CEI Speaker Spotlight: Tod Ferran

0
1499

Ferran CEIHackers Use Remote Access Against You


By Tod Ferran, Security Analyst at SecurityMetrics, CISSP, QSA

Remote access technologies make business communication extremely convenient, but with simplicity…comes more vulnerability. In fact, insecure remote access is the number one attack pathway used by hackers today. If not properly secured, remote access allows attackers to bypass the firewall and most other system security measures and remotely gain access to systems in a healthcare environment.

Would it surprise you to learn that according to SecurityMetrics forensics investigation data of breached organizations during 2014, insecure remote access played a role in 93% of investigated cases?

All remote access applications are vulnerable to cyber attack, mostly because of the way they are configured by default. If hackers already know which ports you are using to connect with remote access, all that’s left to attack are your individual credentials. All too often, these individual credentials are weak and easily guessable.

But don’t get too discouraged. When implemented and managed properly, remote access can be secure.

Come to my Compliance and Ethics Institute session on October 6 at 3:00 p.m. to find out how hackers use malware to steal data, see a live hacking demo in action, and learn to secure your remote access technology against a cybercriminal invasion.

Can’t wait for the session? Check out this infographic on remote access for more information on securing remote access technology, or read my latest blogs on HIPAA security.

The 14th Annual Compliance & Ethics Institute will be held in Las Vegas October 4-7, 2015.