Remote Protocols


Remote protocols are transmission protocols in the network that enable access to remote content. These protocols are mainly used in infrastructures for IT support/helpdesk, terminal servers and virtual desktops.

Remote Desktop Protocol (RDP)

The Remote Desktop Protocol (RDP) is a protocol developed by Microsoft to enable Windows users to access another system (e.g. a company client) from one system (e.g. a company server). This facilitates decentralized collaboration. Employees can use their own laptops or computers to access their office workstation from home, for example. Employees can then access any software installed on the workstation without having to install it on the system they are accessing from. They also gain access to all files and documents on the remote system. These remain on the workstation computer at all times.

However, RDP use does carry risks: if employees use short and/or simple passwords and refrain from using multiple authentication, security gaps are revealed that cyber criminals exploit.

Brute force attacks on remote protocols

Due to the coronavirus, employees had to work remotely and move their workplace to their own homes. New work processes and structures had to be found and integrated in a very short time to allow employees to work effectively and efficiently – data protection and cyber security were often neglected during this time. The novelty and general inexperience with “remote working” often had an additional negative effect. Cybercriminals exploit this situation and intensify their attacks on companies. They often focus on remote protocol applications (such as Microsoft’s RDP). As with other┬ábrute force attacks, username-password combinations are tried and guessed. In a very short time, hackers often obtain the victim’s RDP access data and can thus act on the remote system on their behalf.

Related articles

  • Open Port

    What are the dangers of an open port? Whenever your computer connects to the Internet, such as to go to a website or to automatically detect and download updates, so-called ports come into play. Ports are similar to the house numbers of the addresses between which the connection exists and information packets are transmitted. If a port is open, you can access that open door of the digital house number and request services. For websites, certain open ports are intentional, so that site should be available at any time. For private or business devices, however, an unintentionally open port poses a danger: in the worst case, attackers can directly access the system. Firewalls block these unwanted gaps.

    mehr lesen
  • Incognito Mode

    The browser incognito mode (also called private mode) does not create a history of your website visits. However, in incognito mode, most of your bookmarks and saved passwords are accessible.

    mehr lesen

Are you curious?

Test us for 30 days free of charge and without obligation.

We empower your employees to actively contribute to your company’s cybersecurity.

See for yourself how easily and quickly Perseus can be integrated into your corporate structure.

Test now for free

Do you have any questions about our services?

Do not hesitate to call: + 49 30 95 999 8080

  • Free trial period
  • Without obligation
  • Video training for cyber security and data protection with exam and certificate
  • Try our phishing simulation
  • IT security check, malware scanner, data security check and more
  • Ends automatically after 30 days