Resources and insights
The latest industry news, interviews, technologies, and resources.
Crosstalk Solutions Shares Their Access Server Tutorial
Crosstalk Solutions is known for their expertise in networking and VoIP solutions, and their reputation for creating informative, high-quality technical content makes them the perfect partner for this video. Whether you’re an IT professional setting up Access Server for the first time or an experienced user looking to fine-tune your configuration,
Heather Walters
3 minute read
Optimizing Host Collective's Operations with CloudConnexa
In the competitive landscape of hosting services, Host Collective stands as a testament to operational excellence. Led by CTO Frank Cheung, the company navigates the complexities of managed hosting with precision and dedication under their premium hosting brand, Everleap. Their partnership with CloudConnexa shows exactly how the strategic adoption
Heather Walters
3 minute read
NetworkinGuys Leverages Access Server for Secure and Scalable Client Connectivity
In today's digital landscape, security threats are ever-evolving, and remote work is increasingly the norm. 80% of the MSPs OpenVPN recently surveyed said they expect a full 80% of their clients to have a hybrid remote work policy, with some work time spent outside the office. Every remote ‘office’ is an opportunity for attack without the right
Heather Walters
6 minute read
How To Deploy a Connector on CloudConnexa
Are you feeling a little lost when it comes to deploying connectors on CloudConnexa? Don't worry; we've got you covered. First off: what exactly is a connector? A Connector is software that is installed on an Application Server or on a computer/virtual machine running on your private network. It creates an always-on OpenVPN tunnel to the
Heather Walters
16 minute read
How to Launch the Windows and MacOS OpenVPN Connect Client
OpenVPN Cloud is now CloudConnexa® — learn more here.
Heather Walters
7 minute read
Digital Certificates: The Do's and Don'ts
“Encrypt everything” is now a prime directive on the Internet. That’s generally good advice, but setting up effective encryption isn’t as simple as flipping a switch. Managing the public and private keys and digital certificates that are essential to robust security takes careful planning and constant vigilance. This isn’t a set-it-and-forget-it
Heather Walters
5 minute read
Harnessing Zero Trust Network Access (ZTNA) to Manage Shadow IT
As new technology, new risks, and new tools surface faster than most teams can keep up with, organizations are experiencinga surge in shadow IT. Employees, usually in an effort to get their work done more efficiently, resort to using unauthorized applications and services outside of the approved IT infrastructure. While this trend may arise from
Heather Walters
4 minute read
How The Great Resignation Weakened Network Security (and What You Can Do About It)
No matter what industry you’re in, you likely have faced a talent shortage in the last few years. In 2021, 47 million people quit their jobs, according to the Bureau of Labor Statistics (BLS) — that was 23% of the total U.S. workforce. In 2022, roughly 38 million more quit. Employees everywhere are reevaluating their career choices, seeking better
Heather Walters
3 minute read
Leading Through Crisis: Managing a Cybersecurity Incident
Cyber attacks are on the rise, and it seems every year they take new forms. Ransomware is gettingmore expensive. IoT attacks alone areexpected to doubleby 2025. Taking steps to mitigate these risks is essential, of course, but on the other side of that coin — it’s also essential to prepare for when the worst hits. The role of an organization’s
Heather Walters
4 minute read