No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Data Privacy

VPN & Compliance: Now You See Me, Now You… Still Do

Why It Might Be Time to Reassess Your Approach to Data Privacy

by John Klassen
May 14, 2019
in Data Privacy, Featured
businessman toggling VPN option on smartphone

VPN for secure, private web access? From a data protection, privacy and compliance perspective, you may want to think again. Authentic8’s John Klassen explains how using VPN can still leave your organization exposed.

Contrary to common belief – even among IT professionals – VPN technology is a poor choice to protect an organization’s data and ensure IT security when employees and contractors connect to the corporate network and the web.

In theory, VPN can make connecting with networks and resources more secure. It creates an encrypted data tunnel between the user’s computer (at home or a public WiFi hotspot, for example) and a secure server (on the corporate network) that can also serve as a springboard to the web.

In reality, incident reports of data breaches and privacy violations tell a darker story. VPN still passes web code to the locally installed web browser. Because of the inherent security weakness of traditional browsers, this often defeats VPN’s very purpose and facilitates malware and spyware infiltration, as well as data exfiltration and deanonymization by third parties.

From “Better Than Nothing” Fix…

The inherent flaws and limitations of VPN are well documented.1 They have become apparent over the more than 20 years the technology has been around, yet even in regulated fields such as the financial sector or health care, VPN is still promoted as a “quick fix” to protect corporate digital assets and remote access for mainly three reasons:

  1. Privacy, anonymity and location masking – The organization wants to ensure that the IP addresses and geolocations of employees remain concealed and their IP addresses aren’t disclosed to websites, for example to prevent targeted “watering hole” cyberattacks2 or to avoid tipping off the target of web research by AML/BSA specialists or FIU investigators.3
  2. Protection against malware and spyware – The company expects VPN to provide an insulation layer between the user and the web that prevents compromising the local IT environment, for instance when remote workers connect via public WiFi.
  3. Manageability – IT or the compliance team hopes that VPN nodes help them eliminate the widening web use blindspot4 in their organization and to regain control over how users access the web and corporate network resources, often from BYOD devices.

Recently, more companies that deployed VPN based on one or more of these considerations are reconsidering that approach. What is causing them to have second thoughts?

Multiple factors seem to come into play here. Recent warnings by the Department of Homeland Security5 and security firms6 highlight VPN shortcomings. Such alerts prompt many IT, compliance and risk professionals to reassess the “better than nothing” approach to online security that VPN still represents in many organizations.

What they find is that VPN may not be what they need going forward.

… to Compliance and Security Risk

One key advantage of VPN services is that many encrypt much of the data transmitted from point to point within the VPN. Others – and this is the bad news – don’t. With some VPN services, not all data gets encrypted. Admins are shouldered with the burden to verify exactly what a given VPN service is encrypting – and what it’s not.

Another feature of VPN services that is frequently misunderstood is their capability to conceal the user’s true identity and location. In some cases, but not all, someone accessing the internet can appear to be somewhere entirely different than their actual physical location.

You’re Not as Masked as You Think

Serving up the information of the server at the VPN “tunnel exit” instead, VPN is supposed to hide such information about the originating user or network. For anti-money laundering (AML) specialists or fraud investigators, for example, the latter capability would be crucial – if it reliably worked.

The problem here is that it frequently doesn’t and also depends on basic factors such as connection quality.6

As a result, AML/BSA compliance specialists or FIU analysts who rely on VPN risk disclosing their IP address, corporate network information or location coordinates to a suspicious website, and information leaked from the local browser used with VPN lets adversaries identify the users and their intent via “browser fingerprinting.” This can put compliance and operational security at risk and also lead to incomplete or contaminated research results.

VPN: Tunneling Malware to Your IT

A common misconception about VPN still is that it protects against malware, such as keyloggers, ransomware or executable phishing attachments. It does not.

VPN merely protects data in transit, which includes malware encountered on an infected website or in an email. Once it gets downloaded and processed by the local browser, it can infect the user’s computer and spread from there. In a white paper titled “VPNs Are Not As Secure As You Think,” security researchers at content delivery network Akamai concluded: “VPNs are a weak security solution.”8

New Risks, Fragmented Policies

On the enterprise level, VPN is known to introduce new network vulnerabilities. One example is enterprise apps that are deployed in different locations, on-site or in the public cloud. They frequently require separate VPN gateways that need to be configured manually.

The current shortage of IT security professionals compounds the challenge. If policies are not applied consistently across all gateways, security suffers. In their white paper, the Akamai researchers point out the consequences: “VPNs result in fragmented security policies for distributed enterprises.”9

“We Love Our VPN”

…said no one ever. Instead, employees are complaining about slow connection speeds, which make VPN synonymous with “productivity loss.” In organizations that depend on fast and secure web access, consistent access policies and non-attribution when team members access external websites, VPN has failed to deliver on several levels.

Warnings about VPN, such as a bipartisan letter from two U.S. senators in February to the Department of Homeland Security10 or the DHS alert mentioned earlier, gave companies more reason to reassess VPN.

Fed Up With VPN?

Another major factor driving this change seems to be the availability and growing popularity of a solution that delivers where VPN falls short. Many organizations had initially turned to VPN for lack of a better alternative. They no longer have to.

Just like other point solutions (think anti-virus tools or web filters), VPN is usually added to an increasingly bloated security stack. Most of its components aim to protect the organization against the risks associated with the use of traditional, locally installed browsers.

In many banks and investment houses, leading law firms and more than 100 government agencies, that picture is rapidly changing since the arrival of the secure cloud browser. With remote browser isolation technology, all web content is processed remotely, isolated in a cloud container.

This enables organizations to maximize security and compliance while avoiding the problems associated with VPN. Remote browser isolation technology truly affords the benefits VPN only purports to provide:

  • Privacy, anonymity and location masking – With a compliance-ready cloud browser, the user’s IP address and geolocation remain completely concealed. As an example, with Silo, the cloud browser made by Authentic8, which pioneered the technology, only Authentic8’s IP address is disclosed to websites.
  • Protection against malware and spyware – The right cloud browser creates a perfect isolation layer between the user and the web while preventing web code from entering the local IT environment or reaching the end device. No code from the web can touch the endpoint. Only visual display information (pixels) gets transmitted back to the endpoint. This effectively disconnects the organization and its users from the web’s risk zone.
  • Control, oversight and auditability – By embedding policies in the centrally managed remote browser – from access controls to data loss prevention to compliance auditing – IT regains control over employee activities on the web, regardless of device, network or location of the user.

Browser isolation outside the firm’s IT perimeter offers compliance-friendly protection instead of the weak assurances offered by VPN. In the financial services sector, it enables organizations to implement the recommendations of the OCIE.[11] Last but not least, one year after the General Data Protection Regulation (GDPR) went into effect in the European Union, organizations with business interests in the EU have even more reason to consider a cloud browser.

GDPR compliance has been a sore point for many VPN services as much as for the traditional browsers they work with. By comparison, a centrally managed cloud browser for use in this space should have no problems to provide privacy controls that fulfill the requirements of the European Union’s Data Protection Directive (Directive 95/46/EC) and meet the requirements of GDPR.


[1] Authentic8: VPN for Secure and Private Web Access? Think Again. (White paper 1/2019)

[2] Watering Hole Attacks on BSA/AML Compliance Professionals

[3] AML Investigators: When Anonymity Is Paramount, Can You Trust Your Browser? (White paper 7/2018)

[4] John Klassen: Financial Services: Blindspot Browser (Authentic8 Blog 2/12/2019)

[5] Department of Homeland Security: Vulnerability in Multiple VPN Applications (4/12/2019)

[6] Catalin Cimpanu: Many VPN Providers Leak Customer’s IP Address via WebRTC Bug (Bleeping Computer 3/28/2018)

[7] Amir Khashayar Mohammadi: VPN & Privacy: What Nobody Told You (Authentic8 Blog 2/21/2019)

[8] Authentic8: VPN for Secure and Private Web Access? Think Again. (White paper 1/2019)

[9] ibid.

[10] Letter from U.S. Senators Marco Rubio, Ron Wyden to Christopher C. Krebs, Director of Cybersecurity and Infrastructure Security Agency, Department of Homeland Security –

[11] John Klassen: A Persistent Threat in Financial Services (Corporate Compliance Insights 1/2/2019)


Tags: AMLBYOD/Bring Your Own DeviceGDPRRansomware
Previous Post

Compliance and Ethics Risk Assessment by Jeff Kaplan: Revised and Expanded Edition

Next Post

What is the Power of a Pre-Settlement Monitorship?

John Klassen

John Klassen

John Klassen is Product Marketing Manager at Authentic8, maker of Silo, the browser in the cloud that ensures compliance and control for the world’s most demanding firms in regulated industries.

Related Posts

monies illustrating money laundering

Power Shift: What Happens When America Steps Back From Global AML Enforcement?

by Joe Biddle
April 15, 2025

EU's new anti-money laundering authority emerges as potential counterweight amid uncertain US priorities

origami tiger

Paper Tigers Won’t Protect You: The Reality of Effective NIS2 Compliance

by Hans Kayaert
March 24, 2025

Why Belgium's early adoption model could prevent another round of ‘compliance theater’ across Europe

examining data on laptop screen

Privacy Rights Surge Forces Rethink of Data Management

by Gal Ringel
March 14, 2025

As global privacy regulations multiply, organizations face mounting pressure to efficiently respond to data subject requests amid complex data environments

bills on clothesline money laundering

Trump 2.0 Is Already Shaking Up the Sanctions & AML Landscape

by Paul | Weiss
March 11, 2025

Financial institutions should prepare for potential ‘Know Your Customer's Customer’ obligations sanctions priorities shift

Next Post
three people puzzle pieces

What is the Power of a Pre-Settlement Monitorship?

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights