There were unhappy faces all around on May 14 as Microsoft published a critical security vulnerability article detailing a flaw in the Remote Desktop Services, or RDP, part of older versions of Windows. The vulnerability could potentially allow malicious code to run on a susceptible computer without any involvement from the user. In plain English: an unprotected system is vulnerable to an invisible hacking attack.
The vulnerability exists in Microsoft Windows 7, Microsoft Server 2008 and older version of the popular Microsoft Windows operating system. The flaw is so severe that Microsoft has taken the unusual step of writing a security patch for Microsoft Windows XP, although users need to manually download the software to their computer. Microsoft Windows 8, Windows Server 2012, and later versions of Windows (including Windows 10) are already protected against the vulnerability.
What Should You Do?
BIS Consulting already lock down the RDP connection away from the Internet, which means customers enjoying our IT Maintenance plans will be protected.
If you are not one of our IT Maintenance clients CONTACT US anyway. You have enough on your plate without having to worry about extra IT issues. Let our IT pros give you a no-cost security assessment and determine a plan of action to keep you protected.
If you have someone on staff that handles your IT, we strongly recommend they immediately install the security patch using Microsoft Windows Update. We also recommend they check that your firewall has locked down the RDP connection port.
Still Using Windows XP, Server 2003, Windows 7, or Server 2008?
If you have machines running the older version of Microsoft Windows, we encourage you to retire the obsolete Windows operating system or even the computer. For a free, no obligation estimate of any costs involved, please email or call David Steele.