Cybersecurity

Key Components of an Effective Cloud Security Framework
Companies of all sizes hope to see benefits from implementing these robust frameworks, such as enhanced cloud visibility and control, reduced risks, and improved compliance. The expectation is that these frameworks will enable you to proactively identify and eliminate potential vulnerabilities, minimize data breach risks, and be in good standing
OpenVPN Team
8 minute read

January 2025 Cybersecurity Roundup: VPN Usage Surges & Threats Increase
Recent website and app bans in the U.S. and abroad have created a surge in personal VPN usage. However, that surge has also come with a rise in threat actors looking to exploit new personal VPN users.
Krista Lyons
6 minute read

TikTok Ban: What It Means and Why a VPN Might Not Be Enough
At OpenVPN, we understand that this situation has sparked renewed interest in VPNs as a potential solution, and we want to provide clarity and guidance. While a VPN can be a powerful tool for enhancing privacy and accessing restricted content, navigating a TikTok ban involves complexities beyond simply using a VPN. Here’s a breakdown of the
Heather Walters
3 minute read

Phishing Awareness Training: A Guide for IT Managers
Phishing is nothing new. In fact, phishing was one of the first social engineering attack methods on the internet, dating back as early as the 1990s via AOL email addresses. The problem with phishing awareness is that, while you might be familiar with the threats, reasons, and methods of attack, the employees in your organization may not be quite
Krista Lyons
9 minute read

May/June ‘24 Cybersecurity News Roundup: RAT Malware & Vulnerabilities Target Network Security
Krista Lyons
5 minute read

Summer Cybersecurity Roundup: Microsoft Vulnerabilities, CrowdStrike Outage
Krista Lyons
7 minute read

Defending Against the Most Common Wireless Network Attacks
Cybercrime has become a massive problem for businesses in recent years — organizations must take precautions before it’s too late. After all, some of the most well-known companies in the US have become subject to large-scale cyber attacks over the last decade, including the 2013 Target data breach in which hackers exposed a staggering 40 million
OpenVPN Team
3 minute read

April ‘24 Cybersecurity News Roundup: Brute Force Attacks & Vulnerabilities on VPNs & SSH
Krista Lyons
8 minute read

2FA vs. MFA: What’s the Difference?
More than 15 billion leaked credentials were available for sale online in 2024 — which means there is a solid chance that at least a few of your employees have information that has been compromised. Authentication plays a pivotal role in ensuring the security of sensitive data, systems, and networks, but only when it makes access more difficult
Krista Lyons
4 minute read