NEW: Microsoft Vulnerabilities Report 2022 - Read the Findings of Our Annual Report Read Now

  • Partners
  • Support
  • Careers
  • English
    • Deutsch
    • français
    • español
    • 한국어
    • português
BeyondTrust
  • Products

    Privileged Password Management

    Discover, manage, audit, and monitor privileged accounts and credentials.

    • Password Safe
    • DevOps Secrets Safe
    • Privileged Access Discovery Application

    Endpoint Privilege Management

    Enforce least privilege across Windows, Mac, Linux, and Unix endpoints.

    • Windows and Mac
    • Unix and Linux
    • Active Directory Bridge

    Secure Remote Access

    Centrally manage remote access for service desks, vendors, and operators.

    • Remote Support
    • Privileged Remote Access
    • Privileged Access Discovery Application

    Cloud Security Management

    Automate the management of identities and assets across your multicloud footprint.

    • Cloud Privilege Broker

    BeyondInsight

    Experience the industry’s most innovative, comprehensive platform for privileged access management.

  • Solutions

    Use Cases

    • Cloud Security
    • Compliance
    • Cyber Insurance
    • Digital Transformation
    • Endpoint Security
    • Operational Technology
    • Ransomware
    • Service Desk Efficiency
    • Zero Trust

    Industry Applications

    • Financial Services
    • Government Agencies
    • Healthcare
    • Law Enforcement
    • Manufacturing
    • Schools & Universities

    Solutions

    The BeyondTrust Privileged Access Management portfolio is an integrated solution that provides visibility and control over all privileged accounts and users.

  • Resources

    Learn

    • Blog
    • Customer Stories
    • Competitor Comparisons
    • Datasheets
    • Videos
    • Glossary
    • Infographics
    • Podcast
    • Whitepapers

    Attend

    • Events
    • Go Beyond
    • Training
    • Webinars

    Support

    • Changelog
    • Professional Services
    • Technical Documentation

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

  • Company
    • About
    • Leadership
    • Core Values
    • Partners
    • Careers
  • Watch Demo
  • Contact Sales

Cyber Attack on Water Treatment Plant a Wake-Up Call to Harden Remote Access Security

February 10, 2021

  • Blog
  • Archive
  1. Home
  2. Blog
  3. Cyber Attack on Water Treatment Plant a Wake-Up Call to Harden Remote Access Security

Last Friday, a cyber threat actor audaciously cracked into the systems of a Florida water treatment plant leveraging the TeamViewer remote access tool, and ordered the system to increase the amount of lye in the water to extremely dangerous levels. This should serve as a blunt reminder and wake-up call that using consumer-grade remote access tools in both Operational Technology (OT) and Information Technology (IT) environments can introduce risk.

Fortunately, an employee monitoring the system noticed the threat actor’s activity in real-time and took the initiative to alert others and escalate a defensive response to prevent significant damage. But had the attacker been a bit savvier, the attack could easily have slipped further under the radar. In fact, one of the scariest things about this attack is how unsophisticated the attacker seemed to be, yet was still able to compromise critical infrastructure by leveraging an unsecured remote access tool.

With OT systems, such as systems control and data acquisition (SCADA) systems and industrial control systems (ICS), increasingly exposed to the Internet and often easily discoverable by tools like Shodan, it’s imperative that the pathways into the environment be properly locked down. Time and time again, exploits such as this one demonstrate that basic or unsecured remote access tools absolutely do not cut it in any environment where security is an important consideration.

BeyondTrust provides the only Secure Remote Access solutions that meet the rigorous requirements of Federal Information Processing Standards Publication (FIPS) 140-2 Level 1. Our Privileged Remote Access and Remote Support products are designed with security at the forefront, with a unique architecture and features that make them secure and easy-to-use in any environment.

BeyondTrust secures remote access for customers across the world’s most complex and demanding environments. Our Secure Remote Access solutions provide:

  • Remote connection security: Every remote connection is outbound through Port 443, requiring no firewall changes. You can define permissions for every session, whether for attended or unattended access. Our solution also provides the ability to proxy access to RDP, SSH, cloud instances, and Windows/Unix/Linux applications.
  • Simple authentication: Centrally manages users with existing account directories, such as LDAPS, Kerberos, Smart Card, RADIUS, for simple and secure user management. Password management and two-factor authentication are built-in, and credentials are injected into sessions without ever exposing them to the end user or system.
  • Secure architecture. Our architecture provides each customer with a unique configuration and military-grade security. Your data is never co-mingled with data from any other customer.
  • Robust session management, auditing, & reporting. Everything that happens during remote sessions is logged and recorded. And reports are stored in a tamper-proof way.
  • Seamlessly integrates with other solutions: Seamlessly integrates with ITSM, SIEM, MFA, IAM, and other solutions to help you unlock synergies across your entire IT/security ecosystem.

Next Steps: Hardening Remote Access for Your Critical Infrastructure & Sensitive Assets

Government agencies and enterprises throughout the world have an immense responsibility to keep citizens and customers safe, and their data secure—at all times. Unfortunately, the use of consumer-grade remote access tools is rampant, and frequently inadequate, inappropriate, and out of compliance, for the use cases to which it is applied.

As federal and state agencies continue to be the target for threat actors, it’s incumbent upon IT and security teams to harden remote access to protect critical infrastructure and sensitive data to the level it demands and the public expects.


Whitepapers

The Top 5 Remote Access Problems

Photograph of Julissa Caraballo

Julissa Caraballo, Product Marketing Manager

Julissa Caraballo is a Product Marketing Manager at BeyondTrust. She has over 10 years of experience in software product marketing and lead generation. Previously, Julissa worked as a Marketing Director for a medical management software company. She holds a BA in Business Administration/Marketing and a MBA in Healthcare Management. Her certifications include, Certified Digital Marketing Manager, Pragmatic Marketing Certified and Certified Medical Practice Executive. She can be found on LinkedIn and all social media platforms.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Whitepapers

Cybersecurity Insurance Checklist

Whitepapers

Azure PIM vs. BeyondTrust PAM

Whitepapers

The Guide to Just-In-Time Privileged Access Management

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support
  • Cloud Privilege Broker

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Infographics
  • Podcast
  • Videos
  • Webinars
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press
BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2022 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.