"NSA and Co-Authors Recommend Best Practices to Secure Remote Access Software"

Cybercriminals are using legitimate remote access software to gain access to victims' systems, blend in with regular network activity, and bypass detection. The National Security Agency (NSA), together with co-authors, released the "Guide to Securing Remote Access Software" Cybersecurity Information Sheet (CSI) in order to help network administrators and defenders follow best practices and provide recommendations on how to mitigate malicious activity. Eric Chudow, NSA's System Threats and Vulnerability Analysis Subject Matter Expert, commented that remote access may be a beneficial option for many organizations, but it could also be a threat vector into their systems. It could enable cyber actors to use or even control systems and resources if not properly secured. NSA, the Cybersecurity and Infrastructure Security Agency (CISA), the FBI, the Multi-State Information Sharing and Analysis Center (MS-ISAC), and the Israel National Cyber Directorate (INCD) are among the co-authoring agencies. This article continues to discuss the new guide on securing remote access software. 

NSA reports "NSA and Co-Authors Recommend Best Practices to Secure Remote Access Software"

Submitted by Anonymous on