Nick Cavalancia is a four-time Microsoft MVP, has over 28 years of enterprise IT experience, is an accomplished consultant, speaker, trainer, writer, and columnist, and has achieved industry certifications including MCSE, MCT, Master CNE, and Master CNI. He has authored, co-authored and contributed to dozens of books on various technologies. Nick regularly speaks, writes and blogs for some of the most recognized tech companies today on topics including cybersecurity, cloud adoption, business continuity, and compliance.
Cyber Insurers are scrutinizing exactly what the state of your organization’s security stance looks like in order to obtain a policy – something remote access has quite a bit to say about.
With more ransomware attack analysis including specific details, it becomes clearer how ransomware gangs are leveraging your organization’s remote access against you.
With third-party Remote Access solutions providing access to internal resources and elevated privileges, knowing the solution you employ is truly secure should be a critical part of your security strategy.
I’ve covered in previous articles how remote access can be used by threat actors as a means of gaining entrance, persistence, stealth, and more as part of a cyberattack. And this potential misusing of remote access brings with it some hefty repercussions.
Remote Access to internal endpoints continues to be leveraged by threat actors involved in data breaches. But exactly how much a problem is it, and how can you put a stop to it?