Encryption
Four steps organisations can take to protect against encrypted tunnel attacks
Nefarious actors can use encrypted tunnels to pivot across corporate networks, eavesdrop, route traffic to phishing websites & access sensitive data.
By Terrie Anderson
•
4 min read
•
Mon, 5th Feb 2018