RDP Ransomware Attacks: What Can You Do to Protect Your Business?
RDP Ransomware Attack Prevention Tip #1
Make sure all the passwords on your Server and workstations are all strong passwords, combining uppercase, lowercase, numbers, and symbols. There is debate around whether changing passwords every 3 months is necessary, however, there is no debate surrounding the topic of strong passwords.
RDP hackers will continually try a brute-force attack on your system, trying basic usernames with basic passwords. Strong passwords are a must. Brute-force RDP attacks lead me on to my next tip.
RDP Ransomware Attack Prevention Tip #2
Enforce Limited Log-in Attempts
The Domain Controller on your network needs to be configured in such a way as to limit the login attempts for every user on your network. This will help to keep you secure from brute-force attacks. We suggest putting a limit of 5 attempts. Anything less might result in a lot of support calls to your IT vendor to unlock the account.
Let’s face it, sometimes you need more than 3 go’s in order to type in your complex password, especially when you are in a rush.
RDP Ransomware Attack Prevention Tip #3
Enforce Two-Factor Authentication – 2FA
This is the number one step you can take in ensuring that no hacking occurs through the RDP port on your server. We use a system that requires a user to approve the connection through their mobile device once first authenticating with the Server. Without this protection in place, your network is seriously at risk.
RDP Ransomware Attack Prevention Tip #4
Use a VPN
This is an old school method of protecting your network. This enforces the need to at least authenticate once prior to accessing the RDP server. Incorrectly configured the use of a VPN can give a hacker full access to your network, allowing them to wreak havoc depending on the other security measures on your system.
- Use a complex password.
- If practical, only allow access from specific IP addresses.
- Use 2FA.
- Use a different password to those used on the network.
RDP Ransomware Attack Prevention Tip #6
Limited RDP Access to Particular IP Addresses
If practical, RDP access should be limited to only accept connections from PC’s from specific IP addresses. A logon attempt from any other IP address source needs to be rejected immediately, thus securing your network. This isn’t always practical if the user is travelling.
RDP Ransomware Attack Prevention Tip #7
Use a Strong Firewall to Protect your RDP Connections
A firewall needs to be in place to protect your network. Preferably your firewall should have the ability to block connections from IP addresses that repeatedly try to compromise your system. This step will also protect you from brute-force attacks.
The firewall of course needs to block all ports that are not required, both incoming and outgoing.
RDP Ransomware Attack Prevention Tip #8
Some ransomware attacks are Trojan based and can be stopped in their tracks if you use a decent antivirus to protect your Server. Be sure to use an Enterprise grade Antivirus to protect your server. Reach out to us if you need help.
RDP Ransomware Attack Prevention – Other Measures
Below is a quick list of other things to attend to in securing your network…
- Use an Active Directory Domain
- Use a spam filter for every email address on your network
- Restrict wireless access to employees, make them join a guest network if needed
- Do not allow the checking of private emails or browsing of non-work-related sites by employees
If you need any help in securing your network, please reach out to us for a no-obligation assessment.