InfoSec (6)
When to Hire a CISO
Organizations have been moving larger and larger quantities of corporate data to the cloud — because enterprises around the globe realize the benefits that the cloud has over traditional computing. However, the cloud presents different security challenges than that of conventional on-site and PC solutions. Security in the cloud should be addressed
OpenVPN Team
3 minute read
Long-Term Vulnerabilities
A lot of organizations have weaknesses that can be exploited — but what about those weaknesses that extend back for decades? It’s not comforting to think that trusted companies and products have had breachable weaknesses for years, but it is a reality that must be faced as more and more long-term vulnerabilities are brought to light. Some
OpenVPN Team
3 minute read
Cerberus
You have probably heard about some Android Trojans like Anubis, Red Alert 2.0, GM bot, and Exobot — these pesky viruses have already made their rounds and done a fair share of damage. Although they are no longer circulating in the malware-as-a-service realm, a new version with similar capabilities has appeared on the Internet, offering Android bot
OpenVPN Team
3 minute read
Cybercrime-as-a-Service
DDoS stands for Distributed Denial of Service and occurs when a single system crashes after being targeted by multiple systems to flood its bandwidth. DDoS attacks are the scourge of IT security, and one-third of all downtime incidents are attributed to DDoS attacks — and thousands happen every day. Are they created by sophisticated Bond-worthy
OpenVPN Team
3 minute read
Biometric Security for Businesses
A password is supposed to help secure accounts and keep sensitive data protected — but the problem is that traditional passwords are often more of a liability than an asset because employees don’t heed the warnings. Employees often reuse passwords, neglect changing their passwords, leave the default password, or use weak passwords. In fact, a
OpenVPN Team
4 minute read
The Bad Actors Within Your Business
We have all listened to spooky stories or watched scary movies where it turns out the bad guy was inside the house the entire time. These plotlines tend to hit us hard because it’s especially frightening to contemplate that danger is lurking in the place we feel most safe. But these creepy plotlines stand as a sobering reminder for businesses as
OpenVPN Team
3 minute read
Should Pen-Testing Be Up For Debate?
Cyber attacks can be costly to any organization. They can destroy systems, lose organizations money, and cause reputational damage — but performing a penetration test can help protect your organization and its network. With the numerous security breaches taking place around the world, there is no doubt that penetration testing is one of the most
OpenVPN Team
4 minute read
Switching Vendors and Preventing Lock-In
Cloud computing is more than just a temporary fad — according to Forrester Research, the public cloud services market will grow to $236 billion by the year 2020. Why? Because cloud computing provides numerous benefits to businesses of all sizes.
OpenVPN Team
4 minute read
Does Your Business Really Need Penetration Testing?
With cyber threats increasing exponentially, breaches are no longer a matter of “if,” but “when.” If there are vulnerabilities in your system, chances are hackers will find them. It’s up to you to make sure you are aware of your weak spots — and fix them before the bad guys find them and exploit them. In the most recent CISO/Security Vendor
OpenVPN Team
4 minute read
What Organizations Need to Learn from APT Attacks
Cyber attacks have existed since the adoption of the Internet, evolving over the past few decades — from viruses and worms to malware and botnets; cyber threats continue to advance just as quickly as the Internet itself. In recent years, a new threat, the “Advanced Persistent Threat” (APT) has emerged. In the most recent CISO/Security Vendor
OpenVPN Team
6 minute read