

Justin Jett
Director of Audit and Compliance /*=$expert->feature_status*/ ?>
Plixer
Comments Dotted :
4
March 19, 2020
Organizations that are building out their VPN capabilities need to be sure to properly deploy and patch their systems.
As the number of employees working from home continues to rise, businesses must ensure that their VPN is in a position to offer their employees the same experience as though they were working in the office. Bandwidth can be a serious strain for businesses not used to a majority of their users connecting from home. IT must be sure to educate their users, so they are aware of the impact on everyone and to limit their bandwidth-heavy activity, like Netflix streaming, to outside of office hours......Read More

January 02, 2020
DNS-Over-HTTPS (DoH) and DNS-Over-TLS (DoT) are important advancements to the overall security of the internet.
DNS-Over-HTTPS (DoH) and DNS-Over-TLS (DoT) are important advancements to the overall security of the internet. However, these technologies can create blind spots in corporate networks. By preventing businesses from seeing DNS queries, individuals can become victims to DNS leak attacks if their systems are compromised. While encrypted DNS is important to prevent internal eavesdropping, those within the organizations should use company-approved DoH or DoT servers instead of publicly available.....Read More

November 22, 2019
Additionally, organizations should monitor TLS certificate metadata with network traffic analytics.
Organizations that plan to, or are currently, using TLSI to detect malicious activities on the network must be sure to maintain the certificate validation process that would normally happen between the client and the server. Additionally, organizations should monitor TLS certificate metadata with network traffic analytics. These details such as certificate common name, Certificate Authority (CA) information, and expiration date, will give security and network professionals information they need .....Read More

September 23, 2019
By having a baseline of normal user behavior, organizations can understand how compromised machines have taken data off the network.
Software vulnerabilities, like the one found in Forcepoint VPN Client for Windows, can mean real problems for organizations. Once a hacker has exploited the vulnerability, they gain significant power over the end-user’s system. While it is not clear if the vulnerability also gives access to corporate resources, businesses should be certain to have access to network traffic analysis to understand how machines across the network are behaving. By having a baseline of normal user behavior,.....Read More
