Cloud Security (7)
Long-Term Vulnerabilities
A lot of organizations have weaknesses that can be exploited — but what about those weaknesses that extend back for decades? It’s not comforting to think that trusted companies and products have had breachable weaknesses for years, but it is a reality that must be faced as more and more long-term vulnerabilities are brought to light. Some
OpenVPN Team
3 minute read
Network Visibility
Nearly 84% of businesses increased their cloud-based workloads in 2018, but lack of network visibility could compromise security and business value. Network visibility refers to how data is collected, aggregated, distributed, and served to monitoring and analytics tools — and study after study shows that cloud users want and need this visibility.
OpenVPN Team
4 minute read
Shared Responsibility Model
When it comes to the cloud, who takes responsibility? Is it up to you or the cloud provider (i.e., the vendor)? One of the top options is the Shared Responsibility Model, where each involved party has a level of responsibility and accountability in ensuring security.
OpenVPN Team
3 minute read
Single-Tenant Vs. Multi-Tenant Cloud Services
There are two primary types of cloud services: The first is single-tenancy, which in cloud computing is often described as a single family home. The second is multi-tenancy, which is like an apartment building — but the key difference is that the walls that separate tenants from each other are not solid, but software. This form of cloud
OpenVPN Team
3 minute read
Harnessing Data Management to Improve Data Security
It is easy to underestimate the importance of data management — many business leaders think they can put some basic security measures around their data and call it a day. But how the data is collected, stored, and disseminated is just as important as the security measures around it. Steve Prentice explained in the latest Cloud Security Tip, “Data
OpenVPN Team
4 minute read
Protect Your Organization With Encryption
As time goes on and technology advances, organizations are finding that they must secure more and more sensitive data. Business leaders must ensure that data security and privacy remain a top priority to protect and defend from costly data breaches — as well as prevent a loss of trust and a decrease in brand respect and loyalty. In the most recent
OpenVPN Team
4 minute read
Advantages and Disadvantages of API for Business
API's are essential tools for businesses — they streamline organizational operations, and provide strategic value such as additional exposure for your brand and increased revenue. APIs are a new type of ecosystem, allowing companies to expand into new markets where they can use them for more than just technical concepts.
OpenVPN Team
5 minute read
The Importance of Data Protection Policies
Your data is your responsibility — take control of it. Utilizing multiple cloud services can bring certain organizational benefits, but it can also present new risks. Organizations leverage almost five clouds, on average — making it more critical than ever for leaders to take security into their own hands. Steve Prentice gave more insight in his
OpenVPN Team
4 minute read
Advantages of using Google Cloud Identity for authentication of both SaaS applications and VPN access
Use of a Virtual Private Network (VPN) is a great security tool to extend your private network to remote users and locations while at the same time ensuring that only authorized users can access the private network. However, even the best security safeguards will come to naught if the user identities used to authenticate VPN access are not
OpenVPN Team
6 minute read
Leading Through Crisis: Managing a Cybersecurity Incident
Cyber attacks are on the rise, and it seems every year they take new forms. Ransomware is gettingmore expensive. IoT attacks alone areexpected to doubleby 2025. Taking steps to mitigate these risks is essential, of course, but on the other side of that coin — it’s also essential to prepare for when the worst hits. The role of an organization’s
Heather Walters
4 minute read