The pandemic and the resulting shift to remote work greatly increased the usage of Remote Desktop Protocol (RDP).
While RDP has become more important to many organizations, expanding RDP usage also expands the attack surface for cybercriminals.
The Center for Internet Security (CIS) recently published a report on securing RDP, and it includes a powerful statement on where we are in cyber history:
"We are at a point in cybersecurity where offense must inform defense in order to help protect against the most prolific cyber threats to our environments. Telecommuting has always presented challenges, balancing security with usability. Open-source reports indicate that Remote Desktop Protocol (RDP) usage jumped an estimated 41% when COVID-19 struck."
Open-source reports also tell us that over 3.5 million devices have RDP open publicly. However, just because these are open publicly does not mean the devices are actively exploited. It just means that the surface area for attacks is very large for bad actors to exploit.
The The Multi-State Information Security & Analysis Center (MS-ISAC) notes that RDP is one of the most attacked protocols.
Some may think that the best way to avoid an RDP attack would be to simply turn RDP completely off. But this is a problematic option since some applications require the Microsoft RDP for daily functions.
The CIS report says there are four major benefits of RDP.
These benefits are fantastic for an organization, but how can you mitigate the risks that come along with RDP usage?
The CIS report outlines seven ways to improve the security of RDP, which are low or no cost to an organization. They are:
RDP-based attacks are most effective when organizations lack basic cybersecurity controls, including those listed above.
For more detailed information regarding RDP and RDP-based attacks, you can check out the CIS report.