{"id":1796,"date":"2016-09-01T10:00:51","date_gmt":"2016-09-01T14:00:51","guid":{"rendered":"http:\/\/www.produceinventory.com\/blog\/?p=1796"},"modified":"2016-09-01T10:00:51","modified_gmt":"2016-09-01T14:00:51","slug":"beware-of-hackers-gaining-access-through-rdp-connections","status":"publish","type":"post","link":"https:\/\/www.produceinventory.com\/blog\/beware-of-hackers-gaining-access-through-rdp-connections\/2016\/09\/01\/","title":{"rendered":"Beware of Hackers Gaining Access Through RDP Connections"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-1797\" src=\"http:\/\/www.produceinventory.com\/blog\/wp-content\/uploads\/sites\/2\/2016\/08\/bigstock-Hacker-in-front-of-his-compute-127222697-300x200.jpg\" alt=\"hacker \" width=\"200\" height=\"134\" \/>There is a lot of hacking activity going on out there. We see examples of it quite often. If you allow outsiders to connect to your systems via Remote Desktop Protocol (RDP), which many do, we\u2019d recommend you set up rules in your firewall to only allow RDP connections from specific IP addresses. Further, if your remote users are only in North America, it would also make sense to set up rules to block requests from other parts of the world. You might find a significant improvement in performance (not to mention security) if you do this.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There is a lot of hacking activity going on out there. We see examples of it quite often. If you allow outsiders to connect to your systems via Remote Desktop Protocol (RDP), which many do, we\u2019d recommend you set up rules in your firewall to only allow RDP connections from specific IP addresses. Further, if &#8230; <a title=\"Beware of Hackers Gaining Access Through RDP Connections\" class=\"read-more\" href=\"https:\/\/www.produceinventory.com\/blog\/beware-of-hackers-gaining-access-through-rdp-connections\/2016\/09\/01\/\" aria-label=\"Read more about Beware of Hackers Gaining Access Through RDP Connections\">Read more<\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[1063,1199],"class_list":["post-1796","post","type-post","status-publish","format-standard","hentry","category-whats-new-at-waudware","tag-safeguard-rdp-connections","tag-stop-hackers-from-rdp-access","infinite-scroll-item","masonry-post","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-50","no-featured-image-padding"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Put a Stop to Hackers Gaining Access Through RDP Connections<\/title>\n<meta name=\"description\" content=\"Set up rules in your firewall to only allow RDP connections from specific IP addresses. Set up rules to both remote users from outside North America too.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.produceinventory.com\/blog\/beware-of-hackers-gaining-access-through-rdp-connections\/2016\/09\/01\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Put a Stop to Hackers Gaining Access Through RDP Connections\" \/>\n<meta property=\"og:description\" content=\"Set up rules in your firewall to only allow RDP connections from specific IP addresses. Set up rules to both remote users from outside North America too.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.produceinventory.com\/blog\/beware-of-hackers-gaining-access-through-rdp-connections\/2016\/09\/01\/\" \/>\n<meta property=\"og:site_name\" content=\"Produce Inventory Control System Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ProduceInventory\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-01T14:00:51+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.produceinventory.com\/blog\/wp-content\/uploads\/2016\/08\/bigstock-Hacker-in-front-of-his-compute-127222697-300x200.jpg\" \/>\n<meta name=\"author\" content=\"Wendy Marlow\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/beware-of-hackers-gaining-access-through-rdp-connections\\\/2016\\\/09\\\/01\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/beware-of-hackers-gaining-access-through-rdp-connections\\\/2016\\\/09\\\/01\\\/\"},\"author\":{\"name\":\"Wendy Marlow\",\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/#\\\/schema\\\/person\\\/7c961d4eb41d79fb1adae194ba4ea36a\"},\"headline\":\"Beware of Hackers Gaining Access Through RDP Connections\",\"datePublished\":\"2016-09-01T14:00:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/beware-of-hackers-gaining-access-through-rdp-connections\\\/2016\\\/09\\\/01\\\/\"},\"wordCount\":106,\"publisher\":{\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/beware-of-hackers-gaining-access-through-rdp-connections\\\/2016\\\/09\\\/01\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.produceinventory.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2016\\\/08\\\/bigstock-Hacker-in-front-of-his-compute-127222697-300x200.jpg\",\"keywords\":[\"safeguard rdp connections\",\"stop hackers from rdp access\"],\"articleSection\":[\"What\u2019s New @ WaudWare\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/beware-of-hackers-gaining-access-through-rdp-connections\\\/2016\\\/09\\\/01\\\/\",\"url\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/beware-of-hackers-gaining-access-through-rdp-connections\\\/2016\\\/09\\\/01\\\/\",\"name\":\"Put a Stop to Hackers Gaining Access Through RDP Connections\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/beware-of-hackers-gaining-access-through-rdp-connections\\\/2016\\\/09\\\/01\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/beware-of-hackers-gaining-access-through-rdp-connections\\\/2016\\\/09\\\/01\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.produceinventory.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2016\\\/08\\\/bigstock-Hacker-in-front-of-his-compute-127222697-300x200.jpg\",\"datePublished\":\"2016-09-01T14:00:51+00:00\",\"description\":\"Set up rules in your firewall to only allow RDP connections from specific IP addresses. Set up rules to both remote users from outside North America too.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/beware-of-hackers-gaining-access-through-rdp-connections\\\/2016\\\/09\\\/01\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/beware-of-hackers-gaining-access-through-rdp-connections\\\/2016\\\/09\\\/01\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/beware-of-hackers-gaining-access-through-rdp-connections\\\/2016\\\/09\\\/01\\\/#primaryimage\",\"url\":\"http:\\\/\\\/www.produceinventory.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2016\\\/08\\\/bigstock-Hacker-in-front-of-his-compute-127222697-300x200.jpg\",\"contentUrl\":\"http:\\\/\\\/www.produceinventory.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2016\\\/08\\\/bigstock-Hacker-in-front-of-his-compute-127222697-300x200.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/beware-of-hackers-gaining-access-through-rdp-connections\\\/2016\\\/09\\\/01\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Beware of Hackers Gaining Access Through RDP Connections\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/\",\"name\":\"Produce Inventory Control System Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/#organization\",\"name\":\"Produce Inventory Control System Blog\",\"url\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/03\\\/produce-inventory-control-system-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/03\\\/produce-inventory-control-system-logo.png\",\"width\":217,\"height\":75,\"caption\":\"Produce Inventory Control System Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ProduceInventory\",\"https:\\\/\\\/www.youtube.com\\\/@PICS-Software\\\/videos\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/fcharleswaud\\\/\",\"https:\\\/\\\/www.instagram.com\\\/waudwarepics\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/#\\\/schema\\\/person\\\/7c961d4eb41d79fb1adae194ba4ea36a\",\"name\":\"Wendy Marlow\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/36a7382f04247b01f69499f67fa612c2cda4f45c1dd3c2e9a494be2d9c7a6edf?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/36a7382f04247b01f69499f67fa612c2cda4f45c1dd3c2e9a494be2d9c7a6edf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/36a7382f04247b01f69499f67fa612c2cda4f45c1dd3c2e9a494be2d9c7a6edf?s=96&d=mm&r=g\",\"caption\":\"Wendy Marlow\"},\"url\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/author\\\/wendymarlow\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Put a Stop to Hackers Gaining Access Through RDP Connections","description":"Set up rules in your firewall to only allow RDP connections from specific IP addresses. Set up rules to both remote users from outside North America too.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.produceinventory.com\/blog\/beware-of-hackers-gaining-access-through-rdp-connections\/2016\/09\/01\/","og_locale":"en_US","og_type":"article","og_title":"Put a Stop to Hackers Gaining Access Through RDP Connections","og_description":"Set up rules in your firewall to only allow RDP connections from specific IP addresses. Set up rules to both remote users from outside North America too.","og_url":"https:\/\/www.produceinventory.com\/blog\/beware-of-hackers-gaining-access-through-rdp-connections\/2016\/09\/01\/","og_site_name":"Produce Inventory Control System Blog","article_publisher":"https:\/\/www.facebook.com\/ProduceInventory","article_published_time":"2016-09-01T14:00:51+00:00","og_image":[{"url":"http:\/\/www.produceinventory.com\/blog\/wp-content\/uploads\/2016\/08\/bigstock-Hacker-in-front-of-his-compute-127222697-300x200.jpg","type":"","width":"","height":""}],"author":"Wendy Marlow","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.produceinventory.com\/blog\/beware-of-hackers-gaining-access-through-rdp-connections\/2016\/09\/01\/#article","isPartOf":{"@id":"https:\/\/www.produceinventory.com\/blog\/beware-of-hackers-gaining-access-through-rdp-connections\/2016\/09\/01\/"},"author":{"name":"Wendy Marlow","@id":"https:\/\/www.produceinventory.com\/blog\/#\/schema\/person\/7c961d4eb41d79fb1adae194ba4ea36a"},"headline":"Beware of Hackers Gaining Access Through RDP Connections","datePublished":"2016-09-01T14:00:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.produceinventory.com\/blog\/beware-of-hackers-gaining-access-through-rdp-connections\/2016\/09\/01\/"},"wordCount":106,"publisher":{"@id":"https:\/\/www.produceinventory.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.produceinventory.com\/blog\/beware-of-hackers-gaining-access-through-rdp-connections\/2016\/09\/01\/#primaryimage"},"thumbnailUrl":"http:\/\/www.produceinventory.com\/blog\/wp-content\/uploads\/sites\/2\/2016\/08\/bigstock-Hacker-in-front-of-his-compute-127222697-300x200.jpg","keywords":["safeguard rdp connections","stop hackers from rdp access"],"articleSection":["What\u2019s New @ WaudWare"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.produceinventory.com\/blog\/beware-of-hackers-gaining-access-through-rdp-connections\/2016\/09\/01\/","url":"https:\/\/www.produceinventory.com\/blog\/beware-of-hackers-gaining-access-through-rdp-connections\/2016\/09\/01\/","name":"Put a Stop to Hackers Gaining Access Through RDP Connections","isPartOf":{"@id":"https:\/\/www.produceinventory.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.produceinventory.com\/blog\/beware-of-hackers-gaining-access-through-rdp-connections\/2016\/09\/01\/#primaryimage"},"image":{"@id":"https:\/\/www.produceinventory.com\/blog\/beware-of-hackers-gaining-access-through-rdp-connections\/2016\/09\/01\/#primaryimage"},"thumbnailUrl":"http:\/\/www.produceinventory.com\/blog\/wp-content\/uploads\/sites\/2\/2016\/08\/bigstock-Hacker-in-front-of-his-compute-127222697-300x200.jpg","datePublished":"2016-09-01T14:00:51+00:00","description":"Set up rules in your firewall to only allow RDP connections from specific IP addresses. Set up rules to both remote users from outside North America too.","breadcrumb":{"@id":"https:\/\/www.produceinventory.com\/blog\/beware-of-hackers-gaining-access-through-rdp-connections\/2016\/09\/01\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.produceinventory.com\/blog\/beware-of-hackers-gaining-access-through-rdp-connections\/2016\/09\/01\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.produceinventory.com\/blog\/beware-of-hackers-gaining-access-through-rdp-connections\/2016\/09\/01\/#primaryimage","url":"http:\/\/www.produceinventory.com\/blog\/wp-content\/uploads\/sites\/2\/2016\/08\/bigstock-Hacker-in-front-of-his-compute-127222697-300x200.jpg","contentUrl":"http:\/\/www.produceinventory.com\/blog\/wp-content\/uploads\/sites\/2\/2016\/08\/bigstock-Hacker-in-front-of-his-compute-127222697-300x200.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.produceinventory.com\/blog\/beware-of-hackers-gaining-access-through-rdp-connections\/2016\/09\/01\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.produceinventory.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Beware of Hackers Gaining Access Through RDP Connections"}]},{"@type":"WebSite","@id":"https:\/\/www.produceinventory.com\/blog\/#website","url":"https:\/\/www.produceinventory.com\/blog\/","name":"Produce Inventory Control System Blog","description":"","publisher":{"@id":"https:\/\/www.produceinventory.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.produceinventory.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.produceinventory.com\/blog\/#organization","name":"Produce Inventory Control System Blog","url":"https:\/\/www.produceinventory.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.produceinventory.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.produceinventory.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/03\/produce-inventory-control-system-logo.png","contentUrl":"https:\/\/www.produceinventory.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/03\/produce-inventory-control-system-logo.png","width":217,"height":75,"caption":"Produce Inventory Control System Blog"},"image":{"@id":"https:\/\/www.produceinventory.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ProduceInventory","https:\/\/www.youtube.com\/@PICS-Software\/videos","https:\/\/www.linkedin.com\/in\/fcharleswaud\/","https:\/\/www.instagram.com\/waudwarepics"]},{"@type":"Person","@id":"https:\/\/www.produceinventory.com\/blog\/#\/schema\/person\/7c961d4eb41d79fb1adae194ba4ea36a","name":"Wendy Marlow","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/36a7382f04247b01f69499f67fa612c2cda4f45c1dd3c2e9a494be2d9c7a6edf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/36a7382f04247b01f69499f67fa612c2cda4f45c1dd3c2e9a494be2d9c7a6edf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/36a7382f04247b01f69499f67fa612c2cda4f45c1dd3c2e9a494be2d9c7a6edf?s=96&d=mm&r=g","caption":"Wendy Marlow"},"url":"https:\/\/www.produceinventory.com\/blog\/author\/wendymarlow\/"}]}},"_links":{"self":[{"href":"https:\/\/www.produceinventory.com\/blog\/wp-json\/wp\/v2\/posts\/1796","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.produceinventory.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.produceinventory.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.produceinventory.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.produceinventory.com\/blog\/wp-json\/wp\/v2\/comments?post=1796"}],"version-history":[{"count":0,"href":"https:\/\/www.produceinventory.com\/blog\/wp-json\/wp\/v2\/posts\/1796\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.produceinventory.com\/blog\/wp-json\/wp\/v2\/media?parent=1796"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.produceinventory.com\/blog\/wp-json\/wp\/v2\/categories?post=1796"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.produceinventory.com\/blog\/wp-json\/wp\/v2\/tags?post=1796"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}