{"id":4176,"date":"2020-03-13T12:20:53","date_gmt":"2020-03-13T17:20:53","guid":{"rendered":"https:\/\/www.kraftgrp.com\/?p=4176"},"modified":"2020-03-18T07:26:04","modified_gmt":"2020-03-18T12:26:04","slug":"corporate-vpn","status":"publish","type":"post","link":"https:\/\/www.kraftgrp.com\/corporate-vpn\/","title":{"rendered":"Is Your Corporate VPN Putting You At Risk?"},"content":{"rendered":"
Like any type of cybersecurity solution, not all Virtual Private Networks (VPN) are made equal. Each and every part of your cybersecurity defense needs to be vetted to make sure it isn\u2019t putting your data at risk.<\/p>\n
Have you assessed your VPN?<\/p>\n
<\/p>\n
A VPN creates a secure tunnel for your data to transit the Internet, using a network of private servers. When you use a VPN, your data is encrypted, or hidden, as it moves from your device to the VPN and then continues onto the Internet through what\u2019s called an exit node. A VPN creates the appearance that your data is coming from the VPN server, not from your device.<\/p>\n
Therefore, it\u2019s harder for an attacker to identify you as the source of the data. Even if attackers can intercept your data, the encryption means the attackers can\u2019t understand your data or use it to their advantage. When you put your data out to the VPN server, it exits back out to the public internet. If the site you\u2019re visiting has HTTPS to keep the connection safe, you are still secure.<\/p>\n
But even if it was intercepted by a third party, it\u2019s challenging for the outside party to trace the data back to you, since it appears to be coming from a VPN server.<\/p>\n
1. No 2FA Capability<\/strong><\/p>\n Two factor authentication (2FA) helps you protect your identity and accounts. More and more organizations are using it for its security and ease-of-use. 2FA requires the user to utilize two methods to confirm that they are the rightful account owner. Biometrics like fingerprints, voice, or even iris scans are also options, as are physical objects like keycards.<\/p>\n By requiring a second piece of information like a randomly-generated numerical code sent by text message, you’re better able to ensure that the person using your employee’s login credentials is actually who they say they are.<\/p>\n Without 2FA enabled, if an employee\u2019s VPN credentials are stolen, a bad actor could have unrestricted access to corporate data. That\u2019s why VPNs need to integrate with 2FA solutions.<\/p>\n 2. Assumption Of Security<\/strong><\/p>\n You can\u2019t afford to make any assumptions when it comes to your cybersecurity. However, some corporate VPN solutions treat remote workers as if they are sitting inside the corporate campus on a device with corporate security controls. This usually isn\u2019t the case.<\/p>\n The reality is that VPN users should be treated in a zero-trust model since they may not be on a company-owned device and are most likely operating from a network without corporate security controls. This means all VPN connections should have extra security controls applied to make sure the remote worker\u2019s network traffic is clean and authorized.<\/p>\n If you’re worried about your remote security, especially when it comes to the VPN you have in place at your business, then don’t try to handle it all on your own. Kraft Technology Group team will help you evaluate your security measures as a whole to make sure you’re not taking on any unnecessary risks.<\/p>\n Like this article? Check out the following blogs to learn more:<\/p>\n The Need for Cybersecurity Expertise at the Board Level for Banking<\/a> VPNs can be a highly effective way to keep remote workers secure, and protect data on public networks – but you can\u2019t make any assumptions. Are you confident your corporate VPN is keeping your business data secure?<\/p>\n","protected":false},"author":1,"featured_media":4177,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_mbp_gutenberg_autopost":false,"footnotes":""},"categories":[17],"tags":[],"class_list":["post-4176","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"\nNeed Assistance Deploying A Secure VPN?<\/h3>\n
\nThe new Health Industry Cybersecurity Practices (HICP)<\/a>
\nNIST\u2019s Small Business Cybersecurity Corner<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"