{"id":26858,"date":"2025-04-15T09:32:37","date_gmt":"2025-04-15T07:32:37","guid":{"rendered":"https:\/\/perseus.de\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\/"},"modified":"2026-03-30T14:48:35","modified_gmt":"2026-03-30T12:48:35","slug":"the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding","status":"publish","type":"post","link":"https:\/\/perseus.de\/en\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\/","title":{"rendered":"The Dangers of the Remote Desktop Protocol: Tips for Safeguarding"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26858\" class=\"elementor elementor-26858 elementor-2903\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"512\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/laptop-5534555_1280-768x512.jpg\" class=\"attachment-medium_large size-medium_large wp-image-26856\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/laptop-5534555_1280-768x512.jpg 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/laptop-5534555_1280-300x200.jpg 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/laptop-5534555_1280-1024x682.jpg 1024w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/laptop-5534555_1280.jpg 1280w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: Stefan Coders via Pixabay<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4da8b9a0 e-flex e-con-boxed e-con e-parent\" data-id=\"4da8b9a0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6c379c5 e-con-full e-flex e-con e-child\" data-id=\"6c379c5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3df1237 e-con-full e-flex e-con e-child\" data-id=\"3df1237\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b8ebafd elementor-widget elementor-widget-text-editor\" data-id=\"b8ebafd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>16.05.2024<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c39ed68 elementor-widget elementor-widget-heading\" data-id=\"c39ed68\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Dangers of the Remote Desktop Protocol: Tips for Safeguarding<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94d44bd elementor-widget elementor-widget-text-editor\" data-id=\"94d44bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity | IT Protection | Attack Vectors<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-04285ca e-con-full e-flex e-con e-child\" data-id=\"04285ca\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b2d0f04 elementor-widget elementor-widget-text-editor\" data-id=\"b2d0f04\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>The Remote Desktop Protocol (RDP) is undoubtedly an invaluable tool for the modern IT infrastructure. It allows users to connect to and control remote computers over the network. This function is particularly popular in companies for IT administration, whether for support or remote maintenance of systems.  <\/strong><\/p><p>But while RDP can undoubtedly increase productivity, it also carries significant risks, especially if it&#8217;s not adequately secured and openly accessible on the internet.<\/p><p>Read here how you can close sources of danger and use the RDP safely.<\/p><p><strong>Potentials of the Remote Desktop Protocol<\/strong><\/p><p>The Remote Desktop Protocol (RDP) is a valuable tool that allows users to connect to and control a remote computer over a network connection. This function is particularly popular for IT administration in companies, for example, when employees need IT support. <\/p><p>While RDP can significantly increase productivity in your business, it can also expose your system to serious risks if you leave it open to the Internet without proper security measures.<\/p><p><strong>What is RDP Hijacking?<\/strong><\/p><p>RDP hijacking occurs when unauthorized persons gain access to your RDP-enabled system. Cybercriminals often exploit vulnerabilities in open RDP configurations to launch attacks. This can lead to unauthorized access, data breaches, and potential system compromise. The consequences can be severe and range from the disclosure or leakage of sensitive data to the complete loss of control of your system or encryption of an enterprise-wide infrastructure with a ransomware Trojan.   <\/p><p>From our experience, we always advise our customers not to expose services to the Internet without further security. This means that you should not connect the RDP service directly to the Internet, as such services always pose security risks. What we learned from past cases was that attackers were able to take over such exposed services (without additional protection, such as a firewall or a VPN) quite quickly via brute force attacks (trying out lists of user and password combinations) and thus gain access to entire company infrastructures within a few hours.  <\/p><p>Attackers target the service&#8217;s standard ports (port 3389) shared by the Internet to gain access to networks. Unfortunately, changing these ports for obfuscation is not a suitable means either, as attackers can determine this shift by scanning the 65,535 possible ports with little effort. <\/p><p><strong>What can I do?<\/strong><\/p><p>To keep this risk as low as possible, it is advisable not to release RDP services directly and to consider alternative solutions. Consider using a firewall with VPN access, Microsoft Remote Desktop Gateway, or Azure Multi-Factor Authentication Server for secure access. <\/p><p>In addition, set Group Policy: Adjust the settings so that users are logged out immediately after an RDP session is disconnected to prevent attackers from simply &#8220;resuming&#8221; sessions. Furthermore, the number of incorrect logins should be reduced to e.g. five failed logins. This also reduces the attack surface by brute force.  <\/p><p>Stay vigilant: With the proliferation of remote work, it&#8217;s important to understand the risks associated with RDP and minimize the attack surface. The implementation of prevention strategies and the knowledge of where information about new threats is regularly listed (e.g. BSI or CERT Bund) are important building blocks for the protection of your IT systems. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d84bbc e-flex e-con-boxed e-con e-parent\" data-id=\"4d84bbc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05a335d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"05a335d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The Remote Desktop Protocol (RDP) is undoubtedly an invaluable tool for the modern IT infrastructure. It allows users to connect to and control remote computers over the network. This function is particularly popular in companies for IT administration, whether for support or remote maintenance of systems.  <\/p>\n","protected":false},"author":3,"featured_media":26856,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[60],"tags":[],"class_list":["post-26858","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Dangers of the Remote Desktop Protocol: Tips for Safeguarding - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/en\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Dangers of the Remote Desktop Protocol: Tips for Safeguarding - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"The Remote Desktop Protocol (RDP) is undoubtedly an invaluable tool for the modern IT infrastructure. It allows users to connect to and control remote computers over the network. This function is particularly popular in companies for IT administration, whether for support or remote maintenance of systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/en\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-15T07:32:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T12:48:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/laptop-5534555_1280.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"The Dangers of the Remote Desktop Protocol: Tips for Safeguarding\",\"datePublished\":\"2025-04-15T07:32:37+00:00\",\"dateModified\":\"2026-03-30T12:48:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\\\/\"},\"wordCount\":555,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/laptop-5534555_1280.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\\\/\",\"name\":\"The Dangers of the Remote Desktop Protocol: Tips for Safeguarding - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/laptop-5534555_1280.jpg\",\"datePublished\":\"2025-04-15T07:32:37+00:00\",\"dateModified\":\"2026-03-30T12:48:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/laptop-5534555_1280.jpg\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/laptop-5534555_1280.jpg\",\"width\":1280,\"height\":853,\"caption\":\"Image Credit: Stefan Coders via Pixabay\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Dangers of the Remote Desktop Protocol: Tips for Safeguarding\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Dangers of the Remote Desktop Protocol: Tips for Safeguarding - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/en\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\/","og_locale":"en_US","og_type":"article","og_title":"The Dangers of the Remote Desktop Protocol: Tips for Safeguarding - Perseus Technologies","og_description":"The Remote Desktop Protocol (RDP) is undoubtedly an invaluable tool for the modern IT infrastructure. It allows users to connect to and control remote computers over the network. This function is particularly popular in companies for IT administration, whether for support or remote maintenance of systems.","og_url":"https:\/\/perseus.de\/en\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\/","og_site_name":"Perseus Technologies","article_published_time":"2025-04-15T07:32:37+00:00","article_modified_time":"2026-03-30T12:48:35+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/laptop-5534555_1280.jpg","type":"image\/jpeg"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Xenia Silbe","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/en\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/en\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"The Dangers of the Remote Desktop Protocol: Tips for Safeguarding","datePublished":"2025-04-15T07:32:37+00:00","dateModified":"2026-03-30T12:48:35+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/en\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\/"},"wordCount":555,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/en\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/laptop-5534555_1280.jpg","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/en\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/en\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\/","url":"https:\/\/perseus.de\/en\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\/","name":"The Dangers of the Remote Desktop Protocol: Tips for Safeguarding - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/en\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/en\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/laptop-5534555_1280.jpg","datePublished":"2025-04-15T07:32:37+00:00","dateModified":"2026-03-30T12:48:35+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/en\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/en\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/en\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/laptop-5534555_1280.jpg","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/laptop-5534555_1280.jpg","width":1280,"height":853,"caption":"Image Credit: Stefan Coders via Pixabay"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/en\/the-dangers-of-the-remote-desktop-protocol-tips-for-safeguarding\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"The Dangers of the Remote Desktop Protocol: Tips for Safeguarding"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/en\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/26858","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=26858"}],"version-history":[{"count":2,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/26858\/revisions"}],"predecessor-version":[{"id":27043,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/26858\/revisions\/27043"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media\/26856"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=26858"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/categories?post=26858"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/tags?post=26858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}