Finally, A VPN Explanation for the Non-Technical World

Finally, A VPN Explanation for the Non-Technical World

If you think online data breaches only affect big companies, think again: a recent report from DataProt revealed that a staggering 59 percent of individual internet users reported being victims of cybercrime. 

In 2018 alone, 105 million Americans were victims, and that number has only increased since the pandemic empowered people to increase their online activity. The first safeguard for enhancing your online privacy is a VPN, which stands for Virtual Private Network. So how can you protect yourself? Read on to learn What is a VPN and a brief explanation of how it works.

A Little Background: The Threat is Real

From spoof websites designed to look identical to known sites to infected links, phishing for information, and installing spyware to track your activities, the threat of personal breaches is very real for all internet users.

How do hackers target their victims?

Corporations are frequently targeted through a vetting process that can include research into leadership, payroll and human resources information, and financial institutions used by the organization. 

Hackers will then create a targeted hacking campaign to assess the weaknesses of the organization’s cybersecurity, such as phishing emails and infected links. Organizations use a combination of VPN, multi-factor authentication, robust cybersecurity tools, and employee training to protect themselves from hackers.

Individuals, however, are frequently less cyber-savvy and often practice weak password management and lax security awareness. Hackers will send threatening emails with infected links, offer contest entries, and create doubt about alleged online purchases. Some hackers will send “too good to be true” offers on products to encourage buyers to provide credit card information. 

These buyers will never see their products, and the hackers will have this account information to create fraudulent charges and new accounts in the victim’s name. By the time the victim is aware of the hack, the site has disappeared along with any hope they have to be refunded or to track the hackers.

Social media hacking is on the rise, with bad actors cloning accounts or creating fake profiles and sending friend requests and infected links to your friends and followers in the hopes of hacking them as well.

What do hackers look for?

Hackers are looking for the most “bang for their buck” by sending mass emails and blanket advertising on social media sites. If they send a thousand emails and only one person falls for their trick, it is still a success for the hacker. Hackers are looking for:

  • Social security numbers and birthdates
  • Physical addresses
  • Account numbers 
  • Credit card information
  • Confirmation of held accounts
  • Passwords

With so many weapons in their arsenal, it’s no surprise that over half of internet users fall victim to bad actors. This is why layered security, including the use of a VPN, is so important for individuals as well as organizations.

What do hackers do with your information?

Once your information is exposed, hackers can use your passwords to gain access to financial information, get more personal information to create new accounts in your name, and sell your information on the dark web for criminals to purchase and use.

What is a Virtual Private Network?

You’ve probably been hearing more and more about VPNs for home use, public wifi protection, and safe internet usage during travel. That’s because it’s vitally important to be smart and safe while you’re on the internet, wherever you are. A VPN can make the internet safer, more secure, and more private. It allows access to the web without being tracked, monitored, and identified.

A VPN is an easy way to add an extra layer of security to your online activities. It takes your internet connection and makes it more secure by masking your individual IP address with a temporary one, hiding your true IP address from every connection you make online. 

A VPN is a service that you sign up for online for a small monthly charge. Once you have an account, your VPN service should be “on” when you’re online

VPNs are not a new concept. Microsoft developed the idea in 1996 to allow employees to access the tech giant’s network remotely. VPNs are now standard in nearly every organization, and growing steadily as a security resource for individual internet users and networks worldwide.

  • A VPN is Virtual…because it’s as if you have a private connection directly to any website or another computer you connect to.
  • Better yet, it’s also Private…because all your website visits and online activity is between you and the websites you visit.
  • It’s also a secure Network…because you’re using a special network of VPN servers that covers the entire globe.

What does a VPN do?

Consider it a cloak of invisibility that allows you to move freely around the web without detection. VPNs encrypt your connections and make you virtually anonymous online. It can even allow access to censored sites and blocks. It reroutes your internet traffic through a server, making your activities appear to originate from that server instead of your personal IP address.

Why Hide an IP address?

Your IP address is a behind-the-scenes number your Internet provider assigns to your computer that allows you to go anywhere on the Internet. It’s something like the house number on your home. Unfortunately, your IP address also gives away your computing location, at home or on the road. 

Governments and bad actors have tracked people down by their IP address, with the help of the person’s Internet Service Provider. Also, online businesses of all kinds monitor activity coming from IP addresses. They may not know your name, but they know you like their website.

Online companies and networks can (and do) restrict someone’s access to a website based on where the user is located. Your location is given away by your IP address. 

It’s not enough that you can be tracked and monitored through your IP address. Hackers can break into networks and sometimes take over devices. Once on your device, these hackers can track all of your information including stored passwords, financial information, and accounts of all kinds.

Bad actors will also sell your IP address on the dark web so other bad actors can access your devices as well.

How does a VPN work?

A VPN is a service that encrypts data. Encryption turns recognizable information into a garbled collection of unreadable code for anyone who doesn’t have a key to decode it. The only entities who hold these keys are your device and your VPN provider. For everyone else, especially those online spies, your information is unreadable. This feature, combined with hiding your IP address, makes a VPN a smart layer of security for all your devices.

Once in place, a VPN will not affect the quality of your online activities in any way.

What Devices Will a VPN Protect?

A VPN can be used for every device with internet access:

  • Personal computers
  • Smartphones and devices
  • Tablets and laptops
  • Company location: Not necessarily the geophysical location of the company, but the company’s jurisdiction and applicable local data retention laws
  • Multiple device VPN capabilities: All your devices should be covered under one subscription
  • Fees: While some services are free, the better VPN providers will be subscription-based
  • Killswitch: Automatically blocks devices from connecting to unprotected and unverified sources
  • Internet speed: The VPN shouldn’t significantly affect your connection speeds or create lags when in use
  • Trustworthiness: Do your research and read reviews of your VPN choices before committing to a contract
  • Robust encryption: Look for AES-256 level encryption, widely considered the “gold standard”
  • Privacy policies: The provider should not keep records of your activities while using the VPN 
  • DNS security: The VPN should protect against Domain Name Server leaks to your ISP provider

VPNs can be used on all operating systems, including MAC and Windows.

What Are the Benefits of Using a VPN?

A virtual private network levels the playing field in a world of ever-increasing, ever-evolving cybercrime targeting both businesses and individuals.  A VPN account instantly and consistently provides: 

  • More privacy. Your connections cannot be linked to your computer or your identity. You can visit any website and your ISP doesn’t know where you’ve been.
  • Better security. VPN connections are super secure. The network is hack proof and all of your internet activity is encrypted (coded) and unreadable in transit.
  • Increased website access. No more blocks or censorship. They can’t prevent you from getting to websites based on an IP address.
  • Greater anonymity. Your true IP address is hidden. You’re unidentifiable online because you’re constantly using a different IP address, never your own. In fact, it typically looks as if you’re in a different part of the world from where you really are.
  • Peace of mind: Knowing you have added an extra tool to your cybersecurity arsenal will give you the confidence to browse, game, and shop online with less fear of being hacked.

How to Get a VPN

Getting a VPN is as simple as finding a provider and package that suits your needs. Some considerations for making your choice include:

Most VPN providers offer free trials. Take advantage of these trials to make sure the services promised are what you need before signing on the dotted line.

Check out our VPN

Click here to download VPN Junkie in the Google play store.

Getting started with your VPN

Once you’ve selected the VPN provider and the terms of the agreement, it’s time to install the program on your devices.

This is frequently as simple as downloading the provider’s app or downloading the program directly from the company website. Once installed, you will be prompted to log in. You will be automatically connected to a VPN server, frequently one that is closest to your physical location so that your internet speed isn’t affected.

  • Data limits
  • Streaming capabilities
  • Number of devices covered
  • Number of available servers
  • Length of contract

You can choose to manually make changes within your operating system, but this is unnecessarily complicated and can keep you from enjoying all the benefits of the VPN.

Choosing the right VPN server

Your device will automatically connect to a server that is close to your location, but you may choose to find servers that are better suited for activities such as gaming or streaming. You may even opt to use a server from a different country to avoid blocks and censorship imposed by that country and access region-locked sites across the world.

How Much Does a VPN Cost?

While there are free VPN providers, they may not offer the same features, speed, and privacy as paid subscriptions. There are a few factors that may impact subscription prices, such as:

The average cost of a VPN per month is just under $10, but providers will offer heavy discounts for annual subscriptions. You may be able to save up to 70% with a longer-term agreement, bringing your monthly price down to $2 per month for some providers. A two-year contract costs an average of $3.40 per month.

VPN providers may also offer packages and upgrades, such as ad blockers and antivirus, for a small increase in price. If you’re looking for a complete security toolkit, these upgrades will help you patch up existing holes in your current antivirus protections.

What A VPN Can’t Do

VPNs will block your information from online spies and public wifi threats. It encrypts data so that, even if your information is hacked, it cannot be used by bad actors. It’s important to note that even though a VPN will protect your browsing and internet history, it will not protect against a user’s risky behaviors.

You will still be at risk for a breach if you install suspicious files, open spam and phishing emails, and don’t follow strong password creation strategies.

That’s why a VPN is only one layer, although an important one,  of a comprehensive cybersecurity strategy. Practicing safe online behaviors and a good antivirus will help patch the holes in your security.

Zero trust

Never click a link in a text or email, even if it is allegedly from your bank or a government agency. Go directly to the official website and seek your notifications there.

No suspicious downloads

If you’ve received a document via email or text and were not expecting one, never download it onto your computer. This includes orders you never authorized, financial documents, and other documents labeled “urgent.” As above, go directly to the official website and look for the download there.

Beware the social media DMs

Never open any link shared via social media messenger until you have contacted the sender and verified the link. These are usually malicious links and, as discussed earlier, sent from cloned or fraudulent accounts.

Recognize spam

Spam emails and texts are pretty easy to recognize once you identify common mistakes hackers make.

  • English is nonsensical: Hackers will not follow proper grammar and spelling. This is a dead giveaway that the message is malicious.
  • Unusual fonts: Hackers will frequently use unusual, unprofessional appearing fonts in the subject line.
  • Threatening: Messages sent by bad actors will frequently appear threatening, hoping to frighten the recipient into action. These include the “restricted account” and “unusual activity” messages from financial institutions. 
  • Unexpected:  You will expect receipts and communications from sites you’ve made purchases from, but never trust a message about a purchase you didn’t authorize. Go to the vendor’s website and check your order history; never click on these links.
  • Company name misspelling: Look for variations and misspellings of the alleged company name. These can be very subtle, such as “AmaZon.”
  • The sender doesn’t match the organization: Hover over the sender to check that the address is from the company it claims to represent.
  • Your name is misspelled: Your name may be misspelled in the subject line or elsewhere in the message.
  • Your name is not used at all: Organizations will address you by the name they have on file for you. Never trust a message addressed to “valued customer” or other generic references.

Select which best describes what you want most from your VPN:

I want protection from hackers on public Wi-Fi and other unsecured networks.
I want to bypass Netflix restrictions, geo-restrictions and other internet filters.
I want to prevent my government, ISP and advertisers from tracking me.


Leave a Comment

Your email address will not be published. Required fields are marked *