Cloud Security (6)

How CloudConnexa Enables Zero Trust for Small Businesses
Forrester analyst Stephen Marsh originated the concept of the perimeterless security approach known as zero trust architecture (ZTA) in 1994. Since then, and with help from his fellow Forrester Analyst John Kindervag, use of the zero trust approach has steadily grown with the biggest enterprises in the world.
OpenVPN Team
7 minute read

Top Retail Cybersecurity Challenges
E-commerce lets retailers use customer data and segmentation to deliver unique customer experiences. That’s why the industry eagerly pursued digital transformation. Unfortunately, that customer data also creates new vulnerabilities that weren’t part of traditional brick-and-mortar retail.
OpenVPN Team
6 minute read

How to Prevent Scareware Attacks with CloudConnexa
Does anybody like pop-ups? Unlikely. That's why pop-up blockers are so popular. And as if pop-up ads and pop-up windows weren’t annoying enough, now scammers are using scareware pop-ups to trick users more determinedly than ever.
OpenVPN Team
4 minute read

Cloud-Based Cybersecurity for Financial Services
In his 2019 annual letter to shareholders, J.P. Morgan Chase CEO Jamie Dimon wrote, “The threat of cybersecurity may very well be the biggest threat to the U.S. financial system.” At the time, J.P. Morgan Chase was spending almost $600 million to defend against cyberattacks after a 2014 breach that affected 76 million households and 7 million
OpenVPN Team
8 minute read

Internet Gateway Selection Feature on CloudConnexa
You’ve deployed internet gateways. Now, you need a way to route the traffic — securely, from your networks, hosts, groups, and users with the flexibility to control where the exit takes place. This is all possible with Internet Gateway Selection, a new feature of CloudConnexa, that lets you configure how internet traffic is routed from your hosts,
OpenVPN Team
2 minute read

Types of DNS Attacks and How to Prevent Them
In the cybersecurity world, Distributed Denial of Service (DDoS), malware, and ransomware get more attention than domain name system (DNS) attacks, but DNS attacks are on the rise.
OpenVPN Team
9 minute read

Cybersecurity for Manufacturing Industry Regulatory Compliance
Mitigating Cyber Risk Vulnerabilities in the Industry 4.0 Age As the manufacturing industry segued from the first to second to third Industrial Revolutions, regulatory compliance came into being. As we embark on the fourth industrial revolution, also known as Industry 4.0, additional regulations are added. You’d be hard-pressed to find anyone who
OpenVPN Team
9 minute read

What Businesses Can Learn from The Kaseya Ransomware Attack
Over the Fourth of July weekend, an IT solutions company, Kaseya, was attacked and infected with ransomware. Now, even with the full resources of the United States government to support them, this attack is still affecting thousands of businesses globally. With the perpetrators demanding millions, this attack has the potential to continue a
OpenVPN Team
3 minute read

How to Fix IP Overlap with OpenVPN Cloud
Multi-cloud networking is the new reality for businesses — and issues that arise from overlapping IP addresses can hold companies back. Thankfully, a feature in CloudConnexa solves the problem by creating unique domain names that are used as routes to the different networks instead of the IP address subnets.
OpenVPN Team
4 minute read

What the Hafnium Attacks Tell Us About Today’s Ransomware Threat
At the start of March, Microsoft took the unusual step of releasing four “out-of-band” patches to its customers. The reason was simple: it had detected a nation state adversary exploiting the related vulnerabilities in attacks on Exchange email servers. However, this was just the beginning. In just a few days, multiple threat groups had joined in
OpenVPN Team
5 minute read