Cloud Security (6)

How CloudConnexa Enables Zero Trust for Small Businesses

How CloudConnexa Enables Zero Trust for Small Businesses

Forrester analyst Stephen Marsh originated the concept of the perimeterless security approach known as zero trust architecture (ZTA) in 1994. Since then, and with help from his fellow Forrester Analyst John Kindervag, use of the zero trust approach has steadily grown with the biggest enterprises in the world.

OpenVPN Team

7 minute read
Top Retail Cybersecurity Challenges

Top Retail Cybersecurity Challenges

E-commerce lets retailers use customer data and segmentation to deliver unique customer experiences. That’s why the industry eagerly pursued digital transformation. Unfortunately, that customer data also creates new vulnerabilities that weren’t part of traditional brick-and-mortar retail.

OpenVPN Team

6 minute read
How to Prevent Scareware Attacks with CloudConnexa

How to Prevent Scareware Attacks with CloudConnexa

Does anybody like pop-ups? Unlikely. That's why pop-up blockers are so popular. And as if pop-up ads and pop-up windows weren’t annoying enough, now scammers are using scareware pop-ups to trick users more determinedly than ever.

OpenVPN Team

4 minute read
Cloud-Based Cybersecurity for Financial Services

Cloud-Based Cybersecurity for Financial Services

In his 2019 annual letter to shareholders, J.P. Morgan Chase CEO Jamie Dimon wrote, “The threat of cybersecurity may very well be the biggest threat to the U.S. financial system.” At the time, J.P. Morgan Chase was spending almost $600 million to defend against cyberattacks after a 2014 breach that affected 76 million households and 7 million

OpenVPN Team

8 minute read
Internet Gateway Selection Feature on CloudConnexa

Internet Gateway Selection Feature on CloudConnexa

You’ve deployed internet gateways. Now, you need a way to route the traffic — securely, from your networks, hosts, groups, and users with the flexibility to control where the exit takes place. This is all possible with Internet Gateway Selection, a new feature of CloudConnexa, that lets you configure how internet traffic is routed from your hosts,

OpenVPN Team

2 minute read
Types of DNS Attacks and How to Prevent Them

Types of DNS Attacks and How to Prevent Them

In the cybersecurity world, Distributed Denial of Service (DDoS), malware, and ransomware get more attention than domain name system (DNS) attacks, but DNS attacks are on the rise.

OpenVPN Team

9 minute read
Cybersecurity for Manufacturing Industry Regulatory Compliance

Cybersecurity for Manufacturing Industry Regulatory Compliance

Mitigating Cyber Risk Vulnerabilities in the Industry 4.0 Age As the manufacturing industry segued from the first to second to third Industrial Revolutions, regulatory compliance came into being. As we embark on the fourth industrial revolution, also known as Industry 4.0, additional regulations are added. You’d be hard-pressed to find anyone who

OpenVPN Team

9 minute read
What Businesses Can Learn from The Kaseya Ransomware Attack

What Businesses Can Learn from The Kaseya Ransomware Attack

Over the Fourth of July weekend, an IT solutions company, Kaseya, was attacked and infected with ransomware. Now, even with the full resources of the United States government to support them, this attack is still affecting thousands of businesses globally. With the perpetrators demanding millions, this attack has the potential to continue a

OpenVPN Team

3 minute read
How to Fix IP Overlap with OpenVPN Cloud

How to Fix IP Overlap with OpenVPN Cloud

Multi-cloud networking is the new reality for businesses — and issues that arise from overlapping IP addresses can hold companies back. Thankfully, a feature in CloudConnexa solves the problem by creating unique domain names that are used as routes to the different networks instead of the IP address subnets.

OpenVPN Team

4 minute read
What the Hafnium Attacks Tell Us About Today’s Ransomware Threat

What the Hafnium Attacks Tell Us About Today’s Ransomware Threat

At the start of March, Microsoft took the unusual step of releasing four “out-of-band” patches to its customers. The reason was simple: it had detected a nation state adversary exploiting the related vulnerabilities in attacks on Exchange email servers. However, this was just the beginning. In just a few days, multiple threat groups had joined in

OpenVPN Team

5 minute read
1 ...
4 5 6 7 8