Category : Software

The Best VPN Services of 2018

“A virtual private network is the best way to stay anonymous online and to secure your web traffic. We’ve tested more than 50 VPNs, and these are our top performers” stated PC Mag’s, Max Eddy

Best VPN Services of 2018

 

What Is a VPN?

In the simplest terms, a VPN is used to create a secure, encrypted connection—which can be thought of as a tunnel—between your computer and a server operated by the VPN service. In a professional setting, this tunnel makes you part of the company’s network, as if you were physically sitting in the office—hence the name.

While you’re connected to a VPN, all your network traffic passes through this protected tunnel, and no one—not even your ISP—can see your traffic until it exits the tunnel from the VPN server and enters the public internet. If you make sure to only connect to websites secured with HTTPS, your data will continue to be encrypted even after it leaves the VPN.

Think about it this way: If your car pulls out of your driveway, someone can follow you and see where you are going, how long you are at your destination, and when you are coming back. They might even be able to peek inside your car and learn more about you. With a VPN service, you are essentially driving into a closed parking garage, switching to a different car, and driving out, so that no one who was originally following you knows where you went.

VPNs Keep You Safe Online

Have you become so comfortable with the idea of transmitting your data via Wi-Fi that you’ve stopped worrying about the safety of said data—and of who else might be looking at it? You’re not alone. In fact, you’re probably in the majority. That’s a huge privacy and security problem. Public Wi-Fi networks, which are commonplace and convenient, are unfortunately also highly convenient for attackers who are looking to compromise your personal information. When even your ISP is allowed to sell your browsing history it’s time to begin thinking about protecting your data. That’s where virtual private networks, or VPNs, come in.

 

Who Needs a VPN?

The protection provided by a VPN offers users many advantages. First and foremost, it prevents anyone on the same network access point (or anywhere else) from intercepting your web traffic in a man-in-the-middle attack. This is especially handy for travelers and for those using public Wi-Fi networks, such as web surfers at hotels, airports, and coffee shops. VPNs also cloak your computer’s actual IP address, making it harder for advertisers (or spies, or hackers) to track you online.

 

How to Choose a VPN Service

The VPN services market has exploded in the past few years, and a small competition has turned into an all-out melee. Many providers are capitalizing on the general population’s growing concerns about surveillance and cybercrime, which means it’s getting hard to tell when a company is actually providing a secure service and when it’s throwing out a lot of fancy words while selling snake oil. In fact, since VPN services have become so popular in the wake of Congress killing ISP privacy rules, there have even been fake VPNs popping up, so be careful. It’s important to keep a few things in mind when evaluating which VPN service is right for you: reputation, performance, type of encryption used, transparency, ease of use, support, and extra features. Don’t just focus on price, though that is an important factor.

____________________________________________________________________

For the original content, please visit:

PCMag.VPN2018

Keylogger Discovered on HP Laptops

Keylogger discovered on HP Laptops

 

Keylogger‘s are used in IT organizations to troubleshoot technical problems with computers and business networks. They can also be used to monitor the network usage of people without their direct knowledge; they are sometimes used as part of home parental controls. Finally, malicious individuals may use keyloggers on public computers to steal passwords or credit card information.” Reported Bradley Mitchell.

Last week, keylogger was discovered on over 460 different models of HP laptops. The keylogger is disabled by default but is easily enabled under the Windows Registry.  Security researcher, Michael Myng, discovered keylogger in an attempt to figure out how to control HP’s laptop keyboard black light.  What he discovered has sent a shockwave throughout the industry. The keylogger was capable of recording every keystroke made by a single user. Thankfully, most are disabled by default, as previously mentioned. However, it would be a very simple change to enable it which could make your PC vulnerable to a potential hacker.

The BBC reports that HP has issued a software patch to remove the keylogger. “However, there are over 460 models of HP laptop affected, including those in the EliteBook, ProBook, Pavilion, and Envy ranges, and the keylogger has been present since 2012. The software patch support page lists all models carrying the disabled keylogger.”

HP initially allowed keylogger to be installed on so many laptops to act as a debugging tool on the drive. It was simply an oversight, then disabled but not removed. Leaving several laptops in danger of being hacked.

____________________________________________________________________

For the original content, please visit:  Keylogger Discovered on HP Laptops

How to get the most out of your Amazon Web Services?

How to get the most out of your Amazon Web Services?

Amazon Web Services

Have you ever noticed that Amazon Web Services is not only cost effective, but helps organizations achieve scalability and reduced time to market. However, you may notice that these benefits can be lost in its IT infrastructure.

But by incorporating Amazon Web Services with SteelConnect it becomes a revolutionary application-defined SD-WAN solution.

Benefits of Riverbed SteelConnect + AWS:

  • Performance: Riverbed SteelConnect delivers high performance – even if network conditions change – for any application (encrypted or conventional, on-premises or cloud-based) to any user (mobile or static).
  • Agility: Simple workflows with intelligent automation reduce IT turnaround time. Setting up a cloud instance takes minutes in AWS and establishing a secure, high-performance mesh network takes another few minutes with Riverbed.
  • Efficiency: The ability to seamlessly leverage hybrid WANs to connect the user to the cloud improves network efficiency. Simple management increases overall IT efficiency.

If you are interested in reading the original article, or would like to educate yourself in more detail about the information presented in this blog post, please visit: Riverbed

 

 

 

 

Two Factor Authentication – What is it?

two factor authentication

Two Factor Authentication, or 2FA, takes a combination of generally accepted forms of authentication to further secure your login to big sites and applications such as Facebook, Microsoft, Google, Apple iCloud and others. This is an extra layer of protection that utilizes something you know such as a password, and something only you has, such as a cell phone or fingerprint. This is not necessarily a new idea, many of us use this everyday when making purchases with a credit card and asked to enter a zip code for verification.

There are 3 generally accepted factors of authentication:

  1. Something you know – such as a password

  2. Something you have – such as a hardware token like a cell phone

  3. Something you are – such as your fingerprint

Two Factor Authentication takes two of the above in order to secure your log in. Such that if you have 2FA enabled on Facebook for instance, when you attempt to log into Facebook on a new device or browser you will be asked to confirm this log in with a second form of authentication which can be any of the three described above.

This form of authenticating is especially advised for sites and applications that house your personal information, credit cards, location information, are tied to other accounts, and could otherwise affect your personal life such as email, social media – the list is endless!

A few big names have taken head to this advice by employing 2FA, although the process is not entirely seamless, great strides have been taken to make using 2FA as easy as possible. Look for 2FA on your favorite big name sites and applications.

Set up Google 2FA here 

Set up Apple 2FA here 

Set up Microsoft 2FA here


 

If you would like to educate yourself in more detail about the information presented in this blog post please visit :

AWS releases tool for migrating on-premises apps to the cloud

amazonwebservices_logo-svg

The Server Migration Service was created to simplify the process of incremental replication of virtual machines from their on-premises infrastructure to Amazon’s cloud.

IT administrators install a connector that will analyze their virtualized server environment and collect information about the instances they’re using. AWS Management Console allows for viewing all the operating connectors and inspect the inventory of virtualized servers running in an environment. Adminstrators can then create and manage replication jobs to take the contents of a VM and reproduce it as an Amazon Machine Image stored in the AWS Elastic Block Store (EBS) service.

Replications can be run on an ongoing schedule and each incremental replication will sync only what has been changed to minimize network bandwidth use. Furthermore it is possible to spin up new instance that should be a duplicate of what is running on-premises. This can be used either for testing the replicated VM or for getting it running in production.

Server Migration Service is available now. Works with regions in northern Virginia, Ireland, and Sydney. Service itself doesn’t carry a charge, but customers must pay for $3 storage used for the move and EBS snapshots that result from the migration process.

 


If you would like to learn more about the material presented in this blog post please visit: www.networkworld.com 

 

Top 3 Identity Management Solution Recommendations

 Identity-Management-as-a-Service (IDaaS) provider aids with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity.

okta

Okta Identity Management

Okta comes highly rated for identity management, and for good reason. Rated best-in-class for support of integrating multiple directories, as it allows for multiple identity providers without compromising data quality, support providers such as AD, Google Apps, and Workday. Beginning at $2 per user, per month and ranging up to $8 for the most advanced tier. Installation and set up of Okta is fairly easy. One of the first steps of set up involves connecting to an existing AD domain, which Okta offers an AD agent that will synchronize user and security group objects to the software’s cloud based Universal Directory. After downloading the installer and going through the basic wizard motions, you can start using the Okta Agent Manager to dabble with basic maintenacne tasks, adding domains, and configuring a proxy server. You can use Okta to make your life easier by configuring the software to pull employee information from a SaaS application, configured as master attricutes, fed back to AD, and therefore enabling changes to the group to be automatically populated. The functionality possibilities are really to whatever degree you decide to take it. Okta offers more than any other Identity Management in the game.

 

onelogin  OneLogin

OneLogin is another great Identity Management tool. It offers support for multiple security policies and roles and mapping functionality provide flexible management. OneLogin offers a free entry-level proving that makes it the ideal choice for small businesses. Their four tier model ranges from the free level offer to an $8 per user, per month option similar to that of Okta. The directory integration sets OneLogin apart in the enterprise, alomg with other expected features of a quality IDaaS, such as multiple security policies, mobile functionality for users, multifactor authentication, and SAML authentication. Some found OneLogin’s dependence on mappings to be confusing, so that is something to consider.

azureWindows Azure Active Directory

Best-in-class integration with both Active Directory (AD) and Office 365, as well as the most cost-effective option for multifactor authentication (MFA). Azure gets a significant boost up due to the tight integration with Microsoft Windows Server Active Directory (AD) and Office 365. Azure AD encompasses advanced toolsets for managing identities and identifying the Software-as-a-Service (SaaS) applications used within an organization. Microsoft has been a top industry leader for decades, which is why they have such a significant leg up in on-premise network directories. Azure AD’s pricing is very competitive compared to other IDaaS, offering a free tier, a Basic tier for $.50 per user per month, and a Premium tier that runs $6 per month.

 


 

If you would like to educate yourself in more detail about the information presented in this blog post, please click on the linked titles above.