As remote and hybrid working becomes the permanent norm for UK businesses, providing secure access to company resources from outside the office has moved from a nice-to-have to an absolute necessity. A Virtual Private Network, or VPN, creates an encrypted tunnel between a remote user's device and your business network, allowing them to access files, applications, and systems as if they were sitting at their desk in the office.
Yet despite the widespread adoption of remote working since 2020, a significant proportion of UK small and medium-sized businesses still rely on insecure methods of remote access — or worse, have no remote access provision at all, forcing staff to email sensitive files to personal accounts or carry data on USB drives. This guide explains everything you need to know about setting up and managing a business VPN, from choosing the right type to ongoing security management.
The stakes have never been higher. Cyber criminals specifically target remote connections because they represent a predictable vulnerability in many organisations' security architectures. A compromised remote session can give an attacker the same level of access to your internal systems that a legitimate employee would have — access to file servers, databases, line-of-business applications, and potentially even administrative controls. Without proper encryption and authentication, every remote connection is an invitation to eavesdroppers and attackers.
This guide is written specifically for UK businesses — addressing the regulatory requirements, compliance frameworks, and practical realities that UK organisations face. Whether you are setting up remote access for the first time or reviewing an existing VPN deployment that has grown organically since the pandemic, the principles and recommendations here will help you build a remote access solution that is secure, performant, and aligned with UK best practice.
What Is a Business VPN and How Does It Work?
A Virtual Private Network creates a secure, encrypted connection between two points — typically between a remote worker's laptop or phone and your company network. When a VPN connection is active, all data transmitted between the remote device and your network is encrypted using military-grade algorithms, making it virtually impossible for anyone to intercept or read the data in transit.
Think of it as a private, secure tunnel running through the public internet. Without a VPN, data travelling between a remote worker and your office network passes through the open internet, where it could potentially be intercepted — particularly on public Wi-Fi networks in coffee shops, hotels, and airports. With a VPN, that same data is wrapped in layers of encryption that make it unreadable to anyone who does not hold the decryption keys.
Business VPNs differ from consumer VPN services in several important ways. Consumer VPNs are designed primarily for privacy and bypassing geographic content restrictions. Business VPNs are designed for secure access to corporate resources, with features such as centralised management, user authentication, access controls, logging, and integration with your existing network infrastructure.
How VPN Encryption Works
At a technical level, a VPN establishes a secure session by first authenticating the remote user and then negotiating encryption parameters. The client and server agree on an encryption algorithm (typically AES-256), exchange cryptographic keys using a secure key exchange protocol, and then wrap all subsequent data in encrypted packets. These encrypted packets travel across the public internet just like any other traffic, but their contents are completely unreadable to anyone who intercepts them. Even if an attacker captures every packet in the VPN session, the encrypted data is computationally infeasible to decrypt without the correct keys.
Modern VPN protocols also provide integrity checking, which ensures that data has not been tampered with in transit, and perfect forward secrecy, which means that even if an attacker somehow obtains the encryption keys for one session, they cannot use those keys to decrypt past or future sessions. These layered protections make a properly configured business VPN one of the most effective tools for securing remote communications.
Services like NordVPN and ExpressVPN are consumer VPN products designed for personal privacy. They route your internet traffic through their servers, masking your IP address. A business VPN is fundamentally different — it connects remote workers directly to your company network, giving them access to internal resources like file servers, line-of-business applications, and printers. Consumer VPN services are not a substitute for a proper business VPN solution.
Types of Business VPN
There are several types of VPN technology used in business environments, each suited to different requirements. Understanding the differences helps you choose the right solution for your organisation.
Remote Access VPN
This is the most common type for UK SMEs. A remote access VPN allows individual users to connect to your business network from any location using VPN client software installed on their laptop, tablet, or phone. The connection is authenticated using credentials — typically a username and password combined with multi-factor authentication — and encrypted using protocols such as IKEv2, OpenVPN, or WireGuard.
Site-to-Site VPN
A site-to-site VPN connects two or more office locations together, creating a single unified network that spans multiple sites. This is common for businesses with branch offices — for example, a company with its head office in London and a regional office in Manchester. A site-to-site VPN allows staff at both locations to access shared resources seamlessly, as if they were on the same local network.
Cloud VPN
As more businesses migrate services to cloud platforms like Microsoft Azure and Amazon Web Services, cloud VPNs have become increasingly important. A cloud VPN provides secure connectivity between your on-premise network and your cloud environment, ensuring that data moving between your office and your cloud resources is encrypted and protected.
SSL/TLS VPN
SSL/TLS VPNs use the same encryption technology that secures websites (HTTPS) to provide remote access. They are popular because they work through standard web browsers without requiring dedicated client software, making them easy to deploy and use. Many business firewalls include SSL VPN functionality that allows remote workers to access internal web applications, file shares, and even full desktop sessions through a secure browser portal. While they may not offer the same level of network integration as IPsec-based VPNs, their ease of use and clientless operation make them an attractive option for organisations with a large number of occasional remote users.
Choosing Between VPN Types
Most UK SMEs will find that a remote access VPN covers the majority of their needs. If you operate from multiple office locations, adding a site-to-site VPN creates a seamless network experience for staff at all sites. Businesses with significant cloud infrastructure should consider how their VPN strategy integrates with cloud connectivity — many cloud providers offer native VPN gateway services that simplify secure connections between your premises and your cloud environment. The key is to assess your specific requirements rather than defaulting to whatever solution is most familiar or most heavily marketed.
Remote Access VPN
- Individual users connect from any location
- Client software on each device
- Ideal for remote and hybrid workers
- Per-user authentication and access control
- Scales easily as team grows
- Works on laptops, tablets, and phones
- Most common solution for UK SMEs
Site-to-Site VPN
- Connects entire office locations together
- Configured on network hardware, not devices
- Ideal for multi-office businesses
- Always-on connection between sites
- Requires compatible firewalls at each site
- Transparent to end users
- Best for businesses with branch offices
Choosing the Right VPN Solution
The VPN market offers a wide range of solutions, from built-in features on business firewalls to dedicated VPN appliances and cloud-based services. For most UK SMEs, the right choice depends on your existing infrastructure, budget, number of remote users, and technical requirements.
| VPN Solution | Best For | Typical Cost | Complexity |
|---|---|---|---|
| Firewall built-in VPN (e.g., Fortinet, SonicWall) | SMEs with existing business firewall | £0 additional (hardware already owned) | Medium |
| Cloud VPN service (e.g., Perimeter 81, Twingate) | Cloud-first businesses | £8-15 per user/month | Low |
| Microsoft Always On VPN | Windows-centric environments | Included with Windows Server | High |
| WireGuard-based solution | Performance-critical applications | Open source + hosting costs | High |
| Dedicated VPN appliance (e.g., Cisco AnyConnect) | Larger SMEs, 100+ users | £2,000-10,000 + licensing | High |
Key Selection Criteria
When evaluating VPN solutions, several factors beyond basic connectivity deserve careful consideration. Scalability is essential — your chosen solution must accommodate not just your current user count but your projected growth over the next three to five years. Migrating VPN solutions mid-contract is disruptive and expensive, so plan ahead. Integration with your existing identity management is another critical factor. If you use Microsoft 365, a solution that integrates with Azure Active Directory simplifies user management and enables seamless single sign-on.
Performance characteristics vary significantly between solutions. Some VPN technologies introduce noticeable latency that affects real-time applications like video conferencing and voice calls. If your remote workers rely heavily on these tools, test performance before committing to a solution. WireGuard-based solutions generally offer the best performance, but they may not integrate as smoothly with enterprise identity systems as more established protocols like IKEv2.
Finally, consider the management overhead. A solution that requires manual configuration of each client device creates a significant administrative burden as your team grows. Cloud-managed VPN services that offer centralised policy deployment, automatic client updates, and self-service portals for users can dramatically reduce the time your IT team or managed service provider spends on VPN administration.
Setting Up a Business VPN: Step by Step
While the specific configuration steps vary depending on your chosen solution, the general process for implementing a business VPN follows a consistent pattern. Here is what to expect.
Step 1: Assess Your Requirements. Before purchasing any hardware or software, define what you need the VPN to do. How many users will connect simultaneously? What resources do they need to access? Do you need site-to-site connectivity as well as remote access? What level of performance is required? These answers shape your solution choice.
Step 2: Choose Your Protocol. Modern business VPNs typically use one of several protocols. IKEv2/IPsec offers excellent security and performance, particularly for mobile devices. OpenVPN provides flexibility and wide platform support. WireGuard delivers the best raw performance with modern cryptography. Avoid older protocols like PPTP, which have known security vulnerabilities.
Step 3: Configure the VPN Server or Gateway. This is the central point that remote users connect to. If you are using a firewall-based VPN, this means configuring the VPN settings on your firewall. For a cloud-based solution, you will provision the service through the provider's management portal. Either way, you will define encryption settings, authentication methods, IP address pools, and access policies.
Step 4: Implement Multi-Factor Authentication. This is non-negotiable. A VPN protected only by a username and password is vulnerable to credential theft. Multi-factor authentication adds a second layer of verification — typically a code from a mobile authenticator app or a push notification — that dramatically reduces the risk of unauthorised access.
Step 5: Configure Split Tunnelling. Split tunnelling determines whether all internet traffic from the remote device passes through the VPN, or only traffic destined for company resources. Full tunnelling provides maximum security but can impact performance. Split tunnelling improves speed but means non-company traffic is unprotected. The right choice depends on your security requirements and user experience priorities.
Step 6: Deploy Client Software. Remote users need VPN client software installed and configured on their devices. Most business VPN solutions offer clients for Windows, macOS, iOS, and Android. Centralised deployment tools like Microsoft Intune or a remote monitoring and management (RMM) platform can push the VPN client and configuration to all devices automatically.
Step 7: Test Thoroughly. Before rolling out to all users, test the VPN with a small pilot group. Verify that connections are stable, performance is acceptable, all required resources are accessible, and multi-factor authentication works correctly. Address any issues before the wider deployment.
User Training and Adoption
A technically perfect VPN deployment can still fail if your users do not understand how to use it properly. Invest time in clear, non-technical documentation that explains how to connect, what to do if the connection drops, and who to contact for support. Conduct brief training sessions — even fifteen minutes can make the difference between smooth adoption and a flood of helpdesk tickets. Emphasise why the VPN matters, not just how to use it. When staff understand that the VPN protects company data, client information, and their own personal details, they are far more likely to use it consistently.
Consider creating quick-reference guides for each platform your staff use — separate guides for Windows, macOS, iOS, and Android ensure that each user has relevant, actionable instructions. Include screenshots of each step in the connection process. Make these guides available on your company intranet and ensure that new starters receive VPN setup as part of their onboarding process. The easier you make it to connect securely, the more likely your staff are to do so without seeking shortcuts.
Relative security ratings of common VPN protocols (industry consensus)
Ongoing VPN Management and Security
Setting up a VPN is only the beginning. Ongoing management is essential to maintain security and performance. Your VPN gateway or service should be kept up to date with the latest firmware and security patches. User accounts should be reviewed regularly, with access revoked immediately when staff leave the organisation. Connection logs should be monitored for unusual activity, such as connections from unexpected geographic locations or at unusual times.
Performance monitoring is equally important. If your VPN becomes slow or unreliable, remote workers will find workarounds — and those workarounds are almost always less secure. Monitor connection speeds, latency, and capacity, and upgrade your VPN infrastructure if it is struggling to handle the load.
Access Control and Segmentation
One of the most important ongoing management tasks is ensuring that VPN access permissions remain appropriate. When a new employee joins, they should receive VPN access only to the resources their role requires — not blanket access to the entire network. When an employee changes roles, their VPN access should be updated to reflect their new responsibilities. And when someone leaves the organisation, their VPN credentials must be revoked immediately, not at the end of the month when someone remembers to update the access list.
Network segmentation through the VPN provides an additional layer of security. Rather than granting all VPN users access to your entire internal network, configure access policies that restrict each user or user group to the specific servers, applications, and file shares they need. This limits the blast radius if a VPN account is compromised — an attacker who gains access through a sales team member's credentials should not be able to reach your finance systems or HR databases. Implementing role-based access control within your VPN is one of the most effective security improvements you can make.
Patch Management and Vulnerability Response
VPN infrastructure is a high-value target for attackers precisely because it provides remote access to your internal network. Vulnerabilities in VPN products are actively exploited — the Fortinet VPN vulnerability (CVE-2018-13379) and the Pulse Secure vulnerabilities of 2019-2021 were used in thousands of attacks against organisations worldwide. When your VPN vendor releases a security patch, applying it should be treated as an urgent priority, not a routine maintenance task. Subscribe to your vendor's security advisory feed and have a process in place to apply critical patches within 48 hours of release.
VPN and UK Compliance Considerations
For UK businesses handling personal data, a VPN is not just a convenience — it is a compliance tool. The UK GDPR requires businesses to implement appropriate technical measures to protect personal data. When your staff access customer records, financial data, or employee information remotely, a VPN provides the encryption necessary to meet this requirement.
The Cyber Essentials scheme, endorsed by the UK Government's National Cyber Security Centre, specifically references secure remote access as a key control. If your business is pursuing Cyber Essentials or Cyber Essentials Plus certification, a properly configured VPN with multi-factor authentication will contribute directly to meeting the scheme's requirements.
For businesses in regulated sectors — financial services, healthcare, legal — the requirements are even more stringent. The FCA, NHS Digital, and the SRA all have specific expectations around secure remote access that a well-implemented VPN helps you meet.
Data Protection Impact Assessments
Under certain circumstances, the UK GDPR requires organisations to conduct a Data Protection Impact Assessment (DPIA) before implementing new technologies that process personal data. While a standard VPN deployment may not always trigger a DPIA requirement, if your VPN implementation involves monitoring employee activity, processing sensitive personal data remotely, or enabling access to large-scale processing systems, a DPIA is prudent. The assessment documents the necessity of the processing, the risks to individuals, and the measures you have implemented to mitigate those risks — including the VPN itself and its associated security controls.
Maintaining records of your VPN security configuration, access policies, and user management procedures also supports your UK GDPR accountability obligations. Article 5(2) requires you to demonstrate compliance, and clear documentation of your remote access security measures provides evidence that you are taking appropriate steps to protect personal data. This documentation should be reviewed and updated whenever your VPN configuration changes, new user groups are added, or your risk profile evolves.
While VPNs remain essential for many UK businesses, the industry is increasingly moving towards a Zero Trust security model. Zero Trust assumes that no user or device should be automatically trusted, even if they are on the corporate network. Technologies like Zero Trust Network Access (ZTNA) provide more granular, application-level access controls compared to traditional VPNs. For businesses with complex security requirements, a hybrid approach combining VPN and ZTNA elements may provide the best balance of security and usability.
Common VPN Pitfalls to Avoid
Even businesses that deploy a VPN often make mistakes that undermine its effectiveness. The most common pitfall is using weak authentication — VPN access should always require multi-factor authentication, not just a password. Another frequent error is allowing unrestricted network access through the VPN, when in reality most remote workers only need access to specific applications or file shares. Implementing least-privilege access controls limits the potential damage if a VPN account is compromised.
Failing to monitor VPN usage is another significant oversight. Without monitoring, you will not know if a former employee is still connecting, if someone is accessing systems at unusual hours, or if your VPN is being targeted by brute-force attacks. Regular log reviews and automated alerting are essential parts of VPN management.
Finally, neglecting VPN performance is a mistake that drives users to circumvent security controls. If the VPN makes it painfully slow to access files or applications, staff will find faster but less secure alternatives. Invest in sufficient bandwidth and modern VPN protocols to ensure that the secure way of working is also the convenient way of working.
Planning for VPN Capacity
Many UK businesses learned a painful lesson during the initial pandemic lockdowns: their VPN infrastructure was not designed for the entire workforce connecting simultaneously. What worked for a handful of occasional remote workers collapsed under the weight of full-time remote access for everyone. Capacity planning should account for peak concurrent usage, not average usage. Consider worst-case scenarios — what if severe weather, transport disruption, or another health emergency forces your entire workforce to work remotely at short notice? Your VPN must be able to handle that load without degradation.
The bandwidth of your office internet connection is equally important. Your VPN concentrator or gateway may support hundreds of concurrent connections, but if your office internet pipe is only 100Mbps, that bandwidth will be shared between all connected users. A 50-person office with everyone connecting via VPN may need a 500Mbps or gigabit internet connection to maintain acceptable performance. Factor in the bandwidth requirements of video conferencing, large file transfers, and cloud application access when sizing your connection.
Documenting Your VPN Architecture
Finally, ensure your VPN configuration is thoroughly documented. Record the hardware and software in use, the configuration settings, the authentication mechanisms, the access policies, and the IP addressing scheme. This documentation is invaluable when troubleshooting issues, onboarding new IT staff or managed service providers, conducting security audits, and planning upgrades. Too many UK businesses have their VPN configuration stored entirely in the head of one person — when that person leaves or is unavailable, the organisation is left unable to manage or troubleshoot a critical piece of infrastructure.
Need Help Setting Up a Business VPN?
Cloudswitched designs, implements, and manages secure VPN solutions for UK businesses of all sizes. Whether you need remote access for a handful of staff or a multi-site VPN connecting offices across the country, we deliver solutions that are secure, reliable, and easy to use. Get in touch to discuss your remote access requirements.
Explore Network Admin Services