Resources and insights
The latest industry news, interviews, technologies, and resources.

Restricted Internet Access: Available Now With CloudConnexa
A walled garden, in internet terms, “... is an environment that controls the user's access to network-based content and services.” A walled garden is used to keep users from exploring outside the walls and to protect against malware, phishing, and other cyber threats. According to TechTarget, “Although a walled garden does not always prevent users
OpenVPN Team
3 minute read

Cybersecurity for SMBs: Why Small Businesses Need Cybersecurity
Reliable cybersecurity, and avoiding cyberattacks, is essential for businesses of any size. The subject is so popular that it’s a standalone topic on Google News. Problem is, many small or medium businesses don’t consider it essential for them — it’s often seen as a problem for big businesses and enterprise, but that couldn’t be further from the
OpenVPN Team
7 minute read

Internet Gateway Selection Feature on CloudConnexa
You’ve deployed internet gateways. Now, you need a way to route the traffic — securely, from your networks, hosts, groups, and users with the flexibility to control where the exit takes place. This is all possible with Internet Gateway Selection, a new feature of CloudConnexa, that lets you configure how internet traffic is routed from your hosts,
OpenVPN Team
2 minute read

Announcing New Support For Businesses In Ukraine
In our continual efforts to support those under attack in Ukraine, OpenVPN®, Inc. is announcing today that we will offer one free year on OpenVPN® Cloud, up to a maximum of 50 connected devices, for any business based in Ukraine, or any non-profit organization doing work to support Ukraine directly.
OpenVPN Team
1 minute read

Types of DNS Attacks and How to Prevent Them
In the cybersecurity world, Distributed Denial of Service (DDoS), malware, and ransomware get more attention than domain name system (DNS) attacks, but DNS attacks are on the rise.
OpenVPN Team
9 minute read

Cybersecurity for Manufacturing Industry Regulatory Compliance
Mitigating Cyber Risk Vulnerabilities in the Industry 4.0 Age As the manufacturing industry segued from the first to second to third Industrial Revolutions, regulatory compliance came into being. As we embark on the fourth industrial revolution, also known as Industry 4.0, additional regulations are added. You’d be hard-pressed to find anyone who
OpenVPN Team
9 minute read

IDS/IPS: What They Are and Why You Need Them
Wireless providers are rolling out 5G to power an IoT (Internet of Things) world. The Ericsson Mobility Report, released in November 2021, estimates that by 2027 half of all global mobile subscriptions will be 5G. While faster than ever connectivity and lower latency are welcome, 5G comes with new threats and cybersecurity risks businesses need to
OpenVPN Team
6 minute read

What Are Credential Stuffing Attacks?
Credential stuffing attacks are growing in popularity — with hackers, anyway; not the businesses targeted. In late December, Help Net Security reported there were more than two billion credential stuffing attacks in the previous 12 months, a 98 percent year-over-year increase. The infosec site predicted attacks would peak during the holiday
OpenVPN Team
6 minute read

VPN Audits — A Primer and a Security Audit Checklist
Popularity of VPNs (virtual private networks) has grown with the popularity, and necessity, of remote workers using outside-the-firewall remote access, often on public WiFi, to tap into internal networks. Like anyone selling a product or service, VPN service providers make bold claims and promises. But should you trust them? How can you identify
OpenVPN Team
5 minute read