Hi [[ session.user.profile.firstName ]]

Stop Hackers by Securing Remote Desktop Protocol (RDP) for IT Support

Many IT departments and IT services vendors rely on Microsoft Remote Desktop Protocol (RDP) to access and work on their own or their clients’ remote computers and systems. Unfortunately, RDP is a common access pathway for hackers, who easily guess default logins and passwords or use brute-force attacks to gain control of RDP connections. Today, there is a thriving interest in RDP hacking, with cybercriminals buying and selling access to point-of-sale terminals and other systems that have RDP enabled on underground forums.

In fact, the 2013 Trustwave Global Security Report states: “Organizations that use third-party support typically use remote access applications like Terminal Services (termserv) or Remote Desktop Protocol (RDP), pcAnywhere, Virtual Network Client (VNC), LogMeIn or Remote Administrator to access their customers’ systems. If these utilities are left enabled, attackers can access them as though they are legitimate system administrators.”

Natively, RDP has no centralized management, auditing or reporting, and limited identity management integration. In addition, RDP is designed for remote access on a local area network (LAN), and establishing a connection to a computer on a remote network usually requires a VPN tunnel and firewall configurations that compromise security - such as opening the default listening port, TCP 3389.

In this webinar, Bryan Hood, Sr. Solutions Engineer at Bomgar, will demonstrate how organizations can eliminate these security gaps, by routing RDP through Bomgar’s secure remote support appliance. With this approach, tech support professionals can still access and fix all of the systems they need to, without opening a door to hackers.
Recorded Feb 18 2014 36 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Bryan Hood, Sr. Solutions Engineer, Bomgar
Presentation preview: Stop Hackers by Securing Remote Desktop Protocol (RDP) for IT Support

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Control The Access, Control The Asset Recorded: Apr 12 2016 57 mins
    Joe Schorr, Chris Clarkson
    An increasing number of high-profile data breaches are being traced back to compromised third-parties. Cybercriminals know that many companies have poor policies and technology in place to manage vendor access to their network. If a hacker takes advantage of vendor vulnerabilities and accesses your network disguised as a legitimate third-party, they typically have weeks or months to move around and gain access to critical systems. This webinar will feature a live hack that will show step by step how cyber criminals gain footholds into your network and ultimately infiltrate sensitive systems. You will also hear results from groundbreaking research on why vendor vulnerabilities exist, and offer solutions for what companies can do to increase their security posture and mitigate the threat from third-party access.
  • Learn How UNC Health Care Improved Efficiency of Customer Support Recorded: Mar 9 2016 59 mins
    Mike Sell and Brian Page (Bomgar), David Martinez (HEAT), Annette Davis (UNC Health Care)
    The service desk continually invests time and money into solutions that can more efficiently track issues and resolve end-user requests. One key element in service desk support success is integrations, specifically between remote support and ticketing systems. Your remote support software should fit seamlessly into your environment and increase your return on those investments. Bomgar offers pre-built integrations for the leading service desk, CRM, and systems management solutions, including an integration with HEAT Software. This webinar will feature an in depth look at the integration from solutions experts from both Bomgar and Heat, as well as implementation success from UNC Healthcare. Attendees will gain exclusive insight the value and benefits that service desks can expect to see from both the Bomgar and HEAT software solutions, as well as the integration between the two products.
  • The Demise of Passwords and the Rise of Authentication Technologies Recorded: Feb 23 2016 47 mins
    Sam Elliott (Bomgar), Andras Cser (Forreter)
    Cyberattacks dominated the news in 2015, and it’s likely that 2016 will be no different. Cyber criminals are relentless in their efforts to find and take advantage of security weaknesses, which often include privileged user credentials. As computing processing power continues to increase, it’s becoming possible to break even the most complex passwords, putting every organization at risk of devastating breaches. Rather than requiring customers and employees to memorize 20-character, non-dictionary passwords, security and risk professionals need to start plotting the demise of the password and improving the security of privileged accounts. This webcast will highlight the technologies, such as privileged access and account management tools, best suited for securing your most sensitive systems and data.
  • Managing Privileged Access Hacking Threats Recorded: Jan 19 2016 43 mins
    Joe Schorr
    Privileged access is a game of managing risk, and breaches leveraging privileged access exploits will solidify as the ‘attack of choice’ this year. Privileged account credentials with connections to valuable systems give hackers access to critical systems without triggering any alarms, making those people and roles the ideal target for hackers. It’s no wonder that we’ve seen this particular attack vector utilized time and time again, and beyond that, outside third-parties and vendors with privileged access are particularly juicy targets because they often use legacy access methods like tunneling that create unrestricted and unmonitored attack footholds on a network.

    Effectively controlling and monitoring privileged access is central to an effective defense in depth strategy. This webinar will offer insight into how to mitigate cybercrime risks and create a winning network protection strategy.
  • Bomgar InSight Recorded: Dec 9 2015 2 mins
    Bomgar Video
    Bomgar now offers remote camera sharing for iOS and Android. Watch this short video to learn more!
  • Top Tips for Vendor Management Recorded: Dec 3 2015 29 mins
    Joe Schorr
    IT professionals have a lot to think about. They are called upon to be both technologists and strategists, guiding their organizations through the technology frontier and driving new business. That being said, choosing tools to better manage security can be a stressful decision. Among security issues, vendor access and third party management has surfaced as a major vulnerability. High-profile data breaches, such as the Target hack, have made evident that giving vendors access to your internal network through methods like VPN are not secure for managing, monitoring and controlling their access. This leaves IT professionals wondering “what are my vendors doing?” This webcast will offer a checklist as a guide to help IT professionals make informed decisions about solutions that will facilitate secure connections and ultimately, secure vendor management.
  • What is Bomgar Privileged Access Management? Recorded: Nov 20 2015 3 mins
    Bomgar Video
    Bomgar Privileged Access Management enables security professionals to control, monitor and manage access to critical systems by privileged users and third-party vendors. Check out this short video to learn more!
  • Remote Support Security - How Bomgar Enables Secure Remote Access Recorded: Nov 10 2015 2 mins
    Bomgar Video
    With Bomgar, you can strengthen remote support security. Each encrypted connection is outbound, so you can connect without VPN or firewall changes. You can leverage Active Directory and LDAPS to manage authentication, define more than 50 permissions for technicians, and capture a detailed audit log of every session.
  • Bomgar Remote Support Software Recorded: Nov 2 2015 3 mins
    Bomgar Video
    Provide remote assistance securely through firewalls to any remote desktop, server, POS system, or mobile device.
  • Close the Door to Cyber-Attacks with Secure Vendor Access Recorded: Oct 15 2015 46 mins
    Joe Schorr, Sam Ellliott
    Watch a cyber-attack unfold live to show you how your vendors can unwittingly leave the door open to your network and understand how to prevent these by managing, controlling and auditing all vendor access This webcast will offer best practice recommendations on how to secure vendor access to your organization. Hear top tips on how to protect your company and customer data, infrastructure and assets from cyber-attacks by securing vendor access while improving productivity.

    This webinar will offer best practice recommendations on how to secure vendor access to your organisation. Hear top tips to protect your company and customer data, infrastructure and assets from cyber-attacks by securing vendor access whilst improving productivity.
  • Combat Higher Education Support Challenges Through Collaboration & Consolidation Recorded: Sep 17 2015 33 mins
    Doug Patel, Rocky Pedroso, Kevin Baldwin
    Tech support at a college or university can be a daunting task to take on. Most IT departments in higher education face meeting varying support demands of faculty, staff and students that are often spread across multiple locations. This makes delivering unified service a challenge. This session will outline how Bomgar can combat such issues in the higher education setting. Attendees will hear from two customers, The University of Miami and Cape Fear Community College, who will share a glimpse into how they consolidated support efforts with Bomgar to provide a more unified and collaborative approach to tech support. Learn how both schools improved all-around success for their service desks, and how they turned tech support into a positive experience for the school as a whole.
  • Ten Steps to Reap the Rewards of Chat Support Recorded: Jun 25 2015 39 mins
    Jeremy Curley, Director of Business Solutions, Bomgar
    Study after study confirms that chat is both a cost effective and customer friendly channel. However, many organizations haven’t yet implemented chat or are still relying on email and phone as primary support channels. Moving to chat can be a daunting task, and too many organizations add chat as a support channel without proper planning. Inevitably, the full benefits of chat are never realized and customers refuse to embrace the new channel. This session will share actions a support organization can take to ensure the success of a new chat channel: ten steps that can help you put the right people, processes and technology in place to successfully launch and gain value from chat support.
  • Desktop Support and Data Breaches: The Unknown Dangers Recorded: Mar 17 2015 33 mins
    Bryan Hood, Senior Solutions Engineer, Bomgar
    According to the 2014 HDI Desktop Support Practices & Salary Report, remote control tops the “must have” list of technologies to successfully provide desktop support to end users. Unfortunately, many service desks are using legacy remote access tools that often leave security gaps putting companies at higher risk of data breaches. This is not a new or unknown issue. Often, IT departments don’t realize the tools they’re using to provide tech support are also being compromised by hackers to plant malware and steal data.  According to the 2013 Trustwave Global Security Report, legacy remote access tools such as RDP and VNC are cited year after year as the most common attack pathways used by hackers. So if remote control tools top the must-have list, what can service desks do to securely support their users without putting their organizations at risk?

    This session will educate desktop support professionals on how hackers are targeting legacy systems and what they need to do to secure their environment.
  • Securing Remote Access against Backoff Malware and More Recorded: Aug 6 2014 31 mins
    Boatner Blakenstein, Sr. Director of Solutions Engineering; Bryan Hood, Sr. Solutions Engineer
    The Department of Homeland Security has issued an advisory for the “Backoff Point-of-Sale Malware,” which has compromised nearly 600 U.S. businesses. According to Karl Sigler, threat intelligence manager with Trustwave, “The criminals gained initial access through remote access systems set up on many POS systems for support and troubleshooting purposes. They would run a brute-force attack on the remote access system's passwords.”

    Most IT departments, outsourcers and vendors rely on remote access tools, such as Microsoft Remote Desktop and LogMeIn, to access and work on remote computers and systems. But these tools are too often readily accessible from any Internet location and rarely configured to require multi-factor authentication, making them easy and popular targets for hackers.

    In this webinar, Boatner Blankenstein, Sr. Director of Solutions Engineering, and Bryan Hood, Sr. Solutions Engineer, at Bomgar, will walk through the Department of Homeland Security’s recommendations for securing remote access, and explain what support teams need to do to implement these guidelines. They’ll also share best practices for improving remote access security beyond the basic recommendations to further protect systems from malware and data breaches.
  • Improving ITSM Metrics with Remote Support Recorded: Jul 17 2014 36 mins
    Adam White, Sr. Solutions Engineer, Bomgar
    Fast incident resolution is at the center of so many ITSM metrics, and remote support is a key part of a multi-channel contact center’s ability to speed time to resolution. This webinar will outline unique types of metrics that you can capture using remote support technologies, how they are related, and how to analyze those metrics to improve services. You will also learn easy methods for cutting resolution times and boost customer satisfaction scores through remote support.
  • No End User? No Problem. Mastering Unattended Remote Support with Bomgar. Recorded: Jun 19 2014 46 mins
    Adam White, Senior Solutions Engineer, Bomgar
    With more and more systems and devices needing technical support, you can’t always have or wait on end-user assistance to get you the access you need. Many remote support solutions don’t provide access to unattended systems in their core product. But with Bomgar Jump clients you can remotely access Windows, Linux and Mac computers wherever they are. In this webinar, learn different ways to access remote desktops, laptops, POS systems, kiosks and servers, even if no one is present to give you control.
  • Increasing Customer Satisfaction Despite Increased Service Desk Demands Recorded: Apr 8 2014 57 mins
    Peter Jurhs, Boise State; Deedra Pearce, Green Clinic Surgical Hospital; Ryan Pollard, CLM Group; Liz Richardson, Bomgar
    Front-line stories from Boise State, Green Clinic Health Systems and The CLM Group

    Yesterday’s service desk is fast disappearing. New technology and the eradication of geographic boundaries is changing customer expectations and service desk demands. Amid these new pressures, support organizations are taking important steps to create positive change to not only keep up with new demands, but also increase customer satisfaction.

    Peter Jurhs of Boise State, Deedra Pearce from Green Clinic Health Systems and Ryan Pollard from the CLM Group will take turns sharing brief examples of how their service desks increased customer satisfaction and efficiency while also responding to increased demand. They will also participate in a panel Q&A about increasing the scope of support, handling the impact of systems changes, best practices for maintaining positive customer relationships, and more.
  • Stop Squandering Service Management Spend: Maximize ROI through Integration Recorded: Mar 12 2014 35 mins
    Sara Lisch, Business Solutions Manager, Bomgar
    Today’s support centers spend a lot of money and resources on technology, including phones, service management, remote support, self-help, and knowledge base systems. Unfortunately, most organizations only leverage the most basic functions within these tools, rather than exploiting the wide variety of available features. Often this is due to user learning being left to “tribal knowledge” versus formalized training. In addition, support centers make processes more complicated by not integrating systems in order to provide a seamless path for both customers and support agents. When systems aren’t fully utilized or integrated, agents are forced to jump between multiple tools and processes, slowing down issue resolution and creating inconsistent and poor support experiences for customers.

    In this webinar, Sara Lisch, Business Solutions Manager at Bomgar, will outline how organizations can fully utilize integrated web-based technologies to better resolve issues and provide a stellar customer experience. Sara will cover:

    - Basic and advanced usage of remote support, chat, knowledge base and ticket management tools
    - How to utilize built-in features to enable a consistent support experience and a more streamlined workflow
    - Best practices for integrating systems and processes to provide a seamless experience for customers and agents
  • Say Goodbye to Yesterday’s Service Desk Recorded: Feb 27 2014 45 mins
    Featuring guest speaker Amy DeMartine, Forrester Research, Inc., and Nathan McNeil, Bomgar
    A recent Forrester Research survey found that when IT and business organizations are asked whether IT delivers high-quality, timely end user support that anticipates employee/customer needs, there is a huge disparity. IT professionals think they are doing a good job, whereas the business disagrees. For most IT organizations, the service desk is the most used single point of contact (SPOC) for business customers¹, making it the lens through which all of IT is viewed. If IT leaders want to improve customer service and the perception of IT, they need to stop obsessing over traditional service desk metrics, and start analyzing whether the quality of interactions is meeting the business’s expectations.

    In this webinar, Forrester Senior Analyst Amy DeMartine, will outline the questions Infrastructure & Operations leaders should be asking to fully understand whether their service desk is meeting business needs. Amy is a member of Forrester's service management and automation team, which serves I&O and service support and delivery professionals in improving, optimizing, and automating the services they offer to business consumers and users. Amy will also share five key strategies for improving the customer experience and keeping the service desk relevant.

    In addition, Nathan McNeill, Co-founder and Chief Strategy Officer at Bomgar, will provide an overview of some best practices and tools service desks can implement to support these strategies.

    ¹”This Isn’t Your Grandfather’s Service Desk”, Forrester Research, Inc., November 15, 2013
  • Stop Hackers by Securing Remote Desktop Protocol (RDP) for IT Support Recorded: Feb 18 2014 36 mins
    Bryan Hood, Sr. Solutions Engineer, Bomgar
    Many IT departments and IT services vendors rely on Microsoft Remote Desktop Protocol (RDP) to access and work on their own or their clients’ remote computers and systems. Unfortunately, RDP is a common access pathway for hackers, who easily guess default logins and passwords or use brute-force attacks to gain control of RDP connections. Today, there is a thriving interest in RDP hacking, with cybercriminals buying and selling access to point-of-sale terminals and other systems that have RDP enabled on underground forums.

    In fact, the 2013 Trustwave Global Security Report states: “Organizations that use third-party support typically use remote access applications like Terminal Services (termserv) or Remote Desktop Protocol (RDP), pcAnywhere, Virtual Network Client (VNC), LogMeIn or Remote Administrator to access their customers’ systems. If these utilities are left enabled, attackers can access them as though they are legitimate system administrators.”

    Natively, RDP has no centralized management, auditing or reporting, and limited identity management integration. In addition, RDP is designed for remote access on a local area network (LAN), and establishing a connection to a computer on a remote network usually requires a VPN tunnel and firewall configurations that compromise security - such as opening the default listening port, TCP 3389.

    In this webinar, Bryan Hood, Sr. Solutions Engineer at Bomgar, will demonstrate how organizations can eliminate these security gaps, by routing RDP through Bomgar’s secure remote support appliance. With this approach, tech support professionals can still access and fix all of the systems they need to, without opening a door to hackers.
Valuable tech support and service desk management content
Gain knowledge and learn best practices related to internal and external tech support from industry experts and Bomgar customers and partners.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Stop Hackers by Securing Remote Desktop Protocol (RDP) for IT Support
  • Live at: Feb 18 2014 5:00 pm
  • Presented by: Bryan Hood, Sr. Solutions Engineer, Bomgar
  • From:
Your email has been sent.
or close