Home Office: Securing Remote Access

Based on the increased use of Remote Access solutions, we would like to remind you about a few best practices in order to minimize the risk associated with these technologies. We be-lieve that the risks are increasing with the number of Remote Accesses into an organizations network. Attackers know about the current situation and may try to use different ways of get-ting access into an organization's network:

• Phishing attempts (be it the classical password harvesting or in case of 2 Factor Authentications the so-called Realtime Phishing)
• Attacks against passwords (Dictionary Attacks, Password Sprayings, Brute Forcing)
• Attacks against unpatched gateway systems
• Malware attacks (often get undetected if no forced tunneling of all traffic is in place)


Specialist staff
Last modification 24.03.2020

Top of page