{"id":124484,"date":"2024-07-03T10:38:43","date_gmt":"2024-07-03T14:38:43","guid":{"rendered":"https:\/\/massive.io\/?p=124484"},"modified":"2026-04-06T10:58:10","modified_gmt":"2026-04-06T14:58:10","slug":"securing-your-storage-connection","status":"publish","type":"post","link":"https:\/\/massive.io\/fr\/securite-et-conformite\/securiser-votre-connexion-de-stockage\/","title":{"rendered":"Meilleures pratiques pour s\u00e9curiser votre connexion de stockage"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;2%|20%|2%|20%|false|true&#8221; custom_padding_tablet=&#8221;4%|0%|4%|0%|true|true&#8221; custom_padding_phone=&#8221;6%|0%|6%|0%|true|true&#8221; border_color_top=&#8221;#e1e1e1&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;7b1bf5ad-cc2a-4448-981c-4963d88bd6e8&#8243; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px||0px||false|true&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#000000&#8243; text_line_height=&#8221;1.8em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>As a video editor or other post-production professional, you probably couldn\u2019t function without your connected storage device. <strong>And that\u2019s exactly why it\u2019s so important to secure your storage connection<\/strong>.<\/p>\n<p>After all, connected storage devices such as network attached storage (NAS) are considered especially juicy targets by cybercriminals. That&#8217;s because:<\/p>\n<ul>\n<li>They often contain very valuable (ie. professional and business) data, which gives victims much more motivation to pay a ransom.<\/li>\n<li>They\u2019re often not backed up.<\/li>\n<li>They\u2019re generally easier to compromise than a <a href=\"https:\/\/www.techtarget.com\/searchstorage\/tip\/NAS-vs-server-Which-storage-option-should-you-choose\" target=\"_blank\" rel=\"noopener\">server<\/a> managed by IT.<\/li>\n<\/ul>\n<p>There are many different types of connected digital storage out there, from cloud storage (such as Amazon S3, Azure Blob Storage, and Google Cloud Storage), to <a href=\"https:\/\/massive.io\/file-transfer\/san-vs-nas-whats-the-difference\/\">storage area networks<\/a> (SANs) and on-prem network attached storage (NAS) devices.<\/p>\n<p>This article focuses on a <a href=\"https:\/\/massive.io\/how-to\/how-to-set-up-a-nas\/\">NAS storage connection<\/a> behind a consumer office\/home network router that can be accessed from outside the office\/home network. But most of these points around securing your storage connection could apply to any on-prem connected storage.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;2514b1ee-af07-4bc3-a96b-c9aaa32f4a18&#8243; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;26px&#8221; width=&#8221;100%&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|tablet&#8221; max_width=&#8221;100%&#8221; custom_margin=&#8221;|-54px|0px||false|false&#8221; custom_padding=&#8221;0px|||0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"\" data-block=\"true\" data-editor=\"520fd\" data-offset-key=\"ekesf-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"ekesf-0-0\">\n<p><strong>Table of Contents<\/strong><\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;2514b1ee-af07-4bc3-a96b-c9aaa32f4a18&#8243; text_text_color=&#8221;#000000&#8243; text_line_height=&#8221;1.8em&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li><a href=\"#The-Storage-Connection-Threat-Landscape\">The Storage Connection Threat Landscape<\/a>\n<ul>\n<li><a href=\"#The-dangers-of-leaving-ports-open\">The dangers of leaving ports open<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"#How-to-Secure-Your-Storage-Connection\">How to Secure Your Storage Connection<\/a>\n<ul>\n<li><a href=\"#Keep-your-network-secure\">Keep your network secure<\/a><\/li>\n<li><a href=\"#Disable-your-storage-device\u2019s-admin-account\">Disable your storage device\u2019s admin account<\/a><\/li>\n<li><a href=\"#Enable-IP-and-username-blocking\">Enable IP and username blocking<\/a><\/li>\n<li><a href=\"#Use-2FA-or-adaptive-MFA\">Use 2FA or adaptive MFA<\/a><\/li>\n<li><a href=\"#Enable-NAS-firewall-and-DoS-protection\">Enable your NAS firewall and DoS protection<\/a><\/li>\n<li><a href=\"#Secure-your-ports\">Secure your ports<\/a><\/li>\n<li><a href=\"#Use-a-VPN\">Use a VPN<\/a><\/li>\n<li><a href=\"#Change-the-default-port-number\">Change the default port number<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"#Collect-Data-Without-Opening-Ports-With-MASV-Centralized-Ingest\">Collect Data Without Opening Ports With MASV Centralized Ingest<\/a><\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_cta title=&#8221;More Collaboration, Less Configuration&#8221; button_url=&#8221;https:\/\/app.massive.io\/en\/signup&#8221; button_text=&#8221;Try MASV for free&#8221; module_class=&#8221;starttrial&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h5&#8243; header_font=&#8221;||||||||&#8221; header_font_size=&#8221;26px&#8221; header_line_height=&#8221;1.3em&#8221; body_line_height=&#8221;1.8em&#8221; background_color=&#8221;#202332&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#072231&#8243; background_color_gradient_end=&#8221;#031119&#8243; custom_button=&#8221;on&#8221; button_text_size=&#8221;18px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#0472ef&#8221; button_bg_color_gradient_start=&#8221;#0472ef&#8221; button_bg_color_gradient_end=&#8221;#005dc6&#8243; button_bg_color_gradient_direction=&#8221;90deg&#8221; button_border_width=&#8221;0px&#8221; button_font=&#8221;Roboto|700|||||||&#8221; button_custom_padding=&#8221;10px|42px|10px|42px|true|true&#8221; custom_margin=&#8221;||20px||false|false&#8221; link_option_url=&#8221;https:\/\/app.massive.io\/en\/signup&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; border_color_top=&#8221;#3d72e7&#8243; border_color_left=&#8221;#3d72e7&#8243; box_shadow_style=&#8221;preset2&#8243; box_shadow_horizontal=&#8221;-13px&#8221; box_shadow_style_button=&#8221;preset1&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; button_border_width__hover_enabled=&#8221;on|hover&#8221; button_custom_padding__hover_enabled=&#8221;on|hover&#8221; button_custom_padding__hover=&#8221;|2em|||false|false&#8221; button_border_width__hover=&#8221;0px&#8221; button_bg_color__hover=&#8221;#005dc6&#8243; button_bg_color__hover_enabled=&#8221;on|desktop&#8221;]<\/p>\n<p>MASV simplifies data ingest by acting as a secure, unified entry point to shared storage destinations.<br \/><!-- notionvc: e1efacb6-d516-4d39-b64e-9ea7089973f6 --><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;2%|20%|2%|20%|false|true&#8221; custom_padding_tablet=&#8221;4%|0%|4%|0%|true|true&#8221; custom_padding_phone=&#8221;6%|0%|6%|0%|true|true&#8221; border_width_top=&#8221;1px&#8221; border_color_top=&#8221;#e1e1e1&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;7b1bf5ad-cc2a-4448-981c-4963d88bd6e8&#8243; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px||0px||true|true&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text module_id=&#8221;The-Storage-Connection-Threat-Landscape&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;2514b1ee-af07-4bc3-a96b-c9aaa32f4a18&#8243; text_text_color=&#8221;#000000&#8243; text_line_height=&#8221;1.8em&#8221; header_2_text_color=&#8221;#000000&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>The Storage Connection Threat Landscape<\/h2>\n<p>Security researcher Jacob Holcomb <a href=\"https:\/\/www.cloudwards.net\/nas-security-guide\/\" target=\"_blank\" rel=\"noopener\">audited NAS devices<\/a> from 10 different manufacturers back in 2014. The result? All of them contained potentially devastating vulnerabilities.<\/p>\n<p>While connected storage security has undoubtedly improved since then, connected storage devices continue to suffer widespread attacks:<\/p>\n<ul>\n<li>Synology NAS devices faced attacks back in 2021 and\u00a0<a href=\"https:\/\/www.reddit.com\/r\/synology\/comments\/12ie59a\/ongoing_attacks_on_synology_nas_how_to_protect\/\" target=\"_blank\" rel=\"noopener\">within the past year<\/a>.<\/li>\n<li>QNAP devices were targeted in the 2021 Qlocker ransomware attack.<\/li>\n<li><a href=\"https:\/\/research.nccgroup.com\/2022\/03\/24\/remote-code-execution-on-western-digital-pr4100-nas-cve-2022-23121\/\" target=\"_blank\" rel=\"noopener\">Western Digital NAS<\/a> devices were attacked via a remote code execution vulnerability in 2021.<\/li>\n<li>More recently, it was reported in April that nearly 100,000 <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/over-92-000-exposed-d-link-nas-devices-have-a-backdoor-account\/\" target=\"_blank\" rel=\"noopener\">D-Link NAS<\/a> devices contain a backdoor vulnerability.<\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/massive.io\/wp-content\/uploads\/2025\/10\/The-Storage-Connection-Threat-Landscape.jpg&#8221; alt=&#8221;Placeholder image&#8221; title_text=&#8221;The-Storage-Connection-Threat-Landscape&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text module_id=&#8221;The-dangers-of-leaving-ports-open&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#000000&#8243; text_line_height=&#8221;1.8em&#8221; header_3_text_color=&#8221;#000000&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>The dangers of leaving ports open<\/h3>\n<p>Hackers don\u2019t necessarily need to exploit a vulnerability to get into your system or storage account if you don\u2019t take the right precautions.<\/p>\n<p><a href=\"https:\/\/www.reddit.com\/r\/editors\/comments\/1d4uiei\/ransomware_attack_on_nas\/?share_id=BOAC3nM3C3jDOWctU4zcT&amp;utm_content=1&amp;utm_medium=ios_app&amp;utm_name=ioscss&amp;utm_source=share&amp;utm_term=1\" target=\"_blank\" rel=\"noopener\">Opening or forwarding ports<\/a> on your router to allow remote access to connected storage can be a big risk, for example.<\/p>\n<p>Botnet attacks on <a href=\"https:\/\/massive.io\/file-transfer\/nas-vs-raid\/\">NAS storage devices<\/a> are very common. And if those botnets find an open port used by your NAS or other connected storage, they\u2019ll almost certainly try to brute force their way in to steal your admin credentials (and then either steal or encrypt your data for ransom).<\/p>\n<p>And if you leave a port open while using your storage device\u2019s default \u201cadmin\u201d account, it\u2019s much easier for attackers to conduct a successful brute force attack since they don\u2019t have to guess you account username (more on this later).<\/p>\n<p>Connected storage experts say there has been a noticeable uptick in these kinds of attacks on NAS devices over the past few years. That\u2019s why it\u2019s imperative to check and update your NAS security at least once a year.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;2%|20%|2%|20%|false|true&#8221; custom_padding_tablet=&#8221;4%|0%|4%|0%|true|true&#8221; custom_padding_phone=&#8221;6%|0%|6%|0%|true|true&#8221; border_width_top=&#8221;1px&#8221; border_color_top=&#8221;#e1e1e1&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;7b1bf5ad-cc2a-4448-981c-4963d88bd6e8&#8243; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px||0px||true|true&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text module_id=&#8221;How-to-Secure-Your-Storage-Connection&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;2514b1ee-af07-4bc3-a96b-c9aaa32f4a18&#8243; text_text_color=&#8221;#000000&#8243; text_line_height=&#8221;1.8em&#8221; header_2_text_color=&#8221;#000000&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>How to Secure Your Storage Connection<\/h2>\n<p>Along with standard cybersecurity stuff such as using complex passwords (passphrases are better) and keeping systems patched and up to date, what else can you do to secure your storage connection and <a href=\"https:\/\/massive.io\/content-security\/how-to-upload-files-securely\/\">keep your file uploads safe<\/a>?<\/p>\n<p>After all, securing and maintaining your own connected device involves a lot more responsibility than a Google Cloud Storage connection, for example.<\/p>\n<p>Before you do anything else, you should:<\/p>\n<ul>\n<li>Configure your storage device to use an HTTPS connection, which encrypts network traffic between it and other devices.<\/li>\n<li>Ensure you have a valid SSL\/TSL certificate installed (you can usually obtain and install a certificate via the device\u2019s admin interface).<\/li>\n<li>Implement backup storage, just in case something bad happens to your data.<\/li>\n<\/ul>\n<p>Here\u2019s a list of other measures you can take to lock down your storage connection as part of your data management best practices.<\/p>\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;Keep-your-network-secure&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#000000&#8243; text_line_height=&#8221;1.8em&#8221; header_3_text_color=&#8221;#000000&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Keep your network secure<\/h3>\n<p>Let\u2019s start with the basics: Keeping your <a href=\"https:\/\/massive.io\/content-security\/how-to-protect-against-content-piracy\/\">home or office network secure<\/a> is imperative, since that\u2019s where your connected storage probably resides. Always keep your router, firewall, and other network devices relatively new, up to date, and configured with fresh passwords.<\/p>\n<p>To secure your router, first <a href=\"https:\/\/www.security.org\/vpn\/find-router-ip-address\/#:~:text=Search%20%E2%80%9Ccmd%E2%80%9D%20to%20open%20Command,LAN%20Adapter%20Wi%2DFi.%E2%80%9D\" target=\"_blank\" rel=\"noopener\">find your router\u2019s IP address<\/a>. Type it into your browser\u2019s address bar. From there you can login to your router and add all kinds of useful security configurations, such as:<\/p>\n<ul>\n<li>Disabling <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wi-Fi_Protected_Setup\" target=\"_blank\" rel=\"noopener\">WPS<\/a>.<\/li>\n<li>Enabling HTTPS logins.<\/li>\n<li>Disabling remote access.<\/li>\n<li>Enabling WPA2 encryption.<\/li>\n<li>Updating the firmware.<\/li>\n<li>Enabling logging just in case something happens.<\/li>\n<\/ul>\n<p>You can also update your password (and change the current user name on your router from the default \u201cadmin\u201d) while you\u2019re logged in.<\/p>\n<p>Speaking of changing usernames\u2026<\/p>\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;Disable-your-storage-device\u2019s-admin-account&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#000000&#8243; text_line_height=&#8221;1.8em&#8221; header_3_text_color=&#8221;#000000&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Disable your storage device\u2019s admin account<\/h3>\n<p>Most connected storage devices default to the username \u201cadmin\u201d out of the box. You should change this immediately. That\u2019s because hackers know that admin is a common default username, and try to take advantage of that with brute force attacks.<\/p>\n<p><a href=\"https:\/\/www.reddit.com\/r\/synology\/comments\/1d4rtu0\/massive_botnet_attacking_synology_how_to_protect\/\" target=\"_blank\" rel=\"noopener\">Watch this video<\/a> for an example of what can happen when a Synology NAS user leaves ports 5000 or 5001 open: <strong>Thousands of login attempts from unknown entities within a short timeframe, all using the username \u201cadmin\u201d.<\/strong><\/p>\n<p>To disable the admin account, simply create a new account with admin privileges that isn\u2019t called admin. Then, deactivate the original admin account. This will help weather a large number of brute force attacks.<\/p>\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;Enable-IP-and-username-blocking&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#000000&#8243; text_line_height=&#8221;1.8em&#8221; header_3_text_color=&#8221;#000000&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Enable IP and username blocking<\/h3>\n<p>Many connected storage devices, such as those from Synology or QNAP, come with auto block functionality that block a specific IP if the NAS detects too many failed login attempts at once.<\/p>\n<p>Most devices also allow the customization of auto block rules. For example, you can configure it to block an IP address after 10 failed attempts within five minutes.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#000000&#8243; background_color=&#8221;#f2f4f9&#8243; custom_padding=&#8221;3%|3%|3%|3%|true|true&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>\ud83d\udca1 <strong>Note<\/strong>: To ensure you don\u2019t accidentally lock yourself out of your own NAS, you can configure auto blocking to unblock an IP address after a specific amount of time.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#000000&#8243; text_line_height=&#8221;1.8em&#8221; header_3_text_color=&#8221;#000000&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Synology and QNAP NAS devices also offer account protection functionality to monitor (and eventually block) repeated login attempts from the same username. Or companies can use <a href=\"https:\/\/www.digitalocean.com\/community\/tutorials\/how-fail2ban-works-to-protect-services-on-a-linux-server\" target=\"_blank\" rel=\"noopener\">Fail2Ban<\/a>, an intrusion prevention daemon that guards against brute force attacks by banning IPs that generate multiple failed attempts.<\/p>\n<p>Blocking a username can be more effective in mitigating botnet attacks than IP blocking. That\u2019s because botnets are able to cycle through thousands of IP addresses from infected machines.<\/p>\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;Use-2FA-or-adaptive-MFA&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#000000&#8243; text_line_height=&#8221;1.8em&#8221; header_3_text_color=&#8221;#000000&#8243; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h3>Use 2FA or adaptive MFA<\/h3>\n<p>It should go without saying that if you have the option to enable two-factor (2FA) or multi-factor authentication (MFA) on your device, you should (this goes for pretty much everything). Most NAS devices with 2FA or MFA require a secure USB key or authenticator app to generate a unique code upon login.<\/p>\n<p>That means that even if a hacker somehow gains access to your username and password, they\u2019ll also need to break into your email or phone to access your connected storage. Most hackers won\u2019t bother to do this (unless they have specifically targeted you).<\/p>\n<p>Indeed, enabling 2FA can be particularly effective because many hackers focus on soft targets that don\u2019t require much work to penetrate.<\/p>\n<p>On top of enabling 2FA, some devices allow for adaptive multi-factor authentication\u2014which means anyone trying to log in from an unusual IP address will be automatically asked to provide additional credentials. If you have this option, you should enable it, too.<\/p>\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;Enable-NAS-firewall-and-DoS-protection&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#000000&#8243; text_line_height=&#8221;1.8em&#8221; header_3_text_color=&#8221;#000000&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Enable NAS firewall and DoS protection<\/h3>\n<p>NAS and other connected storage devices often come with built-in firewalls, which you absolutely should take advantage of. But some NAS devices don\u2019t proactively turn on their firewalls. Users have to do it manually.<\/p>\n<p>That said, it\u2019s always a good idea to set up and turn on your NAS firewall.<\/p>\n<p>If you\u2019re a video editor or post-production professional who only does business with collaborators in certain countries, you can also enable firewall <a href=\"https:\/\/www.reddit.com\/r\/synology\/comments\/cjlqdh\/geoblocking_works_well_give_it_a_try\/\" target=\"_blank\" rel=\"noopener\">geo-blocking<\/a> to block anyone from any region you don\u2019t work with. Geo-blocking is typically done by country.<\/p>\n<p>Because many cyberattacks in the U.S. originate offshore, implementing geo-blocking can reduce the volume of attacks against your storage connection by orders of magnitude.<\/p>\n<p>Just like setting up your device\u2019s firewall, you should also manually engage denial-of-service (DoS) attack protection on your device.<\/p>\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;Secure-your-ports&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#000000&#8243; text_line_height=&#8221;1.8em&#8221; header_3_text_color=&#8221;#000000&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Secure your ports<\/h3>\n<p>Port scanning to detect open ports is the cybersecurity equivalent of jiggling a car door handle to see if the door is open: It\u2019s easy to do, it goes on all the time, and can lead to disaster. <a href=\"https:\/\/www.reddit.com\/r\/selfhosted\/comments\/17tvway\/what_are_the_actual_security_implications_of_port\/\" target=\"_blank\" rel=\"noopener\">One Reddit commenter<\/a> who monitors port scans on their firewall reported as many as 10 per second.<\/p>\n<p>That\u2019s why it\u2019s important to:<\/p>\n<ul>\n<li>Leave your ports closed unless absolutely necessary. A basic security practice for secure connections is to close all ports you don\u2019t need for outside communication.<\/li>\n<li>Take care around which port number you leave open. We already mentioned ports 5000 and 5001; port 22, as well, is popular among attackers because it is associated with the Secure Shell protocol (SSH) and is a default port for remote device connections. That means that like many of the port numbers we\u2019ve already mentioned, it\u2019s subject to more unauthorized login attempts than less popular port numbers.<\/li>\n<\/ul>\n<p>Either way, keeping ports open or allowing port forwarding (which allows remote servers to access devices on your private local area network (LAN), which can then lead to attackers taking control of your devices) is inherently dangerous.<\/p>\n<p>But there are ways you can connect your storage to the web without doing this. When it comes to Synology NAS devices, some security experts recommend using <a href=\"https:\/\/quickconnect.to\/\" target=\"_blank\" rel=\"noopener\">QuickConnect<\/a> instead of the device\u2019s DDNS connection method, since QuickConnect doesn\u2019t require port forwarding.<\/p>\n<p>The downside of QuickConnect, though, is that it\u2019s considered extremely slow when exporting a large file or folder to collaborators or clients over the internet.<\/p>\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;Use-a-VPN&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#000000&#8243; text_line_height=&#8221;1.8em&#8221; header_3_text_color=&#8221;#000000&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Use a VPN<\/h3>\n<p>One of the most effective ways to secure your storage connections is to use a virtual private network (VPN) to add a layer of encryption to all of your network traffic, making it much more difficult for attackers to get their hooks into your system.<\/p>\n<p>Most NAS devices even allow users to <a href=\"https:\/\/security.stackexchange.com\/questions\/189726\/does-it-improve-security-to-use-obscure-port-numbers\" target=\"_blank\" rel=\"noopener\">set up their own VPN server<\/a>.<\/p>\n<p>The main downside to using a VPN, however, is that they can be cumbersome to use when working with clients or partners. You probably don\u2019t want to give a client access to your VPN so they can download a large file or folder from your NAS, for example.<\/p>\n<p>VPNs also aren\u2019t a panacea when it comes to security. They can\u2019t enforce authentication policies or user permissions, and allow remote users to connect from corrupted devices (leaving your network exposed).<\/p>\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;Change-the-default-port-number&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#000000&#8243; text_line_height=&#8221;1.8em&#8221; header_3_text_color=&#8221;#000000&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Change the default port number<\/h3>\n<p>\u201cSecurity by obscurity\u201d has a bad reputation in cybersecurity circles because it isn\u2019t all that effective and can lead to a false sense of security. It is certainly not a strong standalone security technique, but it can have some value when used alongside other more substantial and effective security safeguards.<\/p>\n<p>That\u2019s why some advise <a href=\"https:\/\/security.stackexchange.com\/questions\/189726\/does-it-improve-security-to-use-obscure-port-numbers\" target=\"_blank\" rel=\"noopener\">changing the default port number<\/a> used by your connected storage:<\/p>\n<ul>\n<li>A Synology NAS, for example, defaults to ports 5000 (for HTTP connections) and 5001 (HTTPS connections). Because of that, hackers looking to breach a NAS often sniff around these ports looking for easy targets.<\/li>\n<li>If you\u2019re so inclined, you can also change the default port numbers on your router for HTTP (80), HTTPS (443), and SSH (22) connections. You can change your ports to any number between one and 65,535.<\/li>\n<\/ul>\n<p>The main downside to to changing port numbers is that users must be aware of any updates or they won\u2019t be able to access the NAS.<\/p>\n<p><strong>And while attackers can scan and find any port number in use pretty easily, it\u2019s likely they\u2019ll only do that if they\u2019ve targeted you specifically<\/strong> and aren\u2019t just trying the most popular port numbers on a fishing expedition.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.14.7&#8243; background_color=&#8221;#f5f5f5&#8243; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;2%|20%|2%|20%|true|true&#8221; custom_padding_tablet=&#8221;4%|0%|4%|0%|true|true&#8221; custom_padding_phone=&#8221;6%|0%|6%|0%|true|true&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;7b1bf5ad-cc2a-4448-981c-4963d88bd6e8&#8243; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|true&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;Text&#8221; module_id=&#8221;Collect-Data-Without-Opening-Ports-With-MASV-Centralized-Ingest&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;2514b1ee-af07-4bc3-a96b-c9aaa32f4a18&#8243; text_text_color=&#8221;#000000&#8243; text_line_height=&#8221;1.8em&#8221; header_2_text_color=&#8221;#000000&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Collect Data Without Opening Ports With MASV Centralized Ingest<\/h2>\n<p>Securing your storage connection isn\u2019t difficult, but does take a bit of effort and diligence. To secure your connected NAS or other storage devices you should consider:<\/p>\n<ul>\n<li>Keeping your network secure.<\/li>\n<li>Disabling your storage device\u2019s admin account.<\/li>\n<li>Enabling IP and username blocking.<\/li>\n<li>Using 2FA or adaptive MFA.<\/li>\n<li>Changing the default port number.<\/li>\n<li>Enabling your NAS firewall and DoS protection.<\/li>\n<li>Securing your ports.<\/li>\n<li>Using a VPN.<\/li>\n<\/ul>\n<p>Most of the measures above are low-friction and easy to implement, but unfortunately can still leave you at risk to a determined attacker.<\/p>\n<p>Other techniques, such as using Synology QuickConnect or a VPN, can cause headaches around performance and other variables when <a href=\"https:\/\/massive.io\/content-security\/how-to-send-files-securely\/\">sending or receiving large files<\/a> or datasets.<\/p>\n<p><a href=\"https:\/\/massive.io\/product\/storage-ingest\/\">MASV Centralized Ingest<\/a>, on the other hand, allows users to centralize their data ingestion process through a single entry point to any connected storage, either on-premises or in the cloud. It\u2019s a secure, unified entry point to shared storage destinations, helping to lessen the IT and security burden around configuring and managing multiple storage platforms and remote users.<\/p>\n<p>Connecting your on-premises connected storage to <a href=\"https:\/\/massive.io\/\">MASV<\/a> doesn\u2019t require any port forwarding\u2014or the opening of any ports at all. Users can collect files from collaborators using a MASV Portal secure web uploader without granting direct storage or network access. MASV is a Trusted Partner Network (TPN)-verified file transfer service with <a href=\"https:\/\/massive.io\/product\/secure-file-transfer\/\">strong encryption and access management controls<\/a>, and that\u2019s compliant with ISO 27001, SOC 2, and other data protection regulations.<\/p>\n<p>With Centralized Ingest you or your IT team can easily define the ingest path and restrict upload access to a single bucket or folder, rather than the entire storage system.<\/p>\n<p><a href=\"https:\/\/app.massive.io\/en\/signup\">Sign up for MASV<\/a> and give Centralized Ingest a try today and g<span data-sheets-root=\"1\">et free transfer credits when you sign up.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_cta title=&#8221;Connect to NAS Without Opening Ports&#8221; button_url=&#8221;https:\/\/app.massive.io\/en\/signup&#8221; button_text=&#8221;Try MASV for free&#8221; module_class=&#8221;starttrial&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h5&#8243; header_font=&#8221;||||||||&#8221; header_font_size=&#8221;26px&#8221; header_line_height=&#8221;1.3em&#8221; body_line_height=&#8221;1.8em&#8221; background_color=&#8221;#202332&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#072231&#8243; background_color_gradient_end=&#8221;#031119&#8243; custom_button=&#8221;on&#8221; button_text_size=&#8221;18px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#0472ef&#8221; button_bg_color_gradient_start=&#8221;#0472ef&#8221; button_bg_color_gradient_end=&#8221;#005dc6&#8243; button_bg_color_gradient_direction=&#8221;90deg&#8221; button_border_width=&#8221;0px&#8221; button_font=&#8221;Roboto|700|||||||&#8221; button_custom_padding=&#8221;10px|42px|10px|42px|true|true&#8221; custom_margin=&#8221;||20px||false|false&#8221; link_option_url=&#8221;https:\/\/app.massive.io\/en\/signup&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; border_color_top=&#8221;#3d72e7&#8243; border_color_left=&#8221;#3d72e7&#8243; box_shadow_style=&#8221;preset2&#8243; box_shadow_horizontal=&#8221;-13px&#8221; box_shadow_style_button=&#8221;preset1&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; button_border_width__hover_enabled=&#8221;on|hover&#8221; button_custom_padding__hover_enabled=&#8221;on|hover&#8221; button_custom_padding__hover=&#8221;|2em|||false|false&#8221; button_border_width__hover=&#8221;0px&#8221; button_bg_color__hover=&#8221;#005dc6&#8243; button_bg_color__hover_enabled=&#8221;on|desktop&#8221;]<\/p>\n<p>Use MASV Centralized Ingest to store data in cloud or connected on-prem storage without opening ports or port forwarding.<br \/><!-- notionvc: e1efacb6-d516-4d39-b64e-9ea7089973f6 --><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les p\u00e9riph\u00e9riques de stockage connect\u00e9s tels que les NAS sont consid\u00e9r\u00e9s comme des cibles particuli\u00e8rement juteuses par les cybercriminels. Voici comment s\u00e9curiser votre connexion de stockage.<\/p>","protected":false},"author":11,"featured_media":16671,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[258],"tags":[],"class_list":["post-124484","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-content-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/massive.io\/fr\/wp-json\/wp\/v2\/posts\/124484","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/massive.io\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/massive.io\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/massive.io\/fr\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/massive.io\/fr\/wp-json\/wp\/v2\/comments?post=124484"}],"version-history":[{"count":0,"href":"https:\/\/massive.io\/fr\/wp-json\/wp\/v2\/posts\/124484\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/massive.io\/fr\/wp-json\/wp\/v2\/media\/16671"}],"wp:attachment":[{"href":"https:\/\/massive.io\/fr\/wp-json\/wp\/v2\/media?parent=124484"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/massive.io\/fr\/wp-json\/wp\/v2\/categories?post=124484"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/massive.io\/fr\/wp-json\/wp\/v2\/tags?post=124484"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}