Using a VPN: Security, Privacy and Performance Concerns
The bewildering COVID-19 pandemic, categorically speaking, changed how industrialized countries like ours (USA) operated for years. One of the greater dichotomies associated with the new reality was the necessity of telework. This a contradictory topic because a substantial percentage of small and medium-sized businesses, the major contributors to the national economy like in many other countries, were unprepared to approach such a situation effectively. One of the many problems related to telework is how to do it securely, and here is the foundation of this article (an extract from the report ‘Masked Identities, Unmasked Truths: The Paradox of VPN Security’), how can we connect to work from a remote location and operate under similar levels of cybersecurity we have when working at the office?
If you are one of those fans who defend VPNs as the best solution to connect remotely, one of those willing to put their hands "on fire" to protect the use of VPNs, this article may not be for you, but if you are eager to listen to different points of view, then you might reflect on your preconceived perceptions. There is a multitude of opinions among technical experts (cybersecurity and information technology gurus – IT community from now on), but what appears to be a common denominator is the coincidence between the IT community about one of the best ways to work remotely in a protected manner: by using Virtual Private Networks (VPNs), and what it is a VPN, in simple words?
It is an online service that could be used to unblock Geo-restricted or censored internet content. It can also be used as a data-shielding tool that allows individuals to protect sensitive information from hackers and government surveillance by encrypting one's online traffic and hiding the actual IP address. Simply put, a VPN is a connection that establishes a private network over a public network system.
VPN Disadvantages – Security, Privacy and Performance Concerns
Despite its numerous benefits, VPNs can also introduce several disadvantages for users. VPNs have been known to cause several issues in the form of privacy invasion, performance degradation, and malware risk. Perhaps one of the biggest concerns of VPN usage is the intrusiveness of VPNs into the user's privacy. There are two main privacy issues associated with using a VPN. The first is the issue of data logging. Many companies that offer VPN services maintain logs of users' activities and data. This data is not necessarily available to the public, but it can indeed be accessed by the company offering the VPN service and can even be accessed by government agencies if proper requests are made.
While most providers claim that they do not log data, users need to understand that using a VPN does come with the risk of having data logs kept on their activity. The second privacy concern is the issue of VPNs that cannot be trusted. Because there are no regulations on the quality of services offered by VPNs, it is possible to be using a VPN that is not secure enough or is operated by an unethical provider. This could create a situation in which user data is leaked to the wrong parties, compromising the user's online security and privacy.
Performance issues can also arise when using a VPN. Because a VPN reroutes traffic from the user's computer or device through the VPN server, it can add extra burden and latency to the traffic. This is especially true when the VPN server is physically located further away from the user, as the traffic has to travel further between points. This can cause the user to experience slower connection speeds, reduced video quality, slower downloads, and other similar issues. Finally, VPNs can also potentially introduce the risk of infection from malware. While most VPNs employ security measures to protect users from malicious websites and malicious actors on the Internet, there is always the risk of downloading malware that the VPN's security measures miss. Malware could be used to steal personal information or otherwise compromise the user's device and data.
What almost everybody says - no paraphrasing, VPNs have turned out to be an indispensable tool for entities and individuals to make their connection secure and anonymous while accessing the Internet. VPNs permit workers and individuals to launch a protected connection between one or more networked computers and the Internet. This "secure" tunneling connection, by using "secure" protocols, also helps to make sure that any information sent through the link (tunnel in this case) remains encrypted. However, now that protocols are mentioned, it is essential to understand how they are intertwined (please note that specifications about protocols used on VPNs are discussed.)
Businesses and individuals to access resources use VPNs that they would otherwise be unable to access from their private networks. Despite its popularity, several drawbacks are associated with using VPNs. Tunneling protocols used by different VPNs can provide a less secure connection than the private networks they protect.
Most VPNs do not offer end-to-end encryption of all data being sent. This can create other security risks, as it allows malicious actors to intercept potentially sensitive information during transit, even when the IT/Cybersecurity community tends to believe that because "data is encapsulated" and "secure protocols are used," it is secure.
Generally speaking, almost everybody concurs with the idea that a VPN is a technology used to help protect users from online threats by connecting them to a private network over a public internet connection, and this idea behind is not under question; however, to provide this level of protection, VPNs must make use of robust encryption protocols, making them attractive to bad actors and vulnerable to security threats and attack vectors.
To find out more about the subject and gain an understanding of the paradoxical nature of VPN security and the risks it poses download the full report ‘Masked Identities, Unmasked Truths: The Paradox of VPN Security’.
Share this
You May Also Like
These Related Stories