Navigation
MENUMENU
MENUMENU
  • SOLUTIONS
        • INFORMATION SECURITY
          • Vulnerability Management
          • Multifactor Authentication
          • Threat Intelligence
          • Network Management Solutions
          • Security Information and Event Management
          • Remote Access Software
          • Systems Administration Tools
          • Robotic Process Automation
          • Data Loss Prevention
          • Data / Password Recovery
          • Asset Management Solutions
          • Identity and Access Management
          • Antivirus
          • Activity Monitoring and Surveillance
          • Forensic Solutions
        • SOFTWARE DEVELOPMENT
          • Integrated Development Environments
          • Development Components
            • UI Components
            • Networking Components
            • Office Components
            • Barcode Components
            • Communication
          • Imaging Solutions
          • Software Localization
          • Release Automation & Management
          • eLearning Authoring Solutions
          • Charting Solutions
          • PDF Solutions
          • Reporting Solutions
          • Testing & QA
          • Text Retrieval/Enterprise Search
          • Database
  • SERVICES
    • TRAINING SERVICES
    • IMPLEMENTATION SERVICES
    • AFTER-SALES SERVICES
    • BEST PRACTICES CONSULTING
  • WHAT'S NEW
    • EVENTS
    • LATEST UPDATES
    • SPECIAL OFFERS
  • ABOUT
    • ABOUT US
    • OUR PARTNERS
    • PARTNERSHIP WITH LOGON
    • CAREER WITH LOGON
  • SEARCH
Software Asia Limited
  • SOLUTIONS
        • INFORMATION SECURITY
          • Vulnerability Management
          • Multifactor Authentication
          • Threat Intelligence
          • Network Management Solutions
          • Security Information and Event Management
          • Remote Access Software
          • Systems Administration Tools
          • Robotic Process Automation
          • Data Loss Prevention
          • Data / Password Recovery
          • Asset Management Solutions
          • Identity and Access Management
          • Antivirus
          • Activity Monitoring and Surveillance
          • Forensic Solutions
        • SOFTWARE DEVELOPMENT
          • Integrated Development Environments
          • Development Components
            • UI Components
            • Networking Components
            • Office Components
            • Barcode Components
            • Communication
          • Imaging Solutions
          • Software Localization
          • Release Automation & Management
          • eLearning Authoring Solutions
          • Charting Solutions
          • PDF Solutions
          • Reporting Solutions
          • Testing & QA
          • Text Retrieval/Enterprise Search
          • Database
  • SERVICES
    • TRAINING SERVICES
    • IMPLEMENTATION SERVICES
    • AFTER-SALES SERVICES
    • BEST PRACTICES CONSULTING
  • WHAT'S NEW
    • EVENTS
    • LATEST UPDATES
    • SPECIAL OFFERS
  • ABOUT
    • ABOUT US
    • OUR PARTNERS
    • PARTNERSHIP WITH LOGON
    • CAREER WITH LOGON
  • SEARCH

Set your main menu in Appearance > Menus

Email Us Service Hotline: +852 25128491
Software Asia Limited
  • SOLUTIONS
        • INFORMATION SECURITY
          • Vulnerability Management
          • Multifactor Authentication
          • Threat Intelligence
          • Network Management Solutions
          • Security Information and Event Management
          • Remote Access Software
          • Systems Administration Tools
          • Robotic Process Automation
          • Data Loss Prevention
          • Data / Password Recovery
          • Asset Management Solutions
          • Identity and Access Management
          • Antivirus
          • Activity Monitoring and Surveillance
          • Forensic Solutions
        • SOFTWARE DEVELOPMENT
          • Integrated Development Environments
          • Development Components
            • UI Components
            • Networking Components
            • Office Components
            • Barcode Components
            • Communication
          • Imaging Solutions
          • Software Localization
          • Release Automation & Management
          • eLearning Authoring Solutions
          • Charting Solutions
          • PDF Solutions
          • Reporting Solutions
          • Testing & QA
          • Text Retrieval/Enterprise Search
          • Database
  • SERVICES
    • TRAINING SERVICES
    • IMPLEMENTATION SERVICES
    • AFTER-SALES SERVICES
    • BEST PRACTICES CONSULTING
  • WHAT'S NEW
    • EVENTS
    • LATEST UPDATES
    • SPECIAL OFFERS
  • ABOUT
    • ABOUT US
    • OUR PARTNERS
    • PARTNERSHIP WITH LOGON
    • CAREER WITH LOGON
  • SEARCH
View large
Isdecision-news, news

Protecting Active Directory logins for remote working | IS Decisions

Posted on at by logon

Protecting Active Directory logins for remote working

This article was originally published by LOGON’s partner IS Decisions.

The boom in working from home has become a bonanza for cyber attackers. Each time an employee connects to the corporate network from their home they create an access point that can often be exploited. With Windows Active Directory (AD) still being the core identity and access platform for businesses around the world, the single best thing you can do to improve security is to protect the remote use of these Active Directory credentials.

 

Phishing the most vulnerable

According to the Cyber Threat Alliance, there is a flood of new phishing emails devoted to the coronavirus. And like COVID-19 itself, the hackers are now interested in the most vulnerable, your new remote workers. Phishing doesn’t attack Active Directory directly but it takes advantage of the employee’s desire to click a link. As your employees are self-isolating and feeling uncertain, the desire to click and connect has never been stronger!

By looking to steal employee credentials, attackers want to then escalate privileges and move laterally within your network, looking for systems, applications and data of value that they can exploit. And what’s more, like coronavirus, you might not even know you are infected. According to the Ponemon Institute, the average time taken to discover a breach is 191 days.

 

The threat surface has rapidly expanded

In the best of times, the often inadequate protection of Active Directory logins puts businesses at significant cyber risk. And now, as the majority of business shift to working from home, this threat surface has rapidly expanded.

The risk is all the greater since we’ve all had to rapidly migrate to home working without the time to prepare. It has forced some companies to rush to allow Microsoft remote desktop (RDP) access.

Remote desktop access allows employees to access desktop resources that they need, without having to be on premise. This helps prevent the common issues that might arise for remote workers, such as not having enough computing power, or not having access to the files and applications they need.

Continue reading the article

Learn More about IS Decisions

Two-Factor authentication on Active Directory logins is a security enhancement that asks employees to present two pieces of evidence when logging into an account. UserLock makes this easy by working closely alongside Active Directory to offer 2FA and full access management on all Windows logins and RDP connections. It can be added to all remote access requests and involves the employee using either an application authenticator or token as their second factor.

Book a Demo
Start First Trial
was last modified: June 9th, 2021 by logon
Share Post
Previous
Security risks working from home | Holm Security
Next
What is Vulnerability Management and Why Does Your Enterprise Need It? | ArcusTeam

About Author

logon

COMPANY

Company Overview
Career with LOGON
Contact Us

JOIN US TODAY

Resellers
Software Publishers
Procurement Managers

WE ARE AVAILABLE ON

SAP Ariba   coupa

gem

SERVICES

Training Services
Implemetation Services
After-sales Services
Best Practices Consulting

WHAT'S NEW

Events
Latest Updates
Special Offers

FOLLOW US ON

GET IN TOUCH

Phone:+852 25128491
Email: [email protected]

Legal   |   Privacy Policy

Important Links

  • Call me
  • Legal
  • Privacy Policy

Search engine

Use this form to find things you need on this site
Search

Results for {phrase} ({results_count} of {results_count_total})

Displaying {results_count} results of {results_count_total}

Dont see what you were looking for ? Retry the search with a different phrase ? If unsuccessful, please click here

Generic filters
Exact matches only
Search in title
Search in content
Search in excerpt
Newsletter
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Contact Us Today
Book a Demo with us


Book a Demo with us


Free Website Risk Detection Request

    Request a Demo !

      Search

      Results for {phrase} ({results_count} of {results_count_total})

      Displaying {results_count} results of {results_count_total}

      Dont see what you were looking for ? Retry the search with a different phrase ? If unsuccessful, please click here

      Generic filters
      Exact matches only
      Search in title
      Search in content
      Search in excerpt
      UserLock Video