What is an RDP attack? Seven tips for mitigating your exposure
"Know what systems have RDP enabled. Make sure there are no rogue or unsanctioned RDP servers on your network, especially anything directly connected to the internet. Enable logging and monitoring on RDP server logs so you know who accesses them," says Jacob Sendowski, senior product manager at Vectra.