The alert came at 2:13 a.m. A remote desktop session had been opened from an IP address outside the country. The system shouldn’t have allowed it. But it did. And that’s exactly the kind of gap the NYDFS Cybersecurity Regulation was written to close.
The New York Department of Financial Services (NYDFS) Cybersecurity Regulation sets strict standards for protecting financial data. Remote desktop access sits in its crosshairs. The reason is simple: unsecured remote desktop sessions are one of the fastest ways for attackers to gain control.
Under NYDFS 23 NYCRR 500, companies must implement controls that limit and monitor access to systems. That means enforcing strong authentication, using secure network channels, and logging access events in real time. Remote desktops must be locked to approved devices, run over encrypted connections, and backed by multi-factor authentication. Anything less is a violation.
A compliant setup ensures administrators can’t connect from anywhere without passing multiple layers of checks. All sessions must be recorded, flagged for anomalous behavior, and tied to a defined business purpose. This isn’t just for show — these controls stop credential stuffing, brute force attacks, and lateral movement across the network.