TOSS C3 Podcast

RMM Abuse: What You Don’t Know Can Hurt You


Listen Later

In this eye-opening episode of the TOSS C3 Podcast, Greg Hanna, cybersecurity expert and CEO of TOSS C3, pulls back the curtain on one of the most dangerous — yet least talked about — threats in the IT space: RMM Abuse.

RMM (Remote Monitoring and Management) tools are designed to help IT teams manage systems efficiently — but in the wrong hands, they become a hacker’s best friend. Greg explains how threat actors and even insiders can exploit RMM software to infiltrate, surveil, and control networks without detection.

Whether you're a CEO, CIO, IT professional, or a business owner who relies on managed service providers, this episode will help you understand the risksidentify vulnerabilities, and take proactive steps to protect your organization.

  • What is RMM and why it's a double-edged sword

  • Real-life examples of RMM abuse and how companies were compromised

  • How cybercriminals weaponize RMM tools like AnyDesk, TeamViewer, and ConnectWise

  • Red flags to watch for in your IT environment

  • Why MSPs (Managed Service Providers) are frequent targets — or even unknowing accomplices

  • Steps to audit and harden your RMM setup

  • Greg’s expert advice on zero-trust strategies and insider threat mitigation

  • The importance of continuous threat detection and monitoring your own IT team

"RMM tools are like skeleton keys — if you don’t control who’s holding them, you’re inviting the enemy into your digital fortress."

  1. Audit your existing RMM tools – Know what’s installed, who has access, and how it’s being used.

  2. Ask your MSP the hard questions – What safeguards are in place to prevent unauthorized use?

  3. Implement multi-factor authentication on all RMM-related access points.

  4. Educate your executive team about the potential risks tied to RMM misuse.

  5. Book a cybersecurity assessment with TOSS C3 to evaluate your RMM and endpoint security posture.

Greg Hanna is the CEO of TOSS C3, a leading authority in Cybersecurity, Compliance, and Cloud solutions for high-stakes industries. With decades of experience in protecting sensitive data and securing digital infrastructures, Greg brings expert insights, real-world stories, and actionable strategies to help organizations stay ahead of the cyber curve.

  • Website: https://www.tossc3.com

  • LinkedIn: Greg Hanna

  • Twitter: @TOSS_C3

  • Podcast Episodes: Listen to more

If this episode helped you better understand RMM abuse and how to stop it, share it with your IT team, C-Suite, or business network. And don’t forget to subscribe, rate, and review the TOSS C3 Podcast!

🔍 Key Topics Covered:🛡️ Greg’s Quote of the Episode:✅ Action Steps for Listeners:🧠 About the Host:📲 Stay Connected:🔁 Don’t Forget:

...more
View all episodesView all episodes
Download on the App Store

TOSS C3 PodcastBy TOSS C3