Internet Protocol Security (IPSec)

6th March 2020 | Cybrary Internet Protocol Security (IPSec)

Internet Protocol Security (IPSec) is a set of protocols that provides security for Internet Protocol using advanced cryptography. IPSec is similar to a Secure Socket Layer (SSL), except that SSLs connections are typically used by web browsers, while IPSec tunnels (usually) require a client application installation. Furthermore, IPSec tunnels can access both web and non-web applications, whereas SSL requires workarounds for non-web access such as file sharing. IPSec was designed to serve the IP Protocol, so it is mainly used to support Virtual Private Networks (VPN) over the Internet. 

Source: Techopedia, PCMag

Additional Reading: VPN protocols: What Are They And Which Should I Use?

Related Terms: Secure Socket Layer (SSL), Point to Point Tunneling Protocol (PPTP), Virtual Private Network (VPN)

What does this mean for a SMB?

IPSec is something that should be considered if you have employees working from home or remotely that also need access to resources onsite at your business offices. Sometimes those resources are internally hosted applications and other times its file servers with internally accessed data. If your employees consistently work from home, then a VPN is one option for a strong and secure solution to enable remote worker productively. However, if all they do from home is work on Email, then a VPN may not be necessary since email can be easily secured in other ways via O365 and two-factor authentication on company issued devices. Virtual Private Networks also double as a secure conduit for traveling workers to reach the internet when joining WiFi networks that might not be entirely trustworthy. Once an IPSec tunnel is setup, no interloping hacker can read the data between the device (laptop) and the remote business device terminating the IPSec encrypted tunnel. 

In all cases, never rely solely on a password authenticated VPN. The minimum security practice is to enable two-factor authentication on your VPN. There are too many passwords breached online that could be used by hackers to breach your VPN network. Always pair VPN access with a second factor.

To learn more about IPSec, watch this short 2 minute video:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Claude Mythos Opened Pandora’s Box. Project Glasswing Is Racing to Close It.

Claude Mythos Opened Pandora’s Box. Project Glasswing Is Racing to Close It.

A Practical Brief for vCISOs THE WARNING WE IGNORED OR COULD NOT UNDERSTAND For years, the most credible...

Read more
When the “CEO” Calls and Asks You to Move Money Fast

When the “CEO” Calls and Asks You to Move Money Fast

A guide to spotting senior executive impersonation scams before the fake CEO gets a real wire transfer. It...

Read more
When the Attack Looks Just Like You

When the Attack Looks Just Like You

Artificial Intelligence (or AI) is making phishing emails smarter, malware sneakier, and credential theft easier...

Read more