PSA: If you use RDP, you could be leaving a door open to hackers!

The rise in remote or hybrid work has resulted in a corresponding rise in Remote Desktop Protocol (RDP) attack attempts said security firm Kaspersky.
According to the company, RDP attacks had actually been on the decrease in the years up to 2019, but with the rise of Work from Home with the Covid-19 pandemic, attacks in Singapore grew by 6.85 per cent in 2021 compared to 2020.
Remote Desktop Protocol (RDP) is Microsoft’s proprietary protocol that enables a user to connect to another computer through a network of computers running Windows and is used by both system administrators and users to control servers and other PCs remotely.
But this is also what intruders exploit to penetrate a target computer using attacks like brute-force attacks.
A brute force attack uses trial and error in an attempt to guess or crack an account password, user login credentials, and encryption keys. Although simple, it is a fairly reliable tactic for gaining unauthorised access to individual accounts and organisations' systems and networks.
Some recommended methods to stay safe from RDP attacks include:
This article was first published in HardwareZone.