Skip to content

How Stasmayer uses NordLayer to secure legal and medical clients

Summary: Stasmayer, an MSP and MSSP, secured remote work for around 50 small-business clients. NordLayer enabled fast setup, zero disruptions, and easy management.

Stasmayer and NordLayer Results at a glance

Stasmayer is a managed service provider (MSP) and a managed security service provider (MSSP). They have served small businesses since 2003, with deep expertise in legal and healthcare IT. They believe secure connectivity should be accessible and affordable for everyone. This aim led them to NordLayer.

Here is how they used NordLayer to improve day-to-day security for 50 clients. Their process and lessons can help your organization strengthen its defenses, too.

Profile of Stasmayer

The challenge: ensuring secure connectivity for regulated clients

Small businesses need strong but simple protection. Stasmayer serves organizations in legal, medical, and other professional services. Many of these sectors require strict security standards. They also rely heavily on remote access.

“We wanted a solution that’s easy for our clients to use,” says Haris Michael, CIO, Stasmayer’s first employee and a key person in managing IT security for their customers. “Enterprise-level solutions can be complex to maintain. Small businesses want a smooth and quick setup.”

Legal and medical clients face a wide range of regulatory demands. Law firms follow American Bar Association guidance on data privacy. Healthcare practices must comply with HIPAA. Most of them must keep client information confidential and transmit it in a secure manner. That means:

  1. Protecting sensitive files wherever employees work
  2. Adapting to hybrid environments, with servers in the cloud or on-premise
  3. Maintaining compliance with industry regulations
  4. Managing user identities without extra overhead
  5. Ensuring remote connectivity is never complicated
Breakdown of Stasmayer’s client segments

Addressing these needs was Stasmayer’s top priority. They wanted to find a provider that integrated seamlessly with their day-to-day operations. They also wanted technology that would be simple to roll out, even for small firms with limited resources.

“Many of our clients want to work from anywhere,” Haris explains. “They want to be free to open case files or patient charts on the go. But they don’t want to risk a data leak.”

This demand required Stasmayer to find a flexible, cloud-based security platform. The tool had to integrate with existing workflows and allow granular control over user access. That is where NordLayer became a key partner.

Reason 1: Reliable connectivity

Stasmayer needed a straightforward solution. They wanted a single pane of glass for managing all client VPN deployments. That includes everything from traveling attorneys to remote healthcare workers.

NordLayer offered exactly that. They could deploy a virtual private gateway for clients, then spin up or remove user access as needed. This saved a lot of time, especially for small organizations.

What Stasmayer did:

  • Created secure gateways for clients
  • Set up flexible site-to-site VPNs, bridging on-premise and cloud resources
  • Used a single cloud management panel to monitor all users

“We love that our clients can get their data from any device,” says Haris. “All they do is log in through NordLayer. It protects them from risky networks and keeps a record of everything.”

This setup is crucial for small to mid-sized businesses that might have limited security budgets. Large enterprise VPNs are too heavy and complex. NordLayer focuses on ease of use, so it fits smaller infrastructures perfectly.

Reason 2: Streamlined zero-trust features and a cloud firewall

A cloud firewall can seem like an advanced feature. Many smaller clients don’t realize they need it. Stasmayer views it as a crucial element of a zero-trust framework.

What Stasmayer did:

  • Allowed remote workers to connect only to specific applications through the NordLayer Cloud Firewall
  • Filtered traffic so it never leaves a protected environment
  • Enforced Zero-Trust principles by checking each user and device before granting access

“We see a big benefit in having that ‘bubble of security,’” Haris explains. “For instance, if you’re home or at a coffee shop, your device still tunnels through NordLayer. That keeps data safe. It’s also easy to track connections inside the management console.”

This approach meets the demands of both legal clients and healthcare clinics. Law firms gain confidence that their files are never openly exposed online. Healthcare offices can ensure compliance with HIPAA by wrapping their telehealth visits in a safe environment.

“Security is never a one-time thing,” says Haris. “It’s ongoing, and the right tools help us keep pace.”

Reason 3: PSA integration

Stasmayer uses the NordLayer PSA integration to manage billing across multiple clients. Manual invoicing is time-consuming, especially if an organization has more than a handful of users. NordLayer’s integration with PSA automates that process.

What Stasmayer did:

  • Connected NordLayer to their PSA for automatic billing
  • Synced user counts and usage patterns without manual data entry
  • Gave clients simple, transparent invoices

“That integration cuts out a ton of repetitive steps,” Haris notes. “When we add a new user, our PSA sees it and adjusts billing. The same thing happens if someone leaves or a client’s requirements change.”

This efficiency reduces day-to-day administrative burdens. That is a big reason Stasmayer can manage so many small and mid-sized companies at once.

Reason 4: International travel support

Some of Stasmayer’s clients travel abroad for conferences or cross-border meetings. They need a quick, safe way to connect to company resources and email. Before NordLayer, Stasmayer had to unblock specific countries each time someone flew overseas. That was clunky, risky, and easy to forget.

Haris Michaels's quote

What they did:

  • Helped clients deploy NordLayer on phones, tablets, and laptops
  • Blocked all foreign logins at the email level except through NordLayer
  • Eliminated the need for manual country-by-country firewall changes

“People used to forget to tell us they were leaving the US,” says Haris. “They’d arrive, discover they couldn’t log into email, then call us in a panic. Now, we just say, ‘Open NordLayer.’ That’s it. They’re in.”

Users also feel more confident because they know their data is protected when they connect from the airport or a hotel Wi-Fi network. NordLayer’s cross-platform app runs quietly in the background, shielding users from suspicious traffic. This reduces the threat of eavesdropping attacks, which are common in public hotspots.

Reason 5: Powerful site-to-site VPN

Many Stasmayer clients run a hybrid infrastructure. Part of their data resides on a local server, while another part stays in the cloud. This setup demands a site-to-site VPN. But not every solution handles both environments gracefully.

NordLayer delivers seamless traffic routing. Users may not even realize whether they are connecting to an on-premise drive or a hosted application. They simply see their resources under one secure umbrella.

What they did:

  • Unified access to on-premise and cloud servers under NordLayer
  • Linked everything in a single environment
  • Blocked unauthorized data flows outside the secure perimeter

“Some clients only have a small server for specialized apps,” Haris mentions. “They also use Office 365 or Google Workspace. NordLayer ties that together. It’s like giving them a safe private highway that leads into both places.”

This feature resonates strongly with businesses that rely on multiple hosting locations. It helps them avoid the chaos of toggling between different VPNs and routes.

Results: time-saving and hassle-free security

Stasmayer’s rollout of NordLayer delivered tangible benefits to both their internal team and their client base:

  • They scaled to 50 NordLayer clients without major infrastructure changes
  • They eliminated manual user provisioning when employees traveled internationally
  • They saw faster troubleshooting for external connectivity
  • They streamlined billing by syncing NordLayer and their PSA

“NordLayer has simplified everything related to secure remote access,” Haris says. “Our support ticket queue is smaller because employees can handle more tasks on their own.”

Stasmayer also points to improved client satisfaction. Their customers feel confident handling sensitive documents on any device. Legal teams appreciate the ability to manage case files on an iPhone or iPad. Healthcare clinics like how patient records are secured, whether someone is at home or at the office.

“Everyone wants to protect their data,” Haris adds. “But nobody wants to wrestle with complicated software. NordLayer checks both boxes for us.”

Why NordLayer works for Stasmayer

Stasmayer benefits from NordLayer’s easy deployment and versatile network security. They serve many clients in regulated industries. That means they need robust yet user-friendly tools. NordLayer’s blend of features solves that problem. It eliminates the overhead of multiple VPNs while layering in zero trust.

“This gives us enterprise-level tools in a package that’s easy for a small business to deploy and manage. As an MSP, we have one central pane of glass to view all our clients and ensure they meet our standards, rather than managing six different systems or having every client on its own separate system.”

These points highlight why NordLayer suits companies like Stasmayer:

  • One-click setup for remote access
  • Unified management console across many clients
  • Rapid scaling for businesses of any size
  • Cloud firewall that blocks malicious traffic and suspicious ports
  • Dedicated secure gateway that keeps data inside a “bubble”

“Deploying NordLayer on the backend is straightforward with enterprise-class features but without the enterprise complexity,” Haris says. “Most of the time, we spend training users on how to log in. That’s it. We’ve rarely seen a solution so intuitive.”

Pro cybersecurity tips from Stasmayer

Stasmayer has defended small businesses against cyber-attacks since 2003. They encourage everyone to focus on three core areas:

  1. Secure connectivity first
    Make sure your team has a safe path into company data. Don’t rely on public Wi-Fi or ad-hoc connections. Use a dedicated service like NordLayer or a similarly robust platform.
  2. Keep training users
    Emails and phishing attempts evolve constantly. Educate staff about threats at least once a month. Offer reminders, videos, or short tests that keep everyone aware.
  3. Invest in a Managed Security Program
    Don’t leave security to chance. Even the best security can be challenged by advanced attackers. With the proper Managed IT Security Program in place, we can monitor systems around the clock, reduce the likelihood of an attack, and detect intruders fast, before it’s too late.
Haris Michaels's quote

Why join the NordLayer Partner Program?

Stasmayer unified the process of securing remote workers, on-premise servers, and cloud resources using NordLayer. Their top features included:

You can do the same for your MSP. NordLayer scales with your budget and provides the management tools to keep data safe.

Contact NordLayer to learn more about pricing, deployment, or how to set up each feature. Make your clients stronger, reduce the risk of cyber-attacks, and keep operations running smoothly.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Remote network access: How to easily access your local LAN

Summary: Explore secure, scalable remote access to local networks with Cloud LAN—the modern alternative to VPNs, RDP, and static IP setups.

In a world where work happens anywhere, seamless and secure remote network access is no longer a luxury—it’s a must-have. Businesses need to keep their hybrid employees connected to critical internal resources. And they must do so without overstraining IT teams or putting their sensitive data and reputations at risk.

Whether you’re managing remote desktop access, virtual machines, file servers, or network devices, the challenge remains the same: how do we provide reliable, secure local network access without the logistical and security headaches?

Enter Cloud LAN—a modern approach to remote access that combines simplicity with robust security. In this article, we’ll break down the traditional pain points, explore alternatives, and show why Cloud LAN stands out as a smarter network security solution for modern businesses.

What is remote network access?

Remote network access solutions allow users to securely connect to physical or cloud-based networks—or specific devices—from anywhere in the world via the internet. This technology enables employees to access company resources, such as internal servers, printers, or desktop environments, as if they were physically present in the office.

For instance, whether you’re launching a remote desktop session or managing shared drives, remote access ensures seamless interaction with internal infrastructure without being tied to a specific location. Thus, teams can work from home, on the road, or across borders.

This capability is fundamental for enabling hybrid work, supporting branch offices, and securely collaborating with contractors or vendors. It’s also crucial for ensuring that globally dispersed teams have reliable access to the local apps, files, and systems they need to do their jobs.

Key solutions for remote network access

When it comes to implementing remote network access, IT teams often weigh several options. Let’s explore the most common:

  • Traditional Virtual Private Network (VPN): VPNs create a secure tunnel between the user and the company network. By masking the user’s IP address, VPNs allow remote connections to appear as if they originate from within the internal network. While effective for security, traditional VPNs can be slow and require manual configuration.
  • Remote Desktop Protocol (RDP): RDP allows users to control a remote computer or server via the remote desktop connection. It’s useful for accessing applications or files hosted on a central machine, but exposing it to the public Internet may introduce vulnerabilities.
  • Static IP address and port forwarding: Some IT teams assign a static IP address to devices and manually configure port forwarding to allow external access. While this works for certain setups, it’s notoriously difficult to manage at scale and poses security risks if not properly secured.
Key remote access solutions

Why traditional remote access methods fall short

Despite being widely used, traditional remote access tools have critical limitations—especially when applied to fast-growing or remote-first organizations.

  • Complex configuration. Legacy VPN appliances, hardware firewalls, and remote desktop gateways require manual setup, network configuration, and ongoing provisioning. This creates an administrative burden and increases the risk of misconfigurations if user counts grow or change frequently.
  • High maintenance and overhead. Traditional infrastructure demands constant upkeep. IT teams must patch VPN servers, troubleshoot remote access failures, and monitor performance across on-premise hardware, driving up costs and resource allocation.
  • Security concerns. Exposing RDP to the internet, misconfigured VPN tunnels, or weak segmentation policies can all leave organizations vulnerable to breaches. These tools often rely on outdated encryption standards or credentials, increasing the overall attack surface.
  • Limited scalability. Most traditional solutions weren’t built for the hybrid or remote-first era. As companies grow and teams become more distributed, these tools often can’t keep pace with modern workforce needs.

 

Security factors to consider in remote access solutions

Security should be at the heart of any remote network access decision. Here’s what to keep in mind when evaluating solutions:

  • Data encryption: Ensure all remote desktop connections and data in transit are encrypted using modern standards.
  • Network access control: Role-based permissions, Device Security Posture (DPS), and location policies are vital to prevent unauthorized access.
  • Network segmentation: Avoid exposing your entire local network to every user. Instead, use segmentation to limit access to only what’s necessary.
  • Visibility & monitoring: Real-time logs and traffic analysis help detect suspicious behavior early.

Many legacy tools offer piecemeal versions of these protections, but they often lack seamless integration or require additional software and manual setup.

Cloud LAN: A simpler way to access your local network remotely

Here’s where Cloud LAN changes the game. Cloud LAN simplifies remote access by creating a virtual private network between enrolled devices.

How Cloud LAN works

With NordLayer’s Cloud LAN (previously called Smart Remote Access), users can connect directly to remote devices—computers, tablets, or mobiles—running supported operating systems (Windows, macOS, Linux, Android, iOS). It’s a secure way to access and interact with other devices as if they were on the same local network, no matter where they actually are.

It’s ideal for remote troubleshooting, file sharing, virtual desktop use, or collaborating across distributed endpoints—without exposing your broader infrastructure.

What makes Cloud LAN different?

  • Quick to deploy—Cloud LAN is toggle-ready and takes just minutes to activate
  • Built for scale—Whether you have 10 or 10,000 users, Cloud LAN scales effortlessly without the need for additional infrastructure.
  • Device-to-device remote access—Establish secure connections between any authorized devices with the NordLayer app installed, across platforms and locations.
  • Secure by default—Every connection runs thorough encrypted tunnels with Zero Trust Network Access (ZTNA), and network segmentation by design.
  • No manual routing hassle—NordLayer automatically manages routing between devices, so teams can connect directly without needing static IP assignments or manual configurations.

Setting up remote access with NordLayer Cloud LAN

NordLayer makes remote connectivity simple—without the usual complexity of network reconfiguration. Cloud LAN securely links distributed devices into a virtual private network, enabling direct access from anywhere.

Getting started is easy. Just create a Virtual Private Gateway, add your team members, and enable Cloud LAN in the Control Panel. Admins can also manage access via user groups, integrate with identity providers (like Okta, Azure AD, or Google Workspace), and monitor device posture and activity.

Cloud LAN is fast to set up, secure by design, and intuitive to manage—ideal for teams looking to simplify remote collaboration without relying on outdated or overcomplicated remote desktop solutions.

 

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

How to strengthen cybersecurity in construction and prevent attacks

Summary: Construction companies face rising cyber threats. Learn key risks, best practices, and how NordLayer helps protect projects, data, and infrastructure.

Cybersecurity risks affect every economic sector, and the construction industry is no exception.

Digital technology is embedded in how we build. From home building to delivering complex infrastructure, constructors rely on connectivity and data storage to manage material flows, coordinate projects, and communicate with clients.

Cyber-attacks can disrupt these critical functions, raising costs and, potentially, creating physical security risks.

This blog will look at cybersecurity for construction companies. We will discuss general cybersecurity risks that all companies must mitigate, alongside construction-specific risks that require targeted security solutions.

Why do construction companies face cybersecurity risks?

The construction industry consistently attracts cyber criminals for several reasons. Most importantly, construction firms have embraced digitalization. Companies store valuable financial and client information, the type of data that data thieves love to discover.

Construction companies also store infrastructure plans and project schematics. These data types appeal to threat actors linked to hostile states or terrorist collectives. Cyber-attacks on corporate archives could enable and amplify devastating strategic attacks.

Digital transformation has introduced IoT sensors, drone footage, Building Information Modeling (BIM) systems, environmental modeling, and many radical new technologies. Innovation boosts productivity but also creates new targets for cyber criminals.

Competitors are another source of cyber-attacks in the construction industry. Construction is a competitive world where businesses compete for contracts based on reputation and track record. Sabotage or data theft can ruin a firm’s chances of successful tenders.

What drives cyber-attacks on construction firms

Data security studies back up these concerns. PwC’s 2024 Cyber Threats report finds that 76% of cyber-attacks against construction companies are motivated by financial gain. But 12% are linked to espionage, and 9% are connected to sabotage.

Attacks are also becoming more frequent. The security consultancy Kroll reports that phishing attacks on construction companies doubled from 2023-24. With criminals introducing sophisticated new techniques, the threat landscape is becoming more complex and hazardous. Threat mitigation strategies are essential.

Understanding cybersecurity threats for construction companies

Every economic sector faces slightly different adversaries. Cybersecurity measures should avoid generic solutions and rely on knowledge about relevant threats. With that in mind, critical cybersecurity threats in the construction industry include:

Ransomware attacks

Ransomware is the most common attack type against construction industry targets. In these attacks, criminals deploy malware to encrypt victims’ devices. Malware then denies access to encrypted data until attackers receive ransom payments, typically in cryptocurrencies.

Ransomware attacks are more than a financial headache. They disrupt project timelines, putting completion at risk. Attackers may also extract data even if victims agree to pay.

Data breaches

Modern construction companies rely on data flows to monitor projects, maintain quality control, protect the environment, and ensure employee safety. Companies handle vast streams of financial and client data as well. All of this sensitive data can be useful for cyber attackers.

Criminals understand how to compromise construction industry targets with social engineering attacks and malware. Data breaches are inevitable without strong information security measures and employee training processes.

Supply chain attacks

Construction companies depend on complex networks of suppliers to provide material inputs, personnel, and digital services. But criminals can compromise vendors and launch cascading attacks against downstream clients.

This is why construction firms must integrate third parties into their cyber risk assessments. Partner companies represent vulnerable entry points for malicious actors, making robust access control systems essential.

Internet-of-things (IoT) attacks

IoT devices track equipment locations, monitor temperatures and pressure levels, track fleet performance, and provide early safety warnings against vibrations or toxins. These functions cut costs and improve productivity. However, IoT also introduces network security cyber risks.

Direct access to Internet-of-Things devices enables surveillance and data collection. Attackers can also combine IoT devices in botnets to launch denial-of-service attacks and damage network assets.

Moreover, IoT devices often lack native security measures. Companies struggle to update firmware and keep pace with emerging threat vectors. They may even rely on default passwords, opening the door to opportunistic attacks.

Physical security

The construction sector is particularly prone to physical security risks. Members of the public may gain unauthorized access to work sites, putting their safety at risk. Expensive on-site equipment requires security from theft or damage.

Even worse, hybrid cyber-physical attacks can compromise devices that protect work sites. For instance, attackers may use malware to damage air conditioning or dust extraction systems. Insider threats can also introduce malware via USB devices, giving outsiders access to IT systems.

Best practices to mitigate construction industry cybersecurity risks

A single ransomware attack could lead to missed deadlines, contractual fees, loss of personal information and crippling reputational damage. Given these risks, cybersecurity should be a top priority for all construction companies and third-party suppliers.

However, many constructors are poorly prepared for cyber threats. According to insurance firm Travelers, over half of construction companies lack endpoint security controls or post-breach response plans. The best practices below will help you fill those gaps and secure construction industry assets:

Best practices for cybersecurity in construction

Train employees to raise cybersecurity awareness

Phishing emails are the most common way for attackers to access construction industry networks. Clicking on malicious attachments or following fake links allows criminals to implant surveillance tools and launch ransomware attacks.

One of the most effective solutions to phishing risks is comprehensive employee training. Teach staff how to recognize dangerous emails and avoid unsolicited files or documents. Train employees to raise security concerns and follow password security best practices. And use phishing simulations to war-game real-world threats.

If you use IoT devices, training should cover updating firmware and ensuring security. Regularly reiterate the need to avoid default passwords and check devices.

Implement network security controls

Network security measures detect, assess, and neutralize cyber threats before they cause harm. Construction companies need robust firewalls, intrusion detection systems (IDS), and endpoint monitoring tools.

Uncontrolled access is another critical cybersecurity vulnerability. Use multi-factor authentication to request additional credentials for every login. Manage user permissions according to the principle of least privilege, allowing access to essential resources while blocking everything else.

Security teams must also update operational technology and network assets to minimize exploit risks. Attackers will leverage outdated firmware or operating systems. It’s essential to implement software updates and avoid using obsolete legacy systems.

Manage third-party security risks

Construction sector supply chains often become vectors for cyber attacks. This makes vendor and supply chain management a critical challenge.

Third-party risk assessment is critical. Assess vendors based on their cybersecurity controls and compliance records. Build cybersecurity into vendor contracts to encourage secure practices and prompt notification of security incidents.

Manage vendor access carefully according to Zero Trust security models. Assign sufficient privileges to carry out core tasks, without granting third parties extensive network access.

Follow an efficient incident response plan

Construction companies should assume that security incidents will occur. Security teams need a prepared incident response playbook to organize responses and safeguard sensitive information, such as client data or intellectual property.

Response plans should detect breaches, identify attack vectors, and determine the correct response. Depending on the nature of the threat, responses could entail system downtime, quarantine processes, or ongoing monitoring.

Response plans should also include data backup procedures. Regular backups of critical data allow construction companies to restore operations, even during ongoing ransomware attacks.

Ensure response plans meet regulatory compliance requirements (for example, notifying customers or regulators). Use response outcomes to improve security measures and cut future cybersecurity risks.

Managing IoT security

Secure Internet of Things devices with secure zones guarded by firewalls and access controls. Network segmentation allows authorized access and contains DDoS attacks or malware infections, effectively confining IoT attacks.

Extend IDS monitoring to IoT devices, and encrypt data transfers (such as monitoring data or video feeds).

Use industry frameworks to assist compliance

The construction industry does not fight cyber threats alone. For example, the National Institute of Standards and Technology (NIST) provides a Cybersecurity Framework to guide construction firms. Employ the framework as a checklist to source essential tools and implement security measures.

Construct a cybersecurity strategy with NordLayer

Digital transformation in the construction industry brings many benefits, but also comes with a price tag: increasing exposure to cybersecurity risks. NordLayer can help you manage those risks and enjoy the benefits of technological innovation.

NordLayer provides a comprehensive cybersecurity solution for manufacturing companies of all sizes, from single-building sites to nationwide construction enterprises.

Here is what NordLayer offers:

  • Zero Trust Network Access (ZTNA) enables you to restrict access to specific applications and prevent threats from spreading within the network.
  • Web Protection effectively blocks phishing links and sites.
  • Identity and Access Management (IAM) allows you to manage user identities and access for your employees and third parties with multi-factor authentication (MFA), biometric authentication, and Single Sign-On.
  • Cloud Firewall ensures granular access control and helps secure workflows across remote, hybrid, and on-site environments.
  • Endpoint security protects endpoints through traffic encryption and access control.

Cybersecurity should not compromise project delivery or data security. Contact NordLayer’s team to explore flexible and effective cybersecurity solutions for the construction industry.

 

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

How SoundCloud streamlined VPN access with NordLayer

Summary: Tired of VPN maintenance? See how SoundCloud saved 95% of IT admin time and simplified global team access with NordLayer’s Business VPN.

Results at a glance

SoundCloud is one of the largest cloud-based music streaming platforms in the world, connecting millions of listeners and creators across the globe. The company has more than 130 million monthly users and hosts over 250 million audio tracks.

Headquartered in Berlin, with offices in London, Los Angeles, and New York, SoundCloud operates in over 190 countries. Each region brings unique markets and localization needs, requiring a flexible, secure solution to keep teams connected and protected.

Profile of SoundCloud

With SoundCloud expanding globally, their marketing team needed a reliable business VPN with broad location coverage. The company chose NordLayer to provide its marketing and developer teams with an easy setup, strong connectivity, and seamless protection.

The challenge: failing VPN connections and limited geographic coverage

SoundCloud faced several challenges with VPN reliability and geographical coverage. The company was looking for an easy-to-use solution that could provide stable, secure VPN connections in specific markets for localization and marketing purposes. Rafał Kamiński, IT Director at SoundCloud explains:

“Before adopting NordLayer, we struggled with complex VPN maintenance. Also, our previous solution lacked the geographic coverage we needed, for example, in countries like Egypt, Congo, Mexico, or Taiwan.”

To find the right fit, SoundCloud evaluated several VPN tools, focusing on strong security credentials, ease of use, and simple deployment for non-technical users. After shortlisting and testing a few options, they selected NordLayer. It stood out as a reliable, easy-to-use, and budget-friendly solution that met all their requirements.

How NordLayer helped SoundCloud

By switching to NordLayer, SoundCloud simplified VPN use for employees, improved global connectivity, and saved time and resources. What started with just one team quickly expanded to around 90 users across departments.

“With NordLayer, I save 95% of the time I used to spend on setup and maintenance. What used to take hours is now a one-minute task. And that’s not just time saved, it’s real cost savings, too.”

Key benefit 1: Fast deployment across teams

SoundCloud’s IT team deployed NordLayer in less than a day. With bulk user uploads and simple installation on MacBooks, the setup was effortless. Most users needed only a short tutorial and could log in instantly via Google SSO.

NordLayer Settings - Login methods

Key benefit 2: VPN-based, reliable geo-access for global workflows

Some teams, like the designers in Berlin, needed to access vendor servers that only accepted U.S. IP addresses. With NordLayer, they could switch VPN locations in seconds and connect instantly, bypassing location restrictions without manual workarounds.

“With NordLayer, switching IP locations is easy. It solves the problem instantly, with no delays or complications.”

Settings - Security configurations - Always on VPN

Key benefit 3: Reduced workload and operational costs

By removing the need for internal VPN infrastructure, international travel, or manual system setup, NordLayer helped SoundCloud save both time and money. IT teams could focus on strategic tasks instead of troubleshooting VPN usage.

 

Key benefit 4: Smooth scaling of VPN access across departments

Adoption started small with the marketing team, then expanded organically as more employees saw the benefits. Today, nearly 90 users rely on NordLayer’s Business VPN to stay connected securely and easily.

“It started with 10 or 20 users. But like a snowball, it grew fast. One person told another, and suddenly we had almost 100 people using NordLayer across the company.”

Key benefit 5: Easy user management with SSO integration

With NordLayer, managing users is straightforward. IT manually creates and deactivates accounts, while Google SSO enables secure, one-click login, which is easy even for non-technical users.

“NordLayer is super easy to use. Our team just clicks one button with Google SSO and they’re in. No setup hassle, no extra steps. It just works.”

Results: 95% of admin time saved

  • 95% admin time saved
    NordLayer eliminates the need for manual VPN setups or cloud configurations, enabling instant, secure access to remote systems.
  • Ease of NordLayer’s use

“Setting up NordLayer for a new employee at SoundCloud takes just a couple of minutes, making onboarding fast, simple, and stress-free.”

  • Seamless operations and a reliable, secure VPN connection
    Teams can now quickly switch locations to access region-specific content.

Why NordLayer works for SoundCloud

SoundCloud has been using NordLayer for five years now. With employees working remotely or across multiple global locations, SoundCloud needed a flexible Business VPN solution that did not require heavy admin work. NordLayer made a perfect fit.

Pro cybersecurity tips from SoundCloud

Quote

Conclusion

SoundCloud switched to NordLayer’s Business VPN, which provided secure, reliable connectivity and saved the company many hours of IT work.

Thanks to fast internet and reliable VPN performance in all locations, our employees can work without connection issues or delays.”

NordLayer also allows users to easily change IP addresses to access region-restricted servers, which is critical for teams working with vendors or platforms based in other countries.

Does your business need secure and reliable connections? NordLayer provides fast deployment, flexible plans, and strong data security.

Visit NordLayer to find the best plan for your needs.

 

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

ICS security best practices: How to protect Industrial Control Systems

 

Summary: ICS systems face increasing cyber threats. Network segmentation, VPN, and threat intelligence are key to protecting your critical infrastructure. Learn how.

Today’s industry depends on automated control systems to maximize efficiency and enable flexible production. However, modern cyber attackers understand this dependence and have evolved many techniques to compromise and damage Industrial Control Systems (ICS).

This blog will explore how ICS fits into the cybersecurity landscape. We will learn about the threats ICS systems face, discuss best practices to mitigate cyber threats, and ensure smooth industrial operations.

ICS and OT: Definition

Industrial Control Systems (ICS) and Operational Technology (OT) are critical concepts in modern industry. However, the two approaches are slightly different, and understanding these variations is important when protecting ICS deployments.

Operational Technology (OT) vs Industrial Control Systems (ICS)

Operational technology is a subset of industrial technology that monitors machinery and networks across enterprises. OT checks that production or logistics facilities are running smoothly and safely, including physical efficiency, environmental conditions, and cybersecurity factors.

Industrial Control Systems are a subset of OT that manage processes within industrial settings (including cybersecurity). Components of ICS include:

  • Supervisory Control and Data Acquisition (SCADA): Collects data from industrial sensors and delivers this information to centralized security centers.
  • Distributed Control Systems (DCS): DCS handles complex industrial settings. For example, companies may integrate monitoring across chemical processing plants or oil refineries. Systems employ distributed sensors to improve efficiency and resiliency.
  • Programmable Logic Controllers (PLCs): PLCs govern automated industrial processes. They allow technicians to automate production and monitoring functions, including threat data collection, alerts, and incident responses.

Why is cybersecurity important for ICS?

Industrial control systems are fundamental to modern industry. They control production lines that manufacture essential consumer goods, manage power plants and refineries, and help maintain and extend critical infrastructure.

However, the expansion of ICS systems has brought new cybersecurity risks. Cybercriminals now seek to damage vital industries via targeted cyber-attacks, often focusing on ICS technology to achieve maximum impact. As a result, Industrial Control Systems cybersecurity is becoming critically important.

Think about the risks of not securing the ICS network infrastructure. Cyber threats could damage machinery and compromise the physical safety of employees. For instance, in the 2010s, a malware agent called TRITON hit industrial safety systems across the Middle East.

Even worse, attackers could harm entire populations. One attack documented by Verizon targeted water company logic controllers, aiming to contaminate water supplies with harmful chemicals. The attack failed but remains possible.

In most cases, attackers harm companies financially, not physically. ICS attacks often damage productivity by taking plants and equipment offline. For instance, a 2019 attack against Norsk Hydro facilities eventually cost the company over $50 million.

Given these numbers and the consequences of attacks, securing ICS systems should be a cybersecurity priority for all industrial organizations.

Understanding ICS security risks

Industrial cybersecurity starts with awareness of the risks faced by Industrial Control Systems. As ICS/OT becomes more aligned with IT, manufacturers face many critical risks, many of which are evolving and becoming more severe.

ICS security risks

Common ICS vulnerabilities include:

  • Use of legacy systems: Industrial organizations are often slow to update software, which lags behind other technology. Unpatched operating systems and firmware invite bad actors to exploit weak spots. This problem is doubled if vendors no longer support legacy systems. In that situation, companies have no one to advise them or supply updates.
  • Default settings: Companies often install industrial equipment or IoT devices without changing the default settings. Attackers can quickly access ICS systems via default passwords, compromising an entire industrial environment.
  • Lack of encryption: ICS systems rely on commands to operate switches and manage processes. However, cyber attackers accessing this traffic can hijack industrial systems and control production equipment. Encryption solves this problem by making commands unintelligible to outsiders.
  • Risks related to remote access: Vendors and IT staff may access critical systems remotely to manage settings and monitor performance. This represents a vulnerability if companies fail to verify connections via robust access control measures.

Who exploits ICS vulnerabilities? Understanding the threat landscape

Many threat actors exploit these common ICS vulnerabilities. For example, companies without robust access controls, segmentation, and authentication are easy targets for insider threats. Insiders can obtain credentials and mount attacks or supply information to malicious outsiders.

However, many attacks originate overseas. So-called nation-state attacks involve state-backed cybercriminals. The US-created Stuxnet worm, which targeted Iranian nuclear facilities, is a great example, but nation-state attacks also emerged from Russia, China, North Korea, and Israel.

Then there are shady criminal collectives. In 2024, ransomware groups hitting ICS targets surged by 60%, and attacks rose by 87%. Industrial targets are attractive because companies can’t afford to lose production time. For instance, Colonial Pipeline paid ransomware attackers $4.4 million in 2021, and smaller payments happen daily.

Finally, third-party accounts can expose companies to supply chain risks without proper vetting and security assessments. If a vendor suffers a cyber-attack, the effects can cascade to factories that use their products.

What happens when ICS attacks occur?

Whatever threat actor is involved, ICS attacks can be devastating. The most obvious consequences are financial. As noted above, attackers may demand huge ransomware payments to unlock systems. However, ICS attack risks extend beyond ransom payments.

On a practical level, ICS attacks disrupt industrial production as SCADA manipulation causes production lines to behave erratically and halt. DDoS attacks overload and damage machinery, potentially raising fire risks.

Critical infrastructure networks become unreliable and require detailed assessment, which can be a headache for utilities like electricity or water providers. These problems are more severe if attackers disrupt monitoring technology by delivering false readings.

Safety systems may break down or produce false alarms. Physical failure can harm employees, customers, and the environment. When that happens, regulatory compliance violations are almost guaranteed, and reputational harm is never far behind.

ICS security best practices

Cyber threats against critical systems are becoming more sophisticated and damaging. Attackers tailor their methods to specific companies and locations. They research legacy systems, industrial architecture, and security measures to detect seemingly minor vulnerabilities.

In this context, all industrial organizations should strengthen their ICS cybersecurity posture. Let’s explore some best practices to achieve this goal.

Network segmentation

Segmenting ICS environments is an essential part of cybersecurity for Industrial Control Systems. This is because network segmentation divides industrial networks into areas with access permissions assigned to specific teams and employees. Security teams can monitor ICS devices and spot suspicious activity, ensuring only authorized users can access configurations or data flows.

Network segmentation can also help restrict the blast radius of successful attacks. It can, for example, prevent malicious malware from spreading in the network. This is especially helpful in mitigating denial-of-service attacks that flood industrial networks with traffic.

Ideally, companies should use cloud firewalls to implement network segmentation. Cloud firewalls enforce access controls to your ICS devices. You can facilitate smooth access for employees with a legitimate reason to change ICS settings and exclude everyone else.

Not everyone should access everything

  • Granularly define access policies
  • Isolate and protect your critical data with network segmentation by NordLayer

 

Learn more

 

Network segmentation

Training employees

Cutting-edge security tools are useless if employees fail to follow security policies. For instance, companies must educate employees about the importance of MFA and password security. Enforce device security policies, allowing only approved work devices to connect to the ICS network.

Additionally, connect phishing risks with ICS attacks. Employees should know how to identify phishing emails and avoid malicious software infections.

Regularly patch and update software

As we discussed earlier, legacy systems are common failure points in cybersecurity for Industrial Control Systems. Companies let control software become obsolete. Businesses must provide regular patches to mitigate exploits and stay ahead of malicious actors.

Multi-factor authentication (MFA)

Robust access controls prevent unauthorized access, even if attackers obtain user names and passwords. Multi-factor authentication (MFA) requires unique one-time credentials in addition to passwords. This helps block untrusted users at the network edge.

MFA is even more effective with strengthened password security. ICS users should regularly change their passwords and use strong, unique passwords (with no reference to personal information).

Password managers can help by providing a simple interface for credentials management. Integrate tools like NordPass with your ICS security measures to enforce password policies consistently and minimize credential theft risks.

Secure Remote Access

ICS is usually a remote technology. Engineers rarely control equipment on-site and depend on connections between external networks and ICS devices. This opens the door to hijacking and credential theft attacks. Virtual Private Networks (VPNs)help solve this problem.

VPNs help secure company data by creating an encrypted connection for employees to access the network remotely. Business VPN ensures that remote access to critical systems is protected, reducing the risk of cyber-attacks.

Harness the latest threat intelligence

Many ICS attacks originate from organized criminal collectives and nation-states. This level of organization makes attacks more powerful, but has a positive side: targets can research active threats and apply proactive security measures.

Leverage threat detection and intelligence to outpace ICS attackers. Solutions like NordStellar actively monitor current threats and detect leaked credentials on the Dark Web. With this knowledge, security teams can detect critical threats and remedy exploits before attacks occur.

What are the differences between ICS and SCADA systems?

Before we finish, it’s important to clarify how ICS and SCADA systems differ. As mentioned earlier, Supervisory Control and Data Acquisition is a monitoring system that collects data from industrial sensors.

SCADA is most commonly associated with distributed industrial settings. For example, oil pipelines need thousands of SCADA sensors to monitor structural integrity, check employee safety, and spot potential leaks.

ICS is an umbrella term referring to systems that monitor and control industrial environments. SCADA is an element of most ICS deployments, but there is more to ICS than data gathering. ICS is a control model. ICS devices analyze and use data to manage industrial processes.

How can NordLayer help secure ICS systems?

ICS cybersecurity is critically important in the modern economy. Power suppliers, manufacturers, logistics companies, and all industrial organizations face severe and growing cybersecurity risks. Expert assistance is often essential, which is where NordLayer can help.

NordLayer’s cybersecurity for manufacturing solutions help mitigate ICS risks and prevent damaging cyber-attacks.

Our access control solutions regulate access to ICS assets, blocking unauthorized actors and allowing seamless employee access. The cloud firewall allows granular network segmentation, shrinking the attack surface. Threat detection tools monitor your network, while our VPN enables safe remote access to all ICS devices.

Advanced security tools make it possible to secure all types of industrial environments. To learn more, contact the NordLayer team today.

 

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×