{"id":6674,"date":"2022-10-06T15:06:29","date_gmt":"2022-10-06T15:06:29","guid":{"rendered":"https:\/\/www.abrahamsconsulting.com\/blog\/?p=6674"},"modified":"2022-10-06T15:06:29","modified_gmt":"2022-10-06T15:06:29","slug":"how-ransomware-attacks-leverage-unprotected-rdps-and-what-you-can-do-about-it","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/how-ransomware-attacks-leverage-unprotected-rdps-and-what-you-can-do-about-it\/","title":{"rendered":"How Ransomware attacks leverage unprotected RDPs and what you can do about it"},"content":{"rendered":"<p>Ransomware attacks targeting enterprises like yours are skyrocketing. Highly sophisticated cybercriminals use your reliance on digital communications and remote working to hold your data hostage.<br \/>\nMost of these ransomware incidents can be attributed to a limited number of intrusion vectors, namely: badly secured remote desktop protocol (RDP) endpoints; email phishing; and the exploitation of zero-day VPN vulnerabilities<br \/>\nSo, what can be done about it?<br \/>\nFortunately, Thales has solid data-centric cybersecurity solution you can implement to keep the bad guys out of your data &#8211; and your pocket.<br \/>\nAbrahams Consulting LLC is ready when you are to make it happen.<\/p>\n<p><a href=\"https:\/\/stuf.in\/ba0uvg\" target=\"_blank\" rel=\"noopener\">View: How Ransomware attacks leverage unprotected RDPs and what you can do about it<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When it comes to ransomware attacks, no business is safe.<br \/>\nCyberpredators are exploiting unprotected RDPs to extort millions from big and small companies alike.<br \/>\nBut you don&#8217;t have to sit back and wait to be victimized.<br \/>\n@Thales SafeNet Trusted Access can help you protect your business environment against RDP-based ransomware attacks.<br \/>\nDon&#8217;t wait to be a #ransomware victim.<\/p>\n","protected":false},"author":2,"featured_media":6673,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1136],"tags":[],"class_list":["post-6674","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Ransomware attacks leverage unprotected RDPs and what you can do about it - TechTonic Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/how-ransomware-attacks-leverage-unprotected-rdps-and-what-you-can-do-about-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Ransomware attacks leverage unprotected RDPs and what you can do about it - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"When it comes to ransomware attacks, no business is safe.  Cyberpredators are exploiting unprotected RDPs to extort millions from big and small companies alike.  But you don&#039;t have to sit back and wait to be victimized.  @Thales SafeNet Trusted Access can help you protect your business environment against RDP-based ransomware attacks.  Don&#039;t wait to be a #ransomware victim.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/how-ransomware-attacks-leverage-unprotected-rdps-and-what-you-can-do-about-it\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-06T15:06:29+00:00\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/how-ransomware-attacks-leverage-unprotected-rdps-and-what-you-can-do-about-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/how-ransomware-attacks-leverage-unprotected-rdps-and-what-you-can-do-about-it\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"How Ransomware attacks leverage unprotected RDPs and what you can do about it\",\"datePublished\":\"2022-10-06T15:06:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/how-ransomware-attacks-leverage-unprotected-rdps-and-what-you-can-do-about-it\/\"},\"wordCount\":126,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/how-ransomware-attacks-leverage-unprotected-rdps-and-what-you-can-do-about-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/10\/How_Ransomware_attacks_leverage_unprotected_RDPs_and_what_you_can_do_about_it_Solution_Brief_thumb.jpg\",\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/how-ransomware-attacks-leverage-unprotected-rdps-and-what-you-can-do-about-it\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/how-ransomware-attacks-leverage-unprotected-rdps-and-what-you-can-do-about-it\/\",\"name\":\"How Ransomware attacks leverage unprotected RDPs and what you can do about it - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/how-ransomware-attacks-leverage-unprotected-rdps-and-what-you-can-do-about-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/how-ransomware-attacks-leverage-unprotected-rdps-and-what-you-can-do-about-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/10\/How_Ransomware_attacks_leverage_unprotected_RDPs_and_what_you_can_do_about_it_Solution_Brief_thumb.jpg\",\"datePublished\":\"2022-10-06T15:06:29+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/how-ransomware-attacks-leverage-unprotected-rdps-and-what-you-can-do-about-it\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/how-ransomware-attacks-leverage-unprotected-rdps-and-what-you-can-do-about-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/how-ransomware-attacks-leverage-unprotected-rdps-and-what-you-can-do-about-it\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/10\/How_Ransomware_attacks_leverage_unprotected_RDPs_and_what_you_can_do_about_it_Solution_Brief_thumb.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/10\/How_Ransomware_attacks_leverage_unprotected_RDPs_and_what_you_can_do_about_it_Solution_Brief_thumb.jpg\",\"width\":600,\"height\":776},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/how-ransomware-attacks-leverage-unprotected-rdps-and-what-you-can-do-about-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Ransomware attacks leverage unprotected RDPs and what you can do about it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Ransomware attacks leverage unprotected RDPs and what you can do about it - TechTonic Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/how-ransomware-attacks-leverage-unprotected-rdps-and-what-you-can-do-about-it\/","og_locale":"en_US","og_type":"article","og_title":"How Ransomware attacks leverage unprotected RDPs and what you can do about it - TechTonic Times","og_description":"When it comes to ransomware attacks, no business is safe.  Cyberpredators are exploiting unprotected RDPs to extort millions from big and small companies alike.  But you don't have to sit back and wait to be victimized.  @Thales SafeNet Trusted Access can help you protect your business environment against RDP-based ransomware attacks.  Don't wait to be a #ransomware victim.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/how-ransomware-attacks-leverage-unprotected-rdps-and-what-you-can-do-about-it\/","og_site_name":"TechTonic Times","article_published_time":"2022-10-06T15:06:29+00:00","author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/how-ransomware-attacks-leverage-unprotected-rdps-and-what-you-can-do-about-it\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/how-ransomware-attacks-leverage-unprotected-rdps-and-what-you-can-do-about-it\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"How Ransomware attacks leverage unprotected RDPs and what you can do about it","datePublished":"2022-10-06T15:06:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/how-ransomware-attacks-leverage-unprotected-rdps-and-what-you-can-do-about-it\/"},"wordCount":126,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/how-ransomware-attacks-leverage-unprotected-rdps-and-what-you-can-do-about-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/10\/How_Ransomware_attacks_leverage_unprotected_RDPs_and_what_you_can_do_about_it_Solution_Brief_thumb.jpg","articleSection":["Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/how-ransomware-attacks-leverage-unprotected-rdps-and-what-you-can-do-about-it\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/how-ransomware-attacks-leverage-unprotected-rdps-and-what-you-can-do-about-it\/","name":"How Ransomware attacks leverage unprotected RDPs and what you can do about it - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/how-ransomware-attacks-leverage-unprotected-rdps-and-what-you-can-do-about-it\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/how-ransomware-attacks-leverage-unprotected-rdps-and-what-you-can-do-about-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/10\/How_Ransomware_attacks_leverage_unprotected_RDPs_and_what_you_can_do_about_it_Solution_Brief_thumb.jpg","datePublished":"2022-10-06T15:06:29+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/how-ransomware-attacks-leverage-unprotected-rdps-and-what-you-can-do-about-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/how-ransomware-attacks-leverage-unprotected-rdps-and-what-you-can-do-about-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/how-ransomware-attacks-leverage-unprotected-rdps-and-what-you-can-do-about-it\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/10\/How_Ransomware_attacks_leverage_unprotected_RDPs_and_what_you_can_do_about_it_Solution_Brief_thumb.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/10\/How_Ransomware_attacks_leverage_unprotected_RDPs_and_what_you_can_do_about_it_Solution_Brief_thumb.jpg","width":600,"height":776},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/how-ransomware-attacks-leverage-unprotected-rdps-and-what-you-can-do-about-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How Ransomware attacks leverage unprotected RDPs and what you can do about it"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/6674","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=6674"}],"version-history":[{"count":1,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/6674\/revisions"}],"predecessor-version":[{"id":6675,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/6674\/revisions\/6675"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/6673"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=6674"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=6674"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=6674"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}