{"id":1788,"date":"2013-05-03T10:00:33","date_gmt":"2013-05-03T14:00:33","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/?p=1788"},"modified":"2020-02-26T18:29:49","modified_gmt":"2020-02-26T16:29:49","slug":"vpns-use","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/vpns-use\/1788\/","title":{"rendered":"VPNs and Why You Should Use Them"},"content":{"rendered":"<p>Virtual Private Networks, or VPNs for short, have become increasingly essential of late as we more often access sensitive data from remote locations \u2014\u00a0and as the threat of having our sensitive data stolen by attackers has increased. Here\u2019s what you should know.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2013\/05\/06050930\/vpn_title.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1789 aligncenter\" alt=\"VPN\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2013\/05\/06050930\/vpn_title.jpg\" width=\"640\" height=\"420\"><\/a><\/p>\n<ul>\n<li><a href=\"http:\/\/www.howstuffworks.com\/vpn.htm\" target=\"_blank\" rel=\"noopener nofollow\">What a VPN Does<\/a>: VPNs provide a secure connection over the Internet between a user and the data or websites to which they connect and encrypts the data exchanged across that connection. A user opens a VPN portal on their system \u2014 or their tablets and mobile devices \u2014 or navigates to a VPN website, and from there operates under the VPNs protection through the VPN-specific series of protected computers and networks.\n<div class=\"pullquote\">VPNs provide a secure connection over the Internet between a user and the data or websites to which they connect and encrypts the data exchanged across that connection.<\/div>\n<\/li>\n<\/ul>\n<ul>\n<li><b>Why Use a VPN<\/b>: To the extent that the general public is familiar with VPNs, most people probably think of it as a corporate protocol for business travelers and people who work remotely \u2014 something to use to protect your company\u2019s data. That\u2019s not the case anymore. VPNs are used for\u00a0<a href=\"http:\/\/lifehacker.com\/5940565\/why-you-should-start-using-a-vpn-and-how-to-choose-the-best-one-for-your-needs\" target=\"_blank\" rel=\"noopener nofollow\">lots of reasons<\/a> \u2014 they are particularly useful for business travelers and people who download massive amounts of data \u2014but the underlying theme is that it is the best way to ensure that your data is always protected. It\u2019s an added safety measure if you already work on a secure network, but it\u2019s critical to use VPNs over open public Wi-Fi connections \u2014 hence their origins in the traveling corporate space. Attackers prey on unsuspecting people in coffee shops, hotels and airports, but a VPN provides the security to stop them.<\/li>\n<\/ul>\n<ul>\n<li><b>Which VPNs to Use<\/b>: There are lots of VPNs to choose from, some of which are free, some of which are not \u2014 but we\u2019re not talking astronomical prices, more in the $5-$10\/month range. Among the most popular paid VPNs are <a href=\"https:\/\/secure.logmein.com\/products\/hamachi\/\" target=\"_blank\" rel=\"noopener nofollow\">Hamachi<\/a>, <a href=\"https:\/\/www.privateinternetaccess.com\/\" target=\"_blank\" rel=\"noopener nofollow\">Private Internet Access<\/a> and <a href=\"https:\/\/www.astrill.com\/\" target=\"_blank\" rel=\"noopener nofollow\">Astrill<\/a>. Some of the most popular free VPNS are <a href=\"https:\/\/www.shrew.net\/software\" target=\"_blank\" rel=\"noopener nofollow\">Shrew Soft<\/a>, <a href=\"http:\/\/www.comodo.com\/home\/email-security\/vpn-access.php\" target=\"_blank\" rel=\"noopener nofollow\">Comodo Unite<\/a> and the free\/basic version of Hamachi.<\/li>\n<\/ul>\n<ul>\n<li><b>Note of Caution<\/b>: Like all security measures, though, no even the securest of VPNs <a href=\"https:\/\/threatpost.com\/cisco-patches-vulnerabilities-vpn-client-ace-product-062212\/\" target=\"_blank\" rel=\"noopener nofollow\">can be exploited<\/a>. And a VPN can\u2019t protect you if you choose to download malicious files, which is why you still have to be as cautious as ever about the emails you open, the attachments you download and the links you click through. Because VPNs aren\u2019t 100 percent secure, it is still essential to use a robust security suite like <a href=\"https:\/\/usa.kaspersky.com\/products-services\/home-computer-security\/pure?0\" target=\"_blank\" rel=\"noopener\">Kaspersky PURE 3.0<\/a>, which provides a high level or protection while ensuring your system\u2019s speed and efficiency, while programs like <a href=\"https:\/\/www.kaspersky.co.za\/blog\/kaspersky-internet-security-safe-money\/\" target=\"_blank\" rel=\"noopener\">Kaspersky Internet Security<\/a> help you secure your online activity, protecting you from potential attacks \u2014 with or without a VPN.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Virtual Private Networks, or VPNs for short, have become increasingly essential of late as we more often access sensitive data from remote locations \u2014\u00a0and as the threat of having our<\/p>\n","protected":false},"author":41,"featured_media":1790,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[75,189],"class_list":{"0":"post-1788","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-browser-security","9":"tag-data-security"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/vpns-use\/1788\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/vpns-use\/1788\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/vpns-use\/1788\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/vpns-use\/1788\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/vpns-use\/1788\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/vpns-use\/1788\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/vpns-use\/803\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/vpns-use\/1788\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/browser-security\/","name":"browser security"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/1788","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=1788"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/1788\/revisions"}],"predecessor-version":[{"id":25772,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/1788\/revisions\/25772"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/1790"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=1788"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=1788"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=1788"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}