this post was submitted on 30 Jan 2025
25 points (83.8% liked)

Cybersecurity

6096 readers
272 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[โ€“] ironhydroxide 1 points 11 hours ago (1 children)

And here my company ONLY allows RDP for Remote connections, claiming it's always safer.

[โ€“] [email protected] 3 points 11 hours ago* (last edited 11 hours ago)

are they behind firewalls or vpn?

If you are using regular Windows rdp, you might suggest your business follow the guidelines to minimize the attack vector. At my work we use RoyalTS and it is the bee's knees. Lots of extra security added in and lots of easy of use.

Disable Persistent Bitmap Caching: RDP clients (such as mstsc.exe) allow users to disable bitmap caching, minimizing the exposure of session data.

Strengthen Network Security: Employ Virtual Private Networks (VPNs) and robust firewalls to secure RDP connections from external threats.

Monitor RDP Sessions: Log and monitor RDP sessions for suspicious activity, including unexpected outgoing connections or file movements.

Restrict Privileges: Implement the principle of least privilege to limit unnecessary RDP usage.

Apply Updates: Regularly update Windows systems and security patches to prevent exploitation of known vulnerabilities.