ESET's Jake Moore (Security Specialist) responded to an interview with the magazine and said:"Security and privacy are indispensable and must be implemented in all devices that remotely connect to the network."
If you look for a VPN, you can see that a wide variety of providers are in.Moore recommends reading a review when choosing because there are many unknown providers.
"There are many unknown companies in the VPN market. It is important to read the reviews of the company's products and confirm honest opinions. However, many reviews that support the product are made for a fee."
Moore recommends not only reading reviews, but also understanding the risk of using VPN."Rarely, there are VPNs with trackers in software and even VPNs that infect malware. The key to finding the right solution is to investigate each provider in detail."
Sean Light of Immersive Labs, an application security officer, agrees that VPN is an important tool for companies and must investigate to select a provider.
"VPN is essentially an infrastructure with highly important and density. All traffic will go through VPN. To find a proper service provider and select it, take a long time.That is essential "
"Especially when using public Wi-Fi and other public networks, VPN provides excellent security. But inappropriate services may increase risk. Cryptoclains such as HTTPS are reduced such risks.It is a little useful. However, many requests are still performed in plain texts such as plain DNS. "
Like Moore, Wright also emphasizes the importance of considering the impact on privacy when using VPN."All traffic is routed via a service provider. Therefore, even if it is not all of the traffic, some of them may be able to see others.. Free services may be supported by advertising and other revenue. In such a service, there is a risk that personal information will be tracked by some means. "
Mr. Wright also recommends the voice of the VPN provider's customer, especially the opinions on the smartphone app store.It will be helpful because various advantages and weaknesses are detailed.
Light says that it is possible for companies to create their own VPN.But if you don't have the experience of developing VPN, you may be risky.According to him, using tools such as "Pivpn" makes it easier to create and set VPN.But knowledge is important."It is necessary to understand what you are doing, such as not allowing unintended connections and configuring the network correctly to allow VPN connections."
Elements to be considered
There are a wide variety of important factors to consider when searching for VPN.That is said to be MalwareBytes Jean -Philip Tagart (advanced security researcher).First, it is necessary to make sure that the VPN service has a strict policy that does not record logs.This policy helps to improve the entire privacy.
"The ideal scenario is to minimize logs. Less logs will enhance privacy. There is no problem without logs. One of the main purposes using VPN is enhanced end user privacy.To do it. Therefore, the first thing to evaluate is the presence or absence of logs. "
"There are many VPN providers who do not record any logs. However, they may record logs in important situations. The Internet is how the candidate's vpn provider logs are different.It is worth checking in. "
I would like to check the location of the VPN provider headquarters.Depending on the location, the laws applied to the company may change.
"There are cases where VPNs are used to escape the censorship of the nation. If there is a VPN provider base in such censorship, the government requests the provider to deliver logs and forced the logging of logs.There is no way to prevent using the system to track users, "(Tagart)
In the second part, we will continue to introduce the items to be confirmed when the VPN selection and the VPN provider should be asked.