IoT Security
How Identity and Access Management Fits Into Zero Trust
“Never trust, always verify.” If you’ve heard anything about zero trust network access (ZTNA), you’ve likely heard the above phrase. Verifying identity is at the crux of zero trust, and identity and access management is how you make it happen. But isn’t it enough to use multi-factor authentication? Not exactly. In this post, we’ll dive […]
July 23, 2024
Read More
Harnessing Zero Trust Network Access (ZTNA) to Manage Shadow IT
As new technology, new risks, and new tools surface faster than most teams can keep up with, organizations are experiencing a surge in shadow IT. Employees, usually in an effort to get their work done more efficiently, resort to using unauthorized applications and services outside of the approved IT infrastructure. While this trend may arise […]
April 2, 2024
Read More
OpenVPN Connect 3.4.0 for Android is Now Available With Updates to Core Libraries
CloudConnexa is now CloudConnexa® — learn more here. At OpenVPN, we strive to continually improve and enhance our products. We’re pleased to introduce the new OpenVPN Connect version 3.4.0 for Android. This release includes major updates of OpenVPN and OpenSSL libraries, three new levels of security for increased user flexibility, and more. What is OpenVPN […]
February 13, 2024
Read More
January ‘24: Exploited Exposures in VPN and Secure Remote Access Software
Cybersecurity threats in 2024 are heating up. In January alone, there were reportedly 4,645 publicly disclosed security incidents, with 29,530,829,012 known records breached. Several of these attacks were due to a handful of zero-day Common Vulnerabilities and Exposures (CVEs) that were exploited in targeted malware and ransomware attacks, a few of which involved secure remote […]
February 6, 2024
Read More
Partner Tips: 5 ZTNA Best Practices for Managed Service Providers
As an MSP, you know ZTNA is important and getting your clients set up for success with ZTNA in the long run starts with you – otherwise you wouldn’t be here. You also likely know that ZTNA is not one single tool, but that doesn’t mean it needs to be overly complex. When you’re managing several clients at once and implementing ZTNA essentials, simplicity is key.
Once your clients are on board with ZTNA, it's important to follow these five best practices to keep them on the right track.
January 22, 2024
Read More
Key Considerations for Choosing the Right ZTNA Solution for Your Business
When it comes to achieving zero trust network access (ZTNA), there are many different architectures to choose from for your business’s solution. Today, we’ll discuss several in more detail to help you make the most informed choice possible.
July 25, 2023
Read More
Turn Your Old Smartphone into a Secure Live IP Streaming Camera With CloudConnexa®
Do you have an old smartphone lying around? Don't recycle it or trade it in for a new one for a paltry sum! You can turn it into an Internet Protocol streaming security camera (IP camera) and view the live video stream from anywhere for free. You may get more value from repurposing your smartphone as a security camera than the trade-in value of your old phone. This blog post provides a step-by-step guide to upcycling your old phone.
May 2, 2023
Read More
Forget IT Security: Why OT Systems Could Be Your Biggest Cyber Risk
Operational Technology systems run the world. It’s time we address the expanded attack surface and security risks that come with them.
July 14, 2022
Read More
Cybersecurity for the Manufacturing Industry
The manufacturing industry's embrace of the Internet of Things (IoT) has changed our world in countless ways — not the least of which is that it resulted in Industry 4.0.
March 10, 2022
Read More
IDS/IPS: What They Are and Why You Need Them
Intrusion Detection Systems and Intrusion Prevention Systems — or IDS/IPS — are invaluable, readily available network security tools for mitigating malicious traffic and suspicious activity. And the benefits of IDS/IPS aren’t limited to vulnerabilities associated with 5G. Read on for a look at how your business can make an Intrusion Detection System and Intrusion Prevention System part of your security management.
February 22, 2022
Read More