Actual work where 2 students given their post on this:What are the main reasons why a VPN is the right solution for protecting the network perimeter? Do they also provide protection for mobile devices

A VPN, or Virtual Private Network, is a private network that encrypts and transmits data while it travels from one place to another on the Internet. Using a VPN to connect to the Internet allows you to surf websites privately and securely as well as gain access to restricted websites and overcome censorship blocks. VPNs aren't just for desktops or laptops -- you can set up a VPN on your iPhone, iPad or Android phone, too. VPN technology was originally used to allow remote workers access to corporate files and folders when working from a location away from the central office. This meant they were able to access sensitive documents on a secure and encrypted Internet connection. While this is still the case, when we talk VPNs, we’re referring to commercial services that offer people security and privacy when accessing the Internet. Once you connect to the Internet with your VPN service switched on, you will be connected to one of the VPN provider’s servers. At the same time, they will provide you with the IP address of that particular server. Instead of using your own IP address you are using one that belongs to the VPN provider. Your Internet connection is also encrypted between your device and the server you’re connected to. Using a VPN prevents your ISP from being able to keep tabs on what you’re doing online. (Bari, 2017). Hiding your IP address allows you to access the Internet privately and helps to prevent your browsing from being tracked or traced. You are then able to surf the web privately and securely. A VPN protocol refers to the technology a VPN provider uses to ensure you get a secure and fast connection between your device and their VPN servers.

        A VPN protocol is a combination of encryption standards and transmission protocols. Not only does a VPN secure your browsing with an encrypted connection, it can also give you access to a freer Internet by letting you choose where you are located globally. This combination of security and location swapping means VPNs have a lot of tricks up their sleeves. They let you Make public Wi-Fi safer, Stream regionally blocked content, Access blocked websites, avoid censorship, Prevent ISP tracking, Prevent price discrimination. VPNs secure your public Internet connection by encrypting your information and shielding your online activity from cybercriminals and even your own Internet Service Provider, or ISP. In terms of your online privacy, the most secure VPNs are also likely transparent about their privacy policies, take steps to fix leaks, and won’t keep logs of your browsing history. When you use VPN software, your device connects to the VPN provider’s servers (FinjanMobile, 2018). Your Internet traffic passes through the VPN’s Internet connection, meaning your private information is cloaked from your ISP and websites so they can’t log your web browsing. As the VPN server mixes your web traffic with others on the server, your IP address appears to match the one associated with the VPN. These steps make it harder for others to monitor and gather information about where you go and what you do online.

        Sometimes, even with VPN on, there can be data breaches. So, you have to decide which VPN to use and see what the VPN provides. Even with a VPN, sometimes security flaws can reveal your IP location. But you can look for a VPN that specifically works to prevent leaks. A no-log VPN means the network doesn't collect, or “log,” any information transmitted through the network. It doesn't save your personal details, where you go online, what you download, or your search history. This ensures your online privacy and anonymity are protected from everybody — even your VPN provider. So, if a cybercriminal does happen to penetrate a no-log VPN, there won’t be much to find. Look for kill Switch. If your VPN connection drops, your Internet access downgrades to a regular connection. A VPN kill switch will automatically quit preselected programs if your connection becomes unstable, which reduces the chance of data leaking from sensitive programs. Multifactor authentication is another factor to look for. This security method prompts users to prove their identity in more than one way before signing into the program — in this case, your VPN account. For example, you might type in a password and then a four-digit code that’s sent via text message. The additional authentication helps ensure only the right people are accessing your VPN and make it harder for anyone to hack into it.

References

VPN for Smartphones. (n.d.). Retrieved July 31, 2020, from https://us.norton.com/internetsecurity-mobile-vpn-for-smartphones.html

What Does a VPN Do? For One, It Keeps Your Data Secure. (2018, August 30). Retrieved July 31, 2020, from https://www.finjanmobile.com/vpn-data-security/

What is a VPN?: Everything You Need to Know. (n.d.). Retrieved July 31, 2020, from https://www.avg.com/en/signal/what-is-a-vpn-and-why-should-you-use-one