The Hidden Vulnerabilities of Remote Access Tools

The Hidden Vulnerabilities of Remote Access Tools
Author: ISACA
Date Published: 29 March 2021

The sudden shift to remote work caused by the COVID-19 pandemic left organizations and IT departments scrambling to provide in-home office solutions that would allow employees to continue working safely. One such product is a remote access tool, which helps tech support troubleshoot computer problems without requiring physical proximity to the device. “Some of these remote controls and capabilities have saved jobs and made working conditions safer during the COVID-19 pandemic,” security expert Dustin Brewer says in the “Remote Access Tools From a Hacker Perspective” episode of the ISACA® Podcast.

Although remote access tools save time and enable employees to get back to work faster, they can also be weaponized by attackers. In the podcast, Brewer and security expert Frank Downs examine the February 2021 cyberattack that occurred at a water treatment facility in Oldsmar, Florida, USA, and discuss the role of supervisory control and data acquisition (SCADA) networks in public infrastructure. “For us to move forward and evolve, we have to start putting our trust into these [networks],” Brewer says.

Learn more about remote access attacks by listening to “Remote Access Tools From a Hacker Perspective” on the ISACA® website, Apple Podcasts, Podbean, Spotify or Stitcher.