What is an RDP attack? Seven tips for mitigating your exposure

Sorry, this post has not been published yet, check again later!

September 12, 2018
Published by:

CSO

"Know what systems have RDP enabled. Make sure there are no rogue or unsanctioned RDP servers on your network, especially anything directly connected to the internet. Enable logging and monitoring on RDP server logs so you know who accesses them," says Jacob Sendowski, senior product manager at Vectra.

Read publication

Most recent media coverage

The United States Sanction Russia in Response to Cyberattacks

April 16, 2021

Tech Nadu

Read more

President Biden Issues Sanctions Against Russia For Cyberattacks, Election Interference

April 16, 2021

Security Magazine

Read more

Russian Foreign Intelligence Service Exploiting Five Publicly Known Vulnerabilities to Compromise U.S. and Allied Networks

April 16, 2021

Security Magazine

Read more