Home Office - Secure use of remote access

Companies are increasingly using remote methods to access their corporate networks. However, using this technology also raises the risk of cyberattacks.
Attackers use all sorts of methods to gain access to corporate networks:

  • Phishing attempts (classical password phishing or so-called real-time phishingnin the case of two-factor authentication).
  • Attacks on passwords (attacks on directory services, alteration of passwords, brute force attacks).
  • Attacks on unsecured gateways.
  • Malware attacks (these often go unnoticed if there is no tunnelling of the entire data traffic).

The following document gives you recommendations on how to handle remote access in your company network.

Further Information

Last modification 19.02.2021

Top of page