Security Archives - RealVNC® Remote access software for desktop and mobile Tue, 20 Feb 2024 16:47:50 +0000 en-US hourly 1 https://www.realvnc.com/wp-content/uploads/2023/05/cropped-realvnc-favicon-32x32.png Security Archives - RealVNC® 32 32 Five Essential Takeaways from the 2024 RealVNC Remote Access Predictions Report https://www.realvnc.com/en/blog/five-essential-takeaways-2024-realvnc-remote-access-predictions-report/ Tue, 20 Feb 2024 06:55:30 +0000 https://www.realvnc.com/en/?post_type=blog&p=32774 As we step into the future of remote work, there are several key trends and predictions that are shaping the landscape. The 2024 Remote Access Predictions Report by RealVNC offers an insightful look into what lies ahead.

The post Five Essential Takeaways from the 2024 RealVNC Remote Access Predictions Report appeared first on RealVNC®.

]]>

The 2024 RealVNC Remote Access Predictions Report presents a comprehensive analysis drawn from research involving over 450 participants. It highlights emerging technologies, security challenges, and evolving user behaviour that will impact remote access solutions. It also predicts how business strategies, cybersecurity, and day-to-day operations for enterprises around the globe will look like this year.

The report comes to complement the 2023 State of Remote Access Security Report (available here), released a short time ago.  

Returning to the Predictions Report, here are five essential takeaways you should take into account:

1.     Increased Use of Remote Access Technology

As organizations continue to adapt to the changing work landscape, it is projected that nearly one-third of all organizations worldwide will increase their use of remote access technology by 2024. This emerging trend highlights the growing demand for more flexible and remote work environments, allowing employees to seamlessly connect and collaborate from anywhere.

2.     Prioritizing Security

With the surge in remote access, there comes an increased concern for security risks. According to the report, 44% of respondents are planning to strengthen their remote access security measures in 2024. This proactive approach towards security is particularly prominent in the enterprise sector, where 63% of respondents are expecting to enhance their remote access security protocols.

3.     Rise in Security Controls

To ensure robust security, organizations are leveraging a range of security controls. The survey data reveals a significant increase in the adoption of multi-factor identification (MFA), session encryption, Single Sign-on (SSO), policy-based access control, authentication against AD/AAD, session auditing, and the implementation of least privilege/Zero trust principles. By incorporating these security measures, organizations aim to fortify their defenses against potential threats and safeguard their valuable assets and data.

4.     Less Reliance on RDP Advised

Considering the current security concerns, the report advises organizations to minimize their reliance on Remote Desktop Protocol (RDP) as a remote access solution. The organizations that anticipate being the most secure in 2024 are either maintaining the same level of RDP usage or reducing it. This strategic shift reflects the growing recognition of the potential vulnerabilities associated with RDP and the need to explore more secure alternatives.

5.     Single-Solution Remote Access

Another important recommendation of the survey is making remote access happen using a single solution. Many organizations are leveraging different solutions for external and internal remote access scenarios. It’s imperative from a cybersecurity standpoint that organizations use a centralized single solution so that every remote access session is subject to the same sets of policies and configurations.

The future of remote work is here, and it’s crucial for organizations to stay ahead of the curve. Remote access is no longer a luxury but a necessity in today’s digital landscape. However, with this convenience comes the responsibility of securing sensitive data and protecting systems from cyber threats.

Are you ready to navigate the changing tides of remote work? Do you have the necessary security measures in place to safeguard your operations?

For a more detailed understanding of these trends and insights, download our complete 2024 Remote Access Predictions Report and stay ahead of the competition!

The post Five Essential Takeaways from the 2024 RealVNC Remote Access Predictions Report appeared first on RealVNC®.

]]>
AnyDesk security breach is a stark reminder of the imperative for truly secure remote access https://www.realvnc.com/en/blog/anydesk-security-breach/ Mon, 05 Feb 2024 14:12:54 +0000 https://www.realvnc.com/en/?post_type=blog&p=32314 AnyDesk has announced that, following a security audit, they found their production systems have been compromised. Here’s what this should tell you about why a truly secure remote access solution is an imperative. The AnyDesk breach: What do we know so far? According to an incident response by AnyDesk, a security audit found some of ... Read more

The post AnyDesk security breach is a stark reminder of the imperative for truly secure remote access appeared first on RealVNC®.

]]>

AnyDesk has announced that, following a security audit, they found their production systems have been compromised. Here’s what this should tell you about why a truly secure remote access solution is an imperative.

The AnyDesk breach: What do we know so far?

According to an incident response by AnyDesk, a security audit found some of the company’s systems have been compromised. The incident is said to not be related to ransomware.

AnyDesk has downplayed the incident, claiming that the situation is under control. However, users have been urged to reset their passwords if also used elsewhere. The timing of maintenance in the days before the public announcement, as well as the late Friday afternoon press release from AnyDesk, would indicate that the breach occurred several days before public acknowledgment was given.

BleepingComputer has discovered that the attackers stole source code and private code signing keys.

To make things even worse, a recent report from Resecurity suggests that AnyDesk user credentials have made their way onto the Dark Web.

Why should you take the AnyDesk attack seriously?

If you’re an AnyDesk user, you should take this news very seriously. And even if you’re using another remote access solution, this needs to make you challenge its security credentials.

Unfortunately, this is not the first time that something like this has happened. As we said at the time of the GoTo security incident, when security is not the first priority, customers are the ones who end up suffering.

RealVNC: The commitment to security

At RealVNC, security is at the heart of everything we do. We do our best to mitigate such risks, and to keep your data as secure as possible. Here are some of the things we do to make sure that your data never ends up in the wrong hands.

RealVNC's ISO27001 certification: managing data security risks

Our security experts understand the implications of stringent security requirements.

Our ISO27001 certification is our commitment to uphold the highest standards of information security management. When we say that our systems are fortified, we are not speaking lightly. This certification means we engage in continuous risk assessment, employ comprehensive security controls throughout all areas of operations in our company, and ensure that our staff is trained in best practices for information security.

What sets an ISO27001 certified provider apart in today’s digital landscape? It shows that we have a proactive approach to data protection throughout the entire company. We don’t just respond to threats; we anticipate them and prepare for them.

If your remote access provider doesn’t have this certification, question them on it!

RealVNC's fundamental security principles

Our security principles are essential to the service we provide to you. They ensure that your data is as secure as possible, at all times:

  • High-trust services – this means that you don’t have to trust RealVNC as a company to trust our software and services.
  • Secure data storage – RealVNC doesn’t record your sessions. Your data can’t be decrypted, either. Not now, not ever.
  • Secure environment – we treat every connection as if it is made in an hostile environment.
  • Connection control – the one ultimately deciding who is able to connect is the owner of the remote computer.

These principles serve as a guideline for everything we do, ensuring the security of your data.

Here’s a quick example of how these principles work in practice. The username/password you use to log into our portal cannot by itself be used to gain access to remote machines.

Each remote machine will have a further, separate set of credentials (usually platform-native authentication, like Active Directory etc). You are required to enter this before taking control.

Having at least two sets of credentials required to make a connection does, admittedly, cause slight UI/UX friction. However, it’s something we hold dear, as it means that we don’t ever store the credentials that ultimately give you access to a remote device on our systems. Also, the portal credentials we do store are never stored in plaintext, and are one-way hashed.

The importance of independent security audits

This is another one of RealVNC’s many security initiatives, designed to keep your data secure. An extensive white-box security audit, done by respected Berlin-based firm Cure53, has confirmed RealVNC’s strong security stance.

We’ve urged the industry to confirm its software’s security with more than just words ever since. As we said numerous times, when this doesn’t happen, the end users are the ones paying the price.

Your data - in safe hands with RealVNC

We would also like to take this opportunity to confirm for our users that everything security-related at RealVNC is working as intended. We are unaffected by any data breaches and we can assure you that your data is in safe hands. We will continue to work hard to keep it that way.

This is what RealVNC CEO Adam Greenwood-Byrne had to say:

 

I’m proud of RealVNC’s unblemished security record, and we continue to invest in systems and services that ensure we remain on the strongest footing. Customers who have been with us for years, including government departments around the world, recognise the value of our security stance just as well as we recognise the trust they place in us as their remote access vendor of choice. 

We value those relationships tremendously at RealVNC and our team works tirelessly to ensure our customers have what they need to feel safe. The Internet is a much more dangerous place than it was 20 years ago and we are committed to evolving and adapting accordingly.

Also, if the events of the last few days have made you considered switching to a truly secure remote access solution, get in touch!

The post AnyDesk security breach is a stark reminder of the imperative for truly secure remote access appeared first on RealVNC®.

]]>
RealVNC Receives ISO27001 Certification: What It Is and Why It Matters https://www.realvnc.com/en/blog/realvnc-iso27001-certification-what-it-is-why-it-matters/ Thu, 11 Jan 2024 07:24:25 +0000 https://www.realvnc.com/en/?post_type=blog&p=30006 As a global innovator in remote access solutions, RealVNC has recently achieved this important certification—a significant milestone in our commitment to data security. Let's dissect what it all means.

The post RealVNC Receives ISO27001 Certification: What It Is and Why It Matters appeared first on RealVNC®.

]]>

With cybersecurity threats becoming more complex every day, there has never been a more stringent need for robust data protection. One term that’s frequently mentioned in these discussions is ISO27001 certification. But what does it mean? And why should it matter to you?

What Exactly is ISO27001 Certification?

ISO27001—it sounds like a complex code, doesn’t it? It isn’t, actually. This international standard simply refers to Information Security Management Systems (ISMS). Think of it as a “seal of approval” that attests to a company’s system of managing risks related to data security.

When a company displays an ISO27001 badge, it’s making a statement. It says that it has met the rigorous requirements of this standard. It also means that it’s committed to upholding the highest standards of information security, data protection, and compliance with legal and regulatory norms.

The RealVNC Advantage: Going the Extra Mile

So, what does RealVNC’s recent obtaining of the ISO27001 certification mean for you? Simply put, it’s evidence of our commitment to data security.

This certification isn’t just another accolade. Instead, it serves as concrete proof that we’re serious about safeguarding your data. We’re not satisfied with providing industry-leading remote access solutions; we’re equally committed to ensuring operational excellence, resilience, and security against cyberattacks.

In the words of our Chief Information Officer, Andrew Woodhouse:

ISO 27001 certification reinforces that security is at the forefront of everything we do, not only in the products we build but how we operate as a business. This further solidifies RealVNC’s position as the world’s most secure remote access solution and gives our customers confidence that we go above and beyond to protect their information and maintain the confidentiality, integrity, and availability of data. We are proud to join an exclusive group of global organizations renowned for their advanced information security practices. 

The Takeaway: Why Should You Care?

Why should RealVNC’s ISO27001 certification matter to you? The answer lies in the assurance it provides. This certification gives you the confidence that your data is in safe hands—a company that doesn’t just meet basic security requirements, but goes above and beyond to protect your information.

This achievement places us alongside a select group of global organizations known for their rigorous information security practices. 

The post RealVNC Receives ISO27001 Certification: What It Is and Why It Matters appeared first on RealVNC®.

]]>
What goes on when RDP is compromised: A practical look into the threat actions taken https://www.realvnc.com/en/blog/rdp-is-compromised-a-practical-look-threat-actions/ Thu, 21 Sep 2023 07:37:20 +0000 https://www.realvnc.com/en/?post_type=blog&p=23186 The fact that RDP is used in cyberattacks is well-known. But what do threat actors actually do once they gain control of an exposed endpoint? Find out below.

The post What goes on when RDP is compromised: A practical look into the threat actions taken appeared first on RealVNC®.

]]>

As much as we’d like to think we’re rid of it, externally exposed RDP remains alive and well (for some unknown reason). And that’s a HUGE problem for those organizations that are relying on it.  Don’t get me wrong; there’s nothing wrong with using RDP – it’s the insecure use of RDP (no MFA, no monitoring, older host OSes, one-off exposed systems that everyone forgets about, etc.) that is the creates the risk for the organization.

And it’s such a huge problem that RDP’s misuse by cybercriminals continues to make it into reports on the current state of cyberattacks. Take the Quarterly Ransomware Reports from ransomware response vendor Coveware – they’ve been continuously covering various stats about the ransomware attacks (including initial attack vectors) that they respond to for their customers since 2018.  RDP was listed in 2018 as an initial attack vector (it was #1) and it’s still on the board in 2023 just behind email phishing but ahead of vulnerabilities.

So, how is RDP actually used within cyberattacks (ransomware or otherwise)?  At a high level, we can look at Sophos’ 2023 Active Adversary Report for Tech Leaders, where we get a bit of a deeper breakdown:

  • RDP played some role in 95% of attacks, up from 88% in 2022
  • Internal use of RDP was seen in 93% of attacks, with external use seen in 18% of attacks
  • RDP was used only for internal access and lateral movement in 77% of attacks

We can gather from this data that RDP is used as both an initial means of entry into an organization’s network, as well as a means to move laterally within the compromised network. This alone should be enough justification to make you think to yourself “OK – it’s time to ditch RDP”.

But, what really happens when threat actors gain control over an exposed endpoint via RDP?

Generally, we need to speculate based on the end result of an attack and determining of what transpired from forensics evidence. Rather than do that, we now have the results of an unprecedented three-year long RDP honeypot study by security vendor GoSecure where more than 20,000 RDP sessions were monitored, and 190 million threat actions were collected using a custom-built interception tool that recorded over 100 hours of RDP session footage, in order to answer this question.

 

What 5 Types of Threat Actors Do With a Compromised RDP Session

To make 20,000 sessions worth of threat actions digestible (and, apparently, to express the inner Dungeons & Dragons, or “D&D” nerd within some of us!) the kind folks at GoSecure categorized the activities into 5 types of D&D character classifications:

  • Rangers – In D&D, rangers are a skilled explorer, craftsperson, and hunter. GoSecure found that these types of threat actors run reconnaissance using scripts or tools, explore the contents of the compromised system, and check the performance of the system. The going theory is that they are evaluating the system for another type of threat actor; this could be indicative of an initial access broker who simply sells the credentials and resulting remote system access.
  • Thieves – In D&D, thieves are, well… thieves. They burgle, steal, pickpocket, etc. All-round bad guys.  GoSecure characterizes these threat actors as those intent on monetizing the simple RDP access gained without going beyond the “walls” of the compromised endpoint. Actions include installing cryptominers, proxyware, monetized browsers, etc.
  • Barbarians – In D&D, barbarians thrive in battle. Threat actors of this nature are the ones who love the thrill of hacking the rest of your network. They are the ones discovering IP address ranges, finding usernames and passwords/hashes/Kerberos tickets, etc. in an attempt to brute force their way into more computers on your network.
  • Wizards – In D&D, wizards are highly skilled at performing spells (and they usually have no real combat ability), accomplishing the impossible without explanation (i.e., “magic”). GoSecure sees threat actors that use RDP to “portal” (read: laterally move) from system to system. These may be the most skilled of all the threat actors, as wizards are very skilled at living off the land and are able to laterally move with relative ease.
  • Bards – Bards in D&D are sort of a “jack of all trades”, part musician, part fighter, part wizard. In general, though, they are also in the “master of none” category. According to GoSecure, bards have “no apparent hacking skills”; they misuse the compromised RDP session for far more personal needs that include downloading movies, watching porn and performing web searches related to hacking.

So, what’s the breakdown of these five types of threat actors?  Are they all just watching movies? Laterally moving? Running cryptominers?

According to a BlackHat 2023 presentation by GoSecure cybersecurity researchers on their findings of this three-year experiment, the activities are heavily weighted towards barbarians and rangers:

While I’m unsure of the scale used, it’s still very evident that barbarians and rangers combined dwarf thieves, bards, and wizards. This means that, for most RDP sessions, the name of the game is reconnaissance and lateral movement.  To give you a bit more insight into the kinds of actions taken, GoSecure researchers also classified the tools used by all categories of threat actor:

You can establish from this tool classification that actions involved with cyberattack far outweigh any of the other types individually.  Again, RDP is seen primarily as a channel for attack.

Moving Away from RDP – Both Inside and Out

If the industry data wasn’t enough to move you, I’m hoping the GoSecure detail was! It’s evident that insecure RDP is a risk to the organization, both as an externally accessible means of entering a network and as a means to move laterally throughout a compromised environment.

Assuming your organization has a need for both external and internal remote access, what should you do to mitigate this risk entirely?

 

The answer lies in using a means of secure remote access that includes a few controls in place before anyone is allowed to remotely access anything:

  • Multi-factor authentication – it’s 2023; everyone (and I mean everyone) should have MFA enabled on their user account. If you have MFA layered over remote access, you put initial access brokers largely out of business.
  • Granular Access Control – RDP, if left unchecked, allows anyone to jump to any other machine (yes, yes, you need Log On Locally rights, etc., but you get the point!). Secure remote access limits who can utilize remote sessions to specific machines.
  • Least Privilege – RDP sessions leverage the permissions of the logged-on credential. Secure remote access can often determine what level of privileges are exercised in a given remote session.

In all reality, implementing a secure remote access solution that had any of these features would be an improvement in reducing the risk. Why?  Because RDP is built-in (and the threat actors know it!) and completely removing RDP and utilizing another more secure solution would be another barrier for a threat actor to overcome.

If you have any instances of RDP within the organization, it’s time to eradicate them completely and look for another means of securely providing remote access – whether externally or internally – that removes the threat actors’ easy means of remotely existing within your network. To ignore this warning brings new meaning to the phrase “barbarians at the gate.”

The post What goes on when RDP is compromised: A practical look into the threat actions taken appeared first on RealVNC®.

]]>
The Remote Worker’s Guide to Secure Remote Access https://www.realvnc.com/en/blog/remote-workers-guide-secure-remote-access/ Thu, 27 Jul 2023 06:33:22 +0000 https://www.realvnc.com/en/?post_type=blog&p=20193 With so many variables coming into play when allowing remote access to the corporate network, there are several best practices that should be followed to elevate security.

The post The Remote Worker’s Guide to Secure Remote Access appeared first on RealVNC®.

]]>

With so many variables coming into play when allowing remote access to the corporate network, there are several best practices that should be followed to elevate security.

Let’s start by putting aside exactly how much of an organizations workforce is and isn’t working remotely and zero in on the fact that, regardless of where an org is in the mix between completely being remote and everyone already returning to the office, 94% of today’s organizations allow remote access to corporate apps and assets, according to security vendor Check Point. This has the potential to create a lot of risks, so let’s spend some time looking at a few aspects of a remote worker’s connection to a corporate resource, and discuss some best practices to ensure the organization remains as secure as possible.

Assuming that some of the corporate resources exist within the organization’s internal network, it’s safe to also assume that some or all of the remote workers connect to the corporate network, which potentially puts the organization at risk based on the following three factors:

  • The remote worker’s device
  • The remote worker’s method of connecting to the corporate network
  • The remote worker’s method of authentication

In this article, I’ll look at each one, discuss the risk they pose, and make some suggestions on how to facilitate secure remote access.

The remote worker’s device

According to the Check Point data, only 17% of organizations restrict remote access to company-managed laptops.  That means that there are a ton of personal devices in use, with varying levels of security implemented – likely none of which meet corporate security standards. The operating system probably doesn’t have a hardened configuration, there’s probably no antivirus (at a minimum) – let alone a business-level endpoint protection solution, and the use of the personal device tends to put the user at ease, making them far more susceptible to social engineering-based attacks.

So, between the user and the device, what you have is a completely insecure working environment where it’s relatively easy for attackers to compromise the device – particularly when it’s a non-mobile operating system.

Securing the Device

Assuming we’re talking about personal devices here, there are only a few options organizations have.  The first option is conceivable whereby the remote worker is asked to allow the organization to manage the configuration of the personal device in order to harden its configuration and possibly install some form of endpoint protection.  But that’s not entirely probable.   The more likely solution is to not have the worker perform their work activity (logically speaking) on the personal device but to instead remotely access an internal device and perform their work via a remote session.

The remote worker’s method of connecting to the corporate network

According to the Check Point data, 73% of remote workers connect via VPN. Using a VPN does provide some additional levels of security.  For one, most VPNs require the user or the device to authenticate prior to use.  Secondly, the VPN does encrypt the communication across the channel.   But there’s still the issue of the (probably) insecure personal device; should a threat actor gain access to the device (waiting on the actual user to connect to the VPN) and/or the user’s credentials (through, say, a credential harvesting phishing attack and use them to authenticate through the VPN), it’s conceivable that an attacker could find themselves having access to corporate resources despite having a VPN in place.

Securing the Connection

According to IBM, the exploitation of external remote services is one of the top initial attack vectors in cyberattacks, demonstrating how imperative it is that organizations not just look for a way to securely connect the user to the corporate network but to find a method that decreases the risk introduced by the insecure device and network.  VPNs are a great means of connection, but it’s likely necessary to logically connect the user remotely to an internal device where there’s no ability to introduce malware, exfiltrate data, etc. And, depending on the remote access solution used, there may be no need for the VPN at all.

The remote worker’s method of authentication

Let’s start with something we can all agree upon – username/password credentials alone most definitely aren’t enough. Any organization that uses a VPN or any other type of connectivity from a remote device to the corporate network using only standard user credentials is a cyberattack time bomb waiting to go off. VPNs can leverage multi-factor authentication, but then you’re still left with the previously mentioned problems the insecure device introduces. 

Securing the Authentication

I’ve already mentioned remotely-accessed sessions as a potential solution to address the insecurities found in the device and connection, but remote access only works if the solution being used also supports multi-factor authentication at a minimum.  Additional controls, such as policies that define which users or devices can utilize a remote access session – or even potentially moving towards Zero Trust Network Access – is likely necessary to ensure any remote access to the corporate network is as secure as possible and minimizes the risk of being misused as an attack vector as is possible.

Attaining True Secure Remote Access

Creating a state of secure access for remote workers isn’t just a matter of implementing some form of secure session between the worker, the corporate network, and its resources.  No; secure remote access is about assessing the risk introduced by each facet of the working environment, cross-referencing the threat actions taken by cybercriminals, and finding security solutions that address both the business needs of said remote access and the security requirements established based on your risk assessment.

Secure remote access, when implemented properly, can provide remote workers with a secure and productive working environment where the organization can rest assured that despite an attacker’s best efforts, their ability to take advantage of that environment is minimized, if not mitigated.

The post The Remote Worker’s Guide to Secure Remote Access appeared first on RealVNC®.

]]>
U.S. Government’s Latest Operational Directive and Initial Audit Makes the Case (and Mandate) for Secure Remote Access https://www.realvnc.com/en/blog/us-government-operational-directive-secure-remote-access/ Thu, 13 Jul 2023 08:01:38 +0000 https://www.realvnc.com/en/?post_type=blog&p=20889 An analysis of attack surfaces of government agencies demonstrates why the latest compulsory direction to federal, executive branch, departments and agencies should be heeded by every organization.

The post U.S. Government’s Latest Operational Directive and Initial Audit Makes the Case (and Mandate) for Secure Remote Access appeared first on RealVNC®.

]]>

Last month, the Cybersecurity and Infrastructure Security Agency released Binding Operational Directive 23-02: Mitigating the Risk from Internet-Exposed Management Interfaces – a directive aimed at securing both network management devices (e.g., firewalls, routers, VPNs, etc.) and any device that can be remotely managed using a variety of protocols including HTTP, FTP, SSH, SMB, and RDP.

The directive mandates that governmental agencies and sub-agencies make applicable interfaces – whether internally discovered or “within 14 days of notification by CISA” – only accessible internally or deploy access controls where policy enforcement is established from a separate device (a basic tenet of a Zero Trust architecture).

CISA also clarified that they planned to scan for devices and interfaces in the scope of the Directive and notify agencies of all findings. Not more than two weeks later, an analysis of more than 50 federal civilian executive branch agencies was conducted by Internet threat-hunting vendor Censys.  In total, Censys found over 250 instances of “web interfaces for hosts exposing network appliances, many of which were running remote protocols”.

The analysis definitely confirms CISA’s worst fears; that, despite a belief that an agency’s network is secure, there are plenty of exposed ports providing threat actors with management communication protocols that can potentially be misused for malicious purposes.

So, what should organizations in the private sector take away from this directive and subsequent risk analysis? Three things come to mind:

  1. Any Kind of Remote Access Can be a Risk – While we spend a lot of time on this blog talking mostly about remote access from a user “remotely accessing a desktop” perspective, CISA’s list of protocols in the directive is rather extensive and aligns with the long list of examples found within two Initial Access techniques from the MITRE ATT&CK Framework: Exploit Public-Facing Application and External Remote Access. CISA does mention a number of remote desktop-type protocols in their directive as well, furthering the notion that this kind of access remains a risk.
  2. You Have More Present Risk Than You Think – The Censys analysis found an average of five interfaces per agency that met the directive’s criteria. Some of them were even using the Windows SMB protocol (meaning, in theory, an external machine could map a drive to a Windows share at the exposed IP address). Unless your organization does its own threat hunting and port scanning, you should assume you have more exposure than you know about and commission an analysis of your own externally facing risk.
  3. “Secure” is the Goal – While CISA’s first mandate is to “remove the interface from the internet”, it’s only mentioned as an alternative, should an agency not be able to bring the exposed remote access under proper controls. From the directive:

For the purposes of this Directive, as outlined in the required actions section below, networked management interfaces are allowed to remain accessible from the internet on networks where agencies employ capabilities to mediate all access to the interface in alignment with OMB M-22-09, NIST 800-207, the TIC 3.0 Capability Catalog, and CISA’s Zero Trust Maturity Model.

So, CISA is saying, IF you can properly secure your remote access (using Zero Trust as the standard), it’s acceptable to have it continue to be accessible from the Internet.

“Zero Trust Remote Access”?

All four of the referenced documents help to define Zero Trust principles.  It’s important to keep in mind that there are only Zero Trust principles and solutions that adhere to these principles; there are no actual Zero Trust solutions (i.e., solutions that have somehow received a non-existent Zero Trust certification, etc.).

Applying this to your organization’s secure remote desktop access, what’s important – according to CISA’s directive – is:

  1. that the remote access is secured by policy
  2. that the policy engine (the system that establishes and pushes out security policies) be separate from the system proving the remote access.

So, to bring any remote access under “compliance” (if you will) with CISA’s directive for Zero Trust principles to be in place, there are a few things you can initially do:

  • Use a Centrally Managed Remote Access Solution – If you are using, say, a single endpoint providing RDP access externally, you’re definitely not secure. You need to use a Remote Access solution that centrally establishes who can access which systems remotely, from where, when, etc.
  • Use Multi-Factor Authentication (MFA) – nestled somewhat within the NIST 800-207 document that describes Zero Trust as a core tenet that states that MFA should be used. While not stated to be required at all times, we’re talking about providing access to an endpoint logically within the organization; it potentially could also be a persistent foothold for threat actors. So, MFA is needed here always.
  • Determine if Secure Remote Access is All You Need – The state of organizational cybersecurity, in general, is moving towards Zero Trust, albeit slowly; fully implementing Zero Trust can literally take years. It’s why I emphasize the immediate need to embrace Zero Trust principles and not be concerned so much with needing to be “compliant” with Zero Trust (as if it’s a standard with specific implementation requirements… which it’s not). But for those of you thinking that you want to better understand what differentiates solutions like Zero Trust Network Access and a Secure Remote Access solution, read about which solution is right for your organization.

Get Your Remote Access Secure… And Fast!

If nothing else, the directive from CISA makes the case that the risk created by exposed remote access is something that needs to be addressed quickly; their 14-day required response time indicates how big a problem this is, and how fast your organization – regardless of whether you are in the public or private sector – should address the risk.

The post U.S. Government’s Latest Operational Directive and Initial Audit Makes the Case (and Mandate) for Secure Remote Access appeared first on RealVNC®.

]]>
What is Remote Device Management– Purpose, Benefits, and More https://www.realvnc.com/en/blog/remote-device-management/ Thu, 06 Jul 2023 06:01:16 +0000 https://www.realvnc.com/en/?post_type=blog&p=20684 Post-Covid, more and more companies are switching to fully remote or hybrid work models. This brings huge benefits for businesses, including greater employee satisfaction, increased productivity, and lower overheads.

The post What is Remote Device Management– Purpose, Benefits, and More appeared first on RealVNC®.

]]>

However, these working structures do present challenges, as well as opportunities, especially when it comes to technology. Remote working means accessing company networks and resources from desktops and devices in multiple locations. This can compromise security and make collaboration difficult.

Remote Device Management (RDM) solutions eliminate many of these problems. With RealVNC® software, for example, you can manage and monitor remote devices with ease through a single, intuitive application.

Let’s take a closer look at remote device management and how a good RDM platform can benefit your business:

What is remote device management?

Remote device management is an umbrella term covering a multitude of practices around controlling and maintaining devices (i.e., smartphones, tablets, desktop computers, etc.) from afar. RDM platforms come with things like remote desktop software, remote security measures, and more.

Remote management device policies and platforms are extremely useful from both a business and a personal perspective. For example, a business’s IT department can use RDM software to quickly and easily set up an employee’s devices, troubleshoot problems, and update security protocols without ever having to see the device in person.     

Main purposes of remote device management systems

Remote device management is used for a wide variety of purposes, but the main ones are as follows:

  • Visibility. With remote work becoming increasingly popular, teams need new methods of ensuring visibility over employee networks. RDM software helps to provide this.
  • Performance monitoring. RDM software gives IT engineers easy access to device metrics, enabling businesses to stay on top of potentially disruptive performance issues.
  • System management. The most obvious application for RDM systems is managing networks and systems remotely. RDM software gives engineers access to remote devices, enabling them to update, automate, fix, and generally manage the network on a granular level.
  • Automation. RDM software allows network engineers to automate important tasks across the entire network. This saves a lot of time and frustration for employees and even customers, who would otherwise have to perform these tasks manually.

Benefits of remote device management

We’ve mentioned the main uses of RDM above. Now let’s talk about how it benefits businesses.

Scalable device management

The modern workplace is very device-heavy. Whether you operate on a BYOD (Bring Your Own Device) model or provide employees with them yourself, you are likely to end up with a large number of devices in your business’ tech fleet.

Managing all of these can be a nightmare. From system incompatibilities and performance issues to devices becoming obsolete at irregular intervals, there’s always one hurdle or another to overcome with employee devices. 

Remote monitoring and management makes it so much easier to handle this at scale. You can add more and more devices to your fleet without having to worry about the burden of managing them becoming too much.

This is a great help when your company is scaling and adding extra employees and devices.

Usage monitoring

Remote usage monitoring is a great benefit to your business. For example, by keeping an eye on usage, your network engineers can easily detect things like performance issues, overuse of resources, and so on.

Remote usage monitoring highlights when and how things can be streamlined in a quick, easy, non-labor-intensive way. This is especially true when you are using a good remote device management application, platform, or console.

Secure usage

Remote device management enhances network security. By using good RDM software, your business can protect itself against data loss, data theft, and even (to a certain extent) device theft.

Through remote device management, your organization can quickly locate a misplaced (or stolen) device, secure sensitive company data, install important security measures, wipe data from lost devices, update obsolete security features, and more.

Security is a major challenge for any business. Cybercrime is a huge concern for modern businesses, and data breaches represent a serious risk. Being able to monitor, update, and intervene in security breaches remotely is a game changer for security-conscious companies.

Challenges of remote device management

Remote device management can be hugely beneficial for businesses, but it is not without its challenges. Let’s take a look at some of the difficulties associated with an RDM system.

Managing diverse environments

Modern employees expect to be able to conduct their work from a variety of devices. If they can’t access their work computer, they may do their work via a personal computer, smartphone, or tablet. For employees, this is both convenient and efficient.

However, convenience is the hacker’s friend. The loopholes and fixes we use to make our digital lives easier can be gateways for hackers. And it’s hard for company cybersecurity departments to personally vet every single device that employees will use on a daily basis.

With remote device management software, companies can manage a diverse range of devices and environments more easily. However, this aspect can still be challenging if there are no controls put on the systems and devices that employees can use.

The right RDM solution will enable IT departments to control and secure remote networks so that employees can enjoy all the convenience of remote work without compromising company security.

Remote troubleshooting and end-user support

Remote device management necessitates remote troubleshooting and end-user support, which can present its own challenges.

The physical distance between the IT team and the end user can make troubleshooting more complex and time-consuming. A lack of visual cues or the inability to physically interact with a device can also make accurately diagnosing and resolving issues difficult. Furthermore, having multiple different devices and operating systems, which is often the case with remote device management, can also complicate troubleshooting.

Remote device management solutions that make use of remote access tools can help make remote troubleshooting easier for IT teams and more enjoyable for end users.

Security risks

Remote device management introduces a range of security challenges that organizations need to be aware of to protect their systems and data. 

These challenges include unauthorized users attempting to gain access to your system as well as risks involved with transmitting data between devices. Businesses should consider implementing security features such as multi-factor authentication, secure communication protocols, VPNs (Virtual Private Networks), and encryption, to make sure their remote access needs are met securely.

VNC Connect® is designed with security in mind and provides regular security updates to help clients stay safe and connected.

Scalability

Managing a large fleet of devices remotely requires a scalable infrastructure that will allow any increases in user, device, or data volume to be handled easily. 

Transferring large amounts of data between remote devices can impact efficiency and responsiveness. Resources like the availability of computing power as well as storage and network capacity, need to be considered in order to scale remote device management successfully. Implementing robust management tools and leveraging cloud-based solutions can help reduce scalability challenges and ensure efficient management of any number of remote devices.

What are remote device management platforms?

A remote device management platform enables you and/or your IT department to manage remote devices easier.

A good remote device management platform is essential for any business with a lot of remote workers. Remote work has a lot of benefits for businesses, but it also presents some challenges, including:

  • Training staff in IT functions and processes is not easy when staff are not physically present.
  • Device setup is challenging when devices are geographically scattered. This is especially the case in BYOD situations.
  • It is harder to maintain cybersecurity when workers are remote.

Remote device management technology allows IT engineers, team managers, and business leaders to overcome these challenges by accessing and even controlling devices remotely. However, managing a large number and variety of remote devices can be complicated.

This is where an RDM platform comes in.

A good remote device management platform, such as RealVNC’s VNC Connect, combined with the RPort solution, enhances remote access business benefits by making it easy to manage multiple remote devices simultaneously. Through a good RDM platform, you can:

  • Troubleshoot device problems quickly and effectively, no matter where the device is located;
  • Take control of devices as and when needed;
  • Boost and maintain security for your business networks, no matter how geographically scattered your employees are;
  • Provide effective and streamlined training remotely;
  • Set up devices to your business’ specifications without having to physically interact with the devices in question;
  • Enable collaboration through remote sharing tools;
  • And manage devices easily from a single, intuitive platform.

 All in all, such RDM platforms make remote device management easier and much more efficient.

Understand how remote device management can help your business with RealVNC

RealVNC provides secure remote access and management to companies all over the world. Using RealVNC products, you can boost productivity, secure your network, share resources, enable collaboration, monitor device performance, and more – no matter where in the world your employees are located. 

RealVNC products are used and trusted by successful businesses everywhere. If you feel you could benefit from our RDM platform and solutions, why not try us out with our 14-day free trial?

FAQs about remote device management

What types of devices can be managed remotely?

A wide range of devices can be managed remotely, including computers, mobile devices, network devices, and IoT devices, among others. With remote management, devices can be controlled and administrated from one, centralized location. 

What features should I look for in a remote device management solution?

Remote device management solutions need to meet the aims of your business. Some features that is is useful to consider include remote access and control options, security, scalability, and ease of use. 

Can remote device management help with troubleshooting and resolving issues?

The short answer is Yes! Remote device management allows IT teams to diagnose issues and complete fixes without needing to be in the same physical location as a device. With remote working becoming the new norm, this decreases cost as well as downtime due to technical issues.

What are some best practices for effective remote device management?

To establish an effective remote device management strategy, businesses should focus on implementing robust security measures, clear communication and documentation, regular backup and recovery processes, and training for all staff to increase user satisfaction.

Is remote device management secure?

Remote device management is as secure as the solution you choose. Make sure to investigate a provider’s security features, as well as how they prove their security. Last year, RealVNC had a complete security audit performed by Berlin-based Cure53 to test and confirm our commitment to providing the most secure remote access solution on the market.

The post What is Remote Device Management– Purpose, Benefits, and More appeared first on RealVNC®.

]]>
3 Ways Secure Remote Access Helps to Avoid HIPAA Violations https://www.realvnc.com/en/blog/secure-remote-access-hipaa-violations/ Thu, 29 Jun 2023 07:57:19 +0000 https://www.realvnc.com/en/?post_type=blog&p=20169 The surge in remote working and telehealth also increases the likelihood that HIPAA’s privacy and security rules may be breached – but there are ways to reduce this risk with the right remote access.

The post 3 Ways Secure Remote Access Helps to Avoid HIPAA Violations appeared first on RealVNC®.

]]>

When HIPAA was introduced in 1996, the focus was solely on regulating and protecting patient health information (PHI) – it was conceived without any reference to any specific technologies used to connect to, access, and utilize the data. Subsequently, the Department of Health and Human Services (HHS) implemented the HIPAA Privacy Rule to establish safeguards to protect the use and disclosure of PHI data. And in 2013, HHS developed the HIPAA Security Rule – a set of generic standards to protect electronic PHI (ePHI).  Violations of HIPAA are considered to be any violation of the Security, Privacy, or Breach Notification Rules by any type of covered entity listed within HIPAA.

But even back in 2013 – let alone 1996 – I don’t think the architects of HIPAA or its Rules had the forethought to conceive that those individuals utilizing ePHI would all be working from the comfort of their own home, on a personal device.  It may initially sound like that’s no big deal but, as you’ll see in a moment, it’s relatively easy to demonstrate a HIPAA violation in scenarios where remote workers are involved:

  • Insecure Internet Access – The transmission of ePHI over an insecure network is a violation. Now think about unencrypted Wi-Fi at employees’ homes, at the local coffee shop etc., and you quickly realize how easy it would be for threat actors to access the data.  Remember, the insecure transmission itself is enough to be found in violation; it’s not necessary that a malicious actor gains access to the ePHI being transmitted.
  • Unauthorized Devices – If a covered entity leverages a web-based application whereby remote users can access ePHI, there are likely no security controls in place to restrict or limit which user devices can connect to the application. HIPAA requires all devices using, gathering, storing, or transferring ePHI to be protected by specific security controls.
  • Improper Disposal of Files Containing ePHI – A remote user working on a file containing ePHI may simply delete the file when done with it. But if it’s not securely deleted (where the blocks storing the file are overwritten many times to ensure an inability to salvage the file), it’s relatively easy for a malicious actor to undelete the file.
  • Unencrypted Data at Rest – If data is to remain on a remote device, it’s required to be encrypted. Now think about, say, a Word doc that contains some patient details; we both know that a regular healthcare user isn’t going to take steps to ensure that file is encrypted when they’re done working on it.
  • A Lack of Physical Security – Let’s face it; the physical security at your employee’s home doesn’t involve door badges, security guards, etc. And any kind of attempt to gain access to a remote device is going to be done logically (not physically) via some form of remote control, somewhat bridging the gap here between physical and network security.

One of the challenges organizations (healthcare or otherwise) have had to address in the last three years was how to ensure remote users could gain access to corporate resources.  The cloud made things easy enough, driving users directly to cloud applications, platforms, and data. As did VPNs to connect those same remote users to internal corporate resources.

But little of those answers had anything to do with security; they were about productivity.  Today’s organization that is subject to HIPAA needs to also consider whether any of the violations above are possible with their current configuration (here’s a hint: if ePHI data is transmitted to a personal device on a WiFi network the organization hasn’t sanctioned, you’re likely already in violation).

Enter Secure Remote Access.

Using Secure Remote Access to facilitate a remote worker’s access to ePHI does a few things to change whether ePHI is technically transmitted and where the ePHI logically exists.

  • It logically keeps the data within the organization – Whether the remote worker is accessing ePHI using an application in the cloud or data on the corporate network, by requiring them to first securely access a remote desktop and use that desktop to access the ePHI, the data never leaves the organization and leverages the organization’s controls to maintain encryption at rest.
  • No ePHI is transmitted to the remote device – The only data sent to the remote device serving as the client is screen data; the ePHI safely resides only on the remotely accessed desktop, further keeping ePHI off a user’s personal device.
  • The connection is encrypted – Even when using a completely insecure Wi-Fi network, the remote access session itself is encrypted, ensuring that the ePHI access within the session is, therefore, also encrypted.
  • The remote access must be authorized – By requiring multi-factor authentication, it’s possible to eliminate concerns around physical security (as only the actual owner of a credential can authenticate), as well as logically eliminate the issue of an unauthorized device (as the remote session is a sanctioned session on an internal desktop by an authenticated user.

In the end, by switching to using Secure Remote Access, organizations subject to HIPAA find themselves working in a far more secure environment where the expected violation “opportunities” that will (rather than may) occur disappear due to the logical shifting of the access to and use of ePHI to an approved desktop remotely accessed by the healthcare employee.

The post 3 Ways Secure Remote Access Helps to Avoid HIPAA Violations appeared first on RealVNC®.

]]>
What is server security? https://www.realvnc.com/en/blog/what-is-server-security/ Thu, 08 Jun 2023 11:12:37 +0000 https://www.realvnc.com/en/?post_type=blog&p=19378 Server security refers to the measures taken to protect a server from unauthorized access, data breaches, and other cyber threats. It involves implementing various security practices and protocols to ensure that the server remains secure and its data is protected. But what is server security's role in safeguarding your digital assets? This article offers an in-depth understanding of server security, its importance, common issues, and tips on improving it.

The post What is server security? appeared first on RealVNC®.

]]>

Why is server security important?

In today’s digital world, the importance of server security cannot be overstated. Cyberattacks are becoming more frequent and sophisticated, with hackers constantly looking for vulnerabilities in servers to exploit. Remote desktop software and remote desktop connections have become essential tools for businesses, but they can also expose your server to potential threats if not properly secured.

A single security breach can lead to significant financial losses, damage to your reputation, and loss of customer trust. Therefore, investing in robust server security is crucial to safeguard your organization’s digital assets and maintain a secure online presence.

What are the most common server security issues?

Understanding the most prevalent server security problems is the first step towards strengthening your defences. Let’s delve into some common issues that affect web server security and secure server connections.

Common server security issues

How to increase server security

  1. Weak passwords: Using simple or easily guessable passwords leaves your server vulnerable to brute-force attacks. Strong, unique passwords are essential for maintaining a secure server connection.
  2. Legacy/outdated software and operating systems: Outdated software and operating systems often contain known vulnerabilities that hackers can exploit to gain unauthorized access to your server.
  3. Poor patch management: Regularly updating your software and applying security patches is crucial to maintaining web server security and a web secure server environment.
  4. Lack of encryption: Data transmitted over unencrypted connections can be easily intercepted by cybercriminals, putting sensitive information at risk.
  5. Insufficient access controls: Granting excessive permissions to users can lead to unauthorized access and data breaches. Implementing proper access controls helps maintain a secure server.

To protect your server from cyber threats, it is crucial to make it difficult for cybercriminals to infiltrate your server software and systems. Here are some tips to enhance your server security:

Tips to increase server security

  • Update third-party software and operating systems regularly to fix known vulnerabilities.
  • Use strong, unique passwords for all user accounts and change them periodically.
  • Enable encryption for data transmission to ensure a secure server connection.
  • Implement strict access controls and limit the number of users with administrative privileges.
  • Regularly test your server for vulnerabilities and apply necessary security patches.
  • Perform frequent backups to protect your data in case of a breach or system failure.

How to manage server security with Real VNC’s RPort technology

Real VNC’s RPort technology offers a highly secure solution for managing server security. It provides several unique selling points that help you maintain server security:

  • Instant secure and encrypted remote desktop or SSH access to all your servers without a VPN
  • Integration with existing security infrastructure and tools, like VNC Connect or Web-RDP
  • Intuitive, easy-to-use inventory management, remote access, script execution, VPN replacement, and much more
  • Securely log into any Windows or Linux server without a public IP address from your desktop

In the context of server security, Real VNC’s RPort product is an ideal solution for efficiently managing an organization’s entire IT infrastructure from your browser, command line or REST API.

Find out how RPort can change the way you manage your infrastructure here.

Summary

Server security is crucial in today’s digital landscape, as cyber threats continue to evolve and become more sophisticated. By understanding common server security issues and implementing best practices, you can safeguard your organization’s digital assets and maintain a secure online presence. Real VNC’s RPort technology offers a robust solution for managing server security and ensuring a web secure server environment.

The post What is server security? appeared first on RealVNC®.

]]>
4 Reasons Why Internal IT Teams Should Marry Their Remote Access with Remote Management https://www.realvnc.com/en/blog/internal-it-teams-remote-access-management/ Thu, 08 Jun 2023 10:27:01 +0000 https://www.realvnc.com/en/?post_type=blog&p=18974 Remote access made it possible for support teams to quickly solve user problems. But there’s another opportunity to further improve service delivery and drive down support costs.

The post 4 Reasons Why Internal IT Teams Should Marry Their Remote Access with Remote Management appeared first on RealVNC®.

]]>

If you’ve worked on or managed a service desk, one of the most used tools today is some form of remote access. It’s the easiest way to help users work through their problems and is the IT embodiment of the phrase “a picture is worth a thousand words”. After all, no one in IT wants to work strictly over the phone and try to work through countless screens, commands, etc. All this while constantly having to ask the user: “What do you see now?”

To achieve a positive ROI on the helpdesk, the productivity of the support staff is crucial; it’s one of the reasons you use remote access in the first place.

While remote access provides IT support teams with the needed visibility to solve user problems quickly and efficiently, remote access shouldn’t exist in a silo. It should be used as part of a remote management solution that collects and presents information about the systems being supported to the support staff.

If you’re solely using remote access, you may not see the value of having remote management used in conjunction with remote access.  If this is you, let me offer up four reasons why remote management should be a fully integrated part of your remote access support efforts.

1. You can’t manage what you don’t know about

Remote management solutions (in general) maintain an inventory of systems and devices on the network.  Sure, your team can always ask a user what their computer name is (or walk them through the steps to find it) and then remotely access it, but in the interest of productivity, wouldn’t it make more sense to, say, simply search for the user’s username, find the machine that has that user logged on, and then do something as simple as right-clicking the machine icon and selecting the remote access option?

And then there are those situations where the problem isn’t the user themselves; they are just the symptom of a larger problem solved by IT needing to remote into a Linux machine or even an IoT device.  To fix the issue, you’d need to know where said machine/device is and its’ address, right?

Remote management provides this needed context that takes away the step of IT needing to find the machine to be remotely accessed.

2. Support should look before they leap

Let’s say a user submits a ticket saying their Internet is slow.  That’s all you have to go on.  The support staff member could remotely access the machine, realize it’s very slow, and figure out it’s a saturated processor or a slow local disk about to die after doing some digging around. Remote management solutions not only inventory but typically come with monitoring of the found systems to establish both a configuration and to provide an up-to-date status on resource usage.

In the same scenario above, the support person could navigate to the user’s endpoint in the remote management solution, see that the processor utilization is at 100% and have a pretty good idea that their trying to remotely access the system is going to be a slow process, and potentially walk the user through killing the responsible process through, say, Task Manager, before using remote access to determine a proper solution (e.g., updating the offending application to the latest version).

3. Remote access isn’t universal

Today’s service desk supports much more than standardized Windows endpoints; you’ve got a mix of MacOS, mobile devices, Chromebooks, tablets, and more.  And not all of those varied devices support using the exact same remote access protocol and client.  Mature remote management solutions provide access to contextually appropriate remote access tools to enable support staff to follow the same process (that is, find the device, right-click, and select the remote access entry in the menu) without needing to worry themselves with issues like whether they have the right tool, let alone which tool is the right one in the first place.

4. Some things are better handled without remote access

Remote access isn’t always the most efficient way to address problems; in some cases, it’s just an extra step in the process.  Take the example of a documented issue in the support desk’s knowledgebase where the answer is to modify a registry entry in the Windows Registry.  Let’s assume that, in this example, the problem happens enough that someone has written a script that performs the change. If you could remotely run said script, doesn’t that make remotely accessing the user’s endpoint seem like an unnecessary step?  Or what about if the answer is to simply copy an updated version of a given file to the remote endpoint?                 

Many remote management solutions provide the ability to remotely run commands and scripts in a wide variety of endpoint-supported scripting languages as well as copy files without ever needing to start a remote access session on the user’s endpoint.  This is far more efficient and improves the productivity of both the support staff and the user (whose problem is solved sooner without ever needing to stop their work to allow remote control in the first place).

Remote support should include access and management

Every support desk has the same basic goal: to provide fast, efficient support at a cost as low as possible.  Remote access certainly has taken service desk materially to that end.  The addition of remote management can have the same compounding effect by significantly speeding up the process of finding systems to be remotely supported, determining contextual details that help pinpoint root causes, assisting in connecting using the appropriate method and performing repeated tasks without ever disturbing the user.

If you’re not using remote management as part of your support desk arsenal, I suggest investigating how a solution might be used to improve your team’s service delivery while making everyone’s job a bit easier.

The post 4 Reasons Why Internal IT Teams Should Marry Their Remote Access with Remote Management appeared first on RealVNC®.

]]>