Sign in to view more content

Create your free account or sign in to continue your search

Welcome back

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

New to LinkedIn? Join now

or

New to LinkedIn? Join now

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Skip to main content
LinkedIn
  • Top Content
  • People
  • Learning
  • Jobs
  • Games
Join now Sign in
Last updated on Apr 6, 2025
  1. All
  2. Engineering
  3. Network Security

Employees are bypassing VPN protocols in your company. Are your network security measures enough?

When employees bypass VPN protocols, it can expose your network to significant risks. Strengthening security measures is crucial to safeguard your company’s data. Here are some strategies to consider:

- *Educate employees*: Provide training to ensure everyone understands the importance of VPN usage.

- *Implement stricter policies*: Enforce compliance with clear consequences for bypassing protocols.

- *Monitor network traffic*: Use tools to detect and respond to unauthorized access attempts.

How do you ensure VPN compliance in your company? Share your strategies.

Network Security Network Security

Network Security

+ Follow
Last updated on Apr 6, 2025
  1. All
  2. Engineering
  3. Network Security

Employees are bypassing VPN protocols in your company. Are your network security measures enough?

When employees bypass VPN protocols, it can expose your network to significant risks. Strengthening security measures is crucial to safeguard your company’s data. Here are some strategies to consider:

- *Educate employees*: Provide training to ensure everyone understands the importance of VPN usage.

- *Implement stricter policies*: Enforce compliance with clear consequences for bypassing protocols.

- *Monitor network traffic*: Use tools to detect and respond to unauthorized access attempts.

How do you ensure VPN compliance in your company? Share your strategies.

Add your perspective
Help others by sharing more (125 characters min.)
6 answers
  • Contributor profile photo
    Contributor profile photo
    Hannah H.
    • Report contribution

    Absolutely not. If users are tunneling around your tunnels, it's time to stop blaming the end user and start questioning your architecture. Security shouldn't feel like a punishment to a user. If your VPN slows productivity to a crawl, your users will most assuredly find a way around it. It's 2025 and we've got options: Identity-aware proxies, context-based access, Zero Trust Network Access (ZTNA), device compliance checks... VPNs still have a role, but if it's your only line of defense? You're not doing security. You're playing whack-a-mole with your workforce.

    Like
    4
  • Contributor profile photo
    Contributor profile photo
    Vivek Sharma

    COO & Co-Founder at Sarv.com, Strategic Planner| Technical Advisor| Market Analyst

    • Report contribution

    If employees are bypassing VPN protocols, it’s a clear signal that your network security measures need reinforcement and refinement: Investigate the Root Cause: Understand why employees bypass performance, have access issues, or lack awareness. Enforce VPN Usage: Use endpoint management tools to restrict access to company resources unless connected via VPN. Educate Continuously: Highlight risks of unprotected access and share real-world consequences. Improve VPN Performance: Optimize speed and usability to reduce the temptation to bypass. Implement Zero Trust Principles: Authenticate every access attempt, regardless of VPN status. Audit and Monitor: Regularly check logs for unauthorized access and take corrective action.

    Like
    4
  • Contributor profile photo
    Contributor profile photo
    Alexia Wong

    Tuition teacher. Earned Community Top Voice Badge in Teaching in '23 and Community Top Voice Badge in Cybersecurity in '24.

    • Report contribution

    To be sure that your network security measures are enough, you need to first make sure that you explain to them about the importance of VPN protocols. This is so that they would know why they shouldn't bypass it. You need to then make sure that your system and network is equipped with a strong firewall and antivirus. This is so that it would be able to detect and prevent a cyber attack. You must also implement strict rules such as punishments for employees who bypass the VPN protocols. This is so that they wouldn't dare to do it.

    Like
    2
  • Contributor profile photo
    Contributor profile photo
    Ajay Sajeev M

    Architect

    • Report contribution

    Haha, oh the thrill of dodging VPNs, until someone clicks the wrong link and IT spends a week cleaning up the mess. We try to keep it human: explain why VPNs matter, not just that they do. Then back it up with smart monitoring, gentle nudges, and a few "remember that time" horror stories. It’s about building habits, not fear. But yeah… we keep the firewall ready, just in case.

    Like
    1
  • Contributor profile photo
    Contributor profile photo
    Harry Waldron, CPCU

    Associate Consultant @ Voyage Advisory

    • Report contribution

    In every company I worked for, bypassing VPN or MFA requirements was a non-issue. There was no way to authenticate otherwise. If their accounts are not defined to VPN/MFA controls - they ain't getting into our system :)

    Like
    1
View more answers
Network Security Network Security

Network Security

+ Follow

Rate this article

We created this article with the help of AI. What do you think of it?
It’s great It’s not so great

Thanks for your feedback

Your feedback is private. Like or react to bring the conversation to your network.

Tell us more

Report this article

More articles on Network Security

No more previous content
  • Your network security is at risk due to an insecure IoT device. How will you prevent a potential data breach?

    10 contributions

  • Your team is accused of a security breach they didn't cause. How do you prove their innocence?

    14 contributions

  • Struggling to explain network security protocols to non-technical colleagues in a remote work setup?

    14 contributions

  • Your remote team relies heavily on VPNs. How can you safeguard against potential vulnerabilities?

    13 contributions

  • You're integrating third-party software into your network. How do you mitigate the security risks?

    6 contributions

  • You need to address a diverse audience on network security. How do you make your presentation effective?

    9 contributions

  • Clients are worried about complex access control measures. How do you ease their concerns?

    7 contributions

  • Ensuring robust security is critical for your network. How do you maintain seamless access?

    2 contributions

  • You're facing pushback from your IT team on network security updates. How can you get them on board?

    9 contributions

No more next content
See all

More relevant reading

  • Network Security
    What do you do if you're faced with critical decisions in high-pressure network security situations?
  • Information Security Management
    How do you measure the effectiveness of your SOC team?
  • Telecommunications Engineering
    What are the best practices for testing the security of a communication system?
  • Network Security
    What are the most effective ways to lead a team of TCP/IP security professionals?

Explore Other Skills

  • Programming
  • Web Development
  • Agile Methodologies
  • Machine Learning
  • Software Development
  • Data Engineering
  • Data Analytics
  • Data Science
  • Artificial Intelligence (AI)
  • Cloud Computing

Are you sure you want to delete your contribution?

Are you sure you want to delete your reply?

  • LinkedIn © 2025
  • About
  • Accessibility
  • User Agreement
  • Privacy Policy
  • Your California Privacy Choices
  • Cookie Policy
  • Copyright Policy
  • Brand Policy
  • Guest Controls
  • Community Guidelines
Like
1
6 Contributions