← Back to Learn Centre

What is a VPN?

A VPN creates a protected connection between a user and a private network or service.

Simple example

A staff member working from home connects to the company VPN before accessing internal systems.

Why it matters

VPNs can protect remote access, but weak VPN accounts or unpatched VPN devices can become serious entry points.

Common warning signs

  • The activity is unexpected or unusual for the business context.
  • The request or system behaviour creates pressure to act quickly.
  • Normal approval, verification, or security processes are bypassed.
  • There are signs of unauthorised access, data exposure, or system change.
  • Staff are unsure whether the request, message, or system behaviour is legitimate.

Cyber Doc view

This term should be understood in business context, not only as a technical issue. Good protection usually combines clear processes, appropriate technical controls, staff awareness, and a calm response plan.

What to do

Proactive steps

  • Use MFA for VPN access.
  • Patch VPN appliances and clients quickly.
  • Restrict VPN access to users who need it.
  • Disable unused accounts.
  • Monitor VPN login activity.

Reactive steps

  • Disable suspicious VPN accounts or sessions.
  • Review VPN logs for unusual access.
  • Patch known VPN vulnerabilities immediately.
  • Reset credentials if account misuse is suspected.
  • Check accessed systems for signs of compromise.

Related terms

  • Remote access
  • Multi-factor authentication
  • Attack surface