There are few things more nightmarish to a CSO or CIO than a bad actor gaining remote access to their organization’s networked devices. Microsoft’s Remote Desktop Protocol (RDP) has long been a prime target for hackers because it provides direct access to a device or server through a graphical interface. The advent of BlueKeep makes having any unpatched RDP servers connected to the Internet particularly dangerous. BlueKeep, if exploited, not only gives attackers access to the server with RDP but also makes it possible for the attacker to “worm” into other connected systems. It’s critical for organizations to understand their complete Internet attack surface, including any exposed RDP instances or other critical exposures.