Cybercrime , Cybercrime as-a-service , Fraud Management & Cybercrime

Remote Desktop Protocol: The Security Risks

Matthew Boddy of Sophos on Latest Research into RDP Vulnerabilities
Remote Desktop Protocol: The Security Risks
Matthew Boddy, Sophos

In the past year, cybercriminals behind two of the biggest ransomware attacks have abandoned other techniques in favor of exploiting remote desktop protocol. Matt Boddy of Sophos explains why RDP attacks are so popular - and what you can do to discourage them.

RDP is the exploit of choice for attackers to get a foothold in one's environment, says Boddy, security specialist with Sophos, and lead author on recent RDP research. "And once they've got that foothold, they'll then spread and get to every possible device that they can."

And what the research starkly reveals: "How much people are getting attacked every single day just for having their business online."

In an interview about RDP security, Boddy discusses:

  • Findings from Sophos' latest research;
  • What enterprises are currently overlooking;
  • Three common characteristics of RDP attacks.

Boddy started his career working as a network engineer for the Ministry of Defence, helping create and secure military grade networks. He then moved to work as a penetration tester in the MoD, testing and breaking into the networks which he helped create. For the past three years Matt has been working as a Security Specialist at Sophos, helping customers secure their infrastructures, and taking a deeper dive into a variety of cyber threats.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.