Allowing access to an organization’s resources from outside the corporate network may be necessary for some businesses. However, when remote access is allowed, it should be handled securely:

  • Ensure the remote access is encrypted (SSL, IPSec, etc)
  • Ensure there is strong authentication for remote access (2FA)
  • Ensure that strong passwords are required for remote access

Examples of remote access:

  • Citrix
  • TeamViewer
  • Remote Desktop Protocol (Never expose directly to the Internet)
  • RDWeb (remote desktop over web)
  • SSL VPN
  • IPSec VPN

Limit and review authorization scope

  • Do not allow widely scoped authorization for remote access. Be sure to limit authorization/access to a business need.
  • Review authorizations for remote access regularly to assure that no unwanted personnel can access.

Remote access protocols (especially Remote Desktop Protocol or RDP) pose a great risk to organizations of all size. Do not leave these capabilities active unless required. As always, Coalition is here to help you on your way. Please reachout to us for additional information!

Did this answer your question?