DevOPS Department of MD Audit LLC

Head of the Administration and (MD Audit. Softline PJSC) Alexander Demin noted that MD Audit implemented a multi-level security system. including centralized server authorization for all accounts. mandatory end-to-end encryption of each communication channel (even at the cost of some reduction in data transfer speed). phased implementation of two-factor authentication on all critical nodes. as well as comprehensive use of Access Control Lists and firewalls. “These are not just additional precautions – this is a necessary operating standard for a corporate environment with increased security requirements.”

Alexander Demin emphasized.

The head of the information telegram number database  security department of OOO “Kod Bezopasnosti” Alexey Korobchenko named the information security measures that his company takes when working via VPN:

– digital hygiene and data protection on the VPN client side – whether it is a personal device or one issued by an organization;

– use of various imposed 8 essential personal finance tips  means of information protection and tightening of security policies;

– control over activity on a remote device and user activity on the organization side;

– point access to infrastructure via VPN and implementation of the Zero Trust concept. in which any user is considered untrusted until they pass authentication. Moreover. they will pass it at all stages of gaining access to certain resources.

Dmitry Kostin. an information security expert at New Cloud Technologies (MoiOfis) LLC. believes that the categories of data stolen when working with VPNs that are of most interest to attackers have not changed dating data in recent years: “First of all. these are logins and passwords for personal accounts in remote banking systems. government services and social networks. and. of course. any personal data. Of particular value is the identifying and authenticating

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top