What is a VPN and what it can do to secure your information online
On many occasions, we have recommended readers to use a private network VPN when connected to a wireless network (Wi-Fi) public. In this way, traffic that is generated travels encrypted and it is difficult that a third party can steal confidential information. In this post, we’ll explain more about this type of networks, some applications that will give, encryption protocols, among other relevant information.
A VPN (Virtual Private Network) is a networking technology that is used to connect one or more computers to a private network using the Internet. Companies often use a VPN so that its employees from their homes, hotels, etc., can access to corporate resources that otherwise could not. However, connect the computer of an employee to the corporate resources is just a function of a VPN. In conjunction with the above, a correct implementation of this technology ensures the confidentiality and integrity of the information.
As you can guess it, via a VPN what private and confidential information in the wrong hands, it could be detrimental to any company. This is exacerbated if the employee in question is connected using a public Wi-Fi without protection. Fortunately, this problem can be mitigated by encrypting the data that is sent and received. To achieve this goal, you can use the following protocols:
IPsec (Internet Protocol Security): it allows to improve security through robust encryption algorithms and a more comprehensive authentication system. IPsec has two methods of encryption, transport mode and tunnel mode. Also supports encryption from 56 bit and 168 bit (triple DES).
PPTP/MPPE: technology developed by a consortium of several companies. PPTP supports multiple VPN protocols with encryption-40 bit and 128 bit using the Protocol Microsoft Point to Point Encryption (MPPE). PPTP by itself only but does not encrypt the information.
L2TP/IPsec (L2TP over IPsec): technology capable of providing the level of protection of IPsec on the L2TP tunneling protocol. Like PPTP, L2TP does not encrypt the information itself.
Part of the protection of the information that travels through a VPN encryption, however, make sure that it stays full is just as momentous. To achieve this, IPsec uses a mechanism that detects any changes within a package, whether to dismiss it. Protect the confidentiality and integrity of information by using a top VPN service is a good measure to navigate public and insecure Wi-Fi even if you don’t want access to a corporate resource.
On the other hand, home users who wish to use a VPN network, can choose between free and others pay. It is important to mention that those free tend to run slower than one that is not. Also, we recommend reading our guide of security in wireless networks where other measures that can be taken to use a public wireless connection in a more secure manner are reviewed.