Cloud Security (7)
Network Security: The Basics
Network security consists of preventing and protecting against unauthorized encroachment into corporate networks. Network security focuses on how devices interact rather than on the actual devices, like endpoint security. Network security and endpoint security go hand-in-hand.
OpenVPN Team
4 minute read
Coronavirus Scams Are Infecting Devices Around the Globe
As the threat of coronavirus increases, businesses are sending employees to work from home, and students are shifting to online classes. But with the social distancing comes a new threat – cyber attacks.
OpenVPN Team
7 minute read
SIM PIN
A few years ago, hackers found a bug that allowed them to access personal data on any T-Mobile customer. The bug was very well known in the criminal underground and there was even a tutorial on how to exploit it on YouTube. The bug exposed customers’ email addresses. Their billing account numbers, and the phone’s IMSI numbers (a
OpenVPN Team
4 minute read
KNOB Attack
Let’s talk about Bluetooth: “Bluetooth is a convenient and easy method of sharing data between devices, which, of course, qualifies it as a prime target for exploitation. A trio of researchers have discovered a vulnerability that has the potential of attacking billions of Bluetooth-enabled devices, including phones, laptops, IoT and IIoT
OpenVPN Team
3 minute read
Password Hygiene and the Disrupted Customer Experience
There’s no getting around the fact that most people see updating passwords as annoying and bothersome. So what happens when password updates and the online customer experience merge? In the most recent Cloud Security Tip, Steve Prentice posed an interesting question: “When companies in retail or enterprise remind their online visitors to change
OpenVPN Team
3 minute read
Long-Term Vulnerabilities
A lot of organizations have weaknesses that can be exploited — but what about those weaknesses that extend back for decades? It’s not comforting to think that trusted companies and products have had breachable weaknesses for years, but it is a reality that must be faced as more and more long-term vulnerabilities are brought to light. Some
OpenVPN Team
3 minute read
Network Visibility
Nearly 84% of businesses increased their cloud-based workloads in 2018, but lack of network visibility could compromise security and business value. Network visibility refers to how data is collected, aggregated, distributed, and served to monitoring and analytics tools — and study after study shows that cloud users want and need this visibility.
OpenVPN Team
4 minute read
Shared Responsibility Model
When it comes to the cloud, who takes responsibility? Is it up to you or the cloud provider (i.e., the vendor)? One of the top options is the Shared Responsibility Model, where each involved party has a level of responsibility and accountability in ensuring security.
OpenVPN Team
3 minute read
Single-Tenant Vs. Multi-Tenant Cloud Services
There are two primary types of cloud services: The first is single-tenancy, which in cloud computing is often described as a single family home. The second is multi-tenancy, which is like an apartment building — but the key difference is that the walls that separate tenants from each other are not solid, but software. This form of cloud
OpenVPN Team
3 minute read
Harnessing Data Management to Improve Data Security
It is easy to underestimate the importance of data management — many business leaders think they can put some basic security measures around their data and call it a day. But how the data is collected, stored, and disseminated is just as important as the security measures around it. Steve Prentice explained in the latest Cloud Security Tip, “Data
OpenVPN Team
4 minute read