Limiting Ransomware Exposures From Remote Desk Protocol

Remote desk protocol (RDP)—which is a network communications protocol developed by Microsoft—consists of a digital interface that allows users to connect remotely to other servers or devices.

Unfortunately, RDP ports are frequently being leveraged for launching ransomware attacks. In fact, a recent report from Kaspersky found that nearly 1.3 million RDP-based cyberattacks occur each day, with RDP reigning as the top attack vector for ransomware incidents.

Don’t let RDP cause a ransomware incident at your organization. Review these tips for minimizing the likelihood of such an incident:

  • Close your port. RDP-based ransomware attacks usually stem from organizations leaving their RDP ports exposed to the internet. As such, always keep your RDP port closed to the internet.
  • Establish a virtual private network (VPN). A VPN will allow employees to securely access your RDP port, while also making the port harder for cybercriminals to locate online.
  • Bolster your software. Ensure all workplace technology is equipped with top-rated security software to help deter attempted attacks.
  • Restrict access. Be sure to uphold the principle of least privilege by only providing employees with RDP port access if they absolutely need it to conduct their work tasks.
  • Have a plan. Lastly, make sure your organization has an effective cyber incident response plan in place that addresses RDP-based ransomware attack scenarios.

For more risk management tips, contact us today, schedule a complimentary Cyber Insurance consultation with JGS today!