Cybersecurity

TikTok Ban: What It Means and Why a VPN Might Not Be Enough

TikTok Ban: What It Means and Why a VPN Might Not Be Enough

At OpenVPN, we understand that this situation has sparked renewed interest in VPNs as a potential solution, and we want to provide clarity and guidance. While a VPN can be a powerful tool for enhancing privacy and accessing restricted content, navigating a TikTok ban involves complexities beyond simply using a VPN. Here’s a breakdown of the

Heather Walters

3 minute read
Phishing Awareness Training: A Guide for IT Managers

Phishing Awareness Training: A Guide for IT Managers

Phishing is nothing new. In fact, phishing was one of the first social engineering attack methods on the internet, dating back as early as the 1990s via AOL email addresses. The problem with phishing awareness is that, while you might be familiar with the threats, reasons, and methods of attack, the employees in your organization may not be quite

Krista Lyons

9 minute read
May/June ‘24 Cybersecurity News Roundup: RAT Malware & Vulnerabilities Target Network Security 

May/June ‘24 Cybersecurity News Roundup: RAT Malware & Vulnerabilities Target Network Security 

Krista Lyons

5 minute read
Summer Cybersecurity Roundup: Microsoft Vulnerabilities, CrowdStrike Outage 

Summer Cybersecurity Roundup: Microsoft Vulnerabilities, CrowdStrike Outage 

Krista Lyons

7 minute read
Defending Against the Most Common Wireless Network Attacks

Defending Against the Most Common Wireless Network Attacks

Cybercrime has become a massive problem for businesses in recent years — organizations must take precautions before it’s too late. After all, some of the most well-known companies in the US have become subject to large-scale cyber attacks over the last decade, including the 2013 Target data breach in which hackers exposed a staggering 40 million

OpenVPN Team

3 minute read
April ‘24 Cybersecurity News Roundup: Brute Force Attacks & Vulnerabilities on VPNs & SSH

April ‘24 Cybersecurity News Roundup: Brute Force Attacks & Vulnerabilities on VPNs & SSH

Krista Lyons

8 minute read
Addressing the Hyperbole: OpenVPN Zero-Day Vulnerabilities

Addressing the Hyperbole: OpenVPN Zero-Day Vulnerabilities

Johan Draaisma

3 minute read
2FA vs. MFA: What’s the Difference?

2FA vs. MFA: What’s the Difference?

More than 15 billion leaked credentials were available for sale online in 2024 — which means there is a solid chance that at least a few of your employees have information that has been compromised. Authentication plays a pivotal role in ensuring the security of sensitive data, systems, and networks, but only when it makes access more difficult

Krista Lyons

4 minute read
Beating BEC with People, Process and Technology

Beating BEC with People, Process and Technology

Business email compromise (BEC) is a typically dispassionate piece of cybersecurity terminology that actually signifies one of the biggest online threats facing organizations today. In fact, threat actors made more money from BEC scams last year than any other type of cybercrime, according to an annual FBI report published recently. The bad news

OpenVPN Team

4 minute read
The Lapsus$ Group: Who They Are and How to Protect Your Business

The Lapsus$ Group: Who They Are and How to Protect Your Business

Staying one step ahead of cybercriminals takes extensive effort, especially when the targets seem to be constantly moving. There are new and persistent threats coming onto the scene all the time, some more alarming and chaotic than others. Recent hacks by a newer group called Lapsus$ are making waves in the infosec and business communities. Unlike

OpenVPN Team

6 minute read