password); ‘something you have’ (e.g. a smartcard); or ‘something you are’ (e.g. a fingerprint). |
Brute-force attack | involves an attacker attempting many passwords with the intention of eventually finding the correct one. |
Denial of service attack | or DoS attack is a type of attack in which the attacker overloads a system to disrupt normal operation. |
Exploit | occurs when a vulnerability is taken advantage of by an attacker. |
Group Policy | is a set of controls within Windows Server operating systems allowing administrators to define what users can and cannot do. |
Man-in-the-Middle attack | or MitM attack occurs when an attacker is positioned between one computer and another, secretly intercepting (and possibly altering) the communications between them whilst they believe they are communicating directly with each other. |
Ransomware | Ransomware is a form of malware that enables criminals to encrypt or lock data or devices remotely and demand payment (the “ransom”) for their release. More information can be found here. |
Security control | is a counter-measure (or safeguard) put in place to mitigate the likelihood that a threat agent will exploit a vulnerability. |
Strong encryption | is an encryption method using a very large cryptographic key. Larger keys take longer to break. 256 bit encryption is considered strong encryption. |
Threat agent | is a person (or a process) that exploits a vulnerability. Examples include employees not following procedure, or a hacker. |
TLS | or Transport Layer Security is a communication protocol allowing communication between a client (e.g. a web browser) and a server (e.g. a web server) to be secured. |
Vulnerability | is a weakness that allows a threat to compromise it. Examples include a wireless access point with no security, firewall ports open, or no door locks. |