Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity ServicesLogical Security

The importance of VPNs for hybrid workforces

By Lisa Kilpatrick
phone with VPN on the screen

Image via Unsplash

April 4, 2023

From personal entertainment to the transmission of sensitive corporate information, VPNs offer the necessary protection to keep data safe. Particularly when it comes to using a VPN for business purposes, it can greatly enhance an organization’s cybersecurity posture by disguising online data traffic to prevent external access to communications sent or received from devices. Here are some preliminary ways se can implement a VPN to keep data out of the hands of cybercriminals. 

Work-from-home ‘safe mode’

What makes businesses especially vulnerable to cyberattacks is the fact that more employees are switching to the hybrid workplace or “working-from-home” mode. Once outside the secure office infrastructure of the workplace, employees’ devices are exposed to threats that may be encountered when using unprotected public or private Wi-Fi networks.

When using an unprotected Wi-Fi, security leaders may be unknowingly sharing information with a hacker. Cybercriminals can set up a network to position themselves between users and the connection point. These types of attacks are usually referred to as “man-in-the-middle.” Instead of talking directly with the access point, information is sent to the attacker, who then passes it on.

This way, the hacker gets access to every piece of information a person sends out over the Internet: important emails, credit card information and even security credentials for a business network. Once cybercriminals get that information, they can use it to access an employee’s systems and pretend to be a part of a company. Further, they can steal the data, use financial credentials or spy on the company’s business operations. 

Danger-free hotspots

The increase in remote and hybrid work also leads to users more frequently connecting to free and public Wi-Fi. These free access points are available at restaurants, hotels, airports, bookstores, etc. But this freedom comes at a price, and few truly understand the risks associated with public Wi-Fi connections.

Moreover, hackers can create their own Wi-Fi networks that masquerade as a legitimate network. Employees could join the hacker’s network instead of the one from the coffee shop, shopping mall, etc. that they intended to join.

Cybercriminals can also use an unsecured Wi-Fi connection to distribute malware. Once file-sharing across such a network is allowed, they can easily plant infected software on a computer. Some hackers have even managed to hack the connection point itself, causing a pop-up window to appear during the connection process offering an upgrade to a piece of popular software. Clicking the window installs the malware that is masquerading as an update to a legitimate product. And in these cases, simply using a trustworthy VPN might be not enough, be sure that there’s a cybersecurity solution available that corresponds with business objectives. It will help to combat employee negligence as well, since many of them use their computer both for work and leisure activities.

Keeping work and entertainment separate

Post pandemic, small and medium businesses are twice as likely to offer remote working to their employees. Not only does this complicate data protection for small organizations that may not have a dedicated IT person, but it also increases the risk of becoming a target to cybercriminals. As for 2022, the losses from hacking incidents for SMB sector were up 64% year-over-year. Especially for those employees who tend to use their working stations for leisure and entertainment purposes. 

Corporate computers used for entertainment purposes remain one of the most significant ways to get initial access to a company’s network. Looking for alternative ways to download an episode of a show or a newly released film, users encounter various types of malware, including Trojans, spyware and backdoors, as well as adware. A recent survey has found 35 percent of users who faced threats under the guise of streaming platforms were affected by a Trojan. If such malware ends up on a corporate computer, attackers could penetrate the corporate network, search for and steal sensitive information, including both business development secrets and employees’ personal data. A VPN can secure the connection, but if the site visited contains malware, the VPN can’t protect anymore, so a VPN is needed to secure connections and a security product is needed to block malware. 

KEYWORDS: device security hybrid workforce malware threat actor VPN WiFi security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Executive Protection

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

American flag

ICE Acting Director Todd Lyons to Resign

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • Home office

    3 ways hybrid workforces can benefit from a zero trust approach

    See More
  • Employee works from home

    Why hybrid workforces should reconsider BYOD

    See More
  • cyber_lock

    COVID-19 and the need for a national cyber director: How the response to the pandemic illustrates the importance of a leadership

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing