![]() ![]() This is because VPNs were always considered to be a “fill the gap” piece of the IT infrastructure, meant for workers on business travel or for people accessing the company resources off-hours. Most organizations use old, antiquated remote VPN applications and concentrators which work in a hub-spoke architecture. Unfortunately, this also presents a golden opportunity for malicious attackers to disrupt their targets by launching various types of attacks on the enterprise VPN infrastructure itself. In the wake of the COVID-19 pandemic, many IT organizations find themselves scrambling to meet the sudden spike in VPN traffic as most employees are choosing to (or have been mandated to) work from home.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |