March 26, 2012
Quite a few IT departments throughout the U.S. are much more worried about safety problems associated with remote access applications and remote management goods. This new awareness happens the heels of recent info concerning the theft of Symantec’s pcAnywhere’s supply code. This headline news has highlighted the continuing problem of poorly configured remote access applications. These applications account to get a big slice of all information breaches.
Two current research have verified that there’s a issue with remote-access software program. Safety firm, Trustwave released a international safety report that showed 62% of information breaches had been through remote access software program. The study looked over 300 breaches and analyzed the outcomes of numerous testing it conducted with respect to its customers. This discovering matches up using the other new study by Verizon. That business checked out breaches and discovered that 64% of information thieves utilized weaknesses in remote access software program.
“The marketplace issue is a lot larger than pcAnywhere,” says Joel Bomgar, CEO and founder of enterprise remote-management software program maker Bomgar. “That whole group of technologies is inherently danger prone. Whenever you have listening ports, somebody is certainly going to locate a method to brute-force it.”
While the trend in computing has been to reduce the overall exposure of potentially vulnerable systems, remote-access software runs counter to those efforts, Bomgar says. Companies are routinely exposing systems inside their network to outside attackers, and frequently the only security is a poorly chosen password. Other things like hardware authentication can be helpful.
Although most of the attention has been to the hacking of pcAnywhere’s remote access, there are other more insecure areas of remote access that should have more focus. The top two are virtual network computing (VNC) system. VNC is an open source method to remotely access and manage desktop computers. The other weak area is the Remote Desktop Protocol (RDP). Many of these VNC and RDP ports are open and vulnerable to data hackers.
The biggest portion of systems like these that have been breached are point-of-sale servers in restaurants and other similar retail businesses. Most of these companies don’t have the IT resources to lock down their systems in house. They rely on third party vendors who require and use remote access. On top of this, many third party vendors don’t use strong security measures to prevent attacks.