VPN – a brief summary on Virtual Private Networks

What is a VPN?

Put simply, a Virtual Private Network, or VPN, is a group of computers (or discrete networks) networked together over a public network—namely, the internet. Businesses use VPNs to connect remote datacenters, and individuals can use VPNs to get access to network resources when they’re not physically on the same LAN (local area network), or as a method for securing and encrypting their communications when they’re using an untrusted public network.

When you connect to a VPN, you usually launch a VPN client on your computer (or click a link on a special website), log in with your credentials, and your computer exchanges trusted keys with a far away server. Once both computers have verified each other as authentic, all of your internet communication is encrypted and secured from eavesdropping.
The most important thing you need to know about a VPN: It secures your computer’s internet connection to guarantee that all of the data you’re sending and receiving is encrypted and secured from prying eyes.

Benefits of using a VPN

The downloader. Whether they’re downloading legally or illegally, this person doesn’t want on some company’s witch-hunt list just because they have a torrenting app installed on their computer. VPNs are the only way to stay safe when using something like BitTorrent—everything else is just a false sense of security. Better safe than trying to defend yourself in court or paying a massive fine for something you may or may not have even done, right?

The privacy minded and security advocate. Whether they’re a in a strictly monitored environment or a completely free and open one, this person uses VPN services to keep their communications secure and encrypted and away from prying eyes whether they’re at home or abroad. To them, unsecured connections mean someone’s reading what you say.

The globetrotter. This person wants to watch the Olympics live as they happen, without dealing with their crummy local networks. They want to check out their favorite TV shows as they air instead of waiting for translations or re-broadcasts (or watch the versions aired in other countries,) listen to location-restricted streaming internet radio, or want to use a new web service or application that looks great but for some reason is limited to a specific country or region.

Even if none of the above really sound right to you, you can still benefit from using a VPN. You should definitely use one when you travel or work on an untrusted network (read: a network you don’t own, manage, or trust who manages.) That means opening your laptop at the coffee shop and logging in to Facebook or using your phone’s Wi-Fi to check your email at the airport can all potentially put you at risk.

The best VPNs offer a solid balance of features, server location, connectivity protocols, and price. Some are great for occasional use, others are geared towards getting around the location restrictions companies put on their apps and services, and others are targeted at people who do heavy downloading and want a little privacy while they do it.

What makes a good VPN?

Logging: When you connect to a VPN, you’re trusting the VPN service provider with your data. Your communications may be secure from eavesdropping, but other systems on the same VPN—especially the operator—can log your data if they choose. If this bothers you (e.g., you’re the privacy/security advocate or the downloader), make absolutely sure you know your provider’s logging policies before signing up.

 

This applies to location as well—if your company doesn’t keep logs, it may not matter as much where it’s located. (There’s a popular rumor that US-based VPN providers are required to log, in case the government wants them. This isn’t true, but the government can always request whatever data they have if they do log.)

Anti-Malware/Anti-Spyware Features: Using a VPN doesn’t mean you’re invulnerable. You should still make sure you’re using HTTPS whenever possible, and you should still be careful about what you download. Some VPN service providers—especially mobile ones—bundle their clients with anti-malware scanners to make sure you’re not downloading viruses or trojans. When you’re shopping, see if the providers you’re interested in offer anti-malware protection while you’re connected. For example, previously mentioned Hotspot Shield offers malware protection to its premium users. It may not be a dealbreaker for you, but it’s always good to have someone watching your back.

Price: Finally, go into your user agreement with both eyes open. You should read the privacy policy for the service you’re interested in, and be very aware of the differences between free and paid services.

For example:

Free VPN Providers are more likely to log your activities and serve contextual ads while you’re connected. They’re also more likely to use your usage habits to tailor future ads to you, have fewer exit locations, and weak commitments to privacy. They may offer great features, but if logging and privacy are important to you, you may want to avoid them. However, if you just need quick, painless security while traveling on a budget, they’re a great option.

Subscription VPN Providers usually take your privacy a bit more seriously, since you’re paying for the service. It’s unusual for them to show ads, although whether they do logging or store data about your usage varies from company to company. They usually offer free trials so you can give the service a shot first, but remember: just because you’re paying for a service doesn’t mean you shouldn’t do your homework.

Thinking VPN?

Contact PlanIT Computing today on 014852222 for a breakdown of options available for your VPN requirements.

Windows “Whistler” XP – August 2001 – April 2014

Still running Microsoft Windows XP in your business?  In April 2014,  Microsoft is switching support for XP OFF.

This is no joke: Microsoft is putting XP to the grave. There will be no more security updates or patches. If you’re still using it and a weakness or exploit is found, tough luck: there will be no fix nor protection from Microsoft anymore.  Your computer security WILL be at risk.

From experience, this is not a small or minute problem. Over 35% of all office PCs in Ireland are still running Windows XP. The public sector – including schools, hospitals, government departments, authorities and other institutions – also use the 12-year-old operating system in large numbers. From April 2014, these departments will be at risk, FACT.

Depending on the size of your business and the amount of devices in use, if you haven’t already started transferring over to Windows 8 or even Windows 7, it’s probably too late to make it in time for April 2014. Microsoft calculates that it takes at least a year for most companies to fully ‘migrate’ from XP to a newer operating system. ( this figure varies, obviously)

Why such a lengthy delay?  Proprietary / custom software – specific software programs that are designed to work with Windows XP and Windows XP only, usually in 32bit architecture.  64 bit what?

So, upgrading from XP to Windows 8 or Windows 7 could mean a much larger, costly overhaul with significant logistics involved.

But don’t try pleading that when you’re calling on Microsoft for help – the company’s Irish executives have made it quite clear that such excuses will fall on deaf ears. They have advertised the switch off for years. The company has been warning about this for at least two years. They have sent emails, put out leaflets, blogged, phoned up key customers etc. Microsoft even deferred the shut-off date on a previous occasion due to customer inaction on the matter. But not this time – no more shut-off’s. From April 2014, Microsoft has firmly stated that you’re on your own with XP.

When the first serious exploit and virus attack aimed at XP occurs in April 2014, Microsoft are adamant that they won’t answer your calls on it.

“Microsoft Windows XP is no longer safe enough to defend against the onslaught of modern threats that organisations face on a daily basis,” warns an official Microsoft document given out to multiple Irish business customers.

“Businesses that still run Windows XP will become even more vulnerable to malware and attacks after April 2014. The most significant risk is that PCs, and the data they contain, could be hacked and compromised. Today, Windows XP is 21 times more likely to be infected by malware than Windows 8.”

Thinking of upgrading your office systems from Windows XP to Windows 7 or Windows 8?  Call us today for a free, no quibble quotation.

Managed IT Hosting & Managed IT Services

Despite budget cutbacks and personnel reductions, IT organizations must continue managing and expanding existing infrastructure. Managing that technical infrastructure is an increasingly complex and time consuming proposition.

PlanIT Computing provides the tools and manpower necessary to ensure your entire system or any part of IT – computers, servers, network, peripherals, etc. – are optimally performing. When you sign up for our Managed Services, we use our Watch Guard technology to proactively monitor and maintain your systems with automated reporting that describes your system health and security.

Continue reading

IT Service Plans, Maintenance & IT Support Options from PlanIT Computing

Our IT Service Plans provides your business with all of the regularly scheduled services your business will need, comprehensive server and client monitoring, after hours support access, annual network audits, access to help desk services and emergency onsite visit coverage.

At PlanIT Computing, we provide  proactive IT Managed Services. Our combination of regular remote preventative maintenance and real-time monitoring of your computer systems delivers the following benefits:

  • Minimize your IT downtime and failures. We address smaller IT problems before they become expensive IT failures through our remote monitoring, alerting and support mechanisms.
  • Reduce your IT support costs. The ability to connect remotely to your IT systems to take corrective actions avoids expensive on-site call-outs and provide instant support is the key to PlanIT Computing’s Managed IT Services.  Proactive maintenance means fewer issues and less “unexpected” and costly on-site IT support work.
  • Proactive Support. When our monitoring system detects a potential IT issue we are instantly alerted and will contact you to decide on a course of action to address the issue before it affects your business.

Continue reading

Keeping your network safe with IT Security

What is IT Network Security?

IT Network Security defines the activities that a company or organisation takes to protect its network and its data. It is a basic requirement for all businesses. Threats to a company’s network are many but the most common are spread over the internet.

These include:

  1. Viruses, Worms & Trojans
  2. Data interception & theft
  3. Spam
  4. IT Network Security
  5. Computer Hackers
  6. Spyware, Malware & Adware
  7. Data interception & theft

Continue reading

Data Encryption Solutions

Hard drive and data encryption is of vital importance to any business or individual who actively stores confidential and sensitive information about their business and customers.

PlanIT Computing offers a service that can encrypt the entire laptop or desktop computers without the need of starting fresh. Existing servers, computers and laptops can be encrypted whilst running and do not require a “fresh install” to implement the encryption. The technology used to perform the encryption process is of the highest standard and is currently one of the most secure options available on today’s market.

Continue reading