Skip to content

How we implemented traffic routing in Meshnet for increased security

featured image

How a classical VPN server works

First, we should understand how a classical VPN server operates. Meshnet uses the NordLynx protocol, which is based on WireGuard® – a simple, fast VPN that uses state-of-the-art cryptography. For this article, we’ll refer to WireGuard (wg) in our examples and graphics.

A standard configuration would look like this:

A standard VPN configuration.

To arrive at this setup, a couple of things need to happen.

First, let’s establish a secure tunnel (purple dotted connection):

  1. Virtual network interfaces, labeled as wgC and wgS, (which work like tun adapters) are created on both client and server sides.

  2. The client uses a UDP socket to establish a cryptographic session with the server’s address at 192.0.2.1:51820 (in the diagram above, subnet 192.0.2.0/24 stands for wide area network).

  3. Private IP addresses (100.64.0.2, 100.64.0.1) are assigned to the client and server respectively.

At this point, the client can ping the server using the IP address 100.64.0.1, and the server can ping the client at 100.64.0.2. All IP packets sent through the wgX interface are encrypted and sent via the global internet. The real path of the packet is something like this: wgC –(encapsulate)–> lanC –> lanR –> netR –> netS –(decapsulate)–> wgS

But to the OS, the wgX interface is just another network connection to where IP traffic can be routed, similar to a LAN router.

To the OS, a virtual interface is just like any other network connection.

Now if the client wants to conceal its real IP address, it can configure the routing table to direct all default traffic through the wgA interface (some precautions are needed to avoid routing the encrypted traffic itself, but that’s out of the scope of this article).

Meanwhile, the VPN server needs to be configured to function like a router, accepting incoming packets and forwarding them to their next destination. For this, two features are required:

IP forwarding

In most network stack implementations, if a packet arrives on a network interface, it can only be sent out on the same interface. So when the server receives a packet from the wgS interface that’s directed to an IP address outside the network’s subnet, it is dropped.

Enabling IP forwarding changes this behavior. Now, when a packet arrives at a network interface, it is checked against the network’s entire routing table. If another network interface provides a better match, the packet is forwarded to that interface.

Packet path on the server would look like this:  … -> wgS –(ip_fowarding)–> netS -> …

NATing

IP packets arriving at the VPN server will have a private IP address like 100.64.0.2, assigned to the wgC interface. In most cases, these packets will be directed to a publicly routable IP address. After the packet gets forwarded to the netC interface, it still can’t be sent out, because its source address falls within the private network range. The router uplink only deals with public IP addresses and wouldn’t know which device is sending the packet.

As such, NAT (network address translation) is used. For every packet that has a unique source IP, port, and in some cases destination, a unique mapping is created in the NATing table.

For example, if a TCP packet comes from 100.64.0.2:AAAA, it would be mapped to a 192.0.2.1:BBBB address (here AAAA is the port used by software on the client device, and BBBB is a randomly assigned unused port on the server).

The TCP’s packet’s source IP and port would then be exchanged for NAT mapped values, checksum adjusted, and finally sent out on its merry way to the wider internet.

If another computer responds to this BBBB port, the NATing table is consulted and destination IP and port values revert to the original values before the packet is sent to the wgC interface.

And that’s all for a very rudimentary setup!

Supportable platforms

The main challenge with these two requirements is that they limit the number of devices that can function as routers (apart from implementing a user space transport layer multiplexing/demultiplexing logic).

Typically, if we want to set up IP forwarding and NAT, we need root/administrator permissions. Most platforms with strong sandboxing like macOS App Store, iOS, and Android do not provide official APIs to enable this.

That leaves 3 “platforms” we do support:

Linux

Linux is the easiest one of the bunch because it has everything we need already built in, and our NordVPN service, running as root, can set everything up.

macOS Sideload

Unlike the App Store version (which I count as a separate platform), with macOS Sideload applications it’s possible to create launchd services that run with root permissions. This unlocks features that Darwin (the core Unix operating system of macOS) inherits from BSD like ip_forwarding and pf (packet filter), which are used to set up NATing and filtering.

Windows

Setting up IP forwarding is as trivial as a registry modification. However, even if Windows has an official NAT, we found it difficult to use during testing. It does not properly work with Windows Home editions. Being primarily designed for use with Hyper-V, a lot of undefined behaviors crop up when working with our custom adapter drivers. To work around this, we built and shipped our own implementation for NAT.

How Meshnet traffic routing works

Now that we know how a regular VPN server looks and works, we can compare it to how it operates in Meshnet:

Diagram of Meshnet-enabled VPN configuration.

A Meshnet VPN configuration.

The first interesting difference to observe is that, unlike a VPN server, in general, both Meshnet devices will be located in their local area networks.

And without Meshnet’s NAT traversal capabilities, turning a device into a VPN server for easy connection by other devices would be challenging.

The second difference is that your dedicated VPN server will usually have not one, but two NATing steps.

  1. The client’s (device A) source IP is changed to the server’s IP (device B).

  2. The server’s IP (device B) is then changed to the router’s IP.

This unlocks some interesting behavior: If device A is your phone, and device B is your home PC, routing through B makes it appear to your network that your phone is actually your PC. This allows you to securely access your home network without needing API services hosted on a public server.

And if you use a service that only allows access from your home network, it becomes impossible to tell whether the network messages are coming directly from your home PC or a device routing through it.

At this point, if you are even slightly inclined towards security, some alarm bells may be ringing.

Security considerations

Traffic routing is a very powerful feature:

  • You can take over a local network.

  • The device functioning as a VPN server can inspect all traffic going through it.

  • Other devices can essentially mimic your device.

As such, we want the user to have as much control as possible, so a couple of flags exist to be set on each device per connection.

  • Allow traffic routing: Specifies if a device can route its traffic through the device acting as a VPN server at all

  • Allow local network access: Specifies if the device can communicate with other devices in the server’s local area network

Generally, when using this feature, we want to avoid behaviors that might not be obvious at first glance.

A great example of this is a security issue we found and mitigated during development:

Traffic routing could cause unexpected security issues

Traffic routing could cause unexpected security issues.

Let’s say we have two Meshnet accounts: Mesh X with devices A and B, and Mesh Y with device C. Device C has an external connection to device B, which allows traffic routing for C.

Without any additional network rules, when C is routing through B and pings A’s private IP, it would actually reach A, even though they are not configured to be directly connected. It does not even require NAT to work in this case.

So without any explicit user input, device B has unintentionally exposed device A to device C.

To prevent this, we ensure that all such packets are dropped by B. The only way for C to reach A is to send a Meshnet invite and form a direct connection, making this relationship explicit.

In short, traffic routing is a relatively simple technical solution that unlocks many interesting capabilities in the Meshnet network.

Read more about Meshnet.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

How CyberCare integrated Zendesk and NordLayer for the best customer support on the market

CyberCare is a beacon of customer support and stands tall with its roots firmly planted in customer experience excellence. With offices in Lithuania and Ukraine, the company’s workforce of 400 employees embraces a hybrid model. CyberCare succeeds in a culture of quality and flexibility, serving millions worldwide.

Profile of CyberCare

Darius Dagys, Head of Business Development, pilots the organization’s journey of supporting diverse cybersecurity products by leading external partnerships and automation internally. Operating with client data and handling user requests, the company understands the importance of employing the right tools to make work and security effortless and efficient.

The challenge

On a mission to secure client data effectively

Key pain points

For CyberCare, the security of customer data is non-negotiable. As a company that prides itself on providing superior customer support, it became evident that an enhanced security framework was imperative.

The quest wasn’t sparked by a singular incident but by a continuous commitment to uphold the highest standards of data security and privacy.

“Customers trust us with their data when we provide customer support, making the data paramount. To reflect how we value this trust, CyberCare follows best cybersecurity practices.”

Click to tweet

CyberCare combines various technologies and solutions to achieve the best results. However, when they found themselves in need of a network security tool, the team looked for something to ease their daily tasks, maintenance, and configuration to integrate into the existing technology stack smoothly.

“With three years of customer support experience under our belt, our team has provided over 38 million solutions to end-users. At Cybercare, we recognize the criticality of automation, the latest technologies, and top-notch quality in delivering  services.”

Click to tweet

Simple integration and high-security standards led the lookout for a new tool. The challenge was unique as the customer support software vendor secured part of the client data. For complete protection, CyberCare needed to ensure that access to the network is secure from its side as well.

The solution

A simple and effective way to add another security layer

Main criteria choosing the solution

The pivot from previous VPN tools to NordLayer wasn’t a leap in the dark but a calculated step toward fortified security. NordLayer, with its robust VPN services, offered the perfect armor to shield the valuable data entrusted by clients.

“Before NordLayer, we had a short sprint with other VPN tools, which were more complicated. They were managed manually and it was difficult to onboard and offboard new CyberCare employees.”

Click to tweet

Eliminating the complexity and creating shortcuts in user management and network controls streamlined the processes of the CyberCare security team.

“IP allowlisting and creation of other policies are configured automatically, so my team doesn’t have to spend much time setting up the tool.”

Click to tweet

The most important thing is that NordLayer complemented already existing tools in use, such as SSO integration and the customer support solution Zendesk.

Why choose NordLayer?

The choice was clear and devoid of lengthy deliberations. NordLayer promised simplicity, efficacy, and unwavering security.

“NordLayer solution is very simple to use—no effort required.”

Click to tweet

It stood out as CyberCare needed to navigate cyberspace, ensuring data remains inviolable confidently.

“Having a combination of different security layers and solutions, I sleep well knowing that our customers’ data is secure.”

Click to tweet

One of the criteria for selecting NordLayer was its adherence to security standards. Aligning with compliance requirements gives a stronger foundation to a company like CyberCare to be sure all is well on all fronts.

Strategic integration of NordLayer and Zendesk to efficiently protect customer data

Strategic integration of NordLayer and Zendesk to efficiently protect customer data

Who? Dual synergy

CyberCare employs both internal policies and external tools to manage sensitive data. They emphasize selecting partners like Zendesk, known for its commitment to security and ensuring compliance with the latest standards.

Why? Strategic alignment

Zendesk was chosen for its status as a leading CRM platform, ease of use, and significant investment in security. This partnership was based on the need for a CRM that matched CyberCare’s security requirements and business operations.

How? The process

CyberCare leverages NordLayer to ensure that the login process to Zendesk is encrypted and secure. With NordLayer, they assign fixed IPs, meaning Zendesk can be accessed securely via these IPs. This setup guarantees that both the traffic within Zendesk and the access to it are encrypted and safeguarded.

What? The usage

The integration is seamless for employees who log into Zendesk through NordLayer without navigating complex security measures. This not only simplifies the process but also enforces a high level of security by default.

The outcome

An intuitive tool you can forget about

The benefits of implementing NordLayer

The integration of NordLayer into CyberCare’s operations marked a new dawn. With NordLayer’s intuitive design and features like 2FA, SSO, and static IPs, CyberCare not only safeguarded its data but also streamlined access and management processes.

“There are two things about using NordLayer in the team. First, it’s definitely easy, as the app always runs automatically in the background. Second, users must select the correct gateway to connect to Zendesk to do their work, so it’s intuitive by design.”

Click to tweet

As for the tool implementation, NordLayer didn’t require long preparations and complicated setups. Simple, from start to finish, the deployment and solution adoption in the team was as smooth as it gets.

“Onboarding people to NordLayer took one hour. We had to make preparations from the back end, but for the team, it was super easy. You just have an app, click connect, and you can forget about it. There was no trouble at all.”

Click to tweet

The simplicity of NordLayer’s VPN solution meant that employees could focus on their tasks without the distraction of complex security protocols.

Pro cybersecurity tips

Have you ever thought about your top cybersecurity hygiene actions you perform daily? It’s a good question to ask yourself for a self-check because maybe today is the day you start acting a bit more secure than yesterday.

If you don’t know where to start or want to compare your habits with other professionals, here are Darius Dagys, the Head of Business Development and AI at CyberCare, the top favorite tips everyone should consider.

Darius Dagys, Head of Business Development @CyberCare, about cybersecurity

In essence, the collaboration between NordLayer and Zendesk within CyberCare’s operations showcases a forward-thinking approach to data security, emphasizing ease of use without compromising on stringent security measures. This strategic choice not only aligns with their internal policies but also reinforces their commitment to protecting sensitive customer information.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Common blockchain security issues and how to prevent them

Transparency, speed, and high levels of trust make blockchains an increasingly popular option. Those benefits are well-recognized among forward-thinking businesses. However, blockchain security issues are much less prominent, and that’s a problem. Read on to discover common blockchain risks and use our best practices to secure every link in the chain. 

Key takeaways

  • Blockchains are decentralized ledgers consisting of blocks with unique cryptographic hashes. The blocks form an immutable chain that every user can inspect. This transparency enhances trust and integrity in information transmission.

  • Blockchain security is coming into focus as the technology becomes mainstream. Threats include man-in-the-middle, Sybil, and 51 attack types that exploit insecure nodes. Blockchains are vulnerable to traditional phishing and endpoint vulnerabilities. Smart contracts and poorly designed routing systems also put blockchains at risk.

  • Mitigate threats by following blockchain security best practices. Users should implement robust encryption and Identity and Access Management (IAM) solutions. Secure development practices, multi-signature wallets, fail-safes, regular audits, and Zero Trust Security solutions mitigate blockchain security risks.

Blockchains are decentralized digital ledgers that record transactions between different devices or individuals. Chains consist of “blocks”. Each block has a unique cryptographic hash. Subsequent blocks create hashes based on previous blocks, generating a chain where each entry is connected but unique.

Blockchains are tough to change after creating blocks. This immutability makes them a good fit for verifying information transmission. Participants can see information about block generation, making the process extremely transparent.

Analysts project the global blockchain market will grow to $40 billion by 2025, and use cases will multiply. Secure information exchange, digital identification, and tracing financial transactions are just a few areas emerging blockchain technologies are disrupting.

However, as with all new digital technologies, decentralized ledgers potentially pose critical security risks. Hackers routinely use untraceable crypto wallets to mount ransomware attacks. Consensus protocols that establish ledger entries are vulnerable to attack. Poorly designed smart contracts can also put businesses at risk.

This article will take a closer look at blockchain security issues. We will explore how blockchains work and discuss how you can safely capitalize on blockchain technology.

Introducing the main types of blockchain

Blockchains are defined by whether they use public or private keys to verify transactions.

Public blockchain networks are accessible to everyone. Cryptocurrencies like Ethereum or BitCoin fall into this category. Public systems create public and private keys for blockchain participants. The public key enables users to engage transparently with other currency holders, while the private key protects their digital wallets.

Public blockchain technology is decentralized, with no single controlling entity. Decentralization promotes trust among participants and makes the blockchain more resilient. Distributed ledgers are hard to tamper with, as changes need approval from the user community. They also enable access for customers or larger user groups.

Private keys are limited to a defined community of users. Each authorized user receives a private key. Digital signatures based on this key verify interactions with the blockchain ledger.

Private blockchain security ensures control and confidentiality for the blockchain owner, making it suitable for many enterprise uses. However, private blockchains can be vulnerable to insider attacks. Attackers can also exploit centralized chains, using the blockchain controller as an attack vector.

Exploring blockchain security issues

Users often think blockchains guarded by encryption are safer than traditional information transfer systems. Ledgers supposedly make tampering difficult. In theory, changing data blocks without authorization is unlikely without a user’s private keys.

However, there are questions about this reputation for security. Blockchains can put sensitive data at risk, resulting in significant financial losses or data exposure. Companies adopting private or public blockchain solutions should thoroughly assess their security vulnerabilities.

Phishing attacks

Blockchains are as vulnerable to phishers as traditional networks. In this case, phishing attacks target the private keys used by blockchain participants. Cunning attackers persuade key holders to hand over the passwords used as ciphers for private key hashes. When they get the key, hackers can make transactions, extract information, and ruin the integrity of blockchain ledgers.

Solution: The best remedy for phishing attacks is improving employee security training. Include blockchain security issues in cybersecurity training. Every ledger user should know the risks of sharing their private keys.

Routing attacks

Blockchains rely on consensus mechanisms to establish the legitimacy of transactions. However, attackers can use routing attacks to intercept consensus requests and isolate blockchain nodes. Isolated nodes can’t make transactions or ledger changes. Attackers can slow down business processes and launch damaging 51% of attacks (please see below).

Solution: Organizations can cut the risk of routing attacks by protecting blockchain communications with strong encryption and using network monitoring tools to identify suspicious traffic patterns.

Sybil attacks

Sybil attacks create many fake identities or “dishonest nodes.” Dishonest nodes seem authentic to blockchain users (“honest nodes”). However, dishonest nodes enable attackers to control network traffic. They can then force honest nodes to act against their interests.

Sybil attacks enable attackers to leech sensitive information about blockchain users (IP data, for example). Malicious actors can also block new transactions, effectively holding users to ransom.

Solution: Fortunately, Sybil attacks are usually easy to detect. They tend to affect blockchain operators with weak validation and monitoring systems. Ensure you have robust measures in place to authenticate every node.

51% attacks

In 51% of attacks, malicious actors control over half of a blockchain’s computational power. Control matters because attackers can then dominate how the ledger functions.

The most common method involves creating fake “pools” and enticing legitimate users to join. The attacker separates this pool from the original ledger, creating a second parallel blockchain. Attackers then leverage their pool to add blocks faster than users on the original chain.

Problems arise when hackers reintegrate the fake blockchain with the original. If standard rules apply, the largest blockchain becomes the default version. Rules may reverse transactions on the legitimate ledger, eroding user trust.

During a 51% attack, the blockchain is no longer fully decentralized or transparent. A single user can change ledger entries and block additions and potentially force double transactions, leeching money from currency users. For example, in 2020, Ethereum Classic suffered three 51% attacks. Each attack cost currency holders $9 million through double transactions.

Solution: Organizations can cut the risk of 51% attacks by switching from proof-of-work (PoW) consensus algorithms to proof-of-stake (PoS) algorithms. Slowing down transaction confirmations can also make attacks prohibitively expensive.

Man-in-the-middle attacks

Hackers use man-in-the-middle attacks to place themselves between users and digital wallets. Attackers posing as legitimate nodes can intercept transmissions and change their destination or contents. After that, thieves can divert cryptocurrency to their wallets. Because hackers recycle transmission data to the legitimate sender, the diversion may be very hard to detect.

Man-in-the-middle techniques can also steal private keys, giving attackers unlimited access to a user’s blockchain assets. Both attack methods compromise information stored on the blockchain and undermine trust.

Solution: Robust encryption and consensus mechanisms usually mitigate MITM attacks. Blockchain users should adopt secure protocols and verify all transaction details independently.

Endpoint vulnerabilities

Some blockchain security issues start close to home. Users may store their private keys locally and fail to apply protective measures. Stolen smartphones and compromised apps can divulge authentication information. Third-party vendors can expose blockchain keys, putting client assets at risk.

Solution: Do everything possible to prevent encryption key theft. Encrypt devices that store keys and implement rigorous physical security.

Smart contract vulnerabilities

Smart contracts are becoming increasingly popular but can also be risky. Developers build these self-executing contracts into blockchain operations. When two users meet pre-defined conditions, the contract processes their transaction. There is no need for an intermediary to verify credentials. Transactions should be faster and more secure.

However, that’s not always the case. The code base of smart contracts could contain flaws, creating room for malicious exploits. For instance, in 2021, hackers leveraged code flaws in smart contracts to extract over $600 million from Poly Network.

Solution: The problem with smart contracts often lies in the code. Apply code audits and verify every contract before use. Follow secure development practices to ensure high-quality outputs and use trusted code libraries when building contracts.

Blockchain security best practices

The list above may be concerning, and it should be. Blockchain usage is generally safe, but users must be aware of common blockchain security issues to mitigate critical risks. If not, one of the attacks we’ve discussed will eventually materialize.

Help is at hand. Follow the best practices below to benefit from blockchain technology and ensure secure transactions.

Apply robust encryption to blockchain networks

The first blockchain security fundamental is obvious. Always encrypt private keys used to access and change blockchain network nodes.

Use AES-256 (or even more secure standards) to generate blockchain hashes. Remember: every link in the chain should be unique and verifiable. Meeting these conditions is only possible with virtually undecipherable encryption.

Additionally, use encrypted digital signatures to verify blockchain network transactions. Signatures based on the Elliptic Curve Digital Signature Algorithm (ECDSA) should deliver sufficient security.

Implement Identity and Access Management (IAM) solutions

Controlling access to your blockchain network is all-important. IAM solutions define who can use private keys and change the blockchain ledger. Unauthorized users are blocked at the source, making it harder to launch insider attacks.

IAM also makes phishing more complex. Hackers may obtain user credentials. However, IAM systems can detect suspicious logins via contextual verification. Just having a password is not enough to manipulate blockchains.

Combining IAM with robust multi-factor authentication is also advisable. MFA dramatically cuts risks linked to endpoint vulnerabilities.

Adopt secure development practices

Secure development practices ensure the security of apps, contracts, and algorithms. Code reviews check for vulnerabilities before blockchains go live. Measures like bug bounties and penetration testing assess existing blockchain systems. Security teams can detect problems before they enable malicious access.

Use multi-signature wallets for blockchain transactions

One of the biggest blockchain security problems is verifying user requests. Inadequate verification can lead to crippling Sybil or 51 attack methods, ruining the integrity of blockchain systems. Multi-signature (or multi-sig) wallets solve this problem.

These digital wallets require more than one user to approve blockchain network operations, essentially a form of separation of duties. Single users cannot make critical changes or divert funds. Every change requires third-party sign-off.

Multi-sig wallets also have benefits for eCommerce users of blockchain networks. The third party can arbitrate disputes, smoothing problematic transactions.

Put fail-safes in place to deal with security incidents

Fail-safes ensure blockchain security vulnerabilities won’t cause catastrophic failures. Or at least they make disasters less likely.

For example, circuit breakers and emergency stops can kick in when unexpected conditions arise in smart contract transactions. Companies can use secure backups to hold encryption keys and implement secure key recovery systems.

At a more general level, incident recovery policies are crucial. Employees should understand how to restore blockchain networks when emergencies arise. Response plans may include upgradeability measures to fix vulnerabilities without compromising blockchain availability.

Regularly audit blockchain networks

Networks based on blockchain technology are like any other systems. Users must constantly revisit their security measures to detect emerging vulnerabilities. Security teams should also collect user data to monitor transactions.

Audits should include code reviews. Reviews cover apps, consensus mechanisms, encryption, and transfer protocols. Code audits within the software development lifecycle enable timely changes and continuous vulnerability management.

You can use penetration testing to simulate real-world attacks and assess functional weaknesses. Cover the attack types listed above and note any possible weak points.

Finally, audit network security issues that govern access to blockchain networks. For instance, consider device security, password hygiene, and access management. Training is also important, as one careless employee can open the way to 51 attack methods.

Solve blockchain security issues with NordLayer

Blockchain networks now occupy niches throughout the business world. Distributed ledgers are making transactions easier to trace and more trustworthy. They enable secure global payments, manage logistics flows, and record processes like real estate title management.

However, it’s easy to oversell the security benefits of blockchains. As we have seen, blockchain security is an urgent concern for companies adopting the new technology. Hackers can dominate networks, force transactions, steal keys, and destroy the integrity of ledgers. Users need to respond quickly.

NordLayer offers user-friendly solutions that enhance blockchain security by ensuring that only authorized people have access to your blockchain environments.

Our Zero Trust Security solutions, such as IP allowlisting, Cloud Firewall, and MFA, block access for all unauthorized network users and allow the distribution of access rights to blockchain networks. Only users with appropriate credentials can access blockchains, and everyone else remains locked out.

Encrypted VPN tunnels protect private keys, reducing the risk of man-in-the-middle attacks. Device posture checks if connected devices comply with device security rules, promoting endpoint security. ThreatBlock also restricts access to malicious blockchain websites.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

The critical role of cybersecurity monitoring in business

The digital transformation of businesses has brought about significant changes in how organizations operate, communicate, and store data. With this transformation comes an increased risk of cyber threats, making cybersecurity a top priority for businesses of all sizes.

In fact, according to Statista, the global cost of cybercrime is expected to surge in the next four years, rising from $9.22 trillion in 2024 to $13.82 trillion by 2028. This means that if you own a digital business, your chances of experiencing a security incident are high.

One critical aspect of cybersecurity is continuous network surveillance, which involves actively monitoring and analyzing network traffic and system activity to detect and respond to security incidents. In this blog post, we’ll explore the importance of cybersecurity monitoring in business and provide tips for implementing an effective monitoring strategy.

Key takeaways

  • Cybersecurity monitoring is essential for businesses to safeguard against cyber threats and protect their digital assets.

  • Effective network security monitoring provides benefits such as early detection of security incidents, improved security posture, and compliance with regulations.

  • Ignoring cybersecurity monitoring can result in severe consequences, including financial loss, reputation damage, and legal implications.

  • Cybersecurity monitoring involves continuous monitoring of network traffic and system activity to detect and respond to security incidents.

  • Implementing an effective cybersecurity monitoring strategy involves several steps, including conducting a risk assessment, choosing the right tools, establishing baselines, implementing continuous monitoring, and regularly reviewing and updating the strategy.

What is cybersecurity monitoring?

Cybersecurity monitoring is the process of continuously analyzing network traffic and system activity to detect and respond to security incidents. Unlike traditional security measures that focus on preventing attacks, digital security monitoring is about detecting and responding to threats that have already passed a system’s defenses.

However, while prevention is essential, preventing all attacks is not always possible. That’s where cybersecurity monitoring comes in: detecting and responding to threats that have already breached a system’s defenses. Continuous cybersecurity monitoring is an essential component of any organization’s security strategy.

By actively identifying and mitigating potential security risks, organizations can protect their data and minimize the impact of breaches and other cybersecurity risks.

How does cybersecurity monitoring work?

Cybersecurity monitoring involves a combination of network and endpoint monitoring, as well as other tools and strategies.

Network monitoring

Network monitoring means analyzing network traffic to detect suspicious activity, such as unusual data transfers or login attempts from unauthorized devices. Network monitoring tools can also help identify vulnerabilities in a network’s infrastructure and provide real-time alerts when security incidents occur.

Endpoint monitoring

Endpoint monitoring includes analyzing activity on individual devices, such as laptops and smartphones, to detect suspicious behavior. Endpoint detection tools can help detect malware, ransomware, and other cyber threats that may have bypassed network security measures.

Continuous cybersecurity monitoring allows the detection of cyber threats and a proper response. This allows businesses to improve their security posture, comply with regulations, and keep security incidents to a minimum.

Now, let’s discuss the monitoring tools that go hand in hand with these two strategies.

Cybersecurity monitoring tools & strategies

In addition to these two monitoring processes, businesses can use several other cybersecurity monitoring tools and strategies to improve their security posture. Let’s analyze them in detail:

Security Information and Event Management (SIEM)

Security Information and Event Management (SIEM) tools are powerful solutions that gather and connect security data from various sources, including network devices, servers, and applications. SIEM tools use advanced algorithms and machine learning to analyze security alerts in real time, helping security teams identify and respond to potential threats quickly.

SIEM tools can also generate reports and dashboards to provide insights into security trends and compliance status.

Intrusion Detection Systems (IDS)

Intrusion Detection Systems (IDS) are designed to monitor network traffic for signs of intrusion or unauthorized access. IDS tools can detect various malicious activities, including network scans, brute force attacks, and malware infections. Depending on the organization’s specific needs, IDS tools can be deployed as network-based or host-based solutions.

IDS tools can also generate alerts and reports to help security teams investigate and respond to security incidents.

Threat intelligence

Threat intelligence is all about gathering and analyzing data on potential threats. This helps businesses identify and respond to emerging threats. It can come from various sources, including open-source feeds, commercial risk intelligence providers, and internal security data.

Threat intelligence can help security teams understand the tactics, techniques, and procedures (TTPs) used by attackers, enabling them to defend against potential attacks. Threat intelligence can also aid security teams in prioritizing their response efforts and allocating resources more effectively.

By combining these tools and strategies, businesses can continuously monitor their networks and endpoints for suspicious activity, detect and respond to security incidents, and improve their overall security posture.

Data speaks volumes web cover 1400x800

The importance of cybersecurity monitoring in business

Effective cybersecurity monitoring is critical for businesses of all sizes.

The-importance-of-cybersecurity-monitoring-in-businesses

Let’s find out why by having a look at some of the benefits of implementing a continuous monitoring strategy:

Early detection of security incidents

Continuous monitoring enables early detection of a security incident in its early stages, allowing businesses to respond quickly and minimize the impact of a breach.

Improved security posture

Continuous security monitoring can help businesses identify and address vulnerabilities in their network infrastructure, improving their overall security posture.

Compliance with regulations

Many industries are subject to regulations that require businesses to implement cybersecurity monitoring measures. Continuous monitoring can help businesses meet these requirements and avoid costly fines.

Effective cybersecurity monitoring is critical for businesses to protect their assets and reputation. While the benefits of implementing a continuous monitoring strategy are numerous, ignoring digital security monitoring can have serious consequences, which we will explore in the following section.

The risks of ignoring cybersecurity monitoring

Ignoring cybersecurity monitoring can leave businesses vulnerable to various cyber threats, from data breaches to malware attacks. Without continuous monitoring, organizations may not detect a security incident until too late, resulting in significant financial and reputational damage.

Here’s some statistics on the frequency and impact of cyber threats in the business sector:

  • According to a report by Cybersecurity Ventures, cybercrime is projected to cause $10.5 trillion in damages by 2025

  • In 2023, the average cost of a data breach was $4.45 million, according to a report by IBM

  • 66% of SMBs have experienced a cyber attack in the past 12 months

  • 55% of Americans state that they wouldn’t continue doing business with a company that experienced a data breach

  • The long-term consequences of inadequate cybersecurity can include financial loss, reputation damage, downtime costs, and legal implications

Continuously monitoring network traffic and system activity is crucial for businesses to detect and respond to cyber threats on time. Effective threat detection and incident response can significantly reduce the impact of a security incident, preventing both financial and reputational damage.

Businesses that ignore cybersecurity monitoring risk falling victim to cyber-attacks, which can result in significant financial and reputational losses. That’s why businesses need to prioritize security monitoring as part of their overall security strategy.

Steps for implementing cybersecurity monitoring

Implementing an effective cybersecurity monitoring strategy involves several steps, including:

Step 1: Conduct a risk assessment

The first step in implementing an effective cybersecurity monitoring strategy is to identify the assets that need to be protected, the potential threats to those assets, and the vulnerabilities in your network infrastructure. A risk assessment helps you understand the specific risks your organization faces and enables you to prioritize your security efforts accordingly.

This process should involve analyzing your network traffic, identifying potential weak points, and evaluating the potential impact of a data breach.

Step 2: Choose the right tools for security monitoring

Selecting the right tools for security monitoring is critical to the success of your cybersecurity strategy. Look for tools that align with your business needs and provide real-time alerts and analysis. These tools should be capable of detecting and responding to security incidents, providing threat identification and incident response capabilities.

They should also be able to analyze network traffic to identify suspicious activity and potential threats before they cause damage.

Step 3: Establish baselines

Establishing baselines for normal network activity is essential for detecting anomalies and potential security incidents. By understanding what normal network activity looks like, you can quickly identify when something is wrong. This step involves analyzing network traffic patterns, recognizing typical user behavior, and setting up alerts for any deviations from the norm.

Step 4: Implement continuous monitoring

Implementing continuous monitoring is critical to spotting and responding to security incidents on time. It means actively monitoring network traffic and system activity to detect and respond to security incidents. This process should include real-time threat detection and incident response, as well as analyzing network traffic to identify potential threats.

Step 5: Regularly review & update your strategy

Regularly reviewing and updating your cybersecurity monitoring strategy is essential to ensure it remains effective despite evolving threats. It involves evaluating the effectiveness of your current security measures, identifying areas for improvement, and implementing changes as needed.

Additionally, it should include ongoing employee training to ensure that everyone in your organization is aware of the latest security threats and best practices for protecting against them.

By continuously monitoring your network traffic and updating your security strategy, you can minimize downtime, prevent data breaches, and ensure the ongoing security of your organization.

How NordLayer can help

In conclusion, cybersecurity monitoring is a critical aspect of business security in today’s digitalized environment. By actively monitoring network traffic and system activity, businesses can quickly detect and respond to security incidents, improve their security posture, and avoid the long-term consequences of inadequate cybersecurity.

NordLayer offers a range of cybersecurity monitoring tools and services to help businesses improve their network visibility and security posture. With the right tools and strategies in place, businesses can protect themselves against the growing threat of cyber-attacks and safeguard their assets and reputation.

NordLayer’s network visibility solution provides real-time insights into network traffic and activity, helping businesses detect and respond to security incidents quickly and effectively. It allows you to closely monitor who is accessing your network, what devices they use, when connections occur, and how network resources are used.

Key capabilities include comprehensive activity information tracking, visual server usage analytics dashboards, and device posture monitoring to enforce compliance rules and maintain a consistent security posture. By fusing these robust monitoring features, NordLayer empowers businesses to understand and manage everything happening within their network environment.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

How WeTransfer upgraded existing VPN to a cloud-native solution for enhanced security application and experience

In the bustling canals of Amsterdam, a vibrant Dutch company, WeTransfer, emerged in 2009, becoming a haven for creatives worldwide. Known for its ingenious solutions to share large files easily and collaborate with teams, the WeTransfer platform not only caters to creative minds seeking a hassle-free way to distribute their work but also integrates an advertising model that transforms time spent on the site into a visual feast.

Profile of WeTransfer

WeTransfer takes a unique approach in having a viral product complemented by a full-screen advertising space used by hundreds of major brands around the world. The platform supports creative professionals, as well as creative communities facing the world’s most pressing issues.

As a platform serving tens of millions of people around the world, cybersecurity and operational efficiency are top priorities.

In this interview, Director Enterprise IT Adam O’Toole shares why and how WeTransfer embarked on using NordLayer.

The challenge 

Legacy VPN and the need for reliability

Key pain points

VPN is used at WeTransfer not only for the engineering team to connect to several development APIs. It’s also necessary to validate global ad displays in over 130 countries. Ensuring continuity demanded a more flexible and robust solution.

“Moving to a new HQ, we were faced with a fresh challenge: our VPN was physically hosted on-site so our engineering teams could connect to systems that were inside our network. We needed a cloud alternative for changing places”

Click to tweet

The impending office move only accelerated the search for a cloud-based VPN that could offer uninterrupted service and global reach.

The solution

Strategic transition to a hassle-free tool

Main criteria choosing the solution

At WeTransfer, the team used two VPNs in total. One was dedicated to product development in the engineering department. The other was established due to a hybrid work model for remote employees to connect to the network and ad team for localization.

NordLayer stood out for several reasons. First, it’s a fully cloud-native solution. Also, it provides an extensive network of global gateways and static IP addresses, which is excellent for a global company like WeTransfer, present in different countries.

“Our ISO certification demands rigorous checks and balances, a standard that NordLayer meets with its comprehensive access policies, ensuring every connection is secure and aligned with our high standards.”

Click to tweet

What is more, it seamlessly integrates with the company’s security framework. And finally, it ensures compliance, a requirement for WeTransfer to follow ISO 27001 standards.

“We are a small team supporting a company of 340+. We need our tools to work for us, not against us. With automation, we’ve been able to spend less time on manual tasks and more on what matters, proving that a lean team can go a long way.”

Click to tweet

The transition marked a pivotal shift towards a cloud-based model, offering a seamless, maintenance-free experience that contrasted with the upkeep of the previous system.

Why choose NordLayer

The journey to NordLayer began with a collaborative effort to understand the specific needs across departments.

  1. We gathered a list of different departments to see how they use a VPN.

  2. The survey format helped us understand the needs and the demand for a VPN tool.

  3. We crystalized the use cases and how many gateways we needed.

  4. Some of the criteria were simple integration into the infrastructure, hassle-free usage, and static IP setup.

  5. Simplicity in using and maintaining the tool was equally important to security.

The integration with the existing security framework simplified access control, ensuring a smooth onboarding and offboarding process that resonated with the company’s lean IT team ethos.

“Okta integration was a big push from a security perspective for us to have better access control and automation when people come and leave.”

Click to tweet

With the Okta integration supported by NordLayer, the company can leverage stronger authentication mechanisms. Biometric authentication via Okta FastPass provides an additional level of security, allowing it to better protect against common attacks.

The intuitive dashboard and the provision for fixed IP addresses further streamlined operations, making NordLayer an obvious choice.

Rethinking the VPN strategy when transitioning to a cloud-based tool from a physical VPN

Legacy VPN vs Cloud VPN

NordLayer’s appeal lies in its ability to meet the company’s unique demands. Its vast network of gateways enabled the advertising team to accurately preview campaigns across different regions, a critical feature for a global player in the advertising space.

The outcome

Seamless operations and enhanced productivity

The benefits of implementing NordLayer

The switch to NordLayer translated into tangible benefits. The IT team was liberated from the monthly maintenance rituals that had previously hindered productivity and could focus on strategic initiatives.

“With NordLayer, it’s simple: if you’re in, you get access; if you’re out, you lose it. The dashboard is clear, making setup quick and getting results easy.”

Click to tweet

Thanks to NordLayer’s dedicated gateways, WeTransfer improved developer experience for engineers located outside of the Netherlands, with quicker feedback loops during development cycles.

Pro cybersecurity tips

Cybersecurity hygiene is very personal yet important to follow, just as taking care of yourself. It can be achieved differently but for the same result—secure digital environments. This interview was no exception to asking how IT professionals prioritize cybersecurity in their daily lives. Thus,  Adam O’Toole, Director Enterprise IT at WeTransfer, shares his favorite and most important tips on what matters first.

Adam O'Toole, Director Enterprise IT, WeTransfer, about cybersecurity

WeTransfer adoption of NordLayer showcases how cybersecurity posture was improved by underscoring the importance of adaptability, collaboration, and strategic tool selection in the digital age.

The journey from a physical VPN system to a streamlined, cloud-based solution not only enhanced operational efficiency but also fortified the company’s cybersecurity defenses. As a result, the company can continue its mission of supporting the global creative community with trust and confidence.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×