Monday, March 30, 2026

Supply chain vulnerabilities in particular are laid open by many VPN practices

Businesses are putting too great a reliance on VPNs to keep their organisations secure, according to managed service provider, Memset. A poorly managed VPN can expose an otherwise secure organisation to the unknown business and data security practices at the other end of the tunnel. This is of a special and growing issue among organisations’ supply chains, which have been shown to be the weak link in security, according to the most recent Government Cyber Governance Health Check report.

Thomas Owen, Head of Security at Memset commented:

“Site-to-site VPNs are often used to provide suppliers and third parties with reliable, encrypted access to otherwise locked-down portions of your internal network. This might be to enable support, or to allow the third party to interact with your data or systems. Acting in this mode, a VPN effectively connects one network to another by placing an encrypted wrapper around the traffic.

 

Acting similarly to a joining corridor between two independent buildings, the corridor may provide protection from the outside, but each party may now be sharing the contents, culture, personnel and practices of the other. In the same way a VPN can lead to sharing unintended traffic or access between two networks. Where one organisation has strong security controls and the other weak, this can provide an easy path for attackers into the soft underbelly of your digital estate. Not only can it lead to serious operational disruption, it can also cause significant financial and reputational damage.”

Many businesses, but especially SMEs, often deploy one or two ‘security’ controls and consider themselves to be secure enough. However, a ‘defence-in-depth’ approach, where multiple types and layers of controls overlap and support one-another is the only path to meaningful security in today’s world. It is highly likely that one or more secure elements of an organisation’s infrastructure will be breached. It is only when a combination of tightly interlocked measures is in place that attacks can be repelled.

VPNs have also been the recent target of Advanced Persistent Threat (APT) actors and the National Cyber Security Centre (NCSC) has published warning and advice to organisations on how to detect malicious activity, showing the growing vulnerability of this technology.

Owen continues: “VPNs are a relatively safe pipe, but without compensating controls you give up control of what flows through it. If an organisation has over-invested in ‘edge’ controls to ‘build a strong wall’, a VPN can also unwittingly cause all of these to be bypassed.  Cyber security leads need to widen their circle of concern outside of their organisation and work with their compatriots through the supply chain to handle data security effectively. This is particularly important as under the new GDPR norms, data processors and controllers share liability. Therefore, businesses must think about the security of the supplier before sharing access or organisational data.”

Latest

Cambridge Tech Week 2026: A deep dive into the potential of deep tech

From 14–18 September, Cambridge Tech Week 2026 is set...

How digital vaults can future-proof enterprises for the AI era

As AI accelerates demand for high-quality, large-scale data, Alex...

Chainguard Catalog Starter: Build with open source software you can trust

The industry’s largest catalogue of trusted container images now...

Supply chain risk starts where transparency ends

It’s time for businesses to recognise that scientific integrity...

Subscribe To Our Content

Don't miss

Cambridge Tech Week 2026: A deep dive into the potential of deep tech

From 14–18 September, Cambridge Tech Week 2026 is set...

How digital vaults can future-proof enterprises for the AI era

As AI accelerates demand for high-quality, large-scale data, Alex...

Chainguard Catalog Starter: Build with open source software you can trust

The industry’s largest catalogue of trusted container images now...

Supply chain risk starts where transparency ends

It’s time for businesses to recognise that scientific integrity...

Learn the hidden behaviours of history’s great strategists

History’s great strategic thinkers prove that strategy isn’t about...

Cambridge Tech Week 2026: A deep dive into the potential of deep tech

From 14–18 September, Cambridge Tech Week 2026 is set to examine how regions around the world can work together to accelerate the commercialisation and...

How digital vaults can future-proof enterprises for the AI era

As AI accelerates demand for high-quality, large-scale data, Alex Segeda of Western Digital explores whether enterprises can afford not to preserve their archives strategically AI...

Chainguard Catalog Starter: Build with open source software you can trust

The industry’s largest catalogue of trusted container images now offers free, production-ready images to accelerate secure software development Chainguard, the trusted source for open source,...

LEAVE A REPLY

Please enter your comment!
Please enter your name here