benefits of a VDI

Communicate and Collaborate With Anyone. Anywhere.

Even before COVID-19 sent non-essential businesses to work remotely, remote work has increasingly become the new normal. According to Global Workplace Analytics, in the U.S., 4.7 million employees (3.4% of the workforce) work from home at least half the week. While according to Owl Labs, 30% of people report working remotely full-time and 18% work remotely one to three times per week. These numbers are bound to increase as many businesses will continue to allow their employees to work remotely post COVID-19. Although studies indicate that remote work has many benefits, it also has its challenges.

Two of the biggest challenges of working remotely is effective communication and collaboration within organizations. When users are working in a single office environment, people and data are easily accessible. When users are working in their own environments, several variables make secure, effective communication and collaboration a logistical nightmare. Whether its outdated technology and software, unsecured home networks, or limited access to company information, effective communication and collaboration is not only difficult, it increases security threats. 

How can organizations move past these challenges? With Fognigma’s patented software solution, secure, effective communication and collaboration is not only solved, but it is made simple! Organizations can communicate and collaborate seamlessly and securely from anywhere, with anyone, and without leaving a trace that users were ever connected. 

ON-DEMAND, SECURE COMMUNICATION AND COLLABORATION TOOLS

With Fognigma, you can create and deploy custom VPNs in minutes, complete with secure communication and collaboration solutions. Using simple software or hardware solutions, users can secure their connections and safely access resources, allowing them to communicate and collaborate with other uses whether they are working remotely at home or traveling. Fognigma’s communication and collaboration solutions include: 

Video Conferencing 

Fognigma’s video conferencing solution is set up with push-button simplicity. Users can create custom URLs for each conference for ease of use and obfuscation of participants’ locations. Additionally, video conferences are completely protected with end-to-end, cascading AES-256 encryption, and are equipped with chat and screen sharing capabilities. 

Encrypted Telephony

Fognigma’s secure telephony solution wraps VoIP calls in two layers of AES-256 encryption for end-to-end protection. All calls work on desktops, tablets, and mobile devices and extend capability to over 150 data centers in over 50 regions around the globe. Fognigma’s telephony is simple to set up. Users can create call chains, conference calls, and telephone numbers in a matter of minutes. 

Secure File ServersSecure File Share - Fognigma

Fognigma’s secure file servers are entirely encrypted and a safe, secure place to store company policies, intellectual property, company communication logs, marketing collateral, and many other important company files. Fognigma’s solution is designed to allow users to access necessary files from anywhere without anyone else knowing where they are. Administrators can control which users in the company access which folders and files. Additionally, special links can be created to share files or folders with parties outside of your organization.

Sandboxed VDIs

Fognigma’s sandboxed VDIs include all the standard VDI features and more. Fognigma’s VDIs are proven to be 50% faster and more responsive, come with secure local USB capabilities, have dynamic exit switching, nomadic profile ability, drag-and-drop file sharing within VDIs, DNS routing at the exit, proxies audio, multiple language support, and have access to other Fognigma components. 

User-Specific Message and File Encryption

Fognigma’s communication solution simplifies and automates end-to-end encryption, so that content never exists in the clear outside of the user’s device. The manual steps normally associated with private key encryption is transparently handled, allowing users to maintain proper security practices without needing specialized knowledge or extensive training, and without interrupting their regular workflow. A user’s private keys are stored only on the user’s devices and are never shared within the network or the server, protecting your organization from internal and external threats. Encryption keys are specific to each user and each individual interaction; even other users on the same server will be unable to decrypt them. Only the intended recipient’s device will have access. 

Fognigma was purposely designed to be owned and operated by the customer, giving organizations all the tools they need to securely and effectively communicate and collaborate wherever they are. With Fognigma, communication and collaboration is not only secure, its simple. Contact us to schedule a demo today. 

enterprise proxy server

Fognigma’s Video Conferencing Solution Redefines Meeting Space

Meetings are an everyday part of professionals’ workdays. Whether you are a large or small enterprise, meetings are key for effective communication and collaboration.

Even before the recent COVID-19 pandemic, meetings have increasingly become virtual due to users traveling, working remotely, or meeting with external parties. However, virtual meetings can severely limit productivity when there are internet connection delays, compatibility issues, and security concerns.

With Fognigma’s video conferencing solution, meetings are faster, entirely secure, and easier to use. Users simply click the designated meeting URL and enter in their user credentials created by the organization’s administrator. Video conferences live inside encrypted, invisible networks ensuring organizations complete security. 

Fognigma’s video conferencing solution includes these features:Secure Video Conferencing Solution - Fognigma

  1. Compatibility With Any Device: Using Fognigma’s video solution, users can virtually communicate face-to-face using any device running any major operating system, eliminating the risk of compatibility issues. 
  2. Chat and Screen Share: To maximize communication and collaboration in virtual meetings, Fognigma’s video conferencing solution has chat and screen share capabilities. 
  3. Global Accessibility: Whether your users are in the same office or on the other side of the world, Fognigma’s video conferences can be accessed. 
  4. Encryption: Fognigma’s video conferences live inside networks completely protected by FIPS 140-2 validated, cascading AES-256 encryption. 
  5. Entirely on Servers Owned by You: Video conferences live on servers owned entirely by your organization. No one else runs your servers, meaning no one else has access to see your private company information, whether it is shared on a file server or communicated in a video conference. 
  6. Completely Private and Invisible: With Fognigma, there is no man-in-the-middle controlling your video conferences. What is said, who said it and where the conference lives, is completely private to only those involved. Video conferences are entirely invisible to the outside world, only the parties involved know a video conference is happening.

Fognigma’s revolutionary patented software redefines meeting space by providing a secure, invisible, traceless space for enterprises to communicate and collaborate. Contact us to learn more about the communication and collaboration tools we offer. 

VDI - Fognigma

Benefits of Using a Fognigma VDI While Working Remote

Even before the COVID-19 work from home order, the business world has increasingly become a remote occupation. Whether organizations let their employees work remotely a few days out of the week, work completely remote, or have employees that travel frequently, a proper Virtual Desktop Infrastructure (VDI) solution can allow organizations to seamlessly maintain the benefits and feel a single office location offers. 

Learn more about how Fognigma VDIs can secure and unify your organization, no matter where your users are. 

Benefits of Fognigma VDIs

Anonymous Access: Fognigma VDIs allow users to browse the internet in a sandboxed computing environment that protects their actual computer from attack. 

Disposability: When VDIs are no longer in use, they can be destroyed in just a few clicks, and leave absolutely no footprint that links users’ actual computer to the work that was being done. 

Centralized File Sharing: Users can save files and profile information on one VDI and then access them later on another as if it were the exact same one. Any data or files downloaded to a VDI can be virus-scanned in the safe sandboxed environment of the VDI itself, before being transferred to the user’s local computer or a file server.  

USB Capabilities: Fognigma VDIs have local USB compatibility with most peripherals, including Custom Access Card (CAC) readers, printers, keyboards, and more. 

Customization: Fognigma VDIs can be integrated with custom programs, allowing businesses to tailor the sandboxed environments to their needs. 

Proxied Audio: Audio transmitted through the VDI is filtered to ensure no IP leaks occur. 

How can Organizations Benefit from using Fognigma VDIs While Working Remote? 

Fognigma VDIs are Easily Deployable: Organizations can have VDIs in just the click of a mouse for any of their users. 

Paired with Fognigma Secure Communication and Collaboration Tools: Fognigma’s video conferenicng, file servers, and encrypted messaging components can be used within Fognigma VDIs which allows organizations to remotely communicate and collaborate in a secured, sandboxed environment, just as if they were in the office. 

Burned After Use: When organizations VDIs are no longer needed, they are fully destroyed, and then can be spun back up in a click of a mouse. 

Fognigma VDIs live inside of Fognigma’s Virtual Private Networks. These networks are entirely controlled by your business, invisible to anyone (trying) to watch your operations, are completely disposable, and fully encrypted.

Fognigma VDIs give businesses everything they need to protect their users, communications and data.  Contact us to learn more or schedule a demo. 

sensitive and private information

How To Make Sure Your Video Conferences Are Secure

When your entire organization is forced to work remotely, video conferencing is a vital tool for effective communication and collaboration. Many web services are offering free tools to help organizations adapt to this new remote lifestyle, but the increased reliance on video conferences has revealed a major security flaw. 

With more and more organizations switching to a remote work environment, hackers have plenty of new targets and opportunities to access sensitive data – and they’re succeeding. 

This rise in video conferencing attacks has revealed an unavoidable fact: some remote work tools do not have security and privacy. 

Another obvious fact: video conferencing is an essential part of an effective remote work environment. 

So what’s the solution? How do you protect video calls, voice chat, and screen sharing from hackers trying to steal sensitive data? 

Not all video conferencing services are created equal. To ensure your users, data, and communications are secure, follow the guidelines below. 

Video Conferencing Encryption - Fognigma

USE AN ENCRYPTED SERVICE

One simple way you can boost security is to use a service that encrypts audio and video data. In most cases, video conferencing software encryption is extremely efficient and has little to no effect on real-time usability of video conferences. 

AVOID SERVICES THAT SELL DATA:

Even on a secure server, admins for the service provider may have access to your video conferencing sessions. Some providers also sell user data. Before hosting video conferences make sure you’re in the right hands. 

HOST YOUR OWN SERVERS:

The best solution to avoid intrusion is to use servers completely owned by your organization. Most collaboration software is cloud-based, simply because it makes data collection easier. With self-hosted video conferencing software, your data isn’t going to a central cloud computing service that can sell it to the highest bidder. Self-hosting allows your organization to have complete control over everything. 

Fognigma Video Conference

USE THE ALL-IN-ONE SOLUTION: 

Fognigma is a fully encrypted, secure, invisible, traceless network complete with communication and collaboration tools. Fognigma’s video conferencing solution is completely protected by FIPS 140-2 validation, uses cascading AES-256 encryption, runs on servers your organization owns and operates, and is completely private and invisible to everyone but the parties involved.

Ready to ensure your organizations security for remote work? 

Biggest Challenge of Working Remotely - Fognigma

Fognigma Solves Biggest Challenge of Working Remotely

Biggest Challenge of Working Remotely - Fognigma

One of the biggest challenges of working remotely is effective collaboration. 

In an office environment, everything is in a single, secured location. We take for granted how easy it is to efficiently communicate and interact with other people, our data, documents, and other files we need each day. 

Remote work introduces several variables that can make secure, effective collaboration a logistical nightmare. Outdated technology and software, unsecured home networks, and limited access to company information can create major security risks and make collaboration a hassle. 

With Fognigma, the biggest challenge of working remotely is solved, organizations can collaborate seamlessly and securely from anywhere – just as effectively as from the office. 

Using Fognigma’s cutting-edge, customizable VPNs, organizations can: 

Communicate face-to-face in a secure video conferencing server: Fognigma’s video conferences are completely encrypted, live on servers entirely owned by your organization, are completely private, and invisible to everyone but the parties involved. 

Safely store and share sensitive company information on a secure file server: With Fognigma, secure file sharing is made easy. Users can download, upload, and share sensitive company information. Furthermore, special links can be created if specific files needs to be shared with outsiders. 

Send messages and files protected with end-to-end encryption to anyone in your organization: Fognigma’s technology simplifies and automates the encryption, allowing users to easily send secure messages and files to anyone in their organization.

Biggest Challenge of Working Remotely Solved With Fognigma

Access company resources and the Internet from traceless, sandboxed VDIs: Using Fognigma’s VDIs, users can anonymously browse the Internet, access company resources and more while appearing to be anywhere in the world. Users Internet activity leaves no footprint of where they went, removing the risk of hackers tracking where they went or what organization they belong to. 

Obscure and misattribute phone numbers to protect calls and texts: With Fognigma, users can text and call without revealing their true numbers or what is said during the conversation. 

Fognigma makes safe, effective remote collaboration easy – for everyone, no matter where they are. With Fognigma, your organizations biggest challenge while working remotely is solved! 

Don’t let remote work hinder your organizations business operations. Solve your organizations biggest challenge with Fognigma. Contact us to learn more. 

Icons Isometric-21

Mobile Device Security: Four Attacks to Look Out For

According to Forbes, 60% of people use a mobile device for work purposes. As mobile usage continues to increase, so does the risk of organizations mobile device security. 

Earlier this year, Amazon CEO Jeff Bezos’ mobile device was hacked through a specially coded WhatsApp message. 

This incidence raises an important point: if one of the most successful technology companies is vulnerable to a data leakage attack, then so are other companies. Mobile security is a major concern for companies in 2020. Nearly all employees routinely access company information through their mobile devices. As with other forms of hacking, knowledge and prevention are often the best defenses against attacks. 

Here are a few of the most common types of mobile devices attacks that are hurting your company: 

1. WiFi Interference

Mobile devices are only as secure as the networks they use to transfer data. Network spoofing attacks continue to increase, but employees often skip securing their connection and instead rely on public networks. This leaves the door wide open for cybercriminals to steal private information. Connecting  to an effective VPN is a simple way to close these doors and save companies from data loss. 

2. Data Leakage

Data leakage, also known as data breach or data spill, is the act of releasing secure or private information to an untrusted environment. This happens when users improperly setup apps on their mobile devices and inadvertently allow apps to see and transfer their information – which is exactly what happened to Jeff Bezos earlier this year. 

Another great example is an employee tracking workouts at a company gym, revealing the headquarters location. 

Data leakage can also be caused by accidental disclosure. Due to the small size of a mobile screen, users sometimes select the wrong recipient when sending information. It’s a simple mistake, but the consequences can be severe. 

3. Social Engineering

Social engineering is one of the top causes of data breaches on mobile devices. These threats typically start with email. Mobile email applications often only display the name of the sender, which makes it extremely easy for an attacker to pose as a high-level user in an organization and fool unsuspecting employees into sharing sensitive information or granting remote access to protected resources. Employees should always be skeptical of email requests for system access or sensitive data. 

4. IoT Devices & Out of Date Software

Internet of Things - Dexter Edward

These days, the latest lightbulbs, refrigerators, thermostats, TVs, tablets, e-readers, and watches might have more in common than you’d expect. Many are part of the IoT, or Internet of Things. An IoT device generally refers to any internet-enabled piece of technology that you might not expect to have internet access, and often doesn’t require human operation. 

And when it comes to network security, that internet-enabled thermostat or refrigerator might not be so “smart” after all. Any device connected to a network is a potential threat, and many IoT devices have glaring flaws in their security, and often unsecured software and unencrypted communication.

Many of these devices are not supported with software updates – essentially becoming an open door for hackers. As the popularity of IoT devices continues to grow, it’s imperative that users understand their flaws and how they can compromise a network.

 

What  can you do to enhance the mobile device security in your organization? 

1. Implement a strong company policy on mobile security. 

This might sound like an obvious solution, but a little can go a long way. Incorporating security requirements into training, policies, and everyday activities can help ensure employees adhere to proper security practices when using mobile devices. 

VPN - Dexter Edward

 

2. Invest in effective VPNs that are easily accessible for employees who work on the go. 

VPNs provide a convenient means of accessing a secure network for accessing sensitive resources. When it comes to everyday users, sometimes accessibility and ease-of-use are the best solutions for preventing security mistakes. 

3. Enforce two-factor authentication (2FA) on necessary applications. 

Though mobile devices bring new risks, they can also provide solutions. 2FA provides an additional authentication step during the login process that requires a code that’s sent to a specified 2FA device. With this method, an attacker with access to a set of user credentials will be unable to sign in without access to the user’s device. 

In this new decade of cybersecurity threats and solutions, is your company incorporating enough mobile security practices to ensure its safety? 

Dexter Edward offers a secure, customizable, and user-friendly VPN service that includes communication and collaboration services, file sharing, and much more. 

Contact one of our industry experts today to learn more about how we can protect your organization in the new age of mobile security threats.

21 Safe and Fast Internet Connection in Business Isometric Illustration-01

Automated Cybersecurity Solutions

With the latest advancements in artificial intelligence, machine learning, and advanced software processes come new cybersecurity risks. Hackers have more tools than ever before, utilizing new technology to automate their attacks on a larger scale.

With these automated attacks becoming increasingly sophisticated and relentless, it’s imperative to take prevention measures with an equally sophisticated automated cybersecurity solution. 

With the large volume of attacks automation and machine learning bring, your defense must be scaled to match. Automated cybersecurity solutions create faster risk prevention and reduces the volume of risks that require human attention, freeing you and your users to focus on the goals and tasks at hand. 

FIGHT AUTOMATION WITH AUTOMATION

Fognigma’s patented software provides secure, sophisticated, and automated cybersecurity solutions needed to address these threats. 

Reverb: What private telephony communication was meant to be. 

Fognigma’s Reverb provides a traceless telephony solution with encrypted telephone numbers, extensions, and call chains. This ensures your calls and communications are hidden from the world behind the invisibility of Fognigma networks. 

Under the protection of Fognigma’s sophisticated obfuscation technology, your telephony communications stay between caller and recipient. Third parties can’t trace where calls originate, where they end, or what was said. 

With Reverb, your private conversations stay private. 

Encrypted Instant Messaging For All

Fognigma provides instant messaging chat servers within its invisible and secure networks, protected by cascading AES-256 encryption. This dynamic and user-friendly solution eliminates the risks of phishing scams, works on any device running any major operating system, and is globally accessible. 

The best part? It’s fully automated, meaning your organization can immediately incorporate encrypted communication and basic file sharing into its day-to-day operations through a familiar, easy-to-use interface. 

When it comes to the security of your everyday communications, encryption should be easy for everyone. 

Automated CyberSecurity Solution: Securing Video Conferencing

 

Secure Video Conferencing and Screensharing

Fognigma’s secure and encrypted video conference solution allows participants to chat and share screens. This is ideal for team-building exercises, mission briefings, and other instances where face-to-face conversation is preferred. 

This also allows your users to communicate with untrusted outside sources without risk to either party. Fognigma allows your organization to video conference between trusted and untrusted parties without risking the security of anyone on either side.

This solution features end-to-end encryption, is globally accessible, and works on any device running any major operating system. 

Share Files Without RiskAutomed Cybersecurity Solutions: Secure File Sharing

Encrypted file shares are one of the safest ways to store sensitive data such as company polices, intellectual property, company communication logs, marketing collateral, and many other important files. 

Using Fognigma, you can create an encrypted file server within your private network, allowing your users to easily drag and drop files or share items with external parties using a customized link. 

Users can also access the file share using protected virtual desktop instances for even greater security.

Automate VPN management and accomplish more 

Using Fognigma’s sophisticated, fully customizable automation feature, you can automate production and access to all of the components mentioned above. 

In minutes, you can automate a schedule that will build, manage, and destory a VPN with any of the custom components mentioned above, allowing your organization to focus entirely on productivity. 

These are just a few of the powerful features available with Fognigma. Schedule a demo today to see how Fognigma can automate security for your organization. 

malware from vpn

The Perils and Pitfalls of Free VPNs

VPNs Can Help Your Organization’s Cybersecurity

Virtual Private Networks (VPNs) create private and secure tunnels through public Internet space in which we nest our networks. They give us anonymity, protect our resources, and often allow us to get around geo-specific barriers to software and services. But you know all that. There are paid VPN services and free VPN services, but you know that, too. Often, in this world of getting the most with spending the least, our wallets (or, rather, those of our bosses) predicate examining VPNs that cost nothing. But be warned: just because you’re not paying for something doesn’t mean you won’t pay for it.

 

Everything Has a Cost

Nothing online is really free—everything comes at a cost. You might not realize what the cost is, but it’s always there. So, what are the hidden costs of a free VPN service?

Malware

In an independent study by CSIRO, 283 VPN-based Android apps were analyzed. One of the key findings was over 38% of the apps had some sort of malware presence. Though this study was done on Android apps, you can easily extrapolate that these statistics are likely very similar to apps and services on other platforms.

malware from vpn

Third-Party Tracking

In the same study, it was found that 75% of apps used third-party tracking libraries. The top two trackers were Google Ads and Google Analytics, but the paper also pointed out that some of the least common tracking libraries used in all apps were the most prevalent in VPN apps. Some of this makes sense: instead of charging you for the app, the developer is relying on ad revenue. But the pervasiveness and quantity of these trackers is still worrying.

Third-Party Access to Private Information

82% of the apps analyzed in this study requested permissions to access more private information. Some wanted access to SMS messages, while others wanted to view other apps’ activities or read system logs. This last permission is categorized by Android as “highly sensitive,” as it can “expose personal information (including passwords).” Again, some of these permissions can be explained as being normal for the services offered, but the depths at which these free VPN apps are gaining access to your resources and protected information is troublesome.

sensitive and private information

Internet Throttling

Another way free VPNs can make money is by enticing you to opt for paid versions of their free services. The easiest way to do this is through tiers of service. You want free? Okay, that’s fine—but you’ll have to put up with low speeds and a very limited amount of data that can be transferred per day. Want the service you thought you were getting? Well, just take out your credit card and upgrade to the premium package.

Sale of Private Data

This is a little different than allowing third-party apps to access your data; this is the explicit selling of the data you provided when you created an account, as well as your usage statistics, to third parties. Luckily, due to GDPR and other privacy laws, this exploitation of private data does need to be spelled out for potential customers (it just might mean you have to read lots of fine print before you sign up).

Sale of Bandwidth

This one isn’t common, but it has happened. Hola’s free services allow users to get around geo-specific barriers to watch videos and TV shows. However, they also run another paid proxy site called Luminati. What do these two sites have in common? Basically, Hola has been selling unused bandwidth from its free Hola users to its paid Luminati users. And what has this bandwidth been used for? In one example, it was used as a botnet to run multiple DoS attacks against an online forum. What else is the bandwidth of free users being used for (other than making money for the company providing the free service)? No one knows.

botnet attack from vpn

Is A Free VPN Worth It?

In short, yes and no. You must do your research and read any and all fine print before agreeing to grant access or move traffic. And remember, some free VPN apps are better (read: safer) than others. However, always keep in mind these words from Ryan O’Leary, president of the Threat Research Center at WhiteHat Security, “The lower the cost of the [VPN] app, the greater the chance they have security problems. . . . At best, they are using ads to earn income. At worst, they are selling your private information. . . . When done correctly, VPNs are a good option [for extra security]. But never forget that, in the end, you get what you pay for. “