How to Secure and Optimise your VPNs (Virtual Private Networks)

As more employees work from home, it’s important to review your VPN (Virtual Private Network) settings and following the best guidance, specially considering attackers are going through VPN technologies more than ever before.

We need VPNs more than ever and attackers are looking after any ransomware vulnerability in VPNs and gain access to all credentials and clients. You need to make sure the VPN is up-to-date and your firewall too. The only way to protect your VPN is to apply vulnerable patches. Even if you think the infrastructure is safe and secure, you should review and test your VPN connections to check they’re as secure as they should be and review all the settings. With so many people working from home, it’s recommendable spitting the remote traffic over the VPN.

These are the RedSwan best practices for secure work-from-home VPN connections following the National Security Agency guidelines.

  1. Reduce the VPN gateway attack surface
  2. Verify that cryptographic algorithms are Committee on National Security Systems Policy (CNSSP) 15-compliant
  3. Avoid using default VPN settings
  4. Remove unused or non-compliant cryptography suites
  5. Apply vendor-provided updates (patches) for VPN gateways and clients

Security has emerged as one of the primary roadblocks to multi-cloud adoption that requires movement of data, applications, and services from on-premises data centres to the cloud. Maybe it’s time to review that virtual private network (VPN) you set up for vulnerabilities, don’t you think?

For more tips on securing your VPN and cloud computing system in your IT infrastructure, simply contact us for a vendor-agnostic approach and RedSwan can assess the full cyber security marketplace and tailor the solution to your company’s needs.

Tags: