{"id":14100,"date":"2020-06-05T00:35:43","date_gmt":"2020-06-04T22:35:43","guid":{"rendered":"https:\/\/eiposgrados.com\/?p=14100"},"modified":"2020-10-19T10:40:04","modified_gmt":"2020-10-19T08:40:04","slug":"cybersecurity-in-times-of-teleworking-vpns-are-safe-and-reliable","status":"publish","type":"post","link":"https:\/\/eiposgrados.com\/eng\/blog-ciberseguridad\/ciberserguridad-en-tiempos-de-teletrabajo-son-seguras-y-fiables-las-vpn\/","title":{"rendered":"Cybersecurity in times of teleworking. Are VPNs safe and reliable?"},"content":{"rendered":"<p>It is evident that times have changed. After the health and financial crisis caused by the outbreak of Covid-19, we have had to adapt and modify our habits both personally and at work. A large part of the world&#039;s population has begun to work from home and many companies have been forced to adopt teleworking even without being properly prepared.<\/p>\n<p>We are aware that browsing the Internet is not always safe and that on many occasions we share more information than we should.<\/p>\n<p>Some companies are aware of these dangers and have virtual private networks (VPNs).<\/p>\n<p>A VPN allows the computer to send or receive data with all the functionality, management and security policies of a private network.<\/p>\n<p>This is done by establishing a point-to-point connection using dedicated, encrypted connections or a combination of both.<\/p>\n<p>Every time you connect to the Internet you fill out a \u201cform\u201d with a series of key data:<\/p>\n<ol>\n<li>What is my ip?<\/li>\n<li>Where do I connect from?<\/li>\n<li>Do I use a private or public network?<\/li>\n<\/ol>\n<p>Connecting to the Internet through a VPN will allow you to encrypt your data.<\/p>\n<p>A VPN is a layer of protection that acts on two fronts.<\/p>\n<p>On the one hand, it creates a virtual tunnel that encrypts all our Internet data, so that no one can spy on it.<\/p>\n<p>And on the other hand, it hides our IP address (which reveals who we are and where we are) by making all our traffic go through the VPN servers first.<\/p>\n<p><strong><em>So are VPNs safe and reliable? <\/em><\/strong><\/p>\n<p>When they are active, yes.<\/p>\n<p>The problem is that we are talking about software that takes control of your connection and that software can fail, or be blocked by a failure of another program or a virus that you have in memory, and leave your connection exposed. Even if they are only a few seconds, they are enough for a supposed spy to discover who you are, or what you are doing.<\/p>\n<p>There is also what is known as a DNS leak, where a VPN slowdown causes the operating system to switch to standard, unencrypted DNS servers, exposing your connection.<\/p>\n<p>DNS stands for Domain Name System and is a technology based on a database that is used to resolve names on networks, that is, to know the IP address of the machine where the domain is hosted. which we want to access.<\/p>\n<p>As we have mentioned, sometimes while you are using a VPN a DNS leak can occur.<\/p>\n<p>Because the virtual private network, due to saturation or other failure, takes time to respond to an access request, Windows (or the operating system you are using) changes the VPN&#039;s DNS servers to the unprotected DNS that we normally use, leaving revealed our connection.<\/p>\n<p>It&#039;s a rare bug, but it happens. That is why it is important for a company to have specialized profiles in cybersecurity, in addition to the fundamental technological profiles.<\/p>\n<p><strong>Advice:<\/strong> If you use a VPN and want to know if your connection suffers from DNS leaks, you can perform a check using some reliable websites that allow you to perform this check by passing a test such as, for example, <a href=\"https:\/\/www.dnsleaktest.com\/\" target=\"_blank\" rel=\"noopener\">DNS Leak<\/a>.<\/p>\n<p>Author: Mar\u00eda Jos\u00e9 Pe\u00f1a. Computer engineer. IT Project Director. Passionate about Cybersecurity<\/p>","protected":false},"excerpt":{"rendered":"<p>A VPN allows the computer to send or receive data with all the functionality, management and security policies of a private network.<\/p>","protected":false},"author":51,"featured_media":14101,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[332],"tags":[],"class_list":["post-14100","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-ciberseguridad"],"acf":[],"_links":{"self":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/14100","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/users\/51"}],"replies":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/comments?post=14100"}],"version-history":[{"count":0,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/14100\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media\/14101"}],"wp:attachment":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media?parent=14100"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/categories?post=14100"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/tags?post=14100"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}