• The Cybersecurity and Infrastructure Security Agency and other federal agencies have published a Guide to Securing Remote Access Software, which provides:
    • A summary of activities associated with the malicious use of remote access software
    • Best practices recommendations for organizations to detect and defend against malicious cyber actors abusing Remote Access Software
  • Remote access software comprises a wide array of capabilities used to maintain and improve information technology (IT), operational technology (OT), and industrial control systems (ICS) services;
  • Additionally, Remote access software allows managed service providers (MSPs), software-as-a-service (SaaS) providers, IT help desks, and other network administrators to remotely perform several vital technical functions.