Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceCybersecurity News

Protecting VPNs from DDoS Attacks in the Age of Remote Work

By Tom Bienkowski
Strong Cybersecurity: The Critical Role of Lifecycle Management - Security Magazine
April 30, 2020

As a result of the COVID-19 pandemic, more people than ever are working remotely. Because of this recent and rapid transition, users are accessing corporate resources from their homes and generating unprecedented amounts of network traffic.

IT departments face increased pressure to ensure business continuity by providing remote users with access to essential corporate applications and services through Virtual Private Networks (VPNs), which are designed to provide access to private networks through shared or public networks.

Due to the massive increase in home-based users, VPN gateways are running at or near capacity.  Now more than ever, a relatively minor DDoS attack could bring down a VPN gateway, causing the business to shut down for remote home-based users.

That means corporate IT departments need to leverage all the tools at their disposal to keep loads manageable, so VPN gateways aren’t overwhelmed and unable to provide the access necessary for remote workers.

 

Consistent Availability is Crucial

Historically VPNs weren’t in constant use, but they’ve become the backbone of business during the COVID-19 pandemic. That means companies are far exceeding standard capacities and straining access to critical applications and resources. Hackers are also shifting their focus to exploit new vulnerabilities.

These cybercriminals know corporations are more exposed while employees are working remotely and weathering a pandemic. That’s all the motivation they need to launch targeted attacks, which can crash servers and burden systems of any size.

Because of this, businesses need to remain vigilant by putting DDoS detection and protection front and center in their security protocols. IT departments need to track the threat landscape to safeguard network infrastructure, installing the latest software patches and ensuring there are appropriate measures in place to mitigate risks. By doing so, they will strengthen defenses and allow users to have VPN access while they’re working remotely.

Enterprises should also calibrate VPNs so they can support the needs of the entire workforce. The networks need to be available consistently and have as many protections as possible because they’re more vulnerable to attack outside of the corporate network.  

IT teams also need to educate users on best practices to ensure they don’t over-burden VPNs. By smartly monitoring systems and managing hardware, companies will ensure they have the visibility they need to maintain access for remote workers.

 

Getting a ‘Big Picture’ View

It’s difficult for IT professionals to determine what’s happening to the VPN if a cyberattack occurs during high traffic volume, as even a low-volume DDoS attack can overload the system. They need real-time visibility into network firewalls and VPN concentrators, as well as the ability to tune DDoS policy parameters. It’s also essential to understand normal VPN traffic levels so that thresholds can be accurately set. IT departments need access to end-to-end visibility and real-time performance monitoring to ensure that only relevant network traffic is allowed to reach VPN concentrators, so they can mitigate issues before they become a problem.

IT administrators need to ensure that remote access session termination capacity, bandwidth and throughput are horizontally scalable so that they can be supplemented as demand warrants. They should also implement reasonable per-session bandwidth and throughput quotas on remote access sessions and enforce acceptable use policies for remote personnel.

The COVID-19 outbreak and resulting influx of remote workers have made VPNs critical in maintaining business continuity. But, maintaining access only works if enterprises have the right visibility and monitoring to ensure their VPN gateways aren’t overloaded or become susceptible to DDoS attacks.

KEYWORDS: COVID-19 cyber security information security network security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Tombheadshot

Tom Bienkowski has been in the network and security field for over 20 years. During this time, he worked for large enterprises as a Network Engineer and for multiple network management and security vendors where he has had roles in Sales Engineering/Management, Technical Field Marketing and Product Management. He currently serves as Director of Product Marketing focusing on NETSCOUT's industry-leading DDoS protection solutions.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cybersecurity-blog

    Protecting endpoints in the age of hybrid work environments

    See More
  • insider threats

    Combating insider threats in the age of remote work

    See More
  • The Corner Office - july 2018

    VDI improvements ensure business continuity in the age of remote work

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing