top of page

VPNs Are Used For More Than Just Watching Netflix!

What is a VPN?

A virtual private network (VPN) is an internet security service that allows users to access the Internet as though they were connected to a private network. This encrypts Internet communications as well as providing a strong degree of anonymity. Some of the most common reasons people use VPNs are to protect against snooping on public WiFi, to circumvent Internet censorship, or to connect to a business’s internal network for the purpose of remote work.

How does a VPN work?

Ordinarily, most Internet traffic is unencrypted and very public. When a user creates an Internet connection, such as visiting a website in a browser, the user’s device will connect to their Internet Service Provider (ISP), and then the ISP will connect to the Internet to find the appropriate web server to communicate with to fetch the request website.


Information about the user is exposed in every step of the website request. Since the user’s IP address is exposed throughout the process, the ISP and any other intermediary can keep logs of the user’s browsing habits. Additionally, the data flowing between the user’s device and the web server is unencrypted; this creates opportunities for malicious actors to spy on the data or perpetrate attacks on the user, such as a on-path attack.


Conversely, a user connecting to the Internet using a VPN service has a higher level of security and privacy.


A VPN connection involves the following 4 steps:


1. The VPN client* connects to the ISP using an encrypted connection.


2. The ISP connects the VPN client to the VPN server, maintaining the encrypted connection.


3. The VPN server decrypts the data from the user’s device and then connects to the Internet to access the web server in an unencrypted communication.


4. The VPN server creates an encrypted connection with the client, known as a ‘VPN tunnel’.


The VPN tunnel between the VPN client and VPN server passes through the ISP, but since all the data is encrypted, the ISP cannot see the user’s activity. The VPN server’s communications with the Internet are unencrypted, but the web servers will only log the IP address of the VPN server, which gives them no information about the user.


*The VPN client is the VPN software installed on the user’s device.

Is a VPN only for people with something to hide?

As with other Internet privacy services, VPNs are sometimes categorized as tools for illegal or subversive activity. The truth is that there are a number of valid and legitimate reasons to use a VPN. Here are a few of the most common:


Protection over public WiFi - Users who go on public WiFi networks without a VPN are putting themselves at risk. Their Internet traffic is unencrypted, and other users on the same network can monitor their activity using easily accessible tools. This is a common way for attackers to steal login credentials and other sensitive information. If a user is connected through a VPN, a snooping attacker will only be able to see encrypted data, which won’t reveal any sensitive information.


Remote work - Many businesses allow their employees to work remotely using a VPN. This can allow the remote employee to have access to the company’s internal network, as well as provide encryption to protect the business from attackers or spying.


Freedom from censorship in oppressive states - In some parts of the world, expressing or even reading views that are critical of the government is forbidden. Many of these states also provide their citizens with a suppressed version of the Internet that blocks significant amounts of domains. People accessing the Internet in these states can use a VPN to access content that their state wants blocked, as well as speak freely online, since VPN encryption protects their activity from state surveillance.


Location anonymity - Some web services will restrict or filter content based on the location of the user. A VPN can be used to anonymize a user’s location and get around these restrictions.


The right to online privacy - ISPs have been known to sell the private data of their uses. Similarly, some websites will sell information about their visitors. The privacy offered by VPN services enable consumers to opt out of having their data harvested.

What are the downsides of a VPN?

A VPN service doesn’t guarantee an increased level of security; users can only feel secure with a VPN if they trust the VPN provider. A dishonest VPN provider could sell their users’ information or leave them open to attacks. It’s also worth noting that most VPN services come at a recurring monthly cost. Some VPN users may also experience issues with performance.

How does a VPN affect performance?

Some users will experience performance degradation from a VPN, and this depends largely on which VPN service they are using. Not all VPNs are created equal, and if a VPN service does not have the server capacity to handle the load created by their users, those users will experience a slowdown in their Internet connection.


Additionally, if a VPN is located a great distance from both the user and the web server they are trying to access, the resulting travel time can create latency. For example, if a user in Los Angles is accessing a web site whose servers are also in Settle, but that user’s VPN service is located in New York, the user’s request will have to travel across the United States and back before connecting to a server just a few miles away. This is sometimes called the trombone effect.



Conclusion


VPNs are an effective tool to protect sensitive data from the prying eyes of hackers and snoopers. Blocking off your data stream from deliberate eavesdropping gives you a higher level of anonymity and security, giving your data the security it deserves.


If this topic and others are valuable we hope you come back form more. If you have cybersecurity questions or concerns please feel free to reach out to us!

11 views0 comments

Recent Posts

See All

Cybersecurity attacks are on the rise, especially since the onset of the COVID-19 pandemic. Cybercriminals are attacking all businesses, including critical infrastructure and members of the global sup

Microsoft warns about the recently patched Windows MSHTML remote code execution vulnerability tracked (CVE-2021-40444) that has been under active exploitation by multiple threat actors including ranso

The fourth industrial revolution, dubbed Industry 4.0, introduces the use of Cyber Physical Systems (CPSs) in production processes, where the industrial internet of things (IIoT), machine learning, an

bottom of page