• The risk of remote access

    ON SECURITY

    Susan Bradley

    By Susan Bradley

    A consultant I’ve used in the past in my business contacted me.

    “Hey Susan, I just had an unusual intrusion, and they used a remote-access tool in the attack sequence that I had used to access your firm. I only installed that tool to access your firm and want to make sure you review that nothing has entered your network.”

    He explained the scenario to me. He had been home relaxing and noticed that his computer had lit up, as though the keyboard were in use. At first, he thought his cat had walked across the keyboard, but then he realized his cat was nowhere near the PC. He watched as someone remotely accessed his computer, attempting to see whether he had saved passwords in his browser.

    Read the full story in our Plus Newsletter (22.23.0, 2025-06-09).

OSZAR »