Resources and insights
The latest industry news, interviews, technologies, and resources.

What Businesses Can Learn from The Kaseya Ransomware Attack
Over the Fourth of July weekend, an IT solutions company, Kaseya, was attacked and infected with ransomware. Now, even with the full resources of the United States government to support them, this attack is still affecting thousands of businesses globally. With the perpetrators demanding millions, this attack has the potential to continue a
OpenVPN Team
3 minute read

Managing Risk and Driving Growth: Why CISOs Need to be Closer to Their CEOs
During her inaugural speech as the new CEO of the UK’s National Cyber Security Centre (NCSC), Lindy Cameron argued that cybersecurity is still not as embedded as it should be into boardroom thinking.
OpenVPN Team
5 minute read

How to Fix IP Overlap with OpenVPN Cloud
Multi-cloud networking is the new reality for businesses — and issues that arise from overlapping IP addresses can hold companies back. Thankfully, a feature in CloudConnexa solves the problem by creating unique domain names that are used as routes to the different networks instead of the IP address subnets.
OpenVPN Team
4 minute read

Embracing Zero Trust, Little by Little
Zero trust is an important security architecture to protect your business from cyber threats. But how complex is it to implement it correctly? And what message does it send to employees when you say, “never trust, always verify”? Is there a better way?
OpenVPN Team
8 minute read

Connecting With The OpenVPN Connect Team
OpenVPN Connect is an essential tool in the OpenVPN ecosystem, backed by a talented team that’s passionate about constantly improving this app. Today we are pleased to introduce you to four of the talented developers behind the OpenVPN Connect App to share more about how they work together, their strategies for development, and how this app became
OpenVPN Team
8 minute read

IoT Risks Are Growing: Is Your Business Prepared?
In recent years, the default protocol for Internet traffic has changed to IPv6, which offers an unfathomably large pool of 128-bit addresses to assign to devices on Earth’s biggest network, the Internet. How big is it? Large enough, one engineer once calculated, to assign a unique address to every atom on the surface of the earth and still use
OpenVPN Team
6 minute read
How to Encrypt RDP to Protect Against Attacks in 2021
With the lockdowns in 2020 came rapid digital adjustments in all industries. This included ramping up the use of Remote Desktop Protocol (RDP), and with that increase came an increase in attacks. According to ESET’s Q4 2020 Threat Report, RDP attacks increased 768% between Q1 and Q4 last year.
OpenVPN Team
7 minute read

What the Hafnium Attacks Tell Us About Today’s Ransomware Threat
At the start of March, Microsoft took the unusual step of releasing four “out-of-band” patches to its customers. The reason was simple: it had detected a nation state adversary exploiting the related vulnerabilities in attacks on Exchange email servers. However, this was just the beginning. In just a few days, multiple threat groups had joined in
OpenVPN Team
5 minute read

Learning from the Colonial Pipeline Hack: 4 Ways to Mitigate the Risk of a Ransomware Attack
On May 7, Colonial Pipeline discovered they were hit with a ransomware attack. Three days later, the FBI confirmed that a ransomware group known as DarkSide was responsible for the attack, which caused the company to proactively shutdown 5,550 miles of pipe. This shutdown has inflicted panic on the east coast, causing a gasoline shortage in
OpenVPN Team
4 minute read

LDAP Authentication with CloudConnexa
CloudConnexa now brings you the capability to authenticate users through your private LDAP directory. This means you can manage the remote access authentication for your CloudConnexa users with fewer clicks — making it easy to manage users and groups and maintain consistency — and your users can work securely with one less set of credentials.
OpenVPN Team
4 minute read