Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

2/22/2019
12:30 PM
50%
50%

6 Tips for Getting the Most from Your VPN

VPNs are critical for information security. But simply having these cozy security tunnels in the toolkit isn't enough to keep an organization's data safe.
Previous
1 of 7
Next

Blanket forts are great. As kids, we love the feelings of warmth and security that come from being wrapped, safe from the world, in that cozy embrace. IT security pros get a similar feeling when network communications are wrapped in a virtual private network (VPN).

VPNs are encrypted "tunnels" through which network traffic can safely flow. But simply having a VPN in the toolkit isn't enough to keep data safe; the VPN has to be deployed properly and used correctly to be effective.

There are two scenarios for deploying a VPN. One is "point-to-point," in which a VPN protects the network links between servers, data centers, or large infrastructure blocks. The other scenario is for mobile, where the VPN wraps the communication from a laptop, desktop, or handheld computer in the blanket fort of encryption wherever the device may be.

In many ways, the VPN between fixed assets is the easier deployment, since it will be totally within the control of the central IT group to connect assets that rarely, if ever, change. However, the mobile VPN "in the wild" is a much different deployment exercise, one that requires particular attention in order for the VPN to be truly effective at protecting the data flowing to and from devices in the field.

What can an organization's security staff do to make sure that its VPNs are protecting all of the data that has to flow from the field? Start with the steps described here, each of which must be communicated with employees so they understand how important data protection is.

One additional point: For purposes of this article, we're discussing VPNs as a general tool — not just the public VPN services widely used by consumers. If you're already using VPNs for all your network connections, let us know what your best practices look like in the comment section, below.

(Image: Photon Photo — Adobe Stock)

 

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio

Previous
1 of 7
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
nikan70
50%
50%
nikan70,
User Rank: Apprentice
3/18/2019 | 3:15:56 AM
Re: VPN on your router
Love what you're doing here guys, keep it up!
TerazTVSeriale
50%
50%
TerazTVSeriale,
User Rank: Apprentice
3/16/2019 | 8:52:46 AM
Re: VPN on your router
Great tips. Thank you very much!

 

------------

rajstopy do małej  czarnej
DanielN212
50%
50%
DanielN212,
User Rank: Apprentice
2/27/2019 | 9:49:54 AM
Re: VPN on your router
VeePN definitely has an option for routers
Mtony
50%
50%
Mtony,
User Rank: Strategist
2/22/2019 | 7:57:32 PM
VPN on your router
Legit, I think the best thing you can do is install a VPN on your router. I know from experience that ExpressVPN has their own router apps, I think Nord may also.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13868
PUBLISHED: 2020-06-05
An issue was discovered in the Comments plugin before 1.5.5 for Craft CMS. CSRF affects comment integrity.
CVE-2020-13869
PUBLISHED: 2020-06-05
An issue was discovered in the Comments plugin before 1.5.6 for Craft CMS. There is stored XSS via a guest name.
CVE-2020-13870
PUBLISHED: 2020-06-05
An issue was discovered in the Comments plugin before 1.5.5 for Craft CMS. There is stored XSS via an asset volume name.
CVE-2020-5591
PUBLISHED: 2020-06-05
XACK DNS 1.11.0 to 1.11.4, 1.10.0 to 1.10.8, 1.8.0 to 1.8.23, 1.7.0 to 1.7.18, and versions before 1.7.0 allow remote attackers to cause a denial of service condition resulting in degradation of the recursive resolver's performance or compromising the recursive resolver as a reflector in a reflectio...
CVE-2020-10071
PUBLISHED: 2020-06-05
The Zephyr MQTT parsing code performs insufficient checking of the length field on publish messages, allowing a buffer overflow and potentially remote code execution. NCC-ZEP-031 This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions.