We have recently discovered increased activity from people trying to brute force attack (trying 1000’s of different passwords every minute in an attempt to find the right password) servers running remote desktop! Remote desktop is used as a method of remote access for people wanting to get access to their internal network, its great for accessing software installed on the network and it often used for home working.
By the nature of a remote desktop server it needs to be accessible from anywhere on the Internet, where we can we lock down servers so they can be only accessed by certain IP addresses, but if a managing director wants to travel or access their system from Internet cafes manging this is impractical.
During these attacks we often see thousands of password hack attempts, luckily we have complex admin passwords and try to enforce a password change policy on our users, but it is only a matter of time before a system gets hacked.
In an attempt (its a continual game of cat and mouse) to stop these hackers we now we have an application that we can install on your server that will automatically block IP addresses after a number of failed login attempts, this then stops them in their tracks. This can be installed an configured on your server for £100 + VAT as is recommended by Fusion as the standard of what should be installed on every RDP server. Do you have any intruder protection software running on your RDP server? If not contact us today to discuss your options.
If secure access to your IT systems is even more of an issue we are recommending installing some kind of two factor authentication. What is two factor authentication I hear your ask?
Two-factor authentication is a security process in which the user provides two means of identification, one of which is typically a physical token, such as a card, and the other of which is typically something memorised, such as a security code. In this context, the two factors involved are sometimes spoken of as something you have and something you know. A common example of two-factor authentication is a bank card: the card itself is the physical item and the personal identification number (PIN) is the data that goes with it.
We now have some software that allows you to use your smart phone as secondary authentication, it effectivly provides you with a code to type in as you login or pushes a popup to your phone. Other options are that you have dedicated key fobs that generate the number;
The two factor authentication does take a little bit more setup and increase your running costs, but if data security is paramount to you then this is a must. It would be very hard for a hacker to get into your system even if he has a username and password as they wouldn’t have access to the secondary token (ie the users phone or their keyfob)
Please note that your system is only as secure as the weakest link, all it takes is for one user to have a poor password and your system could be compromised… I cannot express how important a strong password policy is.
Is security a concern for you? If so get in contact with Fusion today before its too late!!