{"id":701,"date":"2020-02-04T03:34:37","date_gmt":"2020-02-04T03:34:37","guid":{"rendered":"https:\/\/leciir.com\/?post_type=blog_post&#038;p=701"},"modified":"2020-02-14T14:13:56","modified_gmt":"2020-02-14T14:13:56","slug":"network-security-faqs-vpn-top-picks","status":"publish","type":"blog_post","link":"https:\/\/leciir.com\/?blog_post=network-security-faqs-vpn-top-picks","title":{"rendered":"Network Security FAQs: VPN Top Picks"},"content":{"rendered":"\n<p><em>The 2019 Cost of Data Breach Report by IBM pinned the average international cost of a business data breach at USD 3.92 million, with the most expensive country being the United States at USD 8.19 million. Large-scale network and data breaches affect more people now than ever, bringing up a lot of questions on VPNs and network security. We answer some of these key questions here so that you can Live Easy. <\/em><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>VPN vs. Proxy &#8211; What&#8217;s the difference?<\/strong><\/p>\n\n\n\n<p>Both VPNs and\nProxies allow users to access the internet by first connecting to a server at\nanother location. This can make it appear as though a user is accessing the\ninternet from an IP address that&#8217;s not their own, for example, or can be useful\nin applying corporate network use policy and web traffic monitoring for the\nmany users within an enterprise. How the two services achieve these tasks is\nwhere they differ. <\/p>\n\n\n\n<p>A proxy is applied at the application level. It can relay either only web traffic (HTTP, HTTPS) or traffic from several different applications at once (SOCKS).&nbsp; HTTP proxies are seldom used today, as HTTPS proxies offer more security and privacy with an encrypted connection between the web server and a user&#8217;s web browser. In addition,&nbsp; Proxy servers can build up a pool of IP addresses which application cans use to access the internet. <\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" src=\"https:\/\/leciir.com\/wp-content\/uploads\/2020\/02\/Untitled-picture-8-1024x267.png\" alt=\"Application \nProxy Server \nInternet \" class=\"wp-image-705\" width=\"430\" height=\"111\"\/><\/figure><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>VPNs are applied at the device level, acting on a device network as a whole, rather than the connection of individual apps.&nbsp; They provide an encrypted tunnel for traffic between users and the VPN server, offering the security and the&nbsp; scale for larger tasks, such as uniting all corporate users onto one server, particularly when paired with a firewall and email security appliance (Live Easy with LeCiiR).<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" src=\"https:\/\/leciir.com\/wp-content\/uploads\/2020\/02\/Untitled-picture.png\" alt=\"User \nEncrypted \nTunnel \nVPN Server \nInternet \" class=\"wp-image-704\" width=\"516\" height=\"113\"\/><\/figure><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Deciding when a proxy or VPN is best, or how to optimally combine the two, is a matter of scale, cost and security.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>What kind of maintenance does a VPN need?<\/strong><\/p>\n\n\n\n<p>Key to VPN maintenance for businesses is the consistency of updates. Generally, a VPN provider will make updates available as soon as changes have been applied. Some providers make these updates mandatory for further use of the VPN &#8211; getting them out of the way immediately -, while others allow the user to schedule an update. In either case, installing updates as they become available &#8211; keeping your VPN up to date &#8211; is critical. <\/p>\n\n\n\n<p>Businesses should also remain vigilant of current cybersecurity alerts. The Cybersecurity and Infrastructure Security Agency (CISA), for instance, releases warnings such as the recent <a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/aa20-010a\" target=\"_blank\" rel=\"noopener\">Alert (AA20-010A) for the Continued Exploitation of Pulse Secure VPN Vulnerability<\/a>, in which a remote code execution (RCE) vulnerability (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-11510\" target=\"_blank\" rel=\"noopener\">CVE-2019-11510<\/a>) was exposed as a target for attacks exploiting unpatched Pulse Secure VPNs. Keeping an eye out for alerts like these, as well as following through with the appropriate updates, reduces the response time to and severity of cybersecurity issues and attacks. <\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Are VPNs safe?<\/strong><\/p>\n\n\n\n<p>With a trustworthy provider, VPNs are safe, allowing for secure internet access. To assess whether a VPN service provider is trustworthy, it&#8217;s important to know the user agreement &#8211; <em>well<\/em>. Some providers collect user data, such as connection tendencies and IP addresses, defeating the purpose of VPN use for any privacy concerns. The user agreement identifies the data collection practices of the provider and is the first reference in selecting the right provider.<\/p>\n\n\n\n<p>Typically, the less\na VPN provider logs, the better for your privacy and security. Beyond the user\nagreement, businesses should be aware of a provider&#8217;s location (country) in\norder to understand any associated data retention laws, for example. Different jurisdictions\nmight also require different types of information to be made available in the\nuser agreement, making it important to detect any potential omissions. Just as\nin VPN maintenance, It comes down to vigilance. <\/p>\n\n\n\n<p>At LeCiiR, we want you to Live Easy and securely. That&#8217;s why we offer a fully secured VPN service. Our approach provides entry-point threat mitigation and traffic control, as well as the ability to adapt and grow with network changes. For questions on this topic or any others, don&#8217;t hesitate to <a href=\"https:\/\/leciir.com\/?page_id=84\">contact us.<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" src=\"https:\/\/leciir.com\/wp-content\/uploads\/2020\/02\/Artboard-1@3x.png\" alt=\"\" class=\"wp-image-703\" width=\"171\" height=\"171\" srcset=\"https:\/\/leciir.com\/wp-content\/uploads\/2020\/02\/Artboard-1@3x.png 378w, https:\/\/leciir.com\/wp-content\/uploads\/2020\/02\/Artboard-1@3x-300x300.png 300w, https:\/\/leciir.com\/wp-content\/uploads\/2020\/02\/Artboard-1@3x-150x150.png 150w\" sizes=\"(max-width: 171px) 100vw, 171px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>References<\/strong><\/p>\n\n\n\n<p>CISA, <a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/aa20-010a\" target=\"_blank\" rel=\"noopener\">Alert (AA20-010A): Continued Exploitation of Pulse Secure VPN\nVulnerability<\/a>. January 2020.<\/p>\n\n\n\n<p>NIST\n&#8211; NVD, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-11510\" target=\"_blank\" rel=\"noopener\">CVE-2019-11510&nbsp;Detail.<\/a> October 2019.<\/p>\n\n\n\n<p>IBM, <a href=\"https:\/\/www.ibm.com\/security\/data-breach?p1=Search&amp;p4=p50370570729&amp;p5=b&amp;cm_mmc=Search_Google-_-1S_1S-_-WW_NA-_-%2Bbreach%20of%20%2Bdata_b&amp;cm_mmca7=71700000061027912&amp;cm_mmca8=kwd-295901324379&amp;cm_mmca9=CjwKCAiAg9rxBRADEiwAxKDTuqsKLbXomhe5rKEsFyR2hsY7VUGO4kirwwrLHL6CH5wHGFyQUDCkURoCck8QAvD_BwE&amp;cm_mmca10=405839889594&amp;cm_mmca11=b&amp;gclid=CjwKCAiAg9rxBRADEiwAxKDTuqsKLbXomhe5rKEsFyR2hsY7VUGO4kirwwrLHL6CH5wHGFyQUDCkURoCck8QAvD_BwE&amp;gclsrc=aw.ds\" target=\"_blank\" rel=\"noopener\">2019 Cost of Data Breach Report highlights<\/a>. 2019.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Images: Pixabay<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The 2019 Cost of Data Breach Report by IBM pinned the average international cost of a business data breach at USD 3.92 million, with the most expensive country being the United States at USD 8.19 million. Large-scale network and data breaches affect more people now than ever, bringing up a lot of questions on VPNs [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":702,"comment_status":"open","ping_status":"closed","template":"","tags":[20,21],"blog-category":[],"_links":{"self":[{"href":"https:\/\/leciir.com\/index.php?rest_route=\/wp\/v2\/blog_post\/701"}],"collection":[{"href":"https:\/\/leciir.com\/index.php?rest_route=\/wp\/v2\/blog_post"}],"about":[{"href":"https:\/\/leciir.com\/index.php?rest_route=\/wp\/v2\/types\/blog_post"}],"author":[{"embeddable":true,"href":"https:\/\/leciir.com\/index.php?rest_route=\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/leciir.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=701"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/leciir.com\/index.php?rest_route=\/wp\/v2\/media\/702"}],"wp:attachment":[{"href":"https:\/\/leciir.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=701"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/leciir.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=701"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/leciir.com\/index.php?rest_route=%2Fwp%2Fv2%2Fblog-category&post=701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}