IT companies react to a surge in business VPN-based attacks

Polygonal vector illustration of the virtual private network's shield reading VPN and world map on the background
(Image credit: Shutterstock)

With remote and hybrid work becoming a common practice, companies are relying more and more on the best VPN services to protect their network. 

At the same time, attacks targeting business VPNs appear to be worryingly on the rise. 

"Cybercriminals continue to take advantage of long-standing security vulnerabilities and increased attacks on VPNs," read a new report carried on by cloud security company Zscalert. 

This is why 65% of the companies surveyed are now considering adopting VPN alternatives based on a Zero Trust model. 

44% of the respondents see a surge in VPN attacks

"As evident in several high profile breaches and ransomware attacks, VPNs continue to be one of the weakest links in cybersecurity. Their architecture deficiencies provide an entry point to threat actors and offer them an opportunity to move laterally and steal data,” said Deepen Desai, Global CISO of Zscaler. 

For the 2022 VPN Risks report, the security company surveyed 350 IT professionals across North America businesses.

Nearly half of the respondents (44%) said to have witnessed a surge in exploits against their VPNs since the shift to remote and hybrid work.

Among the most concerning types of cyberattacks there are ransomware (78%), social engineering (70%), malware (66%), web applications (49%) and DDos attacks (45%).

Under this light, the great majority of companies are now concerned that the use of VPN services could compromise the security of their IT network. 

This is why around three out of five companies surveyed said that they are considering switching to VPN alternatives, with 80% of those actively working towards a Zero Trust security model. 

What is Zero Trust? 

The Zero Trust model is a security strategy based on the fact that implicit trust cannot be granted to any user, device or web app. Unlike a VPN-based security infrastructure, all the exchanges of data are here treated as potentially hostile.

It is based on three core principles. The first is to always verify, authenticate and authorize every connection attempt at all times.

Then, for minimizing the risks, any users or applications should have only the minimum access required to perform their job effectively.

Finally, a Zero Trust architecture is built in a way able to shrink the impact zone as much as possible in case of attacks and/or breach. 

“To safeguard against the evolving threat landscape, organizations must use a Zero Trust architecture that, unlike VPN, does not bring the users on the same network as business-critical information, prevents lateral movement with user-app segmentation, minimizes the attack surface, and delivers full TLS inspection to prevent compromise and data loss,” said Desai.

Chiara Castro
News Editor (Tech Software)

Chiara is a multimedia journalist committed to covering stories to help promote the rights and denounce the abuses of the digital side of life – wherever cybersecurity, markets, and politics tangle up. She writes news, interviews, and analysis on data privacy, online censorship, digital rights, cybercrime, and security software, with a special focus on VPNs, for TechRadar and TechRadar Pro. Got a story, tip-off, or something tech-interesting to say? Reach out to chiara.castro@futurenet.com

Read more
Best email services: image of email with one unread message alert
Over 400 million unwanted and malicious emails were received by businesses in 2024
VPN
7 VPN predictions to look out for in 2025
Outlook Calendar on a Tablet
What we learned from VPNs in 2024
ransomware avast
“Every organization is vulnerable” - ransomware dominates security threats in 2024, so how can your business stay safe?
A wall of data on a large screen.
“It's the same doors that the good guys use, that the bad guys can walk through” - former White House tech advisor on data-centric security in the wake of Salt Typhoon
A VPN runs on a mobile phone placed on a laptop keyboard
The 3 biggest VPN innovations of 2024 – what does the future hold?
Latest in VPN Privacy & Security
Shape of Russia filled with Russian flag-colored internet codes on a black hacking background
A new wave of blocks in Russia targets VPN apps and Cloudflare subnets
Digital hand set location on map with two pins. AI technology in GPs, innovation delivery, map location, future transport logistic, route path concept. GPs point. New office location, change address
What does your IP address reveal about you?
A stethoscope next to a laptop on a pink background
How to check if your VPN is working
Teenager playing on a gaming PC with two monitors
Is using a VPN while gaming cheating? 5 myths you shouldn't believe about gaming with a VPN
Neon blue email symbols on a black background
Why am I suddenly getting so many spam emails?
A computer file surrounded by red laser beams
Cover your tracks: the risk of sending unencrypted files
Latest in News
Google Pixel Watch 3
Google Pixel Watches hit with delayed notifications, crashing, and performance issues following Wear OS 5.1 update
Zendesk Relate 2025
Zendesk Relate 2025 - everything you need to know as the event unfolds
Disney Plus logo with popcorn
You can finally tell Disney+ to stop bugging you about that terrible Marvel show you regret starting
Google Gemini AI
Gemini can now see your screen and judge your tabs
Girl wearing Meta Quest 3 headset interacting with a jungle playset
Latest Meta Quest 3 software beta teases a major design overhaul and VR screen sharing – and I need these updates now
Philips Hue
Philips Hue might be working on a video doorbell, and according to a new report, we just got our first look at it