Governance & Risk Management , Incident & Breach Response , Next-Generation Technologies & Secure Development

6 Steps to Secure Remote Access

Bomgar's Sam Elliott on How to Secure the Access and the Credential
6 Steps to Secure Remote Access

Remote access has been a concern since the dial-up days of the internet's infancy. But ubiquitous connectivity only increases enterprise security concerns, says Bomgar's Sam Elliott, who outlines six steps to secure remote access.

"One of the stats we like to cite is Trustwave found that unsecured remote access tools are the leading method of compromise used by cyber criminals," says Elliott, director of security product management at Bomgar. "It's a lot easier for a threat actor to do a quick search on the internet and find an unsecured remote access pathway into an organization than it is for them to use more mature tradecraft like phishing or some brute force access."

In an interview about securing remote access, Elliott discusses:

  • Surprising vulnerabilities in remote access
  • How to secure the connection
  • How to secure the credential

At Bomgar, Elliott is responsible for the product management group that is driving product strategy for Bomgar's security products. He has more than a decade of information security, ITSM, and IT operations management experience. He also is a seasoned expert in the areas of cyber-security, data center discovery, systems configuration management, and ITSM. He resides in Atlanta, GA, with his family and can be found on twitter @samelliott.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing securityintelligence.inforisktoday.com, you agree to our use of cookies.