88% of Firms Are Worried About VPN Vulnerabilities

VPNs can often be useful because of the fact that this is the sort of thing that could potentially end up allowing you to protect your privacy online. They can also serve to aid users in accessing content that might otherwise be blocked by the governments that they are beholden to. In spite of the fact that this is the case, the relative lack of safety of certain VPNs is making them more concerning for organizations than might have been the case otherwise.

According to a recent study conducted by Zscaler, 88% of organizations said that they have concerns about the vulnerabilities that could be created by VPNs. With all of that having been said and now out of the way, it is important to note that phishing turned out the be the biggest concern of all, with 49% of organizations citing it as a prime issue for the future.

40% also mentioned ransomware as a particular worry that might come about due to compromise VPNs. This is unsurprising given that 33% of organizations have already suffered from ransomware attacks directed towards their VPNs with all things having been considered and taken into account.

Perhaps the most significant danger associated with the use of VPNs is the type of detrimental impact that it can have on the entire supply chain. When working with third party contractors, it can be challenging to unify or streamline security protocols. Hence, the use of a vulnerable VPN at any point in the supply chain could compromise every single entity that is a part of it, and organizations will be at great risk if this were to occur.

Experts are recommending that businesses adopt zero trust architecture in order to use VPNs as safely as possible. While there are some concerns about choosing the right partners to establish your zero trust framework, it is nonetheless a critical component of what maintaining an appreciable level of security. Some are even suggesting that brands and companies should avoid using VPNs altogether so that there are absolutely no cracks in the system that malicious actors would be able to exploit.



Read next: The Alarming State of Email Security Worldwide
Previous Post Next Post