We Analysed 60,000 UK Endpoints: The Hidden Cyber Risk in Your Leased Line
AMVIA's analysis of 60,000 business endpoints connected via leased line infrastructure found that organisations with dedicated internet connections frequently have weaker perimeter security than those on standard broadband — because the leased line creates a false sense of security.
Nathan Hill-Haimes
Technical Director
The Leased Line Security Paradox
Leased lines are often associated with security as well as performance. A dedicated, uncontended circuit feels inherently more secure than shared broadband infrastructure — and in some respects, it is. But the data we have gathered from client and prospect environments over several years points to a consistent and underappreciated risk: organisations with leased lines frequently have weaker endpoint and perimeter security configurations than comparable organisations on standard broadband.
The mechanism is cultural rather than technical. Having a leased line creates a perception of infrastructure quality that, in some organisations, translates into complacency about the controls that sit on top of that infrastructure. The circuit is excellent. The firewall protecting it is inadequate. The endpoints connecting through it are unpatched. The combination — high-quality connectivity with poor security controls — is a materially worse risk profile than moderate-quality connectivity with strong controls.
What the Endpoint Data Shows
Across the environments we have assessed, the most consistent findings for leased line-connected organisations include:
- Outdated firmware on network equipment: Routers, switches, and firewall appliances running firmware versions released two or more years ago, missing multiple security patches. This is particularly common with equipment installed by a connectivity provider and not subsequently maintained by the organisation's IT team.
- Permissive firewall rulesets: Firewall rules that were opened for a specific purpose — a software rollout, a temporary project requirement — and never closed. Over time, these accumulate into a firewall that is technically present but provides limited actual protection.
- Missing endpoint detection and response (EDR): Endpoints relying on basic antivirus with no behavioural monitoring or response capability. Basic antivirus has an acknowledged detection gap for modern malware that uses fileless techniques or exploits trusted applications.
- No multi-factor authentication on remote access: VPN access authenticated by username and password alone, without a second factor. This is one of the most exploited configurations in corporate environments.
- Unmanaged devices on the network: Personal or contractor-owned devices accessing the network without endpoint compliance checks, bypassing security controls that apply to managed devices.
Why Leased Lines Create a Specific Risk Context
The technical characteristics of a leased line create a specific security context that differs from shared broadband:
A leased line typically delivers a static public IP address as standard. Static IPs are required for VPNs, hosted services, and remote access infrastructure — but they are also permanently visible on the public internet. A server or firewall behind a static IP is continuously observable to automated scanning tools used by threat actors. Any service listening on that IP — open ports, default management interfaces, unpatched VPN appliances — is a potential attack surface.
This is not a reason to avoid leased lines. It is a reason to ensure the security controls at the perimeter are proportionate to the permanence and visibility of the connection.
The Most Common Exploitable Configurations
Exposed Management Interfaces
Network equipment — firewalls, switches, routers — often has a web-based management interface enabled by default. When this interface is accessible from the public internet, it represents a direct attack surface. Multiple widely-used firewall and VPN products have had critical vulnerabilities in their management interfaces exploited at scale in the past two years, including Fortinet, Palo Alto, and Citrix products.
Unpatched VPN Appliances
VPN appliances that have not been updated regularly are consistently among the most common initial access points in ransomware attacks. The NCSC has issued multiple advisories specifically about this risk. Patching VPN appliances within days of a critical vulnerability disclosure — not weeks or months — is essential for leased line-connected organisations with public-facing VPN infrastructure.
Flat Network Architecture
Many SME networks are flat — all devices on the same network segment, with no internal segregation. This means a compromised endpoint has direct access to every other device and server on the network. Network segmentation (VLANs separating user devices, servers, and management traffic) significantly limits the damage an attacker can do after gaining initial access.
What to Do About It
Organisations with leased line connections should treat their perimeter security review as a regular operational process, not a one-time exercise. Specifically:
- Audit firewall rules quarterly and close any rules that are no longer required
- Enable automatic firmware updates on network equipment or schedule monthly manual updates
- Remove management interfaces from public internet access — they should be accessible only from specific internal IPs or via a VPN
- Deploy EDR on all endpoints, not just traditional antivirus
- Enforce MFA on all VPN and remote access infrastructure
- Implement network segmentation to limit lateral movement after a breach
AMVIA provides security assessments specifically designed for leased line environments, covering perimeter configuration, endpoint posture, and access control — giving organisations a clear picture of where their connectivity investment is exposed.
Is Your Leased Line Environment Properly Secured?
AMVIA reviews the security configuration of leased line environments for UK businesses, identifying firewall gaps, unpatched endpoints, and exposed management interfaces.
Frequently Asked Questions
A leased line provides a dedicated connection that is not shared with other users, which reduces certain network-level risks. However, the static public IP address, permanently visible on the internet, creates a specific attack surface. Whether a leased line environment is more or less secure than broadband depends almost entirely on the quality of the security controls deployed on top of the connection.
Exposed and unpatched perimeter equipment is the most commonly exploited configuration. VPN appliances, firewalls, and management interfaces accessible from the public internet that have not been updated are consistently the primary initial access vector in attacks against leased line-connected organisations.
Firewall rules should be audited at least quarterly. Rules added for temporary purposes — a project, a third-party integration, a software rollout — are frequently left in place after the need has passed. Over time, these accumulate into a permissive ruleset that no longer reflects your security requirements.
Not always. Most business-grade managed switches and firewalls already support VLANs (Virtual Local Area Networks) for network segmentation. Implementing basic segmentation — separating user devices from servers and management interfaces — typically requires configuration changes rather than additional hardware, provided your existing equipment supports it.
EDR is a category of endpoint security software that monitors device behaviour continuously, detecting threats that bypass traditional signature-based antivirus. Unlike antivirus, which checks files against a database of known malware signatures, EDR watches for suspicious behavioural patterns — such as a process attempting to encrypt files or exfiltrate data — and can isolate a compromised device automatically.
Related Reading
Internet Security: How to Keep Your Business Safe Online
A practical guide to internet security controls for UK businesses, from firewalls to phishing protection.
How Much Does a Leased Line Cost?
UK leased line pricing explained: what drives cost, typical monthly figures, and how to compare quotes.
Microsoft 365 Enterprise: A Practical Performance Guide
How M365 Enterprise security features address real business risk — including endpoint and identity controls.