![]() You can find a detailed description of the protocols at the end of the blog.Ĭommon Vulnerabilities and Attack Vectors To establish a VPN – whether it be Remote Access or Site-to-Site – there are generally four protocols commonly used. They are often used to connect networks between offices, allowing transparent and secure communication between sites. The connection between the user and the private network occurs through the Internet and the connection is secure and private.Ī Site-to-Site VPN is commonly used to connect geo-located sites and offices. Whilst VPNs add an additional layer of security over and above transferring data in the clear (without security or encryption), they can be susceptible to cyber-attacks if not configured, protected, and monitored regularly.Ī remote-access VPN permits a user to connect to a private network and access all its services and resources remotely. They can be established over Public and Private Networks, adding additional security to the connection, protecting the data being transferred. We also provide guidance on the controls that can address each type of attack, and an overview of general security considerations to help protect your IT services and resources.įor those of you who do not know, VPNs add privacy and security to networks, enabling data to be transferred between two points securely. The challenge is, from an IT perspective, that many VPN and remote work servers will have been configured at the speed of light – which means mistakes happen, and major vulnerabilities unwittingly left open.īelow we look at the types of VPN, and the main types of attack to which they are likely to be exposed. This type of attacker will then usually concentrate on VPN servers and email servers. Unfortunately, this also presents a heightened opportunity for malicious attackers to disrupt services by launching various types of attack.Īccording to CyBourn (specialists in threat detection and monitoring), there has been a 33% increase in the number of scans and crawlers of their clients – mainly in the retail and insurance industries – which is the first stage of an attack.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |