Reliance on VPNs for remote access is putting enterprises at significant risk as social engineering, ransomware, and malware attacks continue to advance, exposing\u00a0 businesses to greater risk, according to a new report by cloud security company Zscaler.More than 95% of organizations surveyed are now leveraging a VPN service for secure remote access, up from 93% last year, the report said, adding that there are almost 500 known VPN vulnerabilities listed on the CVE (common vulnerabilities and exposures) database.\u201cIt is unsurprising that VPN is no longer able to keep up with the hybrid and remote access requirements of today. VPNs were created at a time when network topologies were vastly different when there was a single corporate network everyone was accessing,\u201d said Ananth Nag, senior regional vice president at Zscaler, whose product line includes Zero Trust Exchange, a cloud-native security platform.More than 350 IT professionals in North America at organizations with global workforces were surveyed for the report.Since the shift to remote and hybrid work, 44% of the organizations have witnessed an increase in exploits targeting their VPNs, and 71% are concerned that VPN networks will jeopardize their security measures, the report said.Majority of companies have 3 or more VPNsThe size and complexity of an organization typically drive the complexity of remote access infrastructure and management proportionally. A majority of companies (61%) surveyed have three or more VPN gateways, and 38% have more than five.Each gateway requires a stack of appliances, often including the VPN, internal firewall, internal load balancer, global load balancer, and external firewall. \u201cThe more gateways an organization has, the more expensive secure remote access becomes and the more complicated it is for IT to administer and manage,\u201d the report noted.About 74% of organizations report that applications run in data centers, while 49% use private clouds, 45% use Azure, 44% use AWS, and 22% use Google Cloud.Single infected device can infect entire networkAbout 97% of organizations say they understand that their VPN is prone to cyberattacks and exploits, but still use the technology, the report said. \u201cBreaches show that it only takes one infected device or stolen credential to put an entire network at risk, which is why cybercriminals are targeting users by accessing through a VPN,\u201d the Zscaler report noted.\u00a0\u201cToday applications are moving to the cloud, a network the enterprise does not control. Users expect to seamlessly work off-network and from any device, anywhere," Nag said. "Remote access VPNs worked well in the network-centric world, but in the age of cloud and mobility, where there are virtual perimeters around the user, device, and application, they lack applicability.\u201dCompanies shift to zero trustOngoing risks from legacy VPNs have created a gradual shift toward Zero trust security architecture, with 80% of companies actively planning or implementing a zero trust model, the report said.Zero Trust architecture, unlike VPNs, does not bring the users on the same network as business-critical information, prevents lateral movement with user-app segmentation, according to Zscaler."The strategy of gaining access permission at the outset followed by virtual internal freedom no longer meets organizations' needs," Nag said.