{"id":15382,"date":"2022-12-15T10:16:32","date_gmt":"2022-12-15T10:16:32","guid":{"rendered":"https:\/\/www.realvnc.com\/?post_type=blog&#038;p=15382"},"modified":"2026-04-13T10:44:18","modified_gmt":"2026-04-13T09:44:18","slug":"rdp-security","status":"publish","type":"blog","link":"https:\/\/www.realvnc.com\/en\/blog\/rdp-security\/","title":{"rendered":"RDP Security: Just How Secure Is RDP Over the Internet?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"15382\" class=\"elementor elementor-15382\" data-elementor-post-type=\"blog\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-497c8139 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"497c8139\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-341ecc5a\" data-id=\"341ecc5a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-68b77e6d elementor-widget elementor-widget-text-editor\" data-id=\"68b77e6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-pm-slice=\"1 1 []\"><span data-color=\"transparent\">What started out as Terminal Services, part of Windows NT 4.0 Server, back in 1998, has enabled users to remotely interact with a Windows desktop environment for more than two decades. <\/span><\/p><p><span data-color=\"transparent\">But back in 1998 none of us was even thinking about the possibility that someone would (GASP!) <\/span><a href=\"https:\/\/www.realvnc.com\/en\/blog\/rdp-is-compromised-a-practical-look-threat-actions\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-color=\"transparent\">misuse the functionality<\/span><\/a><span data-color=\"transparent\"> for their own malicious purposes; the idea of a hacker was someone targeting government networks, infrastructure, etc.<\/span>\u2014<span data-color=\"transparent\">nothing even remotely close to the average business.<\/span><\/p><p><span data-color=\"transparent\">Fast forward to 2022. Remote Desktop Protocol, in its current iteration, is still very much used by organizations today. That\u2019s because it still meets the simple need of remotely connecting to a Windows machine. <\/span><\/p><p><span data-color=\"transparent\">But also, fast forward to the current day, which includes the need to\u00a0<\/span><a href=\"https:\/\/www.realvnc.com\/en\/connect\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-color=\"transparent\">secure a network<\/span><\/a><span data-color=\"transparent\">\u00a0from any external cyber risk that may exist<\/span>\u2014<span data-color=\"transparent\">and the first thing that should come to mind is RDP.<\/span><\/p><h2 data-pm-slice=\"1 1 []\">What is Remote Desktop Protocol (RDP)?<\/h2><p data-pm-slice=\"1 1 []\"><span data-color=\"transparent\">Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft that enables users to access and control a remote computer over a network connection. <\/span><\/p><p><span data-color=\"transparent\">Essentially, RDP allows users to interact with a remote desktop, applications, and resources as if they were physically present at the remote computer. <\/span><\/p><p><span data-color=\"transparent\">This capability is widely utilized across various industries, including <\/span><a href=\"https:\/\/www.realvnc.com\/en\/industry\/healthcare\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-color=\"transparent\">healthcare<\/span><\/a><span data-color=\"transparent\">, finance, and <\/span><a href=\"https:\/\/www.realvnc.com\/en\/industry\/education\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-color=\"transparent\">education<\/span><\/a><span data-color=\"transparent\">, to facilitate remote access for employees, contractors, and partners. <\/span><\/p><p><span data-color=\"transparent\">By leveraging RDP, organizations can ensure that their workforce remains productive, regardless of their physical location.<\/span><\/p><h2 data-pm-slice=\"1 1 []\">How Does RDP Work?<\/h2><p data-pm-slice=\"1 1 []\"><span data-color=\"transparent\">RDP operates by establishing a secure connection between the client computer and the remote computer. The client computer sends keyboard and mouse inputs to the remote computer, which processes these inputs and sends back the display data to the client computer. <\/span><\/p><p><span data-color=\"transparent\">The TCP\/IP protocol facilitates this interaction and ensures a reliable network connection. To safeguard the data transmitted between the two computers, RDP employs various encryption algorithms, such as SSL\/TLS and RC4. <\/span><\/p><p><span data-color=\"transparent\">Additionally, RDP supports multiple authentication methods, including username\/password, smart cards, and biometric authentication, to verify the identity of users accessing the remote computer.<\/span><\/p><h2 data-pm-slice=\"1 1 []\">Securing RDP is a Security Risk<\/h2><p data-pm-slice=\"1 1 []\"><span data-color=\"transparent\">RDP is just minding its own business, helping users be productive. So, why is it being focused on so much? When considering the service from a cybersecurity perspective, we must use the\u00a0<\/span><em><span data-color=\"transparent\">risk<\/span><\/em><span data-color=\"transparent\">\u00a0lens to determine its fate.\u00a0<\/span><\/p><p><span data-color=\"transparent\">The reality is that using RDP (without proper compensating controls) creates <\/span><a href=\"https:\/\/www.realvnc.com\/en\/blog\/breaking-down-rdp-vs-secure-remote-access\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-color=\"transparent\">risk for an organization<\/span><\/a><span data-color=\"transparent\"> as cybercriminals can exploit vulnerabilities to gain access to systems. There are a few issues with Remote Desktop Protocol that create this risk:<\/span><\/p><h3 data-pm-slice=\"1 1 []\">Readily Available Platform<\/h3><p data-pm-slice=\"1 1 []\"><span data-color=\"transparent\">It\u2019s a built-in service on the \u201cserver\u201d side (whether that is a Windows desktop or server OS), with a built-in client on every Windows machine. I mean, c\u2019mon\u2014we\u2019re not even making this difficult for the threat actor!<\/span><\/p><h3 data-pm-slice=\"1 1 []\">Directly Accessible from the Internet<\/h3><p data-pm-slice=\"1 1 []\"><span data-color=\"transparent\">Unlike more advanced services like\u00a0<\/span><em><span data-color=\"transparent\">Zero Trust Network Access,<\/span><\/em><span data-color=\"transparent\">\u00a0which scrutinizes the connection request before connecting the requesting user to the <\/span><a href=\"https:\/\/realvnc.com\/en\/discover\/remote-desktop\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-color=\"transparent\"><u>remote desktop<\/u><\/span><\/a><span data-color=\"transparent\">, RDP connections are directly exposed to the Internet.<\/span><\/p><h3 data-pm-slice=\"1 1 []\">Used Port is Irrelevant<\/h3><p data-pm-slice=\"1 1 []\"><span data-color=\"transparent\">I can\u2019t tell you how many times I\u2019ve heard \u201cI changed the port.\u201d <\/span><em><span data-color=\"transparent\">It doesn\u2019t matter<\/span><\/em><span data-color=\"transparent\">. Threat actors use port scanners to look for active ports, testing them to determine what service is exposed based on the response. So, move the port from 3389 to whatever you want;\u00a0<\/span><em><span data-color=\"transparent\">the bad guys will find it anyway<\/span><\/em><span data-color=\"transparent\">.<\/span><\/p><h3 data-pm-slice=\"1 1 []\">Uses Single Authentication Factor<\/h3><p data-pm-slice=\"1 1 []\"><span data-color=\"transparent\">By default, RDP relies on AD\u2019s scrutiny of a username and password combination to provide access. This is the very same username and password that could be collected via a credential harvesting phishing scam that collects Microsoft 365 logons.<\/span><\/p><h3 data-pm-slice=\"1 1 []\">Enable a Brute Force Attack<\/h3><p data-pm-slice=\"1 1 []\"><span data-color=\"transparent\">If the system hosting the RDP session is Windows 10 or earlier, it may be using a specific default account lockout policy that will <\/span><a href=\"https:\/\/www.realvnc.com\/en\/blog\/brute-force-attacks-strengthen-remote-access-authentication\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-color=\"transparent\">not lock out the credential<\/span><\/a><span data-color=\"transparent\"> despite repeated unsuccessful attempts to log on using the same account.<\/span><\/p><h3 data-pm-slice=\"1 1 []\">Limited Visibility<\/h3><p data-pm-slice=\"1 1 []\"><span data-color=\"transparent\">Unless you implement Microsoft Remote Desktop Services (the current iteration of Terminal Services), organizations may not understand which systems may have RDP enabled, which are exposed externally (especially if the systems in question are sitting in, say, a DMZ outside the firewall), and\u2014most importantly\u2014<\/span><em><span data-color=\"transparent\">which ones are being used<\/span><\/em><span data-color=\"transparent\">.<\/span><\/p><h3 data-pm-slice=\"1 1 []\">Internal Access to a Compromised Remote Endpoint<\/h3><p data-pm-slice=\"1 1 []\"><span data-color=\"transparent\">When establishing the connection, the externally remote client wishing to access an internal Windows desktop is not considered secure. The assumption is that the\u00a0<\/span><em><span data-color=\"transparent\">user<\/span><\/em><span data-color=\"transparent\">\u00a0of a credential afforded remote desktop privileges is the\u00a0<\/span><em><span data-color=\"transparent\">owner<\/span><\/em><span data-color=\"transparent\">\u00a0of that credential.<\/span><\/p><h3 data-pm-slice=\"1 1 []\">(Simple) VPNs don\u2019t add any security to RDP<\/h3><p data-pm-slice=\"1 1 []\"><span data-color=\"transparent\">Many organizations believe \u201c<\/span><a href=\"https:\/\/realvnc.com\/en\/blog\/remote-access-software-or-vpn-whats-best-for-your-remote-workers\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-color=\"transparent\"><u>RDP + VPN<\/u><\/span><\/a><span data-color=\"transparent\">\u00a0= Security.<\/span>\u201d<span data-color=\"transparent\">\u00a0But that\u2019s not always\u2014if rarely\u2014true. Assuming the VPN used merely facilitates a secure channel between the externally remote endpoint and the internal system running RDP, while the connection\u2019s\u00a0<\/span><em><span data-color=\"transparent\">privacy<\/span><\/em><span data-color=\"transparent\">\u00a0is certainly maintained, there is no additional\u00a0<\/span><em><span data-color=\"transparent\">security<\/span><\/em><span data-color=\"transparent\">\u00a0in this scenario.\u00a0<\/span><\/p><p><span data-color=\"transparent\">Many modern\u00a0<\/span><a href=\"https:\/\/www.realvnc.com\/en\/blog\/remote-access-vpn\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-color=\"transparent\">VPN<\/span><\/a><span data-color=\"transparent\">\u00a0services augment the security of the connection using features like multi-factor authentication, certificates present on the remote endpoint, or IP restrictions (to name just a few)<\/span>. Thus<span data-color=\"transparent\">, the overall connection is more secure\u2014but not thanks to RDP itself.<\/span><\/p><p><span data-color=\"transparent\">The simple truth is that for an organization today that wants to stop the misuse of Internet-facing remote access by threat actors of any nature, <\/span><em><span data-color=\"transparent\">all of the risks above must be eliminated<\/span><\/em><span data-color=\"transparent\">. <\/span><\/p><p><span data-color=\"transparent\">The threat actor who wants to gain unauthorized access to the remote access that is in place in your organization should be met with some (if not an extremely high) degree of difficulty along the way:<\/span><\/p><ul><li><p><span data-color=\"transparent\">When they scan your ports, it\u2019s not super obvious, \u201cOh, that\u2019s RDP!\u201d<\/span><\/p><\/li><li><p><span data-color=\"transparent\">The remote client isn\u2019t a Run command away.<\/span><\/p><\/li><li><p><span data-color=\"transparent\">They can\u2019t log on as many times as they want without locking the account.<\/span><\/p><\/li><li><p><span data-color=\"transparent\">They need to provide additional authentication factors at logon.<\/span><\/p><\/li><li><p><span data-color=\"transparent\">And you know which systems are externally accessible <\/span><em><span data-color=\"transparent\">and<\/span><\/em><span data-color=\"transparent\"> when they are utilized.<\/span><\/p><\/li><\/ul><p><span data-color=\"transparent\">So, to answer the question posed in the title of this article, let\u2019s say that RDP is definitely not a secure way to connect remotely over the Internet.<\/span><\/p><p><span data-color=\"transparent\">Depending on your organization\u2019s remote access needs, there are plenty of other remote access solutions that exist (keeping in mind that you\u2019d need to wrap Remote Desktop Protocol in a number of third-party solutions anyway to eliminate the risk it natively creates anyway) to provide your remote users with secure access to internal systems that don\u2019t inherently bring with them the same risks as RDP.<\/span><\/p><h2 data-pm-slice=\"1 1 []\">Enhancing RDP Security with Virtual Private Network (VPN)<\/h2><p data-pm-slice=\"1 1 []\"><span data-color=\"transparent\">A Virtual Private Network (VPN) is a technology that creates a secure and encrypted tunnel between the client computer and the remote computer. <\/span><\/p><p><span data-color=\"transparent\">Organizations can significantly enhance RDP security by encrypting traffic and protecting it from interception and eavesdropping using a VPN. <\/span><\/p><p><span data-color=\"transparent\">VPNs also offer additional security features, such as authentication, authorization, and accounting (AAA), to ensure that only authorized users can access the remote computer. <\/span><\/p><p><span data-color=\"transparent\">To implement this enhanced security, organizations can deploy a VPN client on the client computer and a VPN server on the remote computer, creating a robust defense against potential threats.<\/span><\/p><p>Learn more about: <a href=\"https:\/\/www.realvnc.com\/en\/blog\/remote-access-vpn\/\" target=\"_blank\" rel=\"noopener noreferrer\"><u>VNC vs RDP: which remote desktop tool is the best?<\/u><\/a><\/p><h2 data-pm-slice=\"1 1 []\">Best Practices for Secure Remote Desktop<\/h2><p data-pm-slice=\"1 1 []\"><span data-color=\"transparent\">To ensure secure remote desktop access, organizations should adhere to the following best practices:<\/span><\/p><ol><li><p><strong><span data-color=\"transparent\">Use strong passwords and password policies<\/span><\/strong><span data-color=\"transparent\">: To enhance security, implement <\/span><a href=\"https:\/\/www.realvnc.com\/en\/blog\/five-great-ways-strengthen-password-security\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-color=\"transparent\">complex passwords<\/span><\/a><span data-color=\"transparent\"> and enforce policies such as password expiration and lockout.<\/span><\/p><\/li><li><p><strong><span data-color=\"transparent\">Enable Network Level Authentication (NLA)<\/span><\/strong><span data-color=\"transparent\">: NLA adds an extra layer of security by requiring users to authenticate before establishing a remote desktop connection.<\/span><\/p><\/li><li><p><strong><span data-color=\"transparent\">Use a Virtual Private Network (VPN)<\/span><\/strong><span data-color=\"transparent\">: VPNs encrypt RDP traffic, protecting it from interception and eavesdropping.<\/span><\/p><\/li><li><p><strong><span data-color=\"transparent\">Limit RDP access to specific IP addresses and ports<\/span><\/strong><span data-color=\"transparent\">: Restrict RDP access to specific IP addresses and ports to prevent unauthorized access.<\/span><\/p><\/li><li><p><strong><span data-color=\"transparent\">Monitor RDP activity<\/span><\/strong><span data-color=\"transparent\">: Regularly monitor RDP activity for suspicious behavior and take action to prevent unauthorized access.<\/span><\/p><\/li><li><p><strong><span data-color=\"transparent\">Regularly update and patch RDP software<\/span><\/strong><span data-color=\"transparent\">: Keep RDP software up-to-date with the latest patches to fix vulnerabilities and prevent exploitation.<\/span><\/p><\/li><li><p><strong><span data-color=\"transparent\">Use secure communication protocols<\/span><\/strong><span data-color=\"transparent\">: Encrypt RDP traffic using secure communication protocols, such as Transport Layer Security (TLS).<\/span><\/p><\/li><li><p><strong><span data-color=\"transparent\">Implement multi-factor authentication<\/span><\/strong><span data-color=\"transparent\">: Add an <\/span><a href=\"https:\/\/www.realvnc.com\/en\/blog\/4-ways-to-achieve-a-mulit-layered-approach-to-account-security\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-color=\"transparent\">additional layer of security<\/span><\/a><span data-color=\"transparent\"> by requiring multiple forms of authentication.<\/span><\/p><\/li><\/ol><p><span data-color=\"transparent\">By following these best practices, organizations can ensure secure remote desktop access and protect their remote computers and data from unauthorized access.<\/span><\/p><h2 data-pm-slice=\"1 1 []\">The Future of RDP Security<\/h2><p data-pm-slice=\"1 1 []\">Remote Desktop Protocol (RDP) has become an essential tool for businesses seeking efficient remote access solutions.<\/p><p>However, as technology continues to advance, the risks and challenges around RDP evolve in parallel.<\/p><p>Staying informed about emerging trends and adapting to future developments in RDP security will be crucial for organizations that rely on remote access to maintain productivity and protect valuable data.<\/p><h3 data-pm-slice=\"1 1 []\">Emerging Trends in Remote Access Security<\/h3><p data-pm-slice=\"1 1 []\"><strong>Cloud-Based RDP Solutions: <\/strong>A growing shift toward cloud-hosted remote desktop services is transforming how organizations manage and secure remote access. By centralizing control and monitoring in the cloud, these solutions often provide more robust authentication, better scalability, and automated updates to address new vulnerabilities.<\/p><p><strong>Zero Trust Architecture:\u00a0<\/strong>The <a href=\"https:\/\/www.realvnc.com\/en\/blog\/zero-trust-network-access-vs-remote-access\/\" target=\"_blank\" rel=\"noopener noreferrer\">zero-trust approach<\/a> assumes that no user or device is inherently trustworthy, even within the organization\u2019s network. Remote desktop connections operating under zero-trust principles require continuous authentication, role-based permissions, and strict resource segmentation, thereby reducing the risk of unauthorized access.<\/p><p><strong>Stronger Encryption Standards:\u00a0<\/strong>As cyberattacks become more sophisticated, end-to-end encryption and secure tunneling are becoming more important in preventing data interception. Advanced cryptographic methods safeguard user credentials and session data, ensuring that even if attackers can capture traffic, they cannot easily decipher its contents.<\/p><h3 data-pm-slice=\"1 1 []\">Predictions for RDP Security and Improvements<\/h3><h4 data-pm-slice=\"1 1 []\">Innovative Authentication Methods<\/h4><p data-pm-slice=\"1 1 []\">Future RDP implementations may include biometric verification (fingerprint, facial recognition) and advanced multi-factor authentication (MFA) using tokens or mobile devices. These measures provide an extra layer of defense beyond traditional username-password combinations, helping thwart brute-force attacks.<\/p><h4 data-pm-slice=\"1 1 []\">Integration of AI and Machine Learning<\/h4><p data-pm-slice=\"1 1 []\">Artificial intelligence (AI) and machine learning (ML) technologies are expected to enhance intrusion detection and threat prevention in real time. By analyzing user behaviors and network patterns, AI-driven solutions can flag anomalies\u2014such as abnormal login times or unusual geographic locations\u2014to catch potential intrusions before they cause harm.<\/p><h4 data-pm-slice=\"1 1 []\">Dynamic Policy Enforcement<\/h4><p data-pm-slice=\"1 1 []\">Future RDP security models may use context-aware policies that adapt based on user activity and risk level. For instance, if a user attempts to access sensitive files from an unknown device or at an odd hour, the system can automatically require additional authentication or temporarily block the session.<\/p><h4 data-pm-slice=\"1 1 []\">Proactive Threat Intelligence<\/h4><p data-pm-slice=\"1 1 []\">Organizations are likely to incorporate threat intelligence feeds and automated security orchestration into RDP sessions. This approach uses external databases of known attack patterns and malicious IP addresses, enabling the system to proactively block suspicious traffic or quarantine compromised endpoints.<\/p><h2 data-pm-slice=\"1 1 []\">Charting a Secure Path for RDP<\/h2><p data-pm-slice=\"1 1 []\">While RDP remains a reliable and convenient method for remote access, security cannot be an afterthought.<\/p><p>By tracking emerging trends\u2014from cloud-based services and zero trust frameworks to AI-powered intrusion detection\u2014and embracing future enhancements such as multi-factor authentication and next-generation encryption, organizations can stay one step ahead of cyber threats.<\/p><p>Implementing best practices and proactively updating RDP configurations not only mitigates potential risks but also creates a secure, scalable environment that promotes business continuity and user confidence. As remote access continues to evolve, anticipating and adapting to new security challenges will be essential for maintaining a robust defense against ever-changing threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>There isn\u2019t a soul within IT who will deny that Microsoft\u2019s Remote Desktop Protocol (RDP) client, built into Windows desktop and server operating systems, has helped organizations remain productive.<\/p>\n","protected":false},"author":31,"featured_media":15383,"template":"","blog_category":[369],"class_list":["post-15382","blog","type-blog","status-publish","has-post-thumbnail","hentry","blog_category-remote-desktop"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>RDP Security: Just How Secure Is RDP Over the Internet?<\/title>\n<meta name=\"description\" content=\"So many organizations enable a part of employees to work remotely using RDP over the internet, the question becomes: \u201cIs it actually secure?\u201d\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.realvnc.com\/en\/blog\/rdp-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RDP Security: Just How Secure Is RDP Over the Internet?\" \/>\n<meta property=\"og:description\" content=\"So many organizations enable a part of employees to work remotely using RDP over the internet, the question becomes: \u201cIs it actually secure?\u201d\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.realvnc.com\/en\/blog\/rdp-security\/\" \/>\n<meta property=\"og:site_name\" content=\"RealVNC\u00ae\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/realvnc\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-13T09:44:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/12\/Just-How-Secure-is-RDP-over-the-Internet-VNC-Connect.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"785\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@realvnc\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/rdp-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/rdp-security\\\/\"},\"author\":{\"name\":\"RealVNC\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/505d415578d7c153d5d004b19f33b53f\"},\"headline\":\"RDP Security: Just How Secure Is RDP Over the Internet?\",\"datePublished\":\"2022-12-15T10:16:32+00:00\",\"dateModified\":\"2026-04-13T09:44:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/rdp-security\\\/\"},\"wordCount\":1896,\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/rdp-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Just-How-Secure-is-RDP-over-the-Internet-VNC-Connect.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/rdp-security\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/rdp-security\\\/\",\"name\":\"RDP Security: Just How Secure Is RDP Over the Internet?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/rdp-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/rdp-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Just-How-Secure-is-RDP-over-the-Internet-VNC-Connect.jpg\",\"datePublished\":\"2022-12-15T10:16:32+00:00\",\"dateModified\":\"2026-04-13T09:44:18+00:00\",\"description\":\"So many organizations enable a part of employees to work remotely using RDP over the internet, the question becomes: \u201cIs it actually secure?\u201d\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/rdp-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/rdp-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/rdp-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Just-How-Secure-is-RDP-over-the-Internet-VNC-Connect.jpg\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Just-How-Secure-is-RDP-over-the-Internet-VNC-Connect.jpg\",\"width\":1600,\"height\":785,\"caption\":\"Just How Secure is RDP over the Internet VNC Connect\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/rdp-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"RDP Security: Just How Secure Is RDP Over the Internet?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"name\":\"RealVNC\u00ae\",\"description\":\"The world&#039;s safest remote access software\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\",\"name\":\"RealVNC\u00ae\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"width\":300,\"height\":41,\"caption\":\"RealVNC\u00ae\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/realvnc\",\"https:\\\/\\\/x.com\\\/realvnc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/realvnc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/RealVNCLtd\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/RealVNC\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/505d415578d7c153d5d004b19f33b53f\",\"name\":\"RealVNC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g\",\"caption\":\"RealVNC\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"RDP Security: Just How Secure Is RDP Over the Internet?","description":"So many organizations enable a part of employees to work remotely using RDP over the internet, the question becomes: \u201cIs it actually secure?\u201d","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.realvnc.com\/en\/blog\/rdp-security\/","og_locale":"en_US","og_type":"article","og_title":"RDP Security: Just How Secure Is RDP Over the Internet?","og_description":"So many organizations enable a part of employees to work remotely using RDP over the internet, the question becomes: \u201cIs it actually secure?\u201d","og_url":"https:\/\/www.realvnc.com\/en\/blog\/rdp-security\/","og_site_name":"RealVNC\u00ae","article_publisher":"https:\/\/www.facebook.com\/realvnc","article_modified_time":"2026-04-13T09:44:18+00:00","og_image":[{"width":1600,"height":785,"url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/12\/Just-How-Secure-is-RDP-over-the-Internet-VNC-Connect.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@realvnc","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.realvnc.com\/en\/blog\/rdp-security\/#article","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/rdp-security\/"},"author":{"name":"RealVNC","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/505d415578d7c153d5d004b19f33b53f"},"headline":"RDP Security: Just How Secure Is RDP Over the Internet?","datePublished":"2022-12-15T10:16:32+00:00","dateModified":"2026-04-13T09:44:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/rdp-security\/"},"wordCount":1896,"publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/rdp-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/12\/Just-How-Secure-is-RDP-over-the-Internet-VNC-Connect.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.realvnc.com\/en\/blog\/rdp-security\/","url":"https:\/\/www.realvnc.com\/en\/blog\/rdp-security\/","name":"RDP Security: Just How Secure Is RDP Over the Internet?","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/rdp-security\/#primaryimage"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/rdp-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/12\/Just-How-Secure-is-RDP-over-the-Internet-VNC-Connect.jpg","datePublished":"2022-12-15T10:16:32+00:00","dateModified":"2026-04-13T09:44:18+00:00","description":"So many organizations enable a part of employees to work remotely using RDP over the internet, the question becomes: \u201cIs it actually secure?\u201d","breadcrumb":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/rdp-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.realvnc.com\/en\/blog\/rdp-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/blog\/rdp-security\/#primaryimage","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/12\/Just-How-Secure-is-RDP-over-the-Internet-VNC-Connect.jpg","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/12\/Just-How-Secure-is-RDP-over-the-Internet-VNC-Connect.jpg","width":1600,"height":785,"caption":"Just How Secure is RDP over the Internet VNC Connect"},{"@type":"BreadcrumbList","@id":"https:\/\/www.realvnc.com\/en\/blog\/rdp-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.realvnc.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blogs","item":"https:\/\/www.realvnc.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"RDP Security: Just How Secure Is RDP Over the Internet?"}]},{"@type":"WebSite","@id":"https:\/\/www.realvnc.com\/en\/#website","url":"https:\/\/www.realvnc.com\/en\/","name":"RealVNC\u00ae","description":"The world&#039;s safest remote access software","publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.realvnc.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.realvnc.com\/en\/#organization","name":"RealVNC\u00ae","url":"https:\/\/www.realvnc.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","width":300,"height":41,"caption":"RealVNC\u00ae"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/realvnc","https:\/\/x.com\/realvnc","https:\/\/www.linkedin.com\/company\/realvnc\/","https:\/\/www.youtube.com\/RealVNCLtd","https:\/\/en.wikipedia.org\/wiki\/RealVNC"]},{"@type":"Person","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/505d415578d7c153d5d004b19f33b53f","name":"RealVNC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g","caption":"RealVNC"}}]}},"_links":{"self":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/15382","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/users\/31"}],"version-history":[{"count":1,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/15382\/revisions"}],"predecessor-version":[{"id":89910,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/15382\/revisions\/89910"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media\/15383"}],"wp:attachment":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media?parent=15382"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog_category?post=15382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}