Deploying Fortinet VPN with default settings can leave your organization open to attack


Over 200,000 businesses that have deployed Fortinet VPN with its default configuration could be vulnerable to man-in-the-middle (MitM) attacks according to new research from the network security company SAM Seamless Network.

With more employees working from home than ever before, organizations around the world have turned to VPN services to provide their workers with an easy way to connect to their corporate networks. However, cybercriminals are well aware of this and have begun to look for weakness they can exploit in organization’s VPN configurations.

For the latest tech news and updates, Install TechCodex App, and follow us on Google News,  Facebook, and Twitter. Also, if you like our efforts, consider sharing this story with your friends, this will encourage us to bring more exciting updates for you.


Get real time updates directly on you device, subscribe now.

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. AcceptRead More