Virtual Private Networks (VPN) Explained

30th September 2019 | Training Virtual Private Networks (VPN) Explained

Virtual Private Network (VPN) is a way to create online privacy and anonymity by creating a private network from a public internet connection. A VPN will mask your internet protocol (IP) address and encrypt all the traffic leaving your laptop computer so it will be unviewable by anyone between you and your VPN gateway.

VPN services create secure, encrypted connections to provide data privacy while connected to public Wi-Fi hotspots. Others use VPN services to escape content filters placed on their traffic by their business, ISP, and in some cases government.

What should you do as an SMB owner?

If your employees consistently work from home, then a VPN is a strong best practice to enable those employees to work productively and securely from home. However, if all they do from home is work on Email, then a VPN may not be necessary since email can be easily secured in other ways via O365 and two-factor authentication on company-issued devices. However, if your employees need access to files stored locally on a File Server at your office, then a VPN is quite helpful to protect your business while empowering your employee productivity. Virtual Private Networks are one of the best ways for keeping sensitive company information private and secure. 

In every case, do not ever rely solely on a password-authenticated VPN.  The minimum security practice today is to enable two-factor authentication on your VPN.  There are too many passwords breached online that could be used by hackers to breach your VPN network. Always pair VPN access with a second factor.

Related Readings:

VPN Ratings – What Is A VPN

VPN Ratings – How Does A VPN Work?

VPN Ratings – How To Choose The Best VPN

Related TermEncryption

Source: Symantec

PRO SECURITY TIP:

VPN’s aren’t just for remote access for employees working from home.  People who travel a lot should subscribe to VPN services and use them when joining guest, hotel, coffee shop, or any other public WiFi to protect their data. Make sure you pair your VPN on your Smartphone or Laptop computer with software or hardware-based two-factor authentication in addition to the username and password.

https://www.youtube.com/embed/AjzomZt1EZY

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Your Employees Connected 47 Apps to Google Last Year. Can You Name One of Them?

Your Employees Connected 47 Apps to Google Last Year. Can You Name One of Them?

OAuth tokens don't expire when employees leave, passwords change, or apps go rogue. Your security program needs...

Read more
Attackers Don’t Need a Key. They Already Have Yours.

Attackers Don’t Need a Key. They Already Have Yours.

Most breaches don't start with a hacker in a hoodie cracking code at 3am. They start with your username and a...

Read more
Claude Mythos Opened Pandora’s Box. Project Glasswing Is Racing to Close It.

Claude Mythos Opened Pandora’s Box. Project Glasswing Is Racing to Close It.

Article Updates: As of May 6th 2026, every major U.S. AI lab, including Google DeepMind, Microsoft, xAI,...

Read more