Download our conference room audio guide today!

Get your guide to conference room microphones, speakers, and more


Cybersecurity: Why Use VPNs in a Cloud-Based World

Cybersecurity: Why Use VPNs in a Cloud-Based World

Like any other business in the digital age, even an IT solutions organization has to communicate cybersecurity policies and practices to its team. It’s today’s version of “physician, heal thyself.” It’s one thing to have systems in place to manage IT network security within your office. But what are your expectations for your remote workforce, contractors, and traveling staff? So what is it and why use VPNs for your business?

Yes, VPNs Still Exist

For companies that aren’t primarily cloud-based, getting system access from anywhere other than the office often requires using your company’s VPN, or virtual private network. When a worker is connected to a VPN, the data from his or her computer back to the corporate network is encrypted. If they are in a coffee shop or hotel, for example, no one else also on that network can see what they are doing.

“Giving someone VPN access on their personal computer, means your network is only as secure as that person’s judgement. Think about controlling access to your firm’s VPN the same way you control who has keys to your car.”

Adam Fisk, Director of IT Systems

In the case of folks not using a company laptop, personal VPN solutions do also allow devices to be more secure when users are on an unsecured network. But, in return for 3rd party security, you end up sharing your content and Internet history with another company.

If you’re not sure whether you have a corporate VPN that your staff can use, contact your IT team to find out if you have one and how to connect to it. For clients, TSP incorporates firewall hardware in the planning process, making VPN easy to implement after the fact if needed.

Set Ground Rules

Companies using VPN in the broad sense, i.e. giving employees remote access to a protected network, will want to have an “acceptable use” policy. Such a policy might specify that access is only through corporate hardware or a managed workstation. Policies should also require that workstations also have some sort of antivirus or antimalware software. Furthermore, that each user has (and is using) their own unique credentials.

For more on our own thoughts on using VPNs*, and getting online while out in the world, listen to our Grepcast or contact us for a tech audit and insights on what would work best for your business.

*With additional commentary on gamification, miniature cupcakes, and more!

For further reading:

Why your home’s cybersecurity is more important than ever

Cybersecurity Quiz

5 reasons to get an Internet domain for a family office