A Virtual Private Network (VPN) Is A Must Have For Your Personal Cyber Security
By Theodore “The Wisdom Man” Henderson
Best Selling Author, Certified Social Media Security Professional, Leadership Authority
Author of 30 Smart Ways to Protect Yourself from Cyber Criminals [Kindle Edition]
What a VPN Does
A Virtual Private Network (VPN) connects two computers securely and privately over the Internet,. A VPN “client” on one computer connects to a VPN server on another computer and through the use of encryption and other security tools; no one can see what information is being exchanged.
For example a small business can enable more productivity with tablets, smartphones, and the laptops of employees who are traveling, or remote workers, to connect to the company website as if they were sitting in their remote or home office. The communication or traffic is routed across the Internet between the company and the user but is protected via encryption and cannot be intercepted or read by unauthorized entities. A company that has more than one location or remote and mobile workers can provide a secure link to its resources for all its employees or authorized users.
How a VPNs works
VPNs make use of a client and a server (Click Here for definition of Client/Server). A client program is run on your laptop, tablet or smartphone and it links to a server to establish a secure and private connection. When you turn on a web browser and enter a URL for the website you are seeking the request is sent to the VPN server. The server requests the web page from the site and then sends it to your computer.
Here is where the VPN protects you. Many websites try to determine your identity and location, it queries the computer that that made the request, but that was the VPN server, not the actual requester. If the server is located in the US and has a US IP address for example, the website sees the request coming from a US requestor. Likewise, if you are in the US on vacation or business travel and connect to a UK VPN server then the websites you access believe your are UK based. Your location always appears to be the country where the VPN server is operating.
Communications between the server and your computer are encrypted, so someone spying on you wouldn’t know which websites you access and can’t see private information like passwords, usernames, bank or shopping details and so on. A VPN can be turned on and off as and when you need it.
Free Virtual Private Network Services
1 HotSpot Shield – HotSpot Shieldis one of the most popular free VPN services but the restrictions, compared to its subscription service, are quite severe.
2 PrivateTunnel – In contrast to most of the other VPN service providers that offer a free service and one or more paid-for alternatives, PrivateTunnel has just the one product offering.
3 CyberGhost – The CyberGhost service has servers in the UK and the USA plus many European countries stretching east to as far as Russia and Ukraine.
4 Tunnel Bear – Tunnel Bear operates servers in US, UK, Canada, Germany, France and Japan, plus there’s also one in Australia but this is only for paid customers.
5 Free VPN – CNET offers Free VPN from VPN Master is an easy-to-use VPN tool.
Protect your privacy. Defend yourself against network surveillance and traffic analysis.
Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.
Only you can know if a VPN is necessary for your business needs but one thing all of us know, particularly if we are “road warriors” or remote workers, security is always a concern and a Virtual Private Network can be an excellent cost effective solution. For other straightforward and cost effective ways to protect your mobile device, smartphone, and social media presence take a look at my Kindle e-book. 30 Smart Ways to Protect Yourself from Cyber Criminals [Kindle Edition]
About Theodore Henderson
Theodore Henderson is an Amazon best selling author, Certified Social Media Security Professional Powered by CompTIA, and a Certified Leadership Coach. He is the author of the Security eBook 30 Smart Ways to Protect Yourself from Cyber Criminals aimed at owners of Smartphones, Mobile Devices, and also those who have significant online activities including Social Media, financial services, etc. In addition he authored the eBook “9 Simple Strategies to Becoming A Strong Leader.” He is available for keynotes, seminars, and workshops. He may be reached through www.SocialMediaSecurityTraining.com.
On April 19, 2014 / Cyber Security, General, Internet Safety, Internet Technology, mobile, Online Networking, Security, Smartphone / Leave a comment