10 Tips and Tricks for Choosing a VPN Provider

Articles
Published:
July 30, 2024

Over the last several years, the popularity and prevalence of Virtual Private Networks (VPNs) has grown significantly, and for good reason. VPNs have become an easy and popular tool for internet users to protect their privacy. By encrypting the flow of data to and from a particular device, VPNs are an effective way for users to prevent their online information from being stolen, tracked, or externally examined. In addition to the privacy they provide, VPNs are also a common way for internet users to access region-locked streaming videos from anywhere in the world, bypass paywalls, pricing algorithms, and online censorship laws and government surveillance.

As VPNs continue to become more “mainstream,” the increased demand has resulted in an explosion of new VPN service providers, each offering varying levels of privacy and security. When selecting a VPN service that best fits your privacy needs, consider the below guidance to make an informed, secure selection. 

1. Select a provider with a “No Logging” policy

Some VPN providers will keep detailed activity logs on users that can compromise their anonymity - such as their names, locations, IP addresses, and information about the devices they connect to VPNs. This is particularly prevalent among “free” VPN services, which offset the costs of running their servers by selling user data to third parties or using it for marketing purposes. A user seeking true privacy should thoroughly read a provider’s privacy policies, and only subscribe to a VPN which clearly states it only collects barebones user data and does not sell any of it.

2. Be skeptical of using cheap or free VPN services

Free or inexpensive VPN providers often lack the more advanced capabilities of paid plans, and may offset their server costs by selling user data to third parties. This again reinforces the need to read up providers’ privacy policies and look for independent users’ reviews of cheap or free VPN services - although the latter may provide a “stopgap” for enhancing Internet protection, users should strongly consider the privacy and security trade-offs of using low-cost services.

Most popular and reliable VPN services cost around $10 to 15 a month, and users may get an even better cost-benefit if they are willing to pay more up front for a yearly or longer plan.

3. Consider where the provider’s headquarters is located

VPN providers are still subject to the Internet regulations of the countries where they are headquartered, despite their focus on providing users with greater privacy online. For example, VPN companies based in any of the 14 “Eye” countries - nations including the US, UK, Canada, and Australia - can be more easily compelled to reveal user information to governments, as they are liable to the data-sharing agreements meant to combat crime.

However, even services outside “Eye” countries may provide legal authorities with user data under compelling legal circumstances.

4. If interested in geo-shifting, check where the provider’s servers are located

The location of a VPN provider’s servers is also important: a VPN masks your device’s real location so that it appears to be in the location of the VPN server. For example, if a computer is accessing the internet from Brazil and using a VPN service with a server in the US, then the device would appear to outside observers as if it was itself located in the US.

This is known as “geo-shifting,” and can be useful for making it harder to track a device’s location or accessing Internet content only available in certain countries. Geo-shifting has numerous benefits - including viewing region-locked content in streaming platforms and  connecting to servers in countries without internet regulations to bypass  data-sharing agreements and censorship laws.

Many VPN services have multiple servers across different countries and allow users to manually select the server to which they wish to connect, making this a particularly user-friendly feature. Users who wish to geo-shift should confirm whether these capabilities are offered by each provider.3

5. Review which VPN protocols the provider supports

A VPN protocol is a set of rules governing how the data flows between a device and a provider’s VPN server. Many VPN providers, particularly paid ones, allow users to manually switch between protocols to fine-tune their experience, depending on the level of security and speed they need - but not all of them offer the same amount of protocol choices.

Multiple types of protocol exist, and they can prioritize different aspects of the data flow - for example, a protocol may require a higher number of verification checks while the data is in transit, which may make the connection slower but more secure.

Another may provide more limited security, but has faster connection speeds that are ideal for streaming content via geo-shifting. Users would be best served by reading up on a provider’s selection of protocols, and if they match their expectations for speed and security.

6. Ensure the provider uses strong data encryption methods

VPNs protect user data by transforming user information into code, with only authorized devices and a VPN server having the “key” for translating it back into readable data. These encryption keys usually come in 128 bit, 192 bit, and 256 bit formats, with higher numbers indicating a key with more characters and that is thus harder to break. 256 bit ciphers are therefore considered the “gold standard” for encryption and are used by the US government, though not all VPN providers offer them. 

7. Select a provider with a “Kill Switch” feature

A “kill switch” is a feature that stops your device from connecting to unsecured internet networks in case the VPN temporarily disconnects. This prevents the user from unknowingly using an unprotected internet connection and gives them a chance to reconnect to the VPN before resuming internet activity - it is therefore particularly relevant for users that truly need to prioritize their privacy.

8. Check for bandwidth limits to avoid slow connections

Users should look for a VPN service that does not impose bandwidth restrictions or has a very high cap of multiple terabytes, because using a VPN with restrictions will likely result in slower internet speeds, as all the processes necessary for securing data use more bandwidth.

Slower speeds might be more or less noticeable depending on the users’s baseline internet speed, how the user configures their VPN, and whether or not the VPN service provider imposes additional bandwidth limits on users to free up space on their servers. 

9. Consider how many devices you need to connect

Subscription plans may set a limit on the number of devices you can simultaneously use under a single plan. Users therefore should consider how many devices they want to use under a VPN at the same time, and then compare that to what is offered by each subscription plan.

In specific cases where a large number of devices need to be secured, users can look into employing VPN routers - though these often require a complex setup process, may not be on par with the capabilities of subscription-based plans, and lack the ability to “geo-shift” due to depending on local servers.

10. Read independent reviews and research recent events affecting a provider

Read reviews posted by industry experts to learn more about VPN providers’ security protocols, features, and user experience. Multiple online outlets focused on tech news provide free, comprehensive reviews of various VPN services, as well as lists with their top picks, that can further aid you in selecting the best provider - examples include PC Magazine and CNET. Moreover, it is also important to conduct a basic web search for media coverage or corporate statements about any data breaches or other security incidents by the VPN provider you are considering.

Conclusion

VPNs are an extremely useful technology, offering a wide range of benefits and protections to internet users. As their popularity continues to grow, the number of options on the market have increased accordingly, but it’s important to remember that all VPNs are not created equally. Fortunately, users can easily find a VPN that fits their needs at a relatively low cost by following the guidance above, or consulting with a security expert for support. 

Information as of October 2023

______________________________________________________________________

[1] Sources: Kaspersky - What is VPN?; HP - How does the Internet Work; Imperva - DNS Hijacking, Imperva - Man In the Middle Attack

[2] Sources: Make Use Of - How to Choose a VPN Provider: 7 Tips to Keep in Mind, How To Geek - How to Choose the Best VPN Service for Your Needs

[3] Sources: How To Geek - How to Choose the Best VPN Service for Your Needs; F-Secure - 6 things to consider when choosing a VPN; PC Magazine - Why You Need a VPN, and How to Choose the Right One; Make Use Of - How to Choose a VPN Provider: 7 Tips to Keep in Mind

[4] Sources: VPN Overview - 5 Eyes, 9 Eyes, 14 Eyes Alliances: Everything You Need to Know; PC Magazine - NordVPN: Actually, We Do Comply With Law Enforcement Data Requests

[5] Sources: G2 - VPN Protocols: Are You Using the Right One?; CyberNews - VPN protocols explained

[6] Sources: How To Geek - How to Choose the Best VPN Service for Your Need; Privacy Affairs - VPN Encryption: What is It and How it Works; AT&T Business - The ultimate guide to VPN encryption, protocols, and ciphers; Secure Thoughts - Types of VPN Encryption Methods (And Which One is Best)

[7] Sources: Cybernews - What is a VPN kill switch and how does it work?

[8] Sources: CNET - Router VPNs vs. VPN apps: How to pick the right privacy protection; NordVPN - How to install a VPN on your router; Linksys - What Is a VPN Router?

______________________________________________________________________

Over the last 20 years, Red5 has solved unique and complex security challenges around the world. Our team is committed to evolving alongside the rapidly changing threat landscape and staying ahead of emerging threats on behalf of our clients. Schedule a consultation to discuss your online security and privacy with an expert today. 

Wagner Horta

Subscribe for Cutting-Edge Security Insights!

Get the latest news, expert insights, and exclusive updates right in your inbox.

By clicking Sign Up you're confirming that you agree with our Terms and Conditions.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Related Posts

5 Benefits of a Corporate Travel Risk Program

An effective travel risk program is a key tool in any company’s risk management effort. Travel risk programs provide end-to-end service for traveling employees, starting from when the employee’s trip is planned up until the employee’s safe return home.
May 18, 2023
a hand holds a fishing hook that is using a sim card as bait while a man who is smaller than the sim card holds on with both hands.
Cyber Security

SIM Swapping Attacks: A Surprisingly Common Cyberthreat

Subscriber Identification Module (SIM) swapping attacks are a rising cyber menace that can significantly impact your finances, reputation, and privacy. SIM swapping attacks increased by an astounding 400% from 2021 to 2022, according to the Federal Trade Commission (FTC).
November 15, 2023

The Case for Start-Ups to Invest in Operational Security

Start-ups need to increase their OPSEC, or operational security, and investors need to employ due diligence to better protect themselves.
May 18, 2022

Let's discuss your security.

Partner with Red5 for unmatched intelligence and analysis expertise tailored to your needs.