Resources and insights
The latest industry news, interviews, technologies, and resources.

Third Party Access Control
Are you in control of your office building? Of your resources? Of your own network? Do you have the control to determine who — or what — has access to your resources? Access control, simply put, is all about controlling who gets access to what. It is one of the most fundamental security practices, and is crucial to protecting your organization.
OpenVPN Team
6 minute read

Technology Hijacking
When you hear the word “hijacking” you probably think about aircraft. But hijacking is not exclusive to the aviation industry. It happens across a multitude of platforms — and occurs quite often in technology. Technology hijacking is when a cybercriminal takes control of devices and systems. Take a look at some of the top ways cybercriminals can
OpenVPN Team
4 minute read
Understanding how split tunneling works with OpenVPN Access Server
A basic, personal virtual private network (VPN), such as Private Tunnel, routes the user’s traffic to the internet through an encryptedVPNtunnel. Someone might use the personal VPN service to protect sensitive data on public WiFi or to get around geographic content restrictions. Business VPNs are different, however. While companies may provide
Rohit Kalbag
3 minute read

Securing RDP for Remote Work
If we have learned anything from the COVID-19 pandemic, it’s how essential it is to have reliable ways to keep working when going into the office isn’t an option. Most everyone has heard horror stories of companies that didn’t have remote work options in place before the virus, and then they were left scrambling when government officials mandated
OpenVPN Team
3 minute read

Resources for New Users
Take a look at some of the resources available to get you started, or reach out to us for additional assistance. Your license purchase covers all support, upgrades, and updates. Getting Started Download or set up your Access Server in you preferred environment. See all the options under installation (below). Launch your Admin Web UI that comes
OpenVPN Team
4 minute read

May/June ‘24 Cybersecurity News Roundup: RAT Malware & Vulnerabilities Target Network Security
Krista Lyons
5 minute read

Summer Cybersecurity Roundup: Microsoft Vulnerabilities, CrowdStrike Outage
Krista Lyons
7 minute read

A Better Alternative to IP Whitelisting
Every single organization needs to secure network resources, and control who accesses resources. But as organizations grow and need to provide access for a greater number of users, the more vigilant they need to be with access control. One common method that smaller companies use for access control is IP whitelisting. IP whitelisting is when
OpenVPN Team
5 minute read