blog
Stay up to date with the latest cybersecurity insights, product updates, and best practices from the GoodAccess team.
Release news
New features in GoodAccess allow administrators to specify countries from which users may connect to the zero-trust perimeter and manually approve every device seeking access.
4
Min read
ZTNA
The rise of remote work has led to an increase in BYOD, presenting organizations with the challenge of securing devices they do not own. This article discusses a cloud-based architecture that enables centralized control over BYOD, including security posture checks, real-time enforcement, and logging.
8
NIS2
Organizations that lack the means to implement the necessary technological measures to comply with the requirements of NIS 2 can offload the obligation onto the vendor when consuming security-as-a-service.
9
SMEs are an increasingly popular target among cybercriminals because their limited resources prevent them from deploying security countermeasures. GoodAccess enables SMEs to deploy SaaS-based ZTNA to protect themselves against malware, man-in-the-middle, and other attacks.
15
release news
Release notes: Device Posture Check keeps non-compliant devices out of your perimeter while forced always-on connection ensures security measures are active at all times.
5
Remote work
A backup gateway provides redundancy in case an unexpected outage or performance issues impact the primary gateway. This ensures business continuity and reduces the cost of downtime.
The GoodAccess Linux app enables simple configuration and management of Linux devices connecting to the GoodAccess secure environment.
2
Network security
Content filtering is a mechanism that prevents access to dangerous or objectionable sites or messages. It is broadly used by users on their own devices, companies to enforce their content policies, or governments to control access to certain information.
11
The 10 minimum cybersecurity measures listed in Article 21 of the NIS 2 Directive help ensure obligated entities implement a cybersecurity risk management process that meets the Directive objectives.
ISO 27001 is a cybersecurity standard that offers a structured framework for information security management. Compliance with the standard is a critical component in supply chain security among organizations from military, government, or healthcare sectors.
Release News
GoodAccess now features System-Level Access Logs, a key tool for effective behavior monitoring and regulatory compliance.
Threat protection
A port scan is a networking technique that determines what ports on a device are open. Cybercriminals also use port scanning to identify targets and assess defenses on a network.
Work-from-home trends carry inherent cybersecurity risks that put remote employees and their companies at risk of scams and data breaches. Find out about 8 cybersecurity best practices to keep yourself safe.
20
Cybersecurity risk management is a continuous process of analyzing cyber threats and deploying countermeasures. Read all about how to reduce your company’s cyber risk.
GoodAccess supports SCIM for user access provisioning and synchronization with your IdP. User Groups enable you to manage users and their access rights as one entity.
3
Recent additions to GoodAccess improve device observability and user experience. Find out what kind of information GoodAccess provides and other improvements we’ve made.
Threat Protection
Executive phishing, aka whaling, is a sophisticated form of spear-phishing that targets high-ranking company executives. Find out how to spot and protect your business from whaling attacks.
16
Man-in-the-middle attacks are an insidious form of cyberattack that targets sensitive data in transit. Find out who is the likeliest target and what measures are needed to defend against them easily and effectively.
10
System for Cross-domain Identity Management (SCIM) helps businesses to automatically manage user accounts across different applications and systems.
VPN
OpenVPN and WireGuard are the top 2 VPN protocols out there. WireGuard excels at speed and efficiency, while OpenVPN offers more compatibility and configuration flexibility.
Cybersecurity posture reflects an organization’s ability to fend off cyberattacks. It is a composite of countermeasures against multiple attack vectors.
A VPN gateway is a network device that creates secure connections over the internet. Find out how they work and what benefits they offer to small and medium enterprises.
Zero trust will play a key role in efforts to meet NIS2 compliance. Read more to learn what is NIS2 and how you can comply by implementing a zero-trust approach.
12
Read this expert blog to learn what requirements a VPN for small business should meet in order to mitigate the risks of remote work.
Supply chain attacks can have a devastating impact on a company - and even the economy. In this article, we’ll discuss supply chain attacks and how to prevent them.
There are several ways to control access to your company resources. This article explains the main access control models and how they work.
19
Learn about spear-phishing, a dangerous form of phishing that targets a selected individual to steal their access credentials or other sensitive information.
This article looks at what VPN split tunneling is, how it can benefit your business and what to consider before you implement it.
6
Remote Access
MFA and 2FA help strengthen security and reduce the risk of unauthorized access. We compare MFA and 2FA and recommend the best authentication for you.
Find out all about the technological differences between SD-WAN and VPN, and what use cases they share or specialize in.
This article explains what a bastion host is, the security risks involved with using one and the alternatives for your business.
Read this blog to learn about three main VPN alternatives for your business to help you decide what solution fits your specific needs and preferences.
An overview of cloud network security and why it’s essential for businesses that use it as part of their IT setup. Best practices and valuable recommendations.
7
VPN as a Service (or VPNaaS) has several benefits especially for small and medium businesses. Here’s everything you need to know about it.
Learn about VPN port forwarding and how to use it to enable remote access and host online services safely. Find out what risks you need to avoid and what precautions to take.
Learn about zero trust authentication, where nothing is trusted by default. Access is only granted based on identity, device health, and context.
In this article you will learn 10 security practices you can follow to protect your small business against a data breach. Read more.
Understanding the different types of authentications is key to the safety of your small business network. Learn all you need to know.
Learn how to implement network and application-level segmentation to prevent lateral movement of cyber attackers and gain application-level visibility.
Understand the differences between hardware and software VPN with regards to their deployment, maintenance, costs, scalability, performance and security.
Learn how a zero trust architecture can enhance your security posture by securing resources and data through access control, monitoring, and segmentation.
Find out which is better for your business – ZTNA or VPN – in a side-by-side comparison of cost, complexity, scalability, and reliability.
13
Cloud VPNs are a popular choice among remote-access solutions thanks to cost-efficiency, scalability and the enhanced security features they provide.
VPN protocols determine the security, stability, and speed of a VPN connection. Choosing the right one is down to your specific needs and IT skills.
This article explains why cybersecurity is important for small businesses, what the threats are, and how to counter them.
Network Security
You may think your business will not fall victim to cybercrime. But if you do not have business network security in place, you could face costly data breaches.
Remote Work
What is remote work security and what tools can you use to secure your remote business against cybercrimes? Learn our expert article to learn more.
14
Your hybrid work environment means that you need improved, cost-efficient ways to protect your networks and data. We explain how a VPN Concentrator can help you.
Know which type of VPN to choose to keep your business safe. This article unpacks the different types of VPNs and which one you should use in your organization.
Get ready for the latest cybersecurity trends in 2023 and find out what measures companies should take to protect their on-site and remote workers.
Read up on the risks of remote work and how to tackle them. Learn how to maintain the freedom and flexibility of telework without security compromises.
Brute force attacks are simple and inexpensive attacks that use trial and error to guess login credentials, encryption keys, or session IDs.
The Threat Blocker log boosts your situational awareness by keeping track of threat activity and policy violations in your IT infrastructure.
SaaS remote-access solutions offer the best balance between security, user experience and cost. They securely connect WFH employees with zero hardware required.
The new update of the GoodAccess web application improves user experience, provides more granular configuration, and increases your situational awareness.
Static IP
Not every static IP address is uniquely dedicated to an organization; some are shared. A dedicated IP is a unique identifier of an internet-connected device.
A remote access VPN connects remote users to internal company systems via an encrypted tunnel. It is a common method of enabling secure telework for employees.
Learn how to enhance GoodAccess’ built-in domain-level protection from malware and phishing by adding your own blocklists and importing custom DNS records.
Phishing scams remain one of the most widespread tactics attackers use against companies. Learn the 6 best practices businesses need to adopt to stay safe.
IPsec is integral to many VPN services. Learn more about what is IPsec, how IPsec VPN works, its usage and differences between IPsec VPN and SSL VPN.
An SDP solution can do everything a VPN can. In fact, it improves upon the security a traditional VPN provides and makes up for some of its downsides.
In this exert article, we compare VPN vs HTTPS with regards to their encryption mechanisms and uncover the key use cases for your business
A VPN protects internet users from identity theft and exposure of sensitive information. Here are some reasons why remote workers need to use a VPN service.
The software-defined perimeter is a virtual business infrastructure that uses strong encryption and interconnects remote users, offices, branches, and clouds.
Learn how to expand your private infrastructure to your resources in Google Cloud by allowlisting traffic from the GoodAccess VPN gateway.
Access control is a security strategy that deals with the protection of company systems and security of data transmitted over the Internet.
Single sign-on allows you to log into GoodAccess with the credentials of a 3rd-party identity provider, namely Microsoft Entra ID, Google Workspace, and Okta.
Multi-factor authentication is a technique that strengthens the security of user authentication by extra proofs of identity besides username and password.
Read the 8 pro tips for uplifting your remote access security in 2023 and ensure your remote workforce doesn't pose a security risk to your business.
Understand the differences, principles and use cases of two basic VPN forms: site-to-site VPN and remote access VPN. Read the blog by GoodAccess' experts.
Read this blog to take a technical deep dive into the 5 most important use cases of a professional business cloud VPN for software developers.
In this article, we weigh up static IP addresses vs. dynamic addresses, their differences and usage in business environments.
This blog introduces the new features of GoodAccess cloud VPN with zero-trust access controls such as enhanced identity awareness, connectivity and protection.
GoodAccess is a SASE solution that replaces existing hardware VPNs. Let’s compare the two to see why GoodAccess is the cloud solution for the future.
Cybersecurity is the protection of your and your company’s data in cyberspace.This blog introduces 4 parts of the business cybersecurity landscape.
SASE (Secure Access Service Edge) is a modern cloud-based approach to network security that safely connects people with applications and systems.
Remote access to a company's systems is quite risky, as you don’t have control over every access point. And that's why you need a secure business VPN.
This blog describes the three most important areas of cybersecurity in 2021, the most common threats, and the steps you can take to protect your data.
Having trouble working remotely on a legacy hardware VPN? Fortunately, there is a modern solution for your company’s network security: SASE.