BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    Use Cases and Industries
    See All Products
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

Unsecure Remote Access Again Named Top Method of Compromise in 2017 Trustwave Global Security Report

June 26, 2017

  • Blog
  • Archive

As cyber breaches show no sign of slowing down, it’s more important than ever for organizations to shore up their security posture to protect themselves from a cyberattack. In the 2017 Trustwave Global Security Report, unsecure remote access tools were called out as the leading method of compromise used by cybercriminals, accounting for 30% of the compromises investigated in 2016 – and increase of almost double from the previous year.

2017 Trustwave Global Security Report

The cost and effort needed to secure your network against a cyber breach can be far less than those of cleaning up after one.  The report put together a list of several security measures that organizations should consider when shoring up their security posture, including recommendations concerning remote access solutions:

2017 Trustwave Global Security Report

This year’s report also puts retail organizations on high alert, the most common vertical target in attacks the report investigated. For the retail industry, e-commerce attacks and Point of Sale (POS) attacks were both observed. POS attacks have increased from 22% in 2015 to 31% in 2016, according to the report. The main goal of POS attacks is to gain card data from customers, which can be sold to other hackers or used for fraudulent online purchases.

On the bright side, companies are responding to hacking threats at a faster rate. The report reveals that the number of days to detect breach has decreased from 80.5 days to 49 days. Breaches are being contained faster as well, averaging 2.5 days from detection to containment.

Bomgar’s Secure Access solutions are the choice of the top IT service and support organizations around the world, enabling both employees and vendors to securely connect to Windows, Mac, Linux, iOS and Android devices, regardless of location.  Using Bomgar Remote Support, you’ll replace legacy remote access tools with a complete solution designed for the needs of security-conscious support organizations. Bomgar works through firewalls without VPN tunneling, so your perimeter security can remain intact. All session traffic is encrypted, and Bomgar logs and records each remote session for a detailed audit trail.

For more details on how Bomgar’s solutions enable retail IT organizations to access remote systems and point of sale systems quickly and securely, read this whitepaper and check out our solutions page.

Photograph of Stacy Blaiss

Stacy Blaiss, Director, Product Marketing

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Whitepapers

Mapping BeyondTrust Solutions to the Identity, Credential, and Access Management (ICAM) Architecture

Whitepapers

Four Key Ways Governments Can Prepare for the Growing Ransomware Threat

Whitepapers

The Operational Technology (OT) Remote Access Challenge

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.