Guide to Securing Remote Access Software
Many of the beneficial features of remote access software make it an easy and powerful tool for malicious actors to leverage, thereby rendering these businesses vulnerable. This guide provides an overview of common exploitations and associated tactics, techniques, and procedures (TTPs) along with recommendations to IT/ OT and ICS professionals and organizations.