Resources and insights
The latest industry news, interviews, technologies, and resources.

LastPass Vulnerability
Facebook's Mark Zuckerberg, Google's Sundar Pichai, Twitter's Jack Dorsey, Spotify’s Daniel Ek, Uber’s Travis Kalanick — the list could go on for CEOs whose Twitter accounts were hacked due to poor password hygiene. Interestingly enough, executive leadership of the world's leading tech giants are just as prone to password management issues as the
OpenVPN Team
3 minute read

Why Open Source Software is Good for Business
Many people still believe the myth that proprietary software, or software that is owned by an individual or a company, is more valuable than the alternative — open source software. However, there are almost always significant restrictions on proprietary software use, and its source code is almost always kept secret.
OpenVPN Team
3 minute read

Password Hygiene and the Disrupted Customer Experience
There’s no getting around the fact that most people see updating passwords as annoying and bothersome. So what happens when password updates and the online customer experience merge? In the most recent Cloud Security Tip, Steve Prentice posed an interesting question: “When companies in retail or enterprise remind their online visitors to change
OpenVPN Team
3 minute read

IoT Data
The Internet of Things (IoT) means everyday objects, such as smart plugs, lightbulbs, locks, coffee machines, and motion sensors can connect to the internet and creating a copious amount of data. This data can be used in ways we could not have imagined even a few years ago. A forecast from International Data Corporation (IDC) estimates
OpenVPN Team
4 minute read

Can You Score More Than 90% On Our Cybersecurity Quiz?
By the end of 2019, the estimated global cost of cybercrime will reach $2 trillion — and a single successful phishing attack can cost a small or medium-sized business a whopping $1.6 million. Clearly, neglecting your cybersecurity practices can affect your bottom line in a profound way. Don’t let your business be a part of those statistics — make
OpenVPN Team
1 minute read

The IoT Stampede
Autumn is officially here, which means stores are ramping up their sales. The back-to-school sales happened not too long ago, and next thing you know it will be Black Friday and Cyber Monday. As Steve Prentice explained in the latest Cloud Security Tip, “Every year, the fall season sees billions of dollars being spent on home-based IoT devices.”
OpenVPN Team
2 minute read

When to Hire a CISO
Organizations have been moving larger and larger quantities of corporate data to the cloud — because enterprises around the globe realize the benefits that the cloud has over traditional computing. However, the cloud presents different security challenges than that of conventional on-site and PC solutions. Security in the cloud should be addressed
OpenVPN Team
3 minute read

Long-Term Vulnerabilities
A lot of organizations have weaknesses that can be exploited — but what about those weaknesses that extend back for decades? It’s not comforting to think that trusted companies and products have had breachable weaknesses for years, but it is a reality that must be faced as more and more long-term vulnerabilities are brought to light. Some
OpenVPN Team
3 minute read

Introducing Repository
PLEASANTON, CALIF.– Oct 1st 2019 – OpenVPN is adding a new update to its enterprise VPN product, Access Server, making the upgrade process for customers easier than ever. The 2.7.5 update now allows customers to install Access Server software packages and the related Connect Client software through an official software repository.
OpenVPN Team
3 minute read

TechRadar Pro Names OpenVPN Connect a Powerful Package
TechRadar Pro is one of the top IT publications online, sharing some of the best new features and tools in tech for businesses. Which is why we are excited to be featured in this review, published by TechRadar detailing a complete overview and how-to for OpenVPN Connect, our free and full-featured VPN client software. This article not only
OpenVPN Team
3 minute read