• Tech News
    • Games
    • Pc & Laptop
    • Mobile Tech
    • Ar & Vr
    • Security
  • Startup
    • Fintech
  • Reviews
  • How To
What's Hot

Elementor #32036

January 24, 2025

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

April 18, 2024

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

April 16, 2024
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
    1. Games
    2. Pc & Laptop
    3. Mobile Tech
    4. Ar & Vr
    5. Security
    6. View All

    Bring Elden Ring to the table with the upcoming board game adaptation

    September 19, 2022

    ONI: Road to be the Mightiest Oni reveals its opening movie

    September 19, 2022

    GTA 6 images and footage allegedly leak

    September 19, 2022

    Wild west adventure Card Cowboy turns cards into weird and silly stories

    September 18, 2022

    7 Reasons Why You Should Study PHP Programming Language

    October 19, 2022

    Logitech MX Master 3S and MX Keys Combo for Business Gen 2 Review

    October 9, 2022

    Lenovo ThinkPad X1 Carbon Gen10 Review

    September 18, 2022

    Lenovo IdeaPad 5i Chromebook, 16-inch+120Hz

    September 3, 2022

    It’s 2023 and Spotify Still Can’t Say When AirPlay 2 Support Will Arrive

    April 4, 2023

    YouTube adds very convenient iPhone homescreen widgets

    October 15, 2022

    Google finishes iOS 16 Lock Screen widgets rollout w/ Maps

    October 14, 2022

    Is Apple actually turning iMessage into AIM or is this sketchy redesign rumor for laughs?

    October 14, 2022

    MeetKai launches AI-powered metaverse, starting with a billboard in Times Square

    August 10, 2022

    The DeanBeat: RP1 simulates putting 4,000 people together in a single metaverse plaza

    August 10, 2022

    Improving the customer experience with virtual and augmented reality

    August 10, 2022

    Why the metaverse won’t fall to Clubhouse’s fate

    August 10, 2022

    How Apple privacy changes have forced social media marketing to evolve

    October 16, 2022

    Microsoft Patch Tuesday October Fixed 85 Vulnerabilities – Latest Hacking News

    October 16, 2022

    Decentralization and KYC compliance: Critical concepts in sovereign policy

    October 15, 2022

    What Thoma Bravo’s latest acquisition reveals about identity management

    October 14, 2022

    What is a Service Robot? The vision of an intelligent service application is possible.

    November 7, 2022

    Tom Brady just chucked another Microsoft Surface tablet

    September 18, 2022

    The best AIO coolers for your PC in 2022

    September 18, 2022

    YC’s Michael Seibel clarifies some misconceptions about the accelerator • DailyTech

    September 18, 2022
  • Startup
    • Fintech
  • Reviews
  • How To
Behind The ScreenBehind The Screen
Home»Security»CISA and NSA release guidance for securing VPNs
Security

CISA and NSA release guidance for securing VPNs

July 3, 2022No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
CISA and NSA release guidance for securing VPNs
Share
Facebook Twitter LinkedIn Pinterest Email

What your group ought to take into account in terms of selecting a VPN resolution and hardening it towards assaults

The NSA and CISA have launched joint steerage to assist organizations choose their Digital Personal Community (VPN) resolution and harden it towards compromise. Susceptible VPN servers are engaging targets for risk actors, as they supply nice alternatives for infiltrating the victims’ techniques and networks.

“A number of nation-state superior persistent risk (APT) actors have weaponized widespread vulnerabilities and exposures (CVEs) to achieve entry to susceptible VPN gadgets. Exploitation of those CVEs can allow a malicious actor to steal credentials, remotely execute code, weaken encrypted site visitors’s cryptography, hijack encrypted site visitors periods, and browse delicate information from the machine,” stated the NSA in its press release. The NSA identified {that a} risk actor who establishes a foothold in a system or community can go on and wreak all kinds of havoc on a company.

Dubbed “Selecting and Hardening Remote Access VPN Solutions”, the steerage units out guidelines, or slightly suggestions, that organizations and corporations ought to observe when selecting a distant entry VPN that may grant entry to their techniques. This consists of adhering to tried-and-tested options which can be compliant with trade requirements and will be discovered on product compliance lists, and VPN providers which have clearly recognized requirements and applied sciences that they use to determine VPN connections.

At the moment’s steerage with @CISAgov outlines methods to correctly choose the suitable distant entry VPN on your group and methods to additional harden your VPN as soon as in use. https://t.co/EUUKuZnYyM pic.twitter.com/Pn8nt5w47S

— NSA Cyber (@NSACyber) September 28, 2021

Different recommendation additionally consists of counting on respected distributors with confirmed observe information in remediating any vulnerabilities promptly, following cybersecurity greatest practices, and utilizing robust authentication credentials.

See also  Lenovo UEFI Firmware Vulnerabilities Danger Quite a few Laptop computer Fashions

In the meantime, in terms of hardening VPNs, the NSA-CISA data sheet recommends that organizations ought to:

  • configure robust cryptography and authentication
  • run solely probably the most vital options and so assist cut back the assault floor
  • shield and monitor entry to and from their VPN connections

Naturally, the sheet goes into higher element and consists of recommendation lengthy echoed by cybersecurity professionals, akin to utilizing multi-factor authentication and making use of patches and safety updates as quickly as attainable to mitigate any identified vulnerabilities.

Whereas the recommendation is aimed toward enhancing the safety of the Division of Protection, Nationwide Safety techniques and the Protection Industrial Base, following these suggestions would profit any group or firm, public or governmental, that makes use of a VPN resolution to entry its techniques.



Source link

CISA guidance NSA release securing VPNs
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

How Apple privacy changes have forced social media marketing to evolve

October 16, 2022

Microsoft Patch Tuesday October Fixed 85 Vulnerabilities – Latest Hacking News

October 16, 2022

Decentralization and KYC compliance: Critical concepts in sovereign policy

October 15, 2022

What Thoma Bravo’s latest acquisition reveals about identity management

October 14, 2022
Add A Comment

Comments are closed.

Editors Picks

Project Eve becomes Stellar Blade, new trailer

September 14, 2022

Google opens the door for Android apps that work across all kinds of devices

August 28, 2022

Now all of your new Instagram movies are Reels

July 21, 2022

What’s Deepfake Bruce Willis Doing in My Metaverse?

October 7, 2022

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Elementor #32036

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2025 behindthescreen.uk - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.