Resources and insights
The latest industry news, interviews, technologies, and resources.

Access Server 2.7.4 Update
PLEASANTON, CALIF.– (August 20, 2019) – OpenVPN is releasing a powerful new update to our commercial business VPN product. The Access Server 2.7.4 update features clustering. Our customers are now able to run a high availability server cluster while spreading the load over multiple nodes.
OpenVPN Team
1 minute read

Biometric Security for Businesses
A password is supposed to help secure accounts and keep sensitive data protected — but the problem is that traditional passwords are often more of a liability than an asset because employees don’t heed the warnings. Employees often reuse passwords, neglect changing their passwords, leave the default password, or use weak passwords. In fact, a
OpenVPN Team
4 minute read

The Bad Actors Within Your Business
We have all listened to spooky stories or watched scary movies where it turns out the bad guy was inside the house the entire time. These plotlines tend to hit us hard because it’s especially frightening to contemplate that danger is lurking in the place we feel most safe. But these creepy plotlines stand as a sobering reminder for businesses as
OpenVPN Team
3 minute read

Should Pen-Testing Be Up For Debate?
Cyber attacks can be costly to any organization. They can destroy systems, lose organizations money, and cause reputational damage — but performing a penetration test can help protect your organization and its network. With the numerous security breaches taking place around the world, there is no doubt that penetration testing is one of the most
OpenVPN Team
4 minute read

2FA Is Not Invincible
Time and again, we hear about costly breaches impacting businesses all around the globe — many due to hackers merely gaining access to employee login information. Organizations need to take responsibility for sensitive data by ensuring that employees are using something stronger than just a basic password. Every business should be using two-factor
OpenVPN Team
3 minute read

Harnessing Data Management to Improve Data Security
It is easy to underestimate the importance of data management — many business leaders think they can put some basic security measures around their data and call it a day. But how the data is collected, stored, and disseminated is just as important as the security measures around it. Steve Prentice explained in the latest Cloud Security Tip, “Data
OpenVPN Team
4 minute read

Switching Vendors and Preventing Lock-In
Cloud computing is more than just a temporary fad — according to Forrester Research, the public cloud services market will grow to $236 billion by the year 2020. Why? Because cloud computing provides numerous benefits to businesses of all sizes.
OpenVPN Team
4 minute read

Does Your Business Really Need Penetration Testing?
With cyber threats increasing exponentially, breaches are no longer a matter of “if,” but “when.” If there are vulnerabilities in your system, chances are hackers will find them. It’s up to you to make sure you are aware of your weak spots — and fix them before the bad guys find them and exploit them. In the most recent CISO/Security Vendor
OpenVPN Team
4 minute read

What Organizations Need to Learn from APT Attacks
Cyber attacks have existed since the adoption of the Internet, evolving over the past few decades — from viruses and worms to malware and botnets; cyber threats continue to advance just as quickly as the Internet itself. In recent years, a new threat, the “Advanced Persistent Threat” (APT) has emerged. In the most recent CISO/Security Vendor
OpenVPN Team
6 minute read

Protect Your Organization With Encryption
As time goes on and technology advances, organizations are finding that they must secure more and more sensitive data. Business leaders must ensure that data security and privacy remain a top priority to protect and defend from costly data breaches — as well as prevent a loss of trust and a decrease in brand respect and loyalty. In the most recent
OpenVPN Team
4 minute read