Why Are VPNs Essential For Telecommuting?

Throughout this quarantine, many organizations have enabled remote work strategies. Along with this transition, most of our customers have been enabled with a Virtual Private Network or VPN.

These VPNs have been set up for users to access your internal resources. For many, there is still some confusion as to what exactly a VPN is and why they are so important for an organization to safely and securely enable remote workers.

In this article, we will focus on the basics of VPNs and why they are so critical to keeping your business safe.

But first, this week’s “deep thought” which was shared with us by one of our customers: “Turning up the volume on your TV is like ‘zooming in’… but with sound.”

Now for this week’s article: VPN Basics

What is a VPN?

A VPN is a private network that uses a public network (usually the internet) to connect remotes sites or users together.

The VPN uses virtual connections that are routed from a personal computer through the internet to connect a business’s IP subnets located on the company firewall. Any time a user in your organization is working remotely and has secure access to the company’s shared folders, a VPN is usually used.

What makes a VPN secure?

Security is a top priority for businesses that have remote employees.

Transferring data that is not over a VPN tunnel can be subject to hackers obtaining that information.

A VPN works by encrypting the data so that information cannot be intercepted while transmitting, especially over something like public wifi.

It also makes the data impossible to read without the encryption key, even if your data happens to be stolen.  

What is split tunneling?

Split tunneling is when a personal computer is using both an encrypted VPN Tunnel and an Unsecured Network Connection. The advantage of having set up a connection this way is to limit the bottleneck that can occur when running all traffic through a VPN.

Most of the VPN tunnels set up by a managed service provider are only for connections within your organization. The unsecured network connection is used for personal tasks such as browsing the web or streaming online video service.

Below is a diagram that outlines what split tunneling is:

Virtual Private Network (VPN)

Even with a VPN, it is important to always practice safe browsing habits. A VPN does not always protect your web browsing traffic.

For questions or help establishing a VPN, please contact servicerequest@amdataservice.com. If you have your own Deep Thoughts you would like to share, let us know.

Related information

Connect with us!

 5 Tips To Prevent Ransomware Attacks - Detroit IT Blog: Business IT Support & Network Services | AM Data Service - profile 5 Tips To Prevent Ransomware Attacks - Detroit IT Blog: Business IT Support & Network Services | AM Data Service - facebook 5 Tips To Prevent Ransomware Attacks - Detroit IT Blog: Business IT Support & Network Services | AM Data Service - linkedin  5 Tips To Prevent Ransomware Attacks - Detroit IT Blog: Business IT Support & Network Services | AM Data Service - twitter

 

What is M-Files?

What is M-files? M-Files is a passionate, dynamic company providing intelligent information management solutions that are disrupting the ECM market. The M-Files solution is built on three pillars: it's metadata-based, repository neutral,...

Windows Leak Puts Computers, Servers At Risk

Windows XP and Windows Server 2003 source code was leaked recently. This means devices run on XP and Server 2003 operating systems are now even more vulnerable to attack. Microsoft hasn't supported these outdated operating systems since...

Multi-Factor Authentication (MFA) Basics

You’ve likely heard of multi-factor authentication (MFA) but what exactly is it? What does it do? Why is it important? We answer all of these questions in this blog post. We’re offering enough MFA knowledge to hold your own TED...

Backup Basics

Backups are one of the most critical components of any IT infrastructure. It’s important for any organization to back up data so their data can be restored after accidental deletion or critical failure.

(Pass)words Matter

For World Password Day, we are sharing tips, best practices and information to help you create more secure passwords and understand why this is important.
Page: 123 - All