Translate this page using the Google Translator button above!
Subscriber Support Trial Software App Support 24-hour Response MSM Messaging Callback Response
Answers Dicussion Board Faster Issue Resolution 24/7/365 Availbility Link Security 100% Spam Free
Quickstart Guides In-Depth Manuals Software Documentation Instructional Videos On-Demand Webinars
Coming soon!
Start with a Free Dark Web Scan and Baseline Security Assessment. Your Protection is on Us!
Contributor Columns on Information Technology and Security
The current situation has forced most companies to start working remotely. Hackers see this as the perfect opportunity to exploit vulnerabilities. Every time a remote employee connects to the company network, it is an additional access point that can be exploited.
Active Directory (AD) is the core identity and access platform for companies around the world. If you want to secure your corporate’s network better, you need to protect the remote use of these AD credentials.
Phishing the Most Vulnerable
Hackers are taking advantage of the coronavirus outbreak to create new phishing email campaigns. And just like the disease itself, the threat actors are focusing on the most vulnerable, your new remote workers. What they do is tempt their targets with URLs or document downloads of safety documentation or infection maps. They are using public fear to increase the likelihood that users will click on a link or open an attachment.
Cyber attackers want to compromise corporate credentials to then be able to move laterally within your network to find something they can exploit (valuable data, applications, systems…). The problem is, like with coronavirus, you might not even know you’ve been infected. According to the Ponemon Institute, it takes 191 days on average to discover a breach.
The Threat Surface is Expanding
In such periods, having a poor protection of Active Directory logins might put your organization at risk. Nowadays, since most businesses are forced to work remotely, this threat surface has expanded exponentially.
Because of the current situation, most companies had to rush into remote working without having any time to properly prepare such a change. This makes the risk even higher. Many businesses have rushed to allow Microsoft remote desktop (RDP) access to allow users to access desktop resources without having to be physically in the office.
For a large number of businesses, the priority has been the continuation of operations, leaving little attention for cybersecurity.
How do you protect remote AD login credentials?
Remote desktop access is extremely beneficial for organizations when it comes to remote working. However, it is not fully secure as it is only protected by a password. Here are three recommendations to protect your remote AD connections:
By doing this, you can significantly improve the security of you remote employees.
Two-Factor authentication (2FA) on Active Directory connections enhances security by asking employees to present two pieces of evidence when logging in. UserLock works closely alongside Active Directory to offer 2FA and full access management on all Windows logins and RDP sessions.
Below is a full list of recommendations written by experts in order to fully minimize the risk:
About the Author
François Amigorena is the founder and CEO of IS Decisions, and an expert commentator on cybersecurity issues.
IS Decisions is a provider of infrastructure and security management software solutions for Microsoft Windows and Active Directory. The company offers solutions for user-access control, file auditing, server and desktop reporting, and remote installations.
Its customers include the FBI, the US Air Force, the United Nations and Barclays — each of which rely on IS Decisions to prevent security breaches; ensure compliance with major regulations; such as SOX and FISMA; quickly respond to IT emergencies; and save time and money for the IT department.