Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity ServicesLogical Security

The importance of VPNs for hybrid workforces

By Lisa Kilpatrick
phone with VPN on the screen

Image via Unsplash

April 4, 2023

From personal entertainment to the transmission of sensitive corporate information, VPNs offer the necessary protection to keep data safe. Particularly when it comes to using a VPN for business purposes, it can greatly enhance an organization’s cybersecurity posture by disguising online data traffic to prevent external access to communications sent or received from devices. Here are some preliminary ways se can implement a VPN to keep data out of the hands of cybercriminals. 

Work-from-home ‘safe mode’

What makes businesses especially vulnerable to cyberattacks is the fact that more employees are switching to the hybrid workplace or “working-from-home” mode. Once outside the secure office infrastructure of the workplace, employees’ devices are exposed to threats that may be encountered when using unprotected public or private Wi-Fi networks.

When using an unprotected Wi-Fi, security leaders may be unknowingly sharing information with a hacker. Cybercriminals can set up a network to position themselves between users and the connection point. These types of attacks are usually referred to as “man-in-the-middle.” Instead of talking directly with the access point, information is sent to the attacker, who then passes it on.

This way, the hacker gets access to every piece of information a person sends out over the Internet: important emails, credit card information and even security credentials for a business network. Once cybercriminals get that information, they can use it to access an employee’s systems and pretend to be a part of a company. Further, they can steal the data, use financial credentials or spy on the company’s business operations. 

Danger-free hotspots

The increase in remote and hybrid work also leads to users more frequently connecting to free and public Wi-Fi. These free access points are available at restaurants, hotels, airports, bookstores, etc. But this freedom comes at a price, and few truly understand the risks associated with public Wi-Fi connections.

Moreover, hackers can create their own Wi-Fi networks that masquerade as a legitimate network. Employees could join the hacker’s network instead of the one from the coffee shop, shopping mall, etc. that they intended to join.

Cybercriminals can also use an unsecured Wi-Fi connection to distribute malware. Once file-sharing across such a network is allowed, they can easily plant infected software on a computer. Some hackers have even managed to hack the connection point itself, causing a pop-up window to appear during the connection process offering an upgrade to a piece of popular software. Clicking the window installs the malware that is masquerading as an update to a legitimate product. And in these cases, simply using a trustworthy VPN might be not enough, be sure that there’s a cybersecurity solution available that corresponds with business objectives. It will help to combat employee negligence as well, since many of them use their computer both for work and leisure activities.

Keeping work and entertainment separate

Post pandemic, small and medium businesses are twice as likely to offer remote working to their employees. Not only does this complicate data protection for small organizations that may not have a dedicated IT person, but it also increases the risk of becoming a target to cybercriminals. As for 2022, the losses from hacking incidents for SMB sector were up 64% year-over-year. Especially for those employees who tend to use their working stations for leisure and entertainment purposes. 

Corporate computers used for entertainment purposes remain one of the most significant ways to get initial access to a company’s network. Looking for alternative ways to download an episode of a show or a newly released film, users encounter various types of malware, including Trojans, spyware and backdoors, as well as adware. A recent survey has found 35 percent of users who faced threats under the guise of streaming platforms were affected by a Trojan. If such malware ends up on a corporate computer, attackers could penetrate the corporate network, search for and steal sensitive information, including both business development secrets and employees’ personal data. A VPN can secure the connection, but if the site visited contains malware, the VPN can’t protect anymore, so a VPN is needed to secure connections and a security product is needed to block malware. 

KEYWORDS: device security hybrid workforce malware threat actor VPN WiFi security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Home office

    3 ways hybrid workforces can benefit from a zero trust approach

    See More
  • Employee works from home

    Why hybrid workforces should reconsider BYOD

    See More
  • cyber_lock

    COVID-19 and the need for a national cyber director: How the response to the pandemic illustrates the importance of a leadership

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing