{"id":33906,"date":"2020-03-18T14:38:00","date_gmt":"2020-03-18T14:38:00","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31033\/With-Everyone-WFH-VPN-Security-Has-Become-Paramount.html"},"modified":"2020-03-18T14:38:00","modified_gmt":"2020-03-18T14:38:00","slug":"with-everyone-wfh-vpn-security-has-become-paramount","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/with-everyone-wfh-vpn-security-has-become-paramount\/","title":{"rendered":"With Everyone WFH, VPN Security Has Become Paramount"},"content":{"rendered":"<p>With most employees working from home amid today&#8217;s <span class=\"link\"><a href=\"https:\/\/www.cbsnews.com\/live-updates\/coronavirus-disease-covid-19-latest-news-2020-03-18\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;link_anchor&quot;, &quot;pageType&quot;: &quot;article&quot;}\" rel=\"noopener noreferrer\" target=\"_blank\" data-component=\"externalLink\">COVID-19 (coronavirus) outbreak<\/a><\/span>, enterprise VPN servers have now become paramount to a company&#8217;s backbone, and their security and availability must be the focus going forward for IT teams.<\/p>\n<p>&#8220;It will be very important [that] the VPN service is patched and up-to-date because there will be way more scrutiny (scanning) against these services,&#8221; said Guy Bruneau, an ISC SANS instructor in a post last week.<\/p>\n<p><a href=\"https:\/\/isc.sans.edu\/diary\/rss\/25906\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Bruneau&#8217;s warning<\/a> is just one of the many cybersecurity industry alerts published over the past few days on the topic of VPN security. ZDNet&#8217;s sister site CNET reviews the <a href=\"https:\/\/www.cnet.com\/news\/best-vpn-services-2020-directory\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">best VPN services<\/a>.<\/p>\n<p>Similar warnings and security bulletins were published by the Department of Homeland Security&#8217;s <a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/aa20-073a\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Cybersecurity and Infrastructure Security Agency<\/a> (DHS CISA), the <a href=\"http:\/\/pages.communications.cyber.nj.gov\/Share.aspx?i=0949629ed47d55a1d84d1c82575f46dbada4278f6982dffe5e47d8bc56bc53ef\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">New Jersey Cybersecurity and Communications Integration Cell<\/a> (NJCCIC), and cyber-security firm <a href=\"https:\/\/security.radware.com\/ddos-threats-attacks\/threat-advisories-attack-reports\/coronavirus-remote-access-threats\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Radware<\/a>.<\/p>\n<h3>The perfect time to detect VPN account compromises<\/h3>\n<p>According to Bruneau, it is now more important than ever that companies and IT staff set up systems to capture metrics about the performance and availability of VPN services.<\/p>\n<p>The ISC SANS instructor says these systems will help companies avoid downtime of mission-critical VPN services, especially now since employees work from home, and the VPN service represents the most secure way of accessing company networks and private resources.<\/p>\n<p>Bruneau encourages companies to sift through logs to detect compromises of VPN accounts. Since most employees will now be using VPN systems, they are more likely to fall for phishing attacks that steal VPN account credentials.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>In theory, with the proper logging in place, it should now be much easier to spot compromised accounts by looking at irregular VPN usage patterns for each enterprise user working from home.<\/p>\n<p>&#8220;The activity that should be scrutinized over the coming weeks would be ports associated with VPN like OpenVPN (1194) or SSL VPN (TCP\/UDP 443, IPsec\/IKEv2 UDP 500\/4500) with their associated logs to ensure these services are accessed by the right individuals and are not abused, exploited or compromised,&#8221; Bruneau said.<\/p>\n<div class=\"relatedContent alignRight\" readability=\"10.068965517241\">\n<h3 class=\"heading\"><span class=\"int\">Directory<\/span><\/h3>\n<div class=\"thumb\"><a href=\"https:\/\/www.cnet.com\/news\/best-vpn-services-2020-directory\/?ftag=CMG-01-10aaa1b\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\" rel=\"noopener noreferrer\" target=\"_blank\" data-component=\"externalLink\"><span class=\"img\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/r\/2020\/02\/13\/4b2f48dc-6236-491b-970a-1f8069212124\/resize\/220x165\/eeaa03be6771c1eb5269f5ad434732e7\/istock-1160498103.jpg\" class alt=\"Best VPN services for 2020 (CNET)\" height=\"165\" width=\"220\"><\/span><\/a><\/div>\n<p class=\"title\"><a href=\"https:\/\/www.cnet.com\/news\/best-vpn-services-2020-directory\/?ftag=CMG-01-10aaa1b\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\" rel=\"noopener noreferrer\" target=\"_blank\" data-component=\"externalLink\">Best VPN services for 2020 (CNET)<\/a><\/p>\n<p class=\"dek\">A virtual private network lets you send and receive data while remaining anonymous and secure online. In this directory, CNET looks at a few of the very best commercial VPN service providers on the Internet.<\/p>\n<p class=\"read-more\"><a href=\"https:\/\/www.cnet.com\/news\/best-vpn-services-2020-directory\/?ftag=CMG-01-10aaa1b\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\" rel=\"noopener noreferrer\" target=\"_blank\" data-component=\"externalLink\">Read More<\/a><\/p>\n<\/div>\n<h3>Enable MFA for VPN accounts<\/h3>\n<p>In the light of an expected increase in VPN phishing attacks, the ISC SANS expert recommends that companies look very closely at enabling a multi-factor authentication (MFA) solution to protect VPN accounts from unauthorized access.<\/p>\n<p>His recommendation was also echoed by the NJCCIC and DHS CISA in a US-CERT alert the agency sent out last week.<\/p>\n<p>In a report last year, Microsoft said that enabling a MFA solution for online accounts usually <a href=\"https:\/\/www.zdnet.com\/article\/microsoft-using-multi-factor-authentication-blocks-99-9-of-account-hacks\/\" target=\"_blank\" rel=\"noopener noreferrer\">blocks 99.9% of all account takeover (ATO) attacks<\/a>, even if the attacker has valid credentials for the victim&#8217;s account.<\/p>\n<p><strong>Also:<\/strong> <a href=\"https:\/\/www.zdnet.com\/article\/protect-yourself-how-to-choose-the-right-two-factor-authenticator-app\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Protect yourself: How to choose the right two-factor authenticator app<\/strong><\/a><\/p>\n<h3>VPN servers should be patched and up-to-date<\/h3>\n<p>But besides enabling MFA to protect VPN accounts for employees working from home, CISA also recommended that companies review the patching levels of corporate VPN products. The same advice was also echoed today in a Radware security alert.<\/p>\n<p>Both CISA and Radware point out that corporate VPN solutions have been the targets of a wide range of attacks that began over the 2019 summer.<\/p>\n<p>Attacks targeted VPN servers from Palo Alto Networks, Fortinet, Pulse Secure, and Citrix:<\/p>\n<p>\u2022 Palo Alto Network Security Advisory <a href=\"https:\/\/security.paloaltonetworks.com\/CVE-2019-1579\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">PAN-SA-2019-0020<\/a>, in relation to <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-1579\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">CVE-2019-1579<\/a>;<br \/>\u2022 FortiGuard Security Advisories <a href=\"https:\/\/fortiguard.com\/psirt\/FG-IR-18-389\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">FG-IR-18-389<\/a>, in relation to <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2018-13382\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">CVE-2018-13382<\/a>; <a href=\"https:\/\/fortiguard.com\/psirt\/FG-IR-18-388\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">FG-IR-18-388<\/a> in relation to <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2018-13382\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">CVE-2018-13383<\/a>; <a href=\"https:\/\/fortiguard.com\/psirt\/FG-IR-18-384\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">FG-IR-18-384<\/a>, in relation to <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2018-13379\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">CVE-2018-13379<\/a>;<br \/>\u2022 Pulse Secure Security Advisory <a href=\"https:\/\/kb.pulsesecure.net\/articles\/Pulse_Security_Advisories\/SA44101\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">SA44101<\/a>, in relation to <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-11510\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">CVE-2019-11510<\/a>, <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-11508\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">CVE-2019-11508<\/a>, <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-11540\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">CVE-2019-11540<\/a>, <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-11543\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">CVE-2019-11543<\/a>, <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-11541\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">CVE-2019-11541<\/a>, <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-11542\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">CVE-2019-11542<\/a>, <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-11539\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">CVE-2019-11539<\/a>, <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-11538\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">CVE-2019-11538<\/a>, <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-11509\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">CVE-2019-11509<\/a>, <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-11507\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-11507<\/a>CVE-2019-11507.<br \/>\u2022 Citrix Security Advisory <a href=\"https:\/\/support.citrix.com\/article\/CTX267027\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">CTX267027<\/a>, in relation to <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-19781\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">CVE-2019-19781<\/a>.<\/p>\n<p>All of these systems should have been patched last year when the vulnerabilities were disclosed, and the first attacks began hitting organizations.<\/p>\n<p>With more and more companies needing VPN capabilities to allow workers to log into private corporate systems and do their duties, IT staff are responding by putting up more VPN servers to deal with the surging traffic.<\/p>\n<p>IT staff now need to pay close attention to the new VPN servers they are putting up and make sure these systems have been patched for the vulnerabilities listed above, which are some of the most targeted vulnerabilities today.<\/p>\n<h3>The danger of DDoS attacks on VPN servers<\/h3>\n<p>But with so many organizations moving their employee workforce to work-from-home jobs, there is now a new threat on the horizon &#8212; extortions.<\/p>\n<p>Hackers could launch DDoS attacks on VPN services and exhaust their resources, crashing the VPN server and limiting its availability.<\/p>\n<p>With the VPN server acting as a gateway to a company&#8217;s internal network, this would prevent all remote employees from doing their jobs, effectively crippling an organization that has little to no workers on-site.<\/p>\n<p>Radware says that these types of DDoS attacks don&#8217;t even have to be massive in size.<\/p>\n<p>In a non-public report seen by ZDNet, Dileep Mishra, a Sales Engineering Manager at Radware, says that a fine-tuned TCP Blend (DDoS) attack with an attack volume as low as 1 Mbps is enough to crash a VPN server or a firewall.<\/p>\n<p>Furthermore, SSL-based VPNs (like Pulse Secure, Fortinet, Palo Alto Networks, and others) are also vulnerable to an SSL Flood (DDoS) attack, just like web servers, Mishra said.<\/p>\n<p>Attackers can initiate thousands of SSL connections to an SSL VPN, and then leave them hanging. The VPN server allocates resources to deal with the flood of the attacker&#8217;s useless connections, exhausting memory, and preventing legitimate users from using the service.<\/p>\n<p>Furthermore, because even the IT staff will most likely be working from home, any weakness left in VPN servers would be exploited by attackers to cut off system administrators from their own servers while they rampage through the internal network, steal proprietary data, or install ransomware.<\/p>\n<h3>Other considerations<\/h3>\n<p>But VPN servers are only one option in an array of remote\/telework tools available to companies today.<\/p>\n<p>The NJCCIC also recommends that companies pay close attention to the security of cloud and Software-as-a-Service (SaaS) applications that remote workers will be using in the coming months because of the <span class=\"link\"><a href=\"https:\/\/www.cbsnews.com\/live-updates\/coronavirus-disease-covid-19-latest-news-2020-03-18\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;link_anchor&quot;, &quot;pageType&quot;: &quot;article&quot;}\" rel=\"noopener noreferrer\" target=\"_blank\" data-component=\"externalLink\">COVID-19<\/a><\/span> outbreak.<\/p>\n<p>Similarly, Radware also warns about the increased usage of Remote Desktop Protocol (RDP) connections inside companies with ever-increasing remote workforces. RDP endpoints and accounts will need to be properly secured as well, just like VPNs.<\/p>\n<p>Last, but not least, Bruneau also lays out a series of questions and considerations that companies will need to ponder if they&#8217;re using VPN systems to grant remote workers access to their internal networks.<\/p>\n<ul>\n<li>How many concurrent users can login at the same time?<\/li>\n<li>Will the VPN corporate policy be relaxed to accommodate the maximum of employees?<\/li>\n<li>Who gets priority access if the appliance or service cannot support everyone?<\/li>\n<li>How much bandwidth a typical user uses?<\/li>\n<li>Do you split access time between users (i.e. each gets 2 hours)?<\/li>\n<li>Number of VPN licenses or MFA tokens available?<\/li>\n<li>Are users allowed to use the personal computer?<\/li>\n<li>If personal computers are allowed: (1) What is their security posture (patches, AV update, etc.)? (2) Can they be trusted? (3) What files or shares are employees allowed to access?<\/li>\n<\/ul>\n<div class=\"relatedContent alignNone\">\n<h3 class=\"heading\"><span class=\"int\">Coronavirus Updates<\/span><\/h3>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31033\/With-Everyone-WFH-VPN-Security-Has-Become-Paramount.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":33907,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[6624],"class_list":["post-33906","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlineprivacycryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>With Everyone WFH, VPN Security Has Become Paramount 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/with-everyone-wfh-vpn-security-has-become-paramount\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"With Everyone WFH, VPN Security Has Become Paramount 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/with-everyone-wfh-vpn-security-has-become-paramount\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-18T14:38:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/with-everyone-wfh-vpn-security-has-become-paramount.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"220\" \/>\n\t<meta property=\"og:image:height\" content=\"147\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/with-everyone-wfh-vpn-security-has-become-paramount\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/with-everyone-wfh-vpn-security-has-become-paramount\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"With Everyone WFH, VPN Security Has Become Paramount\",\"datePublished\":\"2020-03-18T14:38:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/with-everyone-wfh-vpn-security-has-become-paramount\\\/\"},\"wordCount\":1241,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/with-everyone-wfh-vpn-security-has-become-paramount\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/with-everyone-wfh-vpn-security-has-become-paramount.jpg\",\"keywords\":[\"headline,privacy,cryptography\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/with-everyone-wfh-vpn-security-has-become-paramount\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/with-everyone-wfh-vpn-security-has-become-paramount\\\/\",\"name\":\"With Everyone WFH, VPN Security Has Become Paramount 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/with-everyone-wfh-vpn-security-has-become-paramount\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/with-everyone-wfh-vpn-security-has-become-paramount\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/with-everyone-wfh-vpn-security-has-become-paramount.jpg\",\"datePublished\":\"2020-03-18T14:38:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/with-everyone-wfh-vpn-security-has-become-paramount\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/with-everyone-wfh-vpn-security-has-become-paramount\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/with-everyone-wfh-vpn-security-has-become-paramount\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/with-everyone-wfh-vpn-security-has-become-paramount.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/with-everyone-wfh-vpn-security-has-become-paramount.jpg\",\"width\":220,\"height\":147},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/with-everyone-wfh-vpn-security-has-become-paramount\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,privacy,cryptography\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineprivacycryptography\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"With Everyone WFH, VPN Security Has Become Paramount\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"With Everyone WFH, VPN Security Has Become Paramount 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/with-everyone-wfh-vpn-security-has-become-paramount\/","og_locale":"en_US","og_type":"article","og_title":"With Everyone WFH, VPN Security Has Become Paramount 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/with-everyone-wfh-vpn-security-has-become-paramount\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-03-18T14:38:00+00:00","og_image":[{"width":220,"height":147,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/with-everyone-wfh-vpn-security-has-become-paramount.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/with-everyone-wfh-vpn-security-has-become-paramount\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/with-everyone-wfh-vpn-security-has-become-paramount\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"With Everyone WFH, VPN Security Has Become Paramount","datePublished":"2020-03-18T14:38:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/with-everyone-wfh-vpn-security-has-become-paramount\/"},"wordCount":1241,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/with-everyone-wfh-vpn-security-has-become-paramount\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/with-everyone-wfh-vpn-security-has-become-paramount.jpg","keywords":["headline,privacy,cryptography"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/with-everyone-wfh-vpn-security-has-become-paramount\/","url":"https:\/\/www.threatshub.org\/blog\/with-everyone-wfh-vpn-security-has-become-paramount\/","name":"With Everyone WFH, VPN Security Has Become Paramount 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/with-everyone-wfh-vpn-security-has-become-paramount\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/with-everyone-wfh-vpn-security-has-become-paramount\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/with-everyone-wfh-vpn-security-has-become-paramount.jpg","datePublished":"2020-03-18T14:38:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/with-everyone-wfh-vpn-security-has-become-paramount\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/with-everyone-wfh-vpn-security-has-become-paramount\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/with-everyone-wfh-vpn-security-has-become-paramount\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/with-everyone-wfh-vpn-security-has-become-paramount.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/with-everyone-wfh-vpn-security-has-become-paramount.jpg","width":220,"height":147},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/with-everyone-wfh-vpn-security-has-become-paramount\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,privacy,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineprivacycryptography\/"},{"@type":"ListItem","position":3,"name":"With Everyone WFH, VPN Security Has Become Paramount"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/33906","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=33906"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/33906\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/33907"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=33906"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=33906"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=33906"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}