Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

2/22/2019
12:30 PM
50%
50%

6 Tips for Getting the Most from Your VPN

VPNs are critical for information security. But simply having these cozy security tunnels in the toolkit isn't enough to keep an organization's data safe.
Previous
1 of 7
Next

Blanket forts are great. As kids, we love the feelings of warmth and security that come from being wrapped, safe from the world, in that cozy embrace. IT security pros get a similar feeling when network communications are wrapped in a virtual private network (VPN).

VPNs are encrypted "tunnels" through which network traffic can safely flow. But simply having a VPN in the toolkit isn't enough to keep data safe; the VPN has to be deployed properly and used correctly to be effective.

There are two scenarios for deploying a VPN. One is "point-to-point," in which a VPN protects the network links between servers, data centers, or large infrastructure blocks. The other scenario is for mobile, where the VPN wraps the communication from a laptop, desktop, or handheld computer in the blanket fort of encryption wherever the device may be.

In many ways, the VPN between fixed assets is the easier deployment, since it will be totally within the control of the central IT group to connect assets that rarely, if ever, change. However, the mobile VPN "in the wild" is a much different deployment exercise, one that requires particular attention in order for the VPN to be truly effective at protecting the data flowing to and from devices in the field.

What can an organization's security staff do to make sure that its VPNs are protecting all of the data that has to flow from the field? Start with the steps described here, each of which must be communicated with employees so they understand how important data protection is.

One additional point: For purposes of this article, we're discussing VPNs as a general tool — not just the public VPN services widely used by consumers. If you're already using VPNs for all your network connections, let us know what your best practices look like in the comment section, below.

(Image: Photon Photo — Adobe Stock)

 

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio

Previous
1 of 7
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
nikan70
50%
50%
nikan70,
User Rank: Apprentice
3/18/2019 | 3:15:56 AM
Re: VPN on your router
Love what you're doing here guys, keep it up!
TerazTVSeriale
50%
50%
TerazTVSeriale,
User Rank: Apprentice
3/16/2019 | 8:52:46 AM
Re: VPN on your router
Great tips. Thank you very much!

 

------------

rajstopy do małej  czarnej
DanielN212
50%
50%
DanielN212,
User Rank: Apprentice
2/27/2019 | 9:49:54 AM
Re: VPN on your router
VeePN definitely has an option for routers
Mtony
50%
50%
Mtony,
User Rank: Strategist
2/22/2019 | 7:57:32 PM
VPN on your router
Legit, I think the best thing you can do is install a VPN on your router. I know from experience that ExpressVPN has their own router apps, I think Nord may also.
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "I feel safe, but I can't understand a word he's saying."
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11111
PUBLISHED: 2020-03-31
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms).
CVE-2020-11112
PUBLISHED: 2020-03-31
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.proxy.provider.remoting.RmiProvider (aka apache/commons-proxy).
CVE-2020-11113
PUBLISHED: 2020-03-31
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.openjpa.ee.WASRegistryManagedRuntime (aka openjpa).
CVE-2020-10374
PUBLISHED: 2020-03-30
A webserver component in Paessler PRTG Network Monitor 19.2.50 to PRTG 20.1.56 allows unauthenticated remote command execution via a crafted POST request or the what parameter of the screenshot function in the Contact Support form.
CVE-2020-11104
PUBLISHED: 2020-03-30
An issue was discovered in USC iLab cereal through 1.3.0. Serialization of an (initialized) C/C++ long double variable into a BinaryArchive or PortableBinaryArchive leaks several bytes of stack or heap memory, from which sensitive information (such as memory layout or private keys) can be gleaned if...