How to ensure secure remote access to shield enterprise clients, users

I've read that remote access software is becoming an increasingly popular attack vector. Is this a legitimate concern for enterprises, and what can be done to ensure secure use of remote access clients?

    Requires Free Membership to View

    SearchSecurity.com members gain immediate and unlimited access to breaking industry news, virus alerts, new hacker threats, highly focused security newsletters, and more -- all at no cost. Join me on SearchSecurity.com today!

    Michael S. Mimoso, Editorial Director

    By submitting your registration information to SearchSecurity.com you agree to receive email communications from TechTarget and TechTarget partners. We encourage you to read our Privacy Policy which contains important disclosures about how we collect and use your registration and other information. If you reside outside of the United States, by submitting this registration information you consent to having your personal data transferred to and processed in the United States. Your use of SearchSecurity.com is governed by our Terms of Use. You may contact us at [email protected].

Remote access software has been a popular attack vector for a long time and is one of the many reasons why organizations have implemented VPNs and firewalls to secure remote access to their networks. Legitimate remote access software has evolved from simple telnet and terminal connections to Web–based, full remote management and publishing applications. These legitimate tools perform many functions, including remote administration and telework. However, other tools like Back Orifice, Netbus, DameWare and Zeus can be used to remotely control a system for potentially illegitimate reasons.

Ask the expert!

Have questions about enterprise information security threats for expert Nick Lewis? Send them via email today! (All questions are anonymous.)

Remote access software is attacked frequently, in fact, because it is typically located outside of an organization's firewall and is often accessible from anywhere on the Internet. The business pressure to make access as efficient as possible is intense, so in order to make remote access simpler, some organizations have skirted secure authentication practices and deployed VPNs using only username and passwords. There are also numerous security vulnerabilities within remote access software that have been exploited successfully.

Enterprises can ensure secure remote access for clients and users by providing encrypted transports, strong authentication for remote access software and controlling access. Encrypted transports protect data from eavesdropping threats and potentially the integrity of data in transport. Strong authentication minimizes the chance for capturing account credentials. Different types of remote access can be controlled by allowing only approved remote access products to access approved areas of the network. Users expect to access most of their applications remotely, so enterprises will be dealing with the security issues arising from remote access software for the foreseeable future. Using these steps should minimize unsafe conditions.

This was first published in September 2012

Join the conversationComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.