Home Office - Secure use of remote access

Authorities are increasingly using remote methods to access their networks. However, using this technology also raises the risk of cyberattacks.
Attackers use all sorts of methods to gain access to networks of authorities:

  • Phishing attempts (classical password phishing or so-called real-time phishingnin the case of two-factor authentication).
  • Attacks on passwords (attacks on directory services, alteration of passwords, brute force attacks).
  • Attacks on unsecured gateways.
  • Malware attacks (these often go unnoticed if there is no tunnelling of the entire data traffic).

The following document gives you recommendations on how to handle remote access in your authority network.

Further Information

Last modification 03.12.2021

Top of page