Search By Topic:

Popular Topics:



Thought Leadership | Jan 3rd, 2011

What Is a VPN?: Ask the Expert

Kent Lawson

Q: I keep seeing the term VPN. What is it and how does it work?

A: This is a very good question. Not because it is difficult to answer – VPNs are pretty simple, really – but because they will be increasingly important to all of us as individuals.


Here’s why. We all know that our lives have become more mobile. Whether it is laptops, untethered from our desk, or smartphones untethered from landlines, we expect our communications to be ubiquitous and portable. But do we also expect them to be private?

Look at what’s changed. When we cut the cord of our phone or our desktop’s broadband service, we are replacing the hard-wired connections we had been using with radio waves.

Like any radio waves, all it takes is another radio receiver tuned to the right channel to listen in. Further, it is two-way radio, so anything that you send or receive is vulnerable. VPNs, as I will explain below, are needed to protect your wireless Internet communications from being intercepted by others.

A Little History

Early on, companies leased point-to-point lines from telephone companies to provide communication between their offices. These were called “private networks” and the lines were reasonably secure, since it would take a significant amount of knowledge and effort to break into them.

When the Internet began to develop, it became much cheaper to give up dedicated, physical lines and move corporate communications to the public network. The only problem is, that made communications much more vulnerable to being intercepted by others. The solution was to encrypt it. That way, no one could read, or, worse, modify, the information being transmitted. This became known as a Virtual Private Network, or VPN, and companies have been using them for at least fifteen years.

A VPN simply uses a public network to communicate securely between two points. The security is provided by encryption, and the two sides must both use the same encryption algorithm and key for it to work. This means that no one else can understand, or more importantly, modify the information being communicated.

But it takes a major corporate IT department, or at least a fifteen year old geek, to maintain a VPN.

At least until recently. Now there are companies offering personal, subscription-based VPN services. For a small monthly fee ($9.95/month, in the case of the PRIVATE WiFi™ product), you can be assured that your private communications will stay private.

That is important because you have no control over those radio waves that are bouncing around Starbucks or the airport lounge. At the same time they are being sent from the WiFi router to your PC, iPad, or smart phone, they can be listened to by anyone else in the room. It is frighteningly easy to do.

When you use a personal VPN like PRIVATE WiFi, it installs a small piece of software on your PC, which does the encrypting and decrypting. It connects automatically to a remote server which decrypts your communication and sends it on to the ultimate destination – whether that is an email account, a SMS user, or a shopping site.

We all now know that we need firewalls and antivirus software to protect our computer from being hacked. Similarly, I believe that everyone who uses a laptop, iPad, or smartphone needs a VPN to protect their communications from hackers in wifi hotspots. It is the last major unprotected risk.

Editor's note: Have a question for Kent? Send in your question about wifi, Internet privacy, or any similar topic and we may feature that topic in an upcoming "Ask the Expert" column as part of our new, ongoing monthly series. Email your question to

Associated Topics:

Associated Topics:


Related Posts

Cyber Security Training Just As Important at C-Level

Thought Leadership
Eva Velasquez | Mar 24th, 2015

The need for better online safety training to prevent data breaches is a hot topic right now. Coupled with stronger computer and network policies, companies want to prevent the hacking events that leave businesses susceptible to a data breach. While it’s no secret that employees in both the private sector and government service can unintentionally expose organizations to hackers, what is surprising is a report by Wombat Security that shows that 33% of CEOs fell for phishing attacks that led to network access. Why are they falling for this kind of internet activity? Read More

FTC Says Hotel WiFi is Dangerous

Thought Leadership
Kent Lawson | Feb 23rd, 2015

Recently, the FTC posted an article on their website stating that hotel WiFi is dangerous and that users should not assume that just because they pay for Internet access that their connection is secure.

We couldn’t agree more. In fact, I have been stating this fact since we launched PRIVATE WiFi nearly five years ago.  This is an important topic because hotel traveler’s rank WiFi access at hotels as the number one amenity that they look for when booking hotel rooms. Read More

Managing BYOD Security Threats: VPNs Mitigate The Risks

Thought Leadership
Kent Lawson | Jan 28th, 2015

It’s clear that the era of BYOD is here to stay. Workers are no longer confined to an office desk and computer, and instead are able to do work from anywhere: home, their local coffee shop, and while taking public transportation. The proliferation of public wireless networks has made this possible, and while this has freed employees up to do work from nearly everywhere, it also has introduced many security challenges. Read More

Don’t Get Hacked At CES

News & Features
Jan Legnitto | Jan 2nd, 2015

It’s that time of year again – when more than 150,000 gadget geeks, techies and businesses from around the world descend on Las Vegas for the mother of all trade shows – the International Consumer Electronics Show. With over 3,200 exhibitors previewing and showcasing their high tech products, CES is the perfect place for tech enthusiasts to network. So you’d think it would be safe for attendees to connect their laptops and mobile devices to the event’s public WiFi hotspot.  But you’d be wrong. Like most big events, CES can be a hot spot for hackers.  If you’re going to be there, make sure you don’t become a target. Read More


Thank you for subscribing to our newsletters

Your email has been added to our system. You will be e-mailed shortly with a request to confirm your membership. Please make sure to click the link in that message to confirm your subscription.