IoT Security

Harnessing Zero Trust Network Access (ZTNA) to Manage Shadow IT

As new technology, new risks, and new tools surface faster than most teams can keep up with, organizations are experiencing a surge in shadow IT. Employees, usually in an effort to get their work done more efficiently, resort to using unauthorized applications and services outside of the approved IT infrastructure. While this trend may arise […]
April 2, 2024
Read More

OpenVPN Connect 3.4.0 for Android is Now Available With Updates to Core Libraries

CloudConnexa is now CloudConnexa® — learn more here. At OpenVPN, we strive to continually improve and enhance our products. We’re pleased to introduce the new OpenVPN Connect version 3.4.0 for Android. This release includes major updates of OpenVPN and OpenSSL libraries, three new levels of security for increased user flexibility, and more. What is OpenVPN […]
February 13, 2024
Read More

January ‘24: Exploited Exposures in VPN and Secure Remote Access Software

Cybersecurity threats in 2024 are heating up. In January alone, there were reportedly 4,645 publicly disclosed security incidents, with 29,530,829,012 known records breached. Several of these attacks were due to a handful of zero-day Common Vulnerabilities and Exposures (CVEs) that were exploited in targeted malware and ransomware attacks, a few of which involved secure remote […]
February 6, 2024
Read More

Partner Tips: 5 ZTNA Best Practices for Managed Service Providers

As an MSP, you know ZTNA is important and getting your clients set up for success with ZTNA in the long run starts with you – otherwise you wouldn’t be here. You also likely know that ZTNA is not one single tool, but that doesn’t mean it needs to be overly complex. When you’re managing several clients at once and implementing ZTNA essentials, simplicity is key. Once your clients are on board with ZTNA, it's important to follow these five best practices to keep them on the right track.
January 22, 2024
Read More

Key Considerations for Choosing the Right ZTNA Solution for Your Business 

When it comes to achieving zero trust network access (ZTNA), there are many different architectures to choose from for your business’s solution. Today, we’ll discuss several in more detail to help you make the most informed choice possible.
July 25, 2023
Read More

Turn Your Old Smartphone into a Secure Live IP Streaming Camera With CloudConnexa®

Do you have an old smartphone lying around? Don't recycle it or trade it in for a new one for a paltry sum! You can turn it into an Internet Protocol streaming security camera (IP camera) and view the live video stream from anywhere for free. You may get more value from repurposing your smartphone as a security camera than the trade-in value of your old phone. This blog post provides a step-by-step guide to upcycling your old phone.
May 2, 2023
Read More

Forget IT Security: Why OT Systems Could Be Your Biggest Cyber Risk

Operational Technology systems run the world. It’s time we address the expanded attack surface and security risks that come with them.
July 14, 2022
Read More

Cybersecurity for the Manufacturing Industry

The manufacturing industry's embrace of the Internet of Things (IoT) has changed our world in countless ways — not the least of which is that it resulted in Industry 4.0.
March 10, 2022
Read More

IDS/IPS: What They Are and Why You Need Them

Intrusion Detection Systems and Intrusion Prevention Systems — or IDS/IPS — are invaluable, readily available network security tools for mitigating malicious traffic and suspicious activity. And the benefits of IDS/IPS aren’t limited to vulnerabilities associated with 5G. Read on for a look at how your business can make an Intrusion Detection System and Intrusion Prevention System part of your security management.
February 22, 2022
Read More

IoT Vulnerabilities for Cybersecurity

IoT devices such as cameras and virtual assistants don't just house sensitive data; they're a way for bad actors to actually look into your home.
January 6, 2022
Read More