The network services trade-off: security policies your IT team wants and the accessibility your employees actually need
9 March 2026
The network services trade-off: security policies your IT team wants and the accessibility your employees actually need
Your IT team implements multi-factor authentication, VPN requirements, and firewall rules that block most external file-sharing services. From a security standpoint, everything is locked down tight. Your sales director working from a coffee shop between client meetings can’t access the presentation they need because the VPN is too slow on public WiFi, so they email it to their personal Gmail account instead.
This is the fundamental tension in network services: the security measures that protect your business often conflict with the accessibility that makes your business actually function. And when employees can’t do their jobs through official channels, they create unofficial workarounds that are often less secure than what you were trying to protect against.
When VPN becomes the productivity killer
IT teams love VPNs for remote access. They create an encrypted tunnel, authenticate users, and make remote connections behave like office network access. From a security perspective, they’re the right approach.
From an employee perspective, VPNs are often frustrating:
- Performance degradation – Everything loads slower through VPN. Cloud applications that work fine with direct internet access become sluggish when routed through the office network and back out to the cloud.
- Connection reliability issues – VPNs drop connections on marginal internet, requiring re-authentication and losing work in progress. Mobile employees switching between WiFi networks deal with constant reconnection.
- Complexity for non-technical users – Remembering to connect, understanding when it’s required versus when it’s optional, troubleshooting when it doesn’t work—all friction that employees would rather avoid.
The result is employees who “forget” to connect to VPN or who use personal devices and accounts to work around it. Network services that mandate VPN for everything without considering the usability impact create security gaps they were trying to prevent.
The file sharing prohibition that doesn’t stick
Many network services block Dropbox, Google Drive personal accounts, and similar services for security reasons. You don’t want company data stored on personal cloud accounts outside your control.
But employees need to share large files with clients, collaborate with external partners, and access documents from multiple locations. If your network services block the convenient options, they’ll find less convenient ones that are often worse:
- Emailing files to personal accounts as a workaround
- Using USB drives that can be lost or stolen
- Setting up personal cloud accounts through mobile hotspots to bypass network restrictions
- Sharing files through whatever platform the client insists on using
The employees aren’t trying to circumvent security—they’re trying to do their jobs. Network services that block without providing acceptable alternatives just create workarounds you can’t monitor or control.
Multi-factor authentication fatigue
MFA is critical for security. Nobody argues with that. But the implementation details determine whether employees comply willingly or find ways around it.
- Requiring MFA for every login – Even when employees are on trusted devices in trusted locations. Security-focused network services implement this without considering that employees might authenticate 20 times per day across different systems.
- No contextual awareness – Treating login from the office network the same as login from a random coffee shop, even though the risk profile is completely different.
- Complex approval processes – Requiring manager approval for MFA bypass requests, which means employees submit requests for legitimate needs and wait hours or days for approval.
The balance network services need to strike: strong authentication where risk is high, streamlined access where risk is low and user experience matters.
The guest network isolation problem
Security best practices say guest WiFi should be completely isolated from the corporate network. Visitors and external devices should have internet access but no access to internal resources.
This creates problems when your actual needs are more nuanced:
- Contractors who need temporary access to specific systems
- Vendors servicing equipment that needs network connectivity
- Employees using personal devices who need to access work email or calendar
- Conference room displays that need to connect to employee laptops
Strict network services policies force awkward workarounds—giving out the corporate WiFi password to contractors, connecting vendor equipment through someone’s personal hotspot, or employees unable to use their personal phones for work when they left their work device at home.
The application whitelisting that blocks business
Network services can implement application control—only approved applications can run on company devices. From a security standpoint, this prevents malware and unauthorized software.
From a business standpoint, it creates friction:
- Sales needs a proposal tool the client uses, but it’s not on the approved list
- Marketing wants to try new design software, but requesting approval takes two weeks
- Someone discovers a productivity app that would help their workflow, but installing it violates policy
- Client-required software for collaboration can’t be installed without IT admin involvement
Employees faced with this choice will either:
- Work less efficiently using only approved tools
- Use personal devices where they can install whatever they need
- Request exceptions so frequently that IT stops properly vetting them
Finding the security-accessibility balance
Effective network services recognize that perfect security is impossible if it makes work impossible. The goal is appropriate security that accounts for actual business operations.
- Risk-based policies rather than blanket restrictions – High-risk activities (accessing financial systems, handling sensitive data) warrant strong controls. Lower-risk activities (checking email, editing documents) need lighter touch.
- Contextual security – Location-aware policies that require stronger authentication from untrusted networks but streamline access from the office or known locations.
- Approved alternatives – If you’re blocking Dropbox, provide an acceptable alternative for the legitimate use case rather than just saying no.
- Exception processes that actually work – Sometimes employees have legitimate needs that don’t fit the standard policy. The exception process should be measured in hours, not days.
- User education that explains why – Employees more readily accept security measures when they understand the actual risks being mitigated rather than experiencing arbitrary restrictions.
The Bring Your Own Device reality
Many companies would prefer all work happens on company-managed devices with full network services security controls. The reality is that employees use personal phones, tablets, and sometimes laptops for work-related tasks.
You can either:
- Pretend it’s not happening – Ignore BYOD and hope employees aren’t mixing work and personal use on uncontrolled devices.
- Ban it completely – Enforce policies prohibiting work on personal devices, then watch employees do it anyway because it’s convenient.
- Accept and manage it – Design network services with the assumption that BYOD happens and create security approaches that work with mixed device environments.
The third option acknowledges reality and creates security around how work actually happens rather than how you wish it would happen.
When employees become the network services critics
There’s a reliable indicator that your network services balance is off: when employees consistently complain about IT being an obstacle rather than an enabler.
Common complaints that signal problems:
- “I can get more work done at home without the VPN”
- “I just use my personal accounts because it’s easier”
- “The client wanted to share files this way but IT won’t let us”
- “I can’t install the tool I need without waiting for IT approval”
These aren’t just complaints—they’re warnings that your security measures are driving behavior you can’t monitor or control. Network services should respond by examining whether the restrictions are actually necessary or just technically convenient.
The audit-driven overcorrection
Sometimes network services become overly restrictive after security audits or compliance assessments. The auditor points out theoretical vulnerabilities, and IT responds by locking down everything.
The problem is auditors evaluate security in isolation. They don’t assess the business impact of their recommendations or consider whether employees will comply with impractical restrictions.
After implementation:
- The security posture looks better on paper
- Actual security might be worse because of employee workarounds
- Business productivity suffers
- Employee satisfaction with IT drops
Effective network services evaluate audit recommendations through the lens of “will this actually improve security or just create shadow IT?”
What the balance actually looks like
Network services that successfully balance security and accessibility tend to share characteristics:
- Layered security – Multiple lighter controls rather than a few heavy-handed ones. If one layer inconveniences users, the others still provide protection.
- Zero trust principles – Assuming no network location is inherently safe, which allows more flexibility in how and where employees work without assuming office network equals secure.
- Continuous authentication – Rather than requiring employees to log in repeatedly, monitoring activity patterns and requiring additional authentication only when behavior is unusual.
- Clear communication – Explaining what policies exist, why they matter, and how to work within them rather than discovering restrictions only when you hit them.
- Regular policy review – Revisiting restrictions to verify they’re still necessary as business needs and technology evolve.
The goal isn’t finding one perfect balance that never changes—it’s maintaining appropriate security that evolves with how your business actually operates. Network services succeed when they protect the business without preventing the business from functioning, and that balance requires ongoing attention rather than set-it-and-forget-it policies.
Disclaimer
The information provided in this article is for educational purposes only and does not constitute professional IT or cybersecurity advice. Implementing network changes carries inherent risks; always consult with a qualified cybersecurity professional or network architect before altering your organization’s security protocols. The effectiveness of the strategies mentioned depends on your specific infrastructure and regulatory requirements.
Further Reading
- Bank for International Settlements (BIS): Triennial Central Bank Survey of Foreign Exchange and OTC Derivatives Markets
- Equinix: Financial Services Interconnection and Low Latency Solutions
- MetaQuotes: Advantages of Using a VPS for MetaTrader 4/5
- Investopedia: The Role of Latency in High-Frequency Trading
Header Image by Pexels from Pixabay
Decision Making Resources

These are the 6 key PDF guides we recommend to help you make better decisions. We’ve bundled them together to help you develop your decision making skills – at half the normal price! Each guide is great value, packed with practical advice, tips and tools on how to make better decisions.
Read the guides in this order and use the tools in each. Then turn problems into opportunities and decide … to be a better manager! Together the bundle contains: 6 pdf guides, 178 pages, 30 tools, for half price!
Extreme Thinking – Unlocking Creativity
>> Return to the Leadership Knowledge Hub