The Increasingly Insecure State of VPNs
Key Points
- Businesses have long used VPNs to provide secure access to company servers from remote locations, but new research has found that there has been an increase in exploits targeting their VPNs.
- These attacks take advantage of vulnerabilities in how VPNs are configured and deployed, with attackers increasingly targeting flaws in multi-factor authentication (MFA) systems.
- While MFA can be very effective at stopping attackers who only have a password, it is not foolproof.
- This rise in attacks makes it clear that alternative, more secure ways to construct secure network infrastructure are needed.
- Zero-Trust Network Access is an emerging approach that overcomes the weaknesses of VPNs by eliminating the reliance on a single perimeter.
Business VPNs have long been a popular way to provide secure access to company servers from remote locations. However, new research has found that IT professionals are seeing an increase in exploits targeting their VPNs. These attacks take advantage of vulnerabilities in how VPNs are configured and deployed.
The report found that attackers increasingly target flaws in multi-factor authentication (MFA) systems. MFA is a security measure that requires users to provide not just a password but also a second factor, such as a one-time code generated by a mobile app or hardware token.
While MFA can be very effective at stopping attackers who only have a password, it is not foolproof. For instance, if an attacker can gain access to a user’s device—for example, by infecting it with malware—they may bypass MFA entirely. This rise in attacks makes it clear that alternative, more secure ways to construct secure network infrastructure are needed.

What Is a VPN and Why Do Businesses Use Them?
A VPN, or Virtual Private Network, is a private network that uses public infrastructure (usually the Internet) to connect remote sites or users together. This enables businesses to communicate securely between remote locations without needing expensive leased lines. There are many reasons why businesses use VPNs.
First, VPNs allow businesses to securely connect to remote locations. This is important for businesses with employees who work remotely or who have offices in different locations. Businesses can use VPNs to ensure their data is securely transmitted between locations.
Second, VPNs can be used to protect businesses against data theft. When businesses transmit data over the internet, they are susceptible to data theft by hackers. Businesses can encrypt their data using a VPN, making it much more difficult for hackers to steal. VPNs use encryption to protect traffic as it travels across the public network. This ensures that confidential data is not intercepted by third parties.
Third, VPNs can be used to bypass internet censorship. In some countries, the government censors certain websites or imposes other restrictions on internet access. Businesses can bypass these restrictions by using a VPN and accessing the internet.
Fourth, VPNs can improve performance. When businesses connect to the internet through a VPN, they can avoid congested networks and get better performance. Lastly, VPNs can provide businesses with additional security features. For example, some VPNs offer antivirus protection or the ability to block certain types of traffic.
Why Are Traditional VPNs a Security Risk in 2025?
For decades, the Virtual Private Network (VPN) has been the standard for remote access, acting like a digital drawbridge to your company’s “castle.” Once a user was authenticated, they were “inside the walls,” with broad access to the entire network.
In 2025, this model is dangerously outdated. Cybercriminals no longer just attack the castle walls; they exploit the excessive trust granted to users inside. If a single user’s VPN credentials are stolen—a common occurrence through phishing—an attacker gains a foothold to move laterally across your network, accessing sensitive servers, financial data, and customer information undetected. The VPN’s “trust once, then allow everywhere” approach creates an enormous attack surface that modern threats are specifically designed to exploit.
How Are VPNs Being Attacked, and What Can Be Done to Protect Them?
As encryption technologies have become more sophisticated, so have the techniques used by attackers to circumvent them. In the past year, there has been a marked increase in attacks targeting VPNs. These attacks exploit vulnerabilities in VPN implementations or the underlying encryption protocols.
One common method of attack is known as a “man-in-the-middle” attack. This is where the attacker intercepts traffic between the VPN server and the client, decrypting it and then re-encrypting it with their own key. This allows the attacker to read and potentially modify the data without the client or server knowing anything has happened.
Another type of attack is known as a “denial-of-service” (DoS) attack. This is where the attacker floods the VPN server with traffic, preventing legitimate users from being able to connect. This type of attack can be especially effective if the attacker targets the server’s internet connection, as this can quickly overwhelm it.
There are several steps that businesses can take to protect their VPNs from these and other attacks:
- Ensure that their VPN servers are properly configured and that all software is up to date. This will help to close any vulnerabilities that could be exploited by attackers.
- Use strong encryption protocols, such as SSL or IPSec. These protocols are much more difficult to break than the older, weaker ones that some VPNs still use.
- Use proper authentication methods, such as two-factor authentication. This will help to ensure that only authorized users can connect to the VPN server.
- Use a firewall to protect their VPN server. This will help to block any unwanted traffic from reaching the server.
Businesses can help protect their VPNs from attack by taking these steps and ensuring they remain secure.
What Recent Vulnerabilities Affect Business VPNs?
It’s not just a theoretical risk. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) continuously updates its Known Exploited Vulnerabilities (KEV) Catalog, which frequently features flaws in major business VPN products.
Attackers actively scan the internet for unpatched or misconfigured VPNs from leading vendors. According to a recent Coalition Cyber Threat Index, compromised perimeter security devices, primarily VPNs and firewalls, were the number one entry point for ransomware attacks, accounting for a staggering 58% of all incidents. This data proves that relying on a VPN is no longer a matter of if it will be targeted, but when.
The Consequences of a Business VPN Attack
A business VPN attack can have far-reaching consequences, dooming a company’s operations and putting its customers’ data at risk. The fallout from a successful attack can include:
Disruption to Business Operations
Businesses rely on VPNs to keep their operations running smoothly, but a successful VPN attack can disrupt that flow. An attacker could take control of the VPN server and block legitimate traffic, or he could use the VPN to launch attacks on other parts of the company’s network. Either way, the result would be decreased productivity and, in some cases, a complete shutdown of operations.
Loss of Customer Data
Businesses store an incredible amount of customer data in today’s digital age. This data is a goldmine for attackers, who can use it to commit identity theft, fraud, and other crimes. A business VPN attack could result in the loss of this data, causing irreparable damage to the company’s reputation and bottom line.
Regulatory Penalties
In many industries, businesses are required to adhere to strict regulations regarding the handling of customer data. If a business VPN attack results in the loss of this data, the company could be subject to hefty fines and other penalties.
Competitive Disadvantage
In the wake of a business VPN attack, a company would likely be at a competitive disadvantage. Customers would be hesitant to do business with a company that had been attacked, and competitors would be quick to capitalize on the situation.
Damage to Brand and Reputation
Perhaps the most lasting consequence of a business VPN attack would be damaging the company’s brand and reputation. Once word got out that the company had been attacked, its reputation would be tarnished, and it would be difficult to regain the trust of customers and partners.
Preventing a business VPN attack requires a layered approach that includes technical and organizational measures. Technical measures, such as proper VPN configuration and strong encryption, can help make it more difficult for attackers to penetrate a company’s network. Organizational measures, such as developing a comprehensive security policy and implementing strict access controls, can help to ensure that only authorized users have access to the VPN.
Is a VPN Enough to Stop Ransomware Attacks?
No. In fact, a VPN can be an accelerant for a ransomware attack.
Here’s the typical playbook: an attacker acquires VPN credentials through a phishing email or buys them on the dark web. They log in as a legitimate employee, bypassing your perimeter defenses. Once inside, the VPN gives them broad network access, allowing them to quietly map your internal systems, locate critical data, and disable backups.
When they are ready, they deploy the ransomware across the entire network they now have access to. Because the VPN authenticated them as a trusted user, traditional security tools often fail to flag their malicious activity until it’s too late. The very tool meant to provide security becomes the attacker’s pathway to paralyzing your entire operation.
What is Zero Trust Network Access (ZTNA)?
Zero Trust Network Access (ZTNA) is a modern security framework built on a simple but powerful principle: “Never trust, always verify.”
Instead of a castle-and-moat, imagine your network is a secure building where every single door requires a keycard swipe. ZTNA treats every access request as a potential threat, regardless of whether the user is in the office or working remotely. It doesn’t grant access to the network; it creates a secure, encrypted tunnel directly to a specific application only after verifying the user’s identity, device health, and other contextual factors. The user never even sees the rest of the network, making lateral movement by an attacker nearly impossible.
How is ZTNA More Secure Than a VPN?
ZTNA’s security superiority comes down to three key differences:
- Least-Privilege Access: A VPN user gets the keys to the entire kingdom. A ZTNA user gets a key to a single room and only for the time they need it. This drastically minimizes the potential damage from a compromised account.
- Reduces Attack Surface: ZTNA makes applications invisible to the public internet. Since there are no open VPN ports for attackers to scan and target, your attack surface is dramatically reduced.
- Continuous Verification: A VPN authenticates you once at the beginning of a session. ZTNA can continuously verify the user and device, ensuring that if a device becomes non-compliant or behavior becomes suspicious, access is revoked instantly.
What are the Business Benefits of ZTNA for Florida SMBs?
For small and medium-sized businesses in Florida, adopting ZTNA isn’t just a security upgrade—it’s a competitive advantage.
- Drastically Reduced Cyber Risk: Protect your business from the devastating financial and reputational cost of a data breach.
- Safer Hybrid & Remote Work: Securely connect your employees from anywhere without exposing your entire network.
- Simplified IT Management: Manage access policies for users, not complex network rules and firewall configurations.
- Improved User Experience: Provide faster, more direct connections to cloud and on-premise apps without the lag of traditional VPNs.
- Easier Compliance: Meet regulatory requirements (like HIPAA or PCI DSS) with detailed logs and granular access controls that prove who accessed what, and when.
How Do We Migrate from a VPN to ZTNA?
Migrating away from a legacy VPN can feel daunting, but it doesn’t have to be a painful “rip and replace” project. A phased approach, guided by an expert partner like Giaspace, ensures a smooth transition.
- Identify & Prioritize: We start by identifying your most critical applications and user groups.
- Implement in Parallel: We deploy a ZTNA solution to run alongside your existing VPN, starting with a pilot group of users and applications.
- Onboard & Expand: As users get comfortable and benefits become clear, we progressively move more applications and teams to ZTNA.
- Decommission: Once all users and resources are migrated, we can safely decommission the legacy VPN, closing a major security gap for good.
Can ZTNA and VPNs Be Used Together?
Yes, a hybrid approach is a common and practical strategy during a migration. Many businesses use ZTNA for accessing modern cloud and web applications while temporarily keeping the VPN for specific legacy systems that may be harder to migrate.
However, the long-term goal should always be to minimize or eliminate reliance on the VPN. Every application that remains accessible via the VPN represents a potential risk. Using them together is a bridge to a more secure future, not the final destination. The ultimate security posture is achieved when ZTNA becomes your single, unified solution for all application access.
ZTNA vs VPNs

Final Thoughts
The latest reports clarify that alternative, more secure ways to construct secure network infrastructure are emerging and may soon replace VPNs altogether. However, it is important to note that VPNs are not going away overnight—it will likely take years for these newer technologies to fully supplant them. In the meantime, business leaders should take steps to reduce the risk of attack by ensuring that their VPNs are properly configured and regularly patched.
Published: May 16, 2025