Deploying Fortinet VPN with default settings can leave your organization open to attack

Over 200,000 businesses that have deployed Fortinet VPN with its default configuration could be vulnerable to man-in-the-middle (MitM) attacks according to new research from the network security company SAM Seamless Network.

With more employees working from home than ever before, organizations around the world have turned to VPN services to provide their workers with an easy way to connect to their corporate networks. However, cybercriminals are well aware of this and have begun to look for weakness they can exploit in organization’s VPN configurations.

Source link

İlk yorum yapan olun

Bir yanıt bırakın

E-posta hesabınız yayımlanmayacak.