VPNs – What, How & Why?

Jun 24, 2021

Did you know our Managed Firewall Service includes VPN capabilities to allow your staff to securely work remotely?

More Info

What is a VPN?

A VPN (Virtual private network) is an online service used for securing and privatising your internet browsing activities by connecting device(s) to an encrypted, private network. When using a VPN, anything performed online will first be sent to the VPNs server, where identifiable details such as your IP address and location will be modified, and your connection will be encrypted. Ultimately, anyone who tries accessing this data will not be able to identify you or any of your personal data.


Typically, VPNs are used by those who want to increase their online privacy by restricting the amount of data that would usually be accessible by your ISPs (Internet Service Provider) and by anyone trying to gain access on public Wi-Fi.

How VPNs work


A VPN creates a point-to-point tunnelling connection only accessible by authorised users. Your device therefore connects to another network, encrypting your data and hiding your real IP address. The way a VPN does this is by masking your computers dynamic IP address with a dedicated or static IP address located anywhere around the world.


What is an IP address?


An Internet Protocol address is a string of numbers such as (192.143.1.55), which are assigned to your devices that can connect the internet. They are used to identify the location of such devices. Think of your home address, if somebody needed to send you a letter, they would use your home address – in return, if you wanted to reply, you would use their address to communicate back.

There are different types of IP addresses such as:


  • Dynamic IP – Assigned by DHCP (Dynamic Host Configuration Protocol) and will consistently change over time
  • Static IP – The opposite of dynamic, these IP addresses do not change
  • Public IP – Assigned to a router or network and used for external communications. Can be used to identify you
  • Private IP – Assigned independently to all devices on your network to identify devices connected. These IP addresses are not unique and cannot be used to identify you
  • Shared IP– Refers to websites who share an IP address with other domains
  • Dedicated IP – Refers to websites with their own dedicated IP


Different types of VPNs


Site-to-site VPNs –

A connection between two or more networks, such as an organisation with many offices/branches in different locations. This VPN will allow all offices secure access to the organisations network remotely so that they can continue to share resources and communicate safely.


Remote access VPNs –

Users away from their organisation, such as those working remotely will authenticate themselves to a remote VPN gateway for their organisations network server. Once authenticated, access will be given, and the user will have access to the organisation while on a secure, private connection.


Hardware VPNs –

Although more expensive and seen in larger organisations, Hardware VPNs can provide many benefits to an organisation such as load balancing. This standalone device includes a dedicated processor while managing to everything a typical VPN would but with increased levels of security.


DMVPNs –

A Dynamic multipoint VPN allows data exchange between sites without needing to pass through the organisations VPN server or router. By creating a mesh VPN service that runs on the VPNs routers and firewall concentrators, each remote site will have a router configured to connect to the main office branch, providing access to needed resources.


Mobile VPNs –

A mobile VPN will typically be placed on the edge on a company network allowing secure tunnelled access. Mobile VPNs provide continuous service and can allow users to switch across multiple networks, whether they are public or private.


VPN Appliance –

A router that provides protection, authorisation, authentication, and secure encryption for VPNs.


Why use a VPN?


Privacy - It is relatively easy to use an IP address to spy on somebody. But, by using a VPN your IP address is hidden and anything you do online will appear to come from the exit node (location) you selected for your VPNs tunnel. Anyone interested in viewing your history, identity and/or location will not be able to access this data as it will have been encrypted by your VPN.


An advantage of this is that if some websites or services may blacklist certain IP addresses in country A but not country B - you can use a VPN to mask your public IP address into an IP address that relates to country B to be able to access these websites. People use this method to access geo-restricted content on streaming services such as Netflix.

Another benefit with VPNs masking your identity is that it makes it extremely difficult for advertisers to identify you and advertise target specific ads.

 

Publicly accessible Wi-Fi – We have all been there, out and about, no access to the internet and an increasing urge to look at our emails, check our bank balance or post something online. What do you do? You look for any publicly available networks. Nothing wrong with that, right?


The truth is, anything you do on a public network is, well, public! Public Wi-Fi is described as the virtual playground for hackers as they can easily access your data. if you were to do anything such as logging into online banking or emailing customers with personal details, you can be certain that whoever has access to the network also now knows these details too – it is scary to think that something so simple can create so many vulnerabilities.


If you ever find yourself in a similar situation and must connect to public Wi-Fi, then we recommend:


  • Ensuring the public network is from a trusted source – hackers can and will create real-sounding public networks to entice people into connect to them
  • Only visit websites that are secure – sites with https:// are using the latest encryption protocols whereas sites using http:// are not
  • Make sure that your device is using an optimal firewall  – We are currently offering a Free Firewall audit to help identify any weaknesses in your current firewall and a Managed Firewall Service to help you make the necersarry steps.
  • Do not communicate sensitive data – You are responsible for ensuring sensitive data remains private – especially if the data belongs to your customers
  • Do not log into online banking – only use websites that are secure low-risk such as listening to music
  • Use a VPN – connect to an encrypted network and disguise your activity 

Why buy our Managed Firewall Service?

Improve your businesses Firewall by adding VPN capabilities:

Using a VPN service with your online devices or firewall can offer many benefits for your business - especially with remote staff. As Cyber Security Experts, JC Cyber Security have a long history of managing complex networks, infastructure, and applications in which our customers' firewalls are operating. We are proud to offer a Managed Firewall Service that can be easily tailored to your businesses needs and requirements. With the aim of providing peace of mind, we reduce risk and ensure ongoing compliance while monitoring your network 24/7, 365 days a year.


If you would like to know more about how your business can use VPNs and/or managed firewall services to secure your business, don't hesitate to speak with one of our cyber security experts today.

Follow Us

Be the first to know

You might also like

08 Apr, 2024
‘Hacking’ refers to activities performed by a threat actor (a ‘hacker’) that seeks to compromise digital services, such as computers, smartphones, and networks. Hackers are usually characterised as only being unlawful, motivated by financial gain, information gathering, or even just for the thrill of having a challenge.
Different Penetration Testing Types
01 Apr, 2024
Penetration testing is a form of an ethical hacking simulation conducted in accordance with industry guidelines, which aims to closely mimic real-world targeted attacks that organisations face daily. By actively testing your organisation’s defences, you can understand your security posture while also improving your defences, reducing the likelihood of experiencing a cyber-attack, ensuring confidentiality, integrity, and availability
What is Penetration Testing?
25 Mar, 2024
A penetration test ultimately seeks to answer the question “How effective is my organisation’s security controls against a skilled human hacker?” while determining the security posture of your organisation.
More Posts
Share by: