Remote access has been a concern since the dial-up days of the internet's infancy. But ubiquitous connectivity only increases enterprise security concerns, says Bomgar's Sam Elliott, who outlines six steps to secure remote access.
"One of the stats we like to cite is Trustwave found that unsecured remote access tools are the leading method of compromise used by cyber criminals," says Elliott, director of security product management at Bomgar. "It's a lot easier for a threat actor to do a quick search on the internet and find an unsecured remote access pathway into an organization than it is for them to use more mature tradecraft like phishing or some brute force access." Read more.