{"id":21422,"date":"2022-03-25T23:06:10","date_gmt":"2022-03-25T23:06:10","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=21422"},"modified":"2022-03-25T23:06:12","modified_gmt":"2022-03-25T23:06:12","slug":"rdp-attacks","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/","title":{"rendered":"Addressing Remote Desktop Attacks and Security"},"content":{"rendered":"\n<p>The Remote Desktop Protocol (RDP) has long been essential for IT service management and <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/secure-access-for-remote-workers-rdp-vpn-vdi\/\">remote access<\/a>. Still, in the wrong hands, RDP attacks and <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">vulnerabilities<\/a> related to remote desktop software are a severe threat.<\/p>\n\n\n\n<p>Recent years presented a torrent of research showing how vulnerable RDP systems are for organizations not taking additional <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-cybersecurity-companies\/\">cybersecurity<\/a> precautions. Because RDP server hosts can access and manage <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/\">remote<\/a> devices, including sensitive clients, the threat posed by RDP attacks can&#8217;t be overstated. As remote desktop solutions are prevalent among IT and <a href=\"https:\/\/www.esecurityplanet.com\/products\/mssp\/\">managed service providers<\/a> (MSP), downstream clients can be at risk, as <a href=\"https:\/\/www.esecurityplanet.com\/threats\/kaseya-breach-underscores-vulnerability-of-it-management-tools\/\">Kaseya<\/a> experienced in 2021.<\/p>\n\n\n\n<p>This article looks at the remote desktop protocol, how RDP attacks work, best practices for defense, the prevalence of RDP attacks today, and how remote desktop software vendors are securing their clients.<\/p>\n\n\n\n<p><strong>Table of Contents<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/#what\">What is the Remote Desktop Protocol (RDP)?<\/a><\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/#attacks\">What are RDP Attacks?<\/a><\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/#how\">How Do RDP Attacks Work?<\/a><\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/#defend\">Defending Against RDP Attacks<\/a><\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/#examples\">Examples of Notable RDP Attacks<\/a><\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/#rds\">Remote Desktop Software and Cybersecurity<\/a><\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/#solutions\">Secure Remote Desktop Solutions<\/a><\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/#rmm\">The Importance of Remote Monitoring and Management<\/a><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what\"><strong>What is the Remote Desktop Protocol (RDP)?<\/strong><\/h2>\n\n\n\n<p>Available on <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/windows-11-security\/\">Windows<\/a> servers since the turn of the century, the remote desktop protocol (RDP) is <a href=\"https:\/\/www.esecurityplanet.com\/products\/microsoft-azure-active-directory\/\">Microsoft<\/a>\u2019s proprietary protocol for allowing an administrator to access and manage remote devices. RDP is widely popular for IT technical support and MSPs as it provides a host to take over a customer&#8217;s machine running client software for issue resolution and troubleshooting.<\/p>\n\n\n\n<p>Though RDP is a Microsoft protocol, many commercial remote desktop software solutions offer added security capabilities for enterprise to SMB organizations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"attacks\"><strong>What are RDP Attacks?<\/strong><\/h2>\n\n\n\n<p>RDP attacks are attempts by <a href=\"https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/\">threat actors<\/a> to access a remote desktop host or client&#8217;s administrative privileges for reconnaissance, command and control, and lateral movement. With administrative control over a remote desktop system, perpetrators can do anything or access whatever <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/data-storage-security-best-practices-for-security-teams\/\">data<\/a> is available to the administrator or specific end-user. RDP attacks are often difficult to detect as no user input is necessary for the threat actor to get to work.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/03\/ESP.TrendMicroRDPAttack-1024x634.png\" alt=\"A graphic image from Trend Micro showing the flow of an RDP attack against a company.\" class=\"wp-image-21423\" width=\"648\" height=\"401\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.TrendMicroRDPAttack-1024x634.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.TrendMicroRDPAttack-300x186.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.TrendMicroRDPAttack-768x475.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.TrendMicroRDPAttack-1536x950.png 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.TrendMicroRDPAttack-150x93.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.TrendMicroRDPAttack-696x431.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.TrendMicroRDPAttack-1068x661.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.TrendMicroRDPAttack.png 1671w\" sizes=\"(max-width: 648px) 100vw, 648px\" \/><figcaption><em>A graphic from Trend Micro shows the infection flow of an RDP brute force attack.<\/em><\/figcaption><\/figure><\/div>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Read more<\/strong>: <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-network-monitoring-tools\/\">Best Network Monitoring Tools<\/a><\/h5>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how\"><strong>How Do RDP Attacks Work?<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Intrusion: Meddler-in-the-Middle and Brute Force Attacks<\/strong><\/h3>\n\n\n\n<p>RDP intrusions are typically the result of two attacker methods: brute force authentication attempts or a meddler-in-the-middle (MITM) attack. Remote desktop software&#8217;s sensitive influence over other devices means <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-iam-software\/\">identity and access management<\/a> (IAM), <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-password-managers\/\">password security<\/a>, and <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/multi-factor-authentication\/\">multi-factor authentication<\/a> are critical for <a href=\"https:\/\/www.esecurityplanet.com\/products\/risk-management-software\/\">risk management<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Reconnaissance<\/strong><\/h3>\n\n\n\n<p>After obtaining the proper <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/oauth\/\">authentication<\/a> credentials and gaining initial access to client devices, attackers have an incentive to navigate victim networks with caution. This reconnaissance period is a staple of the most sophisticated attacks as <a href=\"https:\/\/www.esecurityplanet.com\/threats\/advanced-persistent-threat\/\">advanced persistent threats<\/a> can evaluate their permissioned access, <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\">scan network activity<\/a>, and attempt to escalate access.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Extended Stays and Attack Execution<\/strong><\/h3>\n\n\n\n<p>Like in the case of <a href=\"https:\/\/www.esecurityplanet.com\/threats\/guarding-against-solorigate-ttps-solarwinds-hack\/\">SolarWinds<\/a> in 2020, masked threat actors aren&#8217;t afraid to linger for months during reconnaissance. These stays can mean extended exposure to sensitive client data or proprietary information or enough time to parse through a managed service provider&#8217;s client network.<\/p>\n\n\n\n<p>With lateral movement across a victim&#8217;s IT infrastructure, threat actors can escalate privileges, spread <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/data-deletion-methods-for-sensitive-data\/\">extract data<\/a>, and disrupt IT services as with <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">ransomware<\/a> attacks. As long as actors go undetected, the timing of attacks is on the perpetrator&#8217;s terms.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Also read<\/strong>: <a href=\"https:\/\/www.esecurityplanet.com\/products\/internet-security-software\/\">Best Internet Security Suites &amp; Software<\/a><\/h5>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"defend\"><strong>Defending Against RDP Attacks: Best Practices<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Multi-factor authentication and complex access credential requirements<\/li><li>Establish account lockout policies for brute-force attempts<\/li><li>Role-based access control (RBAC) for RDP consoles<\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/types-of-firewalls\/\">Firewall<\/a>-based restrictions of RDP access<\/li><li>Only allow connections with Network Level Authentication (NLA)<\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">Patch management<\/a> for removing known vulnerabilities<\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/products\/enterprise-vpn-solutions\/\">Virtual Private Network<\/a> (VPN) for shielding client device traffic<\/li><li>Close TCP Port 3389 for devices not using RDP<\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/\">Microsegmentation<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">zero trust<\/a> network access models<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"examples\"><strong>Examples of Notable RDP Attacks<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Calling into Robinhood<\/strong><\/h3>\n\n\n\n<p>In November 2021, an unauthorized third party called a <a href=\"https:\/\/blog.robinhood.com\/news\/2021\/11\/8\/data-security-incident\">Robinhood<\/a> customer support employee and, through <a href=\"https:\/\/www.esecurityplanet.com\/threats\/social-engineering-attacks\/\">social engineering<\/a>, gained access to the company&#8217;s customer support systems. The online financial brokerage contained the intrusion, at which point the threat actor demanded an extortion payment. While no user financial information <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-group-ragnar-threatens-data-leaks\/\">leaked<\/a>, upwards of 5 million users&#8217; email addresses and 2 million names were obtained.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>SamSam Ransomware: Malware Specializing in RDP<\/strong><\/h3>\n\n\n\n<p>Between 2016 and 2018, the malware strain SamSam made brute force RDP attacks an integral part of its attacks on several public organizations. By exploiting weak server vulnerabilities, the Iran-based hackers were able to gain access, move laterally, <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-encryption-software\/\">encrypt<\/a> IT systems, and <a href=\"https:\/\/www.esecurityplanet.com\/threats\/what-ransomware-attackers-look-for\/\">demand ransom<\/a> payment.<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td><strong>Attacks in 2018<\/strong><\/td><td><strong>Victim Organization<\/strong><\/td><\/tr><tr><td>January<\/td><td>City of Farmington, New Mexico<\/td><\/tr><tr><td>February<\/td><td>Colorado Department of Transportation (CDOT)<\/td><\/tr><tr><td>March<\/td><td>City of Atlanta, Georgia<\/td><\/tr><tr><td>July<\/td><td>LabCorp, U.S. clinical labs company<\/td><\/tr><tr><td>September<\/td><td>U.S. Port of San Diego<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Colorado Taken for a Ride<\/strong><\/h3>\n\n\n\n<p>Two years after the attack on the Colorado transportation agency, the <em>Colorado Sun<\/em> <a href=\"https:\/\/coloradosun.com\/2020\/02\/03\/how-samsam-ransomware-took-down-cdot-and-how-the-state-fought-back-twice\/\">revisited<\/a> how SamSam infiltrated CDOT, the immediate aftermath, and the steps taken since to harden security. On a Sunday in February 2018, the Colorado CISO&#8217;s office set up a temporary server to test a new <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/\">cloud-based<\/a> business process. A few days later, IT systems started malfunctioning with ransom messages following.<\/p>\n\n\n\n<p>The system administrator did not configure standard security controls when installing the server in question. Meanwhile, the suspect server was connected to the CDOT domain with an administrator account and the internet. As CISO Debbi Blyth put it, &#8220;The server was discovered almost immediately by the attackers.&#8221; After 40,000 attempts, SamSam had access to explore CDOT&#8217;s core network.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Read more<\/strong>: <a href=\"https:\/\/www.esecurityplanet.com\/products\/threat-intelligence-platforms\/\">Compare the Top Threat Intelligence Platforms<\/a><\/h5>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"rds\"><strong>Remote Desktop Software and Cybersecurity&nbsp;<\/strong><\/h2>\n\n\n\n<p>As remote desktop capabilities have grown beyond Microsoft&#8217;s protocol, a range of software vendors compete to meet the needs of the <a href=\"https:\/\/www.esecurityplanet.com\/products\/cybersecurity-training\/\">digital workplace generation<\/a>. Remote desktop software enables clients to scale remote IT operations, integrate essential <a href=\"https:\/\/www.esecurityplanet.com\/products\/application-security-vendors\/\">applications<\/a>, and secure communications for clients and personnel.<\/p>\n\n\n\n<p>Below are some of the foundational cybersecurity features and solutions offered by leading providers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Remote Desktop Software Features<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Encrypted communication using TLS, RSA public-private key exchange, and AES 256<\/li><li>Identity and access management and <a href=\"https:\/\/www.esecurityplanet.com\/products\/network-access-control-solutions\/\">network access control<\/a>, including <a href=\"https:\/\/www.esecurityplanet.com\/products\/single-sign-on-solutions\/\">SSO<\/a> and MFA<\/li><li>Session, video, and <a href=\"https:\/\/www.esecurityplanet.com\/products\/siem-tools\/\">log management<\/a> for routine and targeted <a href=\"https:\/\/www.esecurityplanet.com\/networks\/penetration-testing-vs-vulnerability-testing\/\">audits<\/a><\/li><li>Support for specific regulatory <a href=\"https:\/\/www.esecurityplanet.com\/networks\/security-compliance\/\">compliance<\/a> and reporting requirements<\/li><li>Reliable update cycle removing <a href=\"https:\/\/www.esecurityplanet.com\/threats\/zero-day-threat\/\">bugs<\/a> and known vulnerabilities<\/li><\/ul>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Also read<\/strong>: <a href=\"https:\/\/www.esecurityplanet.com\/products\/database-security-tools\/\">Top Database Security Solutions<\/a><\/h5>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"solutions\"><strong>Secure Remote Desktop Solutions<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>BeyondTrust<\/li><li>Check Point<\/li><li>ConnectWise<\/li><li>N-able<\/li><li>Splashtop<\/li><\/ul>\n\n\n\n<div class=\"wp-block-image is-style-rounded\"><figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/03\/ESP.BeyondTrust.jpeg\" alt=\"BeyondTrust logo.\" class=\"wp-image-21431\" width=\"150\" height=\"150\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.BeyondTrust.jpeg 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.BeyondTrust-150x150.jpeg 150w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>BeyondTrust<\/strong><\/h3>\n\n\n\n<p>Cybersecurity company BeyondTrust specializes in <a href=\"https:\/\/www.esecurityplanet.com\/products\/privileged-access-management-pam-software\/\">privileged access management<\/a> (PAM), cloud security, and secure remote access. For remote desktop software, BeyondTrust offers Remote Support for essential help desk capabilities and Privileged Remote Access to control, manage, and audit access to critical IT systems.&nbsp;<\/p>\n\n\n\n<p>In addition to granular role-based access control, BeyondTrust PRA creates audit trails and session <a href=\"https:\/\/www.esecurityplanet.com\/products\/digital-forensics-software\/\">forensics<\/a> for compliance reporting. Additional security features include privileged password vaulting, cloud, and virtual infrastructure security, and integrations with existing security information and event managers (SIEM).<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/03\/ESP.CheckPoint.jpeg\" alt=\"Check Point logo.\" class=\"wp-image-21430\" width=\"150\" height=\"150\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.CheckPoint.jpeg 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.CheckPoint-150x150.jpeg 150w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Check Point<\/strong><\/h3>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/\">Check Point<\/a> is a veteran enterprise security vendor that integrates remote access capabilities into every <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-ngfw\/\">next-generation firewall<\/a> (NGFW). For the generation of remote work and operations, Check Point Remote Access VPN offers central management and policy administration for controlling access to <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-network-security-tools\/\">corporate networks<\/a>.&nbsp;<\/p>\n\n\n\n<p>The Remote Access <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vpn-security\/\">VPN<\/a> enables more robust security with the encryption of transmitted data, system compliance scanning, and multi-factor authentication. The SSL VPN Portal for web-based access and the IPsec VPN for corporate network access support Windows, macOS, <a href=\"https:\/\/www.esecurityplanet.com\/threats\/apple-patches-ios-spyware-vulnerabilities\/\">iOS<\/a>, and Android devices to ensure access and security across diverse IT environments.<\/p>\n\n\n\n<p><strong>Read more<\/strong>: <a href=\"https:\/\/www.esecurityplanet.com\/products\/intrusion-detection-and-prevention-systems\/\">Best Intrusion Detection and Prevention Systems | Guide to IDPS<\/a><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/03\/ESP.ConnectWise.png\" alt=\"ConnectWise logo.\" class=\"wp-image-21429\" width=\"150\" height=\"150\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.ConnectWise.png 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.ConnectWise-150x150.png 150w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>ConnectWise<\/strong><\/h3>\n\n\n\n<p>ConnectWise offers a portfolio of MSP solutions for remote monitoring, business management, integrated services, cybersecurity, and more. Under the company&#8217;s unified monitoring and management stack, ConnectWise Control is a secure remote access solution for MSPs, help desks, remote workers, and IT teams.<\/p>\n\n\n\n<p>ConnectWise&#8217;s solution comes with a bundle of built-in security features and tools to give clients the necessary control over sensitive data. Internally, this means role-based access control, logging of videos and session activity, the option to self-host, server-level auditing, and AES-256 encryption for all transmitted data. Additional security features include IP login restrictions, session timeouts, 2FA, and account lockouts for brute force attacks.<\/p>\n\n\n\n<div class=\"wp-block-image is-style-rounded\"><figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/03\/ESP.Nable_.jpeg\" alt=\"N-able logo.\" class=\"wp-image-21428\" width=\"150\" height=\"150\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.Nable_.jpeg 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.Nable_-150x150.jpeg 150w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>N-able<\/strong><\/h3>\n\n\n\n<p>N-able \u2013 formerly SolarWinds MSP between 2013 and 2021 \u2013 has over two decades of experience in integrated monitoring and management tools for enterprise organizations. N-able&#8217;s remote monitoring and management (RMM), ticketing, and remote access tools are familiar solutions to industry veterans, but it also extended its security capabilities over the last few years.<\/p>\n\n\n\n<p>Partnering with <a href=\"https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/\">SentinelOne<\/a>, N-able launched its <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">endpoint detection and response<\/a> (EDR) and password management solutions in 2019. Other cybersecurity tools offered include <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-prevent-dns-attacks\/\">DNS<\/a> filtering, <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-full-disk-software-products\/\">disk encryption<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-backup-solutions-for-ransomware-protection\/\">backups<\/a>, and <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-secure-email-gateways\/\">email security<\/a> for Microsoft-oriented infrastructure. The N-central platform is the most comprehensive solution, bundling these capabilities in a single console managing hundreds of thousands of devices.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/03\/ESP.Splashtop.jpeg\" alt=\"Splashtop logo.\" class=\"wp-image-21427\" width=\"150\" height=\"150\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.Splashtop.jpeg 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.Splashtop-150x150.jpeg 150w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Splashtop<\/strong><\/h3>\n\n\n\n<p>Splashtop is a dedicated remote access and support software company with on-premises and cloud-based solutions for individuals, small businesses, and enterprise organizations.&nbsp;<\/p>\n\n\n\n<p>Serving 30 million end-users and 200,000 businesses, Splashtop offers a swath of security features to meet the motley needs of private and public organizations managing sensitive data. Fit for clients with rigid regulatory requirements, Splashtop is <a href=\"https:\/\/www.esecurityplanet.com\/networks\/soc-best-practices\/\">SOC<\/a> 2 and <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/compliance-gdpr-pipl-ccpa\/\">GDPR<\/a> compliant and supports compliance reporting frameworks for HIPAA, PCI, FERPA, and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/\">ISO 27001<\/a>.&nbsp;<\/p>\n\n\n\n<p>Essential security features include TLS 1.2 and AES 256-bit encryption, 2FA, session and activity logs, and authentication for devices and proxy servers. Enterprise Splashtop goes further for the most administrative control, offering SSO integration, scheduled remote access, group-based access control, and automatic user provisioning.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Also read<\/strong>: <a href=\"https:\/\/www.esecurityplanet.com\/products\/xdr-security-solutions\/\">Top XDR Security Solutions | Extended Detection and Response<\/a><\/h5>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"rmm\"><strong>The Importance of Remote Monitoring and Management<\/strong><\/h2>\n\n\n\n<p>While IT infrastructure continues to expand and remote operations for workers and critical systems become more acceptable, remote monitoring and management capabilities are essential to consider. Several top vendors of RMM solutions naturally include remote desktop software, integrations to leading <a href=\"https:\/\/www.esecurityplanet.com\/products\/third-party-risk-management\/\">third-party<\/a> security systems, and added features to safeguard enterprise data.<\/p>\n\n\n\n<p>RDP attacks remain a dangerous threat, so it&#8217;s paramount for organizations small and large using remote desktop systems to follow the above best practices and bolster security where necessary.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Read more<\/strong>: <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/secure-access-for-remote-workers-rdp-vpn-vdi\/\">Secure Access for Remote Workers: RDP, VPN, &amp; VDI<\/a><\/h5>\n\n\n<div id=\"ta-campaign-widget-66d6edf944b46-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6edf944b46\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6edf944b46\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6edf944b46\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6edf944b46\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6edf944b46\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6edf944b46\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Remote Desktop Protocol (RDP) has long been essential for IT service management and remote access. Still, in the wrong hands, RDP attacks and vulnerabilities related to remote desktop software are a severe threat. Recent years presented a torrent of research showing how vulnerable RDP systems are for organizations not taking additional cybersecurity precautions. Because [&hellip;]<\/p>\n","protected":false},"author":250,"featured_media":21424,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[22,19,14,15],"tags":[6455,2478,29194,586,2016],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[31794,378,308,377,384,31781,381,141,334,143,375,458,486,393],"class_list":["post-21422","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-applications","category-endpoint","category-networks","category-threats","tag-access-management","tag-ransomware","tag-rdp","tag-remote-access","tag-vpn","b2b_audience-awareness-and-consideration","b2b_product-cloud-access-security-broker","b2b_product-endpoint-security","b2b_product-enterprise-network-management","b2b_product-gateway-and-network-security","b2b_product-identity-management-privacy","b2b_product-multi-factor-access-management","b2b_product-network-access-control-nac","b2b_product-networking","b2b_product-remote-access","b2b_product-security","b2b_product-security-management","b2b_product-storage-management","b2b_product-storage-remote-management","b2b_product-virtual-private-network-vpn"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Addressing Remote Desktop Attacks and Security | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"RDP attacks using the remote desktop protocol are on the rise in the era of the digital workplace. Learn more about the threat now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Addressing Remote Desktop Attacks and Security | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"RDP attacks using the remote desktop protocol are on the rise in the era of the digital workplace. Learn more about the threat now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-25T23:06:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-25T23:06:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.RDPAttacks-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sam Ingalls\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/SamIngalls\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sam Ingalls\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/\"},\"author\":{\"name\":\"Sam Ingalls\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2\"},\"headline\":\"Addressing Remote Desktop Attacks and Security\",\"datePublished\":\"2022-03-25T23:06:10+00:00\",\"dateModified\":\"2022-03-25T23:06:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/\"},\"wordCount\":1691,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.RDPAttacks-scaled.jpg\",\"keywords\":[\"access management\",\"ransomware\",\"RDP\",\"remote access\",\"VPN\"],\"articleSection\":[\"Applications\",\"Endpoint\",\"Networks\",\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/\",\"name\":\"Addressing Remote Desktop Attacks and Security | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.RDPAttacks-scaled.jpg\",\"datePublished\":\"2022-03-25T23:06:10+00:00\",\"dateModified\":\"2022-03-25T23:06:12+00:00\",\"description\":\"RDP attacks using the remote desktop protocol are on the rise in the era of the digital workplace. Learn more about the threat now.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.RDPAttacks-scaled.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.RDPAttacks-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"A picture of a threat actor or hacker as they look on at their computer. This article is about the remote desktop protocol and the often mentioned RDP attacks exposing remote systems for individuals up to enterprise organizations. Learn about remote desktop attacks and security measures.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Addressing Remote Desktop Attacks and Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2\",\"name\":\"Sam Ingalls\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg\",\"caption\":\"Sam Ingalls\"},\"description\":\"Sam Ingalls is an award-winning writer and researcher covering enterprise technology, cybersecurity, data centers, and IT trends, for eSecurity Planet, Tech Republic, ServerWatch, Webopedia, and Channel Insider.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/singalls\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/SamIngalls\"],\"url\":\"https:\/\/www.esecurityplanet.com\/author\/singalls\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Addressing Remote Desktop Attacks and Security | eSecurity Planet","description":"RDP attacks using the remote desktop protocol are on the rise in the era of the digital workplace. Learn more about the threat now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Addressing Remote Desktop Attacks and Security | eSecurity Planet","og_description":"RDP attacks using the remote desktop protocol are on the rise in the era of the digital workplace. Learn more about the threat now.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/","og_site_name":"eSecurity Planet","article_published_time":"2022-03-25T23:06:10+00:00","article_modified_time":"2022-03-25T23:06:12+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.RDPAttacks-scaled.jpg","type":"image\/jpeg"}],"author":"Sam Ingalls","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/SamIngalls","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Sam Ingalls","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/"},"author":{"name":"Sam Ingalls","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2"},"headline":"Addressing Remote Desktop Attacks and Security","datePublished":"2022-03-25T23:06:10+00:00","dateModified":"2022-03-25T23:06:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/"},"wordCount":1691,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.RDPAttacks-scaled.jpg","keywords":["access management","ransomware","RDP","remote access","VPN"],"articleSection":["Applications","Endpoint","Networks","Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/","url":"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/","name":"Addressing Remote Desktop Attacks and Security | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.RDPAttacks-scaled.jpg","datePublished":"2022-03-25T23:06:10+00:00","dateModified":"2022-03-25T23:06:12+00:00","description":"RDP attacks using the remote desktop protocol are on the rise in the era of the digital workplace. Learn more about the threat now.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.RDPAttacks-scaled.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.RDPAttacks-scaled.jpg","width":2560,"height":1707,"caption":"A picture of a threat actor or hacker as they look on at their computer. This article is about the remote desktop protocol and the often mentioned RDP attacks exposing remote systems for individuals up to enterprise organizations. Learn about remote desktop attacks and security measures."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/rdp-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Addressing Remote Desktop Attacks and Security"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2","name":"Sam Ingalls","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg","caption":"Sam Ingalls"},"description":"Sam Ingalls is an award-winning writer and researcher covering enterprise technology, cybersecurity, data centers, and IT trends, for eSecurity Planet, Tech Republic, ServerWatch, Webopedia, and Channel Insider.","sameAs":["https:\/\/www.linkedin.com\/in\/singalls\/","https:\/\/x.com\/https:\/\/twitter.com\/SamIngalls"],"url":"https:\/\/www.esecurityplanet.com\/author\/singalls\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21422"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/250"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=21422"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21422\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/21424"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=21422"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=21422"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=21422"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=21422"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=21422"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=21422"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}