Posts Tagged ‘remote access security’

Mitigate Data Breach Risks with Small Security Steps for Remote Servers

September 18th, 2014

With increasing stories about data breaches making the headlines on a near daily basis, the topic of security has become more important than ever. According to a report issued by the Ponemon Institute and IBM, the average cost of data breaches around the world increased by 15 percent during the last year. Each compromised record translated to a cost of $145, translating to a total cost of $3.5 million per company for each data related breach. The most common causes of many of these breaches involved malicious code and sustained probes.

Another element that many of these data breaches seem to have in common is that even a small, simple action, such as applying a security update or requiring two-factor authentication for remote access could have prevented the attacks.

Criminal attacks are now a growing concern among most organizations. In order to prevent such attacks, organizations that use remote-access tools must ensure those tools are secured through the two of two-factor authentication. Simply put, if you are not defending your front line with two-factor authentication, hackers will find it to be much easier to brute-force passwords. Among the most recent breaches was the Heartbleed attack. In those attacks, implementing a Heartbleed fix could potentially have thwarted a breach. Insider threats are also a serious issue today. While the most obvious protections could prevent the loss of data, those measures are often the ones that are overlooked the most.

The subject of security is one that we have been reviewing with customers for many years. Among the most common mistakes that many organizations make is providing unlimited and unmonitored access to system administrators. This, unfortunately, sets the stage for trouble later on. In many instances, admins use hosted remote access tools such as Gotomypc or LogMeIn. If these admins were required to use a centralized remote access tool such as RHUB remote support servers, an audit activity trail would be captured. In addition, the scope of access would also be limited, thus reducing possible threats. Additionally, by requiring two-factor authentication to remote access tools, you can ensure that your employees are not able to utilize another individual’s credentials in order to gain access to different systems.

It should be noted that this would not prevent an admin from utilizing a rogue remote access tool in order to gain access to your network or even from physically logging into a system. Nevertheless, by blocking unauthorized remote access tools from your network and implementing the right physical security practices, you can significantly reduce such risks.

In all instances, successful security should be multi-layered. Those layers must often be comprised of a series of small steps. While on the surface those steps may seem unimportant, the grand sum total can help to mitigate risks and protect your organization from data breaches and hackers.

Are you interested in obtaining improved remote security for your networks? If so, contact us at 866-758-0984 or email us at

  • Share/Save/Bookmark

Protecting Your System from Hacker Attacks with RHUB

July 22nd, 2014

It seems that everywhere we turn today there is a new kind of cyber attack on the news. Whether it’s an attack that steals your password or your financial data, it’s still a concern. Recently, there have been increasing reports regarding attacks that are launched against RDP servers. Known as Bruteforce attack attempts, to date, thousands of victims have been identified.

The news of hackers targeting RDP connections is certainly nothing new. This is a problem that has been going on for years. Developed by Microsoft, RDP is a proprietary protocol that offers users with a graphical interface the ability to connect with another computer using a network connection. Originally, RDP was designed to provide remote access on a LAN. As a result, security issues can occur when RDP is used by support teams over the Internet in order to establish a connection with off-network systems. This is because such a connection often requires the use of a VPN tunnel as well as firewall configurations that can ultimately result in compromised security, including the opening of default ports. Unfortunately, these ports are entirely too vulnerable and easy for hackers to locate by using a simple Internet scan. To make matters worse, the login credentials are frequently susceptible to Bruteforce attacks because they are often shared.

Why would a hacker want to hack a RDP connection? It’s actually quite lucrative. After a hacker has gained the login password for a RDP connection, he or she can take control of the system in which the RDP server is installed. Once that occurs, the hacker has free reign for planting malicious software into the system and can access all types of data.

Additionally, the hacker can also gain access to your organization’s internal network if the workstation that has been compromised is connected to the internal network. This means that the attacker can then gain access to all of the passwords that are installed on the affected system. Clearly, the consequences of such an attack can be significant and broad-ranging.

While it might seem prudent for IT departments to cease the use of RDP for remote access, given the dangers, it is still largely in use. The primary reason for this is that RDP does not require additional software and it is also quite easy to use, especially in terms of server administration.

There is an easier and more secure solution, however. By adding RHUB, RDP users can take advantage of a number of benefits, including the ability to connect securely to remote networks, collaborate with multiple users within a RDP session, and provide support from any type of desktop platform. Additionally, the RHUB remote support and Remote Access tools ensure that your network is protected while still giving you the same functionality as you enjoy with RDP.

If you are interested in learning more about how you can protect your system from hackers while still supporting remote access-enabled systems, contact us at 866-758-0984 or email us at

  • Share/Save/Bookmark