How secure is a VPN? What makes a safe VPN?
Surfing the web can be risky. If you’re using public Wi-Fi, anyone with the password and a little tech know-how can eavesdrop on your online activity. VPNs, or virtual private networks, come in handy by masking your online activity and location, and routing the data you send and receive through a secure virtual tunnel between your computer and the VPN server.
Although VPNs keep prying eyes off your information from the outside, some question the VPNs themselves. After all, can’t they simply track your information? Here’s how to make sure you choose a safe VPN.
Use public Wi-Fi? Help protect your data with Norton Secure VPN bank-grade encryption
With Norton Secure VPN, an encrypted data tunnel helps prevent cybercriminals from hacking into your Wi-Fi connection and intercepting the data you send and receive.
Enjoy a more secure and private online experience when you connect with Norton Secure VPN
How secure is a VPN?
VPNs secure your public internet connection by encrypting your information and shielding your online activity from cybercriminals and even your own Internet Service Provider, or ISP. In terms of your online privacy, the most secure VPNs are also likely transparent about their privacy policies, take steps to fix leaks, and won’t keep logs of your browsing history.
Here’s how an internet connection works without a VPN. When you type a website address into a browser, your ISP taps into your router — that device in your living room with an impossible-to-remember password — to forward your internet traffic to that website. Your ISP also assigns a unique number, called an Internet Protocol (IP) address, to the router, and each computer or phone connected to that router. Some websites, ad networks, and platforms — such as Google, for example — use your IP address to track your location information for marketing purposes.
When you use VPN software, your device connects to the VPN provider’s servers. Your internet traffic passes through the VPN’s internet connection, meaning your private information is cloaked from your ISP and websites so they can’t log your web browsing. As the VPN server mixes your web traffic with others on the server, your IP address appears to match the one associated with the VPN. These steps make it harder for others to monitor and gather information about where you go and what you do online.
The internet privacy solution: virtual private networks
Concerns over internet privacy have been growing in recent years, from talk about government eavesdropping and Facebook data leaks to the rise of laws that control data mining. People typically use VPNs to safeguard against cyber snooping, but this software could also come in handy when folks want to access blocked web pages or mask their online identity and location.
With the end of net neutrality, ISPs are allowed to track your IP address to observe and sell your browsing history, and could potentially throttle your connection as they see fit. VPNs are one answer to the question of how to protect your online privacy because they can provide anonymity and prevent ISPs from tracking your activity.
What factors create a safe VPN?
Not all VPNs provide the same features, and each has its pros and cons. The first step in finding the right VPN for your needs is considering the price tag. It costs money to maintain the infrastructure to operate a VPN service. If VPN providers don’t charge user fees, they may pay for costs through advertising or from gathering and selling your data to third-parties.
Simply put, choosing the right VPN for you might mean paying for one, if you value your online privacy. On average, monthly prices for VPN software can range from $3 to $10, and some providers offer annual pricing at a discount. Next, check for a few must-have features that will ensure you’re using a truly secure and safe VPN. Here’s what to look for.
No IP address leaks
VPNs are meant to hide or disguise your IP address and block others from tracking your online activities. Unfortunately, even with a VPN, sometimes security flaws can reveal your IP location. But you can look for a VPN that specifically works to prevent leaks. And check online reviews to see if the provider has a history of leakage (and what it did to correct it).
A no-log VPN means the network doesn’t collect, or “log,” any information transmitted through the network. It doesn’t save your personal details, where you go online, what you download, or your search history. This ensures your online privacy and anonymity are protected from everybody — even your VPN provider. So, if a cybercriminal does happen to penetrate a no-log VPN, there won’t be much to find.
Before signing up with a VPN, check the company’s terms of service to see if it logs your online activities, whether it keeps logs but periodically purges them, or if the provider would disclose user information in any scenario.
If your VPN connection drops, your internet access downgrades to a regular connection. A VPN kill switch will automatically quit preselected programs if your connection becomes unstable, which reduces the chance of data leaking from sensitive programs.
This security method prompts users to prove their identity in more than one way before signing in to the program — in this case, your VPN account. For example, you might type in a password and then a four-digit code that’s sent via text message. The additional authentication helps ensure only the right people are accessing your VPN and make it harder for anyone to hack into it.
Norton Secure VPN provides internet privacy and security
Norton Secure VPN protects personal information like your passwords, bank details, and credit card numbers when you use public Wi-Fi, whether on a PC, Mac, or mobile device. Using the same encryption technologies as leading banks, Norton Secure VPN helps mask your online activities and location with a no-log VPN — so you can be sure no one is eyeing your data from the inside or outside.
The freedom to connect more securely to Wi-Fi anywhere
With Norton™ Secure VPN, check email, interact on social media and pay bills using public Wi-Fi without worrying about cybercriminals stealing your private information
Try Norton Secure VPN for peace of mind when you connect online
Editorial note: Our articles provide educational information for you. NortonLifeLock offerings may not cover or protect against every type of crime, fraud, or threat we write about. Our goal is to increase awareness about cyber safety. Please review complete Terms during enrollment or setup. Remember that no one can prevent all identity theft or cybercrime, and that LifeLock does not monitor all transactions at all businesses.
Copyright © 2020 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.
No one can prevent all identity theft or cybercrime. Not all products, services and features are available on all devices or operating systems. System requirement information on norton.com.
*Important Subscription, Pricing and Offer Details:
- The price quoted today may include an introductory offer. After that, your membership will automatically renew and be billed at the applicable monthly or annual renewal price found here.
- You can cancel your subscription at my.norton.com or by contacting Member Services & Support. For more details, please visit the Refund Policy.
- Your subscription may include product, service and /or protection updates and features may be added, modified or removed subject to the acceptance of the Customer Agreement.
The number of supported devices allowed under your plan are primarily for personal or household use only. Not for commercial use. If you have issues adding a device, please contact Member Services & Support.
§ Dark Web Monitoring in Norton 360 plans defaults to monitor your email address only. Please login to the portal to review if you can add additional information for monitoring purposes.