VPNs: What are Virtual Private Networks, and Why Do You Need One?

Using a VPN or Virtual Private Network is one of the best steps you can take for your online safety, say experts. There's no denying it: the internet has made our lives so much easier. But this convenience comes with a price—the price of our privacy and security.

In the ever-growing online world, privacy and digital security have become virtually non-existent (here’s why). So, it’s important that you take the necessary steps to secure yourself. And a VPN can help you with that.  

In this post, we’ll have an in-depth look at the risks of being online in this modern era, the role of VPNs in mitigating those risks, and how you can easily set up your own virtual private network. So, let’s begin.

How Does the Internet Work?

Before moving forward and understanding VPNs in-depth, let’s take a moment to understand how the internet works.

You turn on your computer, open a web browser, type the URL of your favorite social media site, and hit enter. As soon as you do this, it takes you to a separate webpage where you can post, communicate, interact, and do tons of other stuff.

But do you know what goes on in the background when you hit that enter button?

Even though your phone and computer don’t need any wires or cables to go online, the internet itself is a global network of physical cables. This includes TV cables, copper telephone wires, and fiber optic cables. Even wireless connections like 3G, 4G, and WiFi rely on these physical cables at a certain point to deliver access to the internet.

This map shows how undersea cables move internet traffic around the world | World Economic Forum

When you type in a URL like “www.facebook.com”, your computer sends your request to your WiFi router, which then decodes your request. After that, it sends the request to your network provider’s server through cables, from where the request starts its journey to Facebook’s dedicated server through the fiber optic cables laid in the oceans.

Once your request reaches the Facebook server, the server sends a response. And the response has to travel the same way back to reach your computer.

All this traveling happens at the speed of light, which is why you can access your favorite websites within a split second.

But you aren’t the only one making this request. At any given time, millions of computers establish a connection with these servers. This means the servers have to know exactly what response to send and who to send it to. So, how do they single you out in this sea of requests?

That’s where IP addresses come in.

Your IP Address = Your Home Address

IP or Internet Protocol addresses work similarly to how physical addresses work. You could say that an IP is a street address for the internet. It’s a combination of different sets of numbers that points to your device’s exact location.

Everything that has internet on it, like computers, servers, and phones, has an IP address. When you request something on the internet, just like by entering a URL in the example above, your computer sends a request to the website’s IP address. The website’s server then sends a response back to your PC using your IP address.

If you’re unprotected on the internet, it can cause a problem, because you have an address (IP) and a path to reach you (the internet). And an unprotected connection means anyone with enough technical knowledge can get to your address through this path. And what’s to say that they won’t come with malicious intent?

Risks of Using the Internet Unprotected

When your network is unprotected, you become vulnerable to malicious attacks. Have a look.

Public Network Monitoring

You can look at your WiFi as the gateway between your device and the servers to which you’re trying to connect. Everything you send and receive from the internet after connecting to the WiFi is open for the individual in control of the WiFi to see.

When you’re using your home WiFi, you can say that you’re protected because you’d be the one who is in control. But we can’t say the same for public WiFi hotspots.

Most people jump at the chance to use free WiFi. But the same thing that makes free WiFi hotspots desirable for you makes it desirable for hackers.

Here are some of the things that hackers do to steal your information.

Man-in-The-Middle Attacks

Man-in-The-Middle or MiTM attacks are a form of hacking in which hackers set up their own free WiFi, luring innocent individuals to connect to their network. Once these individuals establish a connection, the hackers get unfiltered access to everything on your devices, such as emails, security credentials, and financial information.

Once they’re in, the attacker can manipulate your data in any way they want.

Cookie Theft

Cookie theft is another form of a hacking attack that uses a similar technique as MiTM. But, instead of looking for data in your devices’ storage, they steal your cookies.

Cookies, in technical terms, refers to the trackers that websites plant on your device. They’re called cookies because, well, you wouldn’t click “agree” to a website asking, “Can we plant trackers on your computer?”, would you?

Websites use these cookies to make your online experience easier by saving your browsing information

Cookie theft, also known as a ‘pass-the-cookie attack,’ gives hackers access to your browser’s stored session cookies. This lets them pose as you on the same website and do anything they want at your expense.

Data Breaches

Your ISP (Internet Service Provider) logs everything you do on the internet—even when you’re browsing in incognito mode. And the websites you visit also have a ton of information about you. If there’s a breach, all of your stored information on these websites and ISP servers can get out. And you’d have zero control over that.

In 2021 alone, there were 1862 data breaches, which translates to billions of data points collected from internet users, exposed.

And these breaches may not seem like a lot, but if this data ends up in the wrong hands, it can result in problems ranging from identity theft to physical harm to the victims.

Hackers have various techniques for stealing information, including MiTM attacks, cookie theft, and data breaches.

Working Remotely on a Weak Network

So far, we have discussed the security risks on an individual level. But, when you’re working with an unprotected network, its effects can spread much further than you.

As the pandemic forced most people to work remotely, we had to work from our unsecured home networks instead of the secure networks in workplaces. This led to many data breaches because hackers could use an employee’s unsecured network and access authorization to get into the company server.

If your network is unprotected and you’re working from home, your network can be the single point of failure in an otherwise heavily protected company server.

“The bad guys” will always look for the weakest link in the security chain. In my opinion, most often these are people, not technology,” says American computer security consultant, and a former black hat hacker, Kevin Mitnick.


While not a security issue per se, Geo-blocking is a technology that can restrict your access to Internet content based on your geographical location. Geo-Blocking is not just about you being blocked from watching your favorite Netflix shows from other countries. With this tech, you can be easily blindfolded to the things going on in the world.

So, What Can You Do?

The internet wasn’t meant to be a scary place. It was built for the innovation and advancement of humankind. But, when you give access to something good to everyone, there are bound to be consequences.

 So, what does this mean? Should you delete everything you have on the internet and stop using it forever?

Absolutely not. If you look at the brighter side of the internet, it has propelled humanity to a place that was just a dream a mere 100 years ago. So, quitting the internet would not be the brightest idea. What you can do instead is to make the internet a safer place for you to be. And a VPN is one of the things that can help you do that.

What is a VPN?

VPN stands for Virtual Private Network. It’s an extra layer of security you can have while using the internet. Its purpose is to provide you privacy and security as you communicate over the world wide web.

The internet is open to the people on the controlling end. This includes malicious attackers. A VPN simply creates a private tunnel over the open internet, encapsulating everything you send in its private encrypted communications channel.

Anything you send, even if intercepted, has to be deciphered when you browse using a VPN. And it’s virtually impossible to do so.

A VPN provides an extra layer of security while using internet-enabled devices.

Two Types of VPNs

I’m sure you’re familiar with the concept of a LAN, also known as a Local Area Network.

LANs are situated in one physical location, like homes, corporate buildings, and campuses. But since many companies don’t share the same physical space, they use enterprise VPNs.

This is much the same as a LAN, and the company controls both endpoints. The only difference is it can securely connect several physical spaces together.

What you need is the second type, also known as a consumer VPN. There are many companies on the market that sell consumer VPNs to help people secure their internet browsing experience. More on that later.

Is It Legal to Use a VPN?

Now, some of you may be wondering if it’s even legal to hide everything you do on the internet. And the answer to your question is yes (for the most part).

Most countries in the world allow the use of VPNs, except countries like China, Turkey, the United Arab Emirates, Iran, Saudi Arabia, North Korea, and recently, Russia.

So, definitely do your research before visiting a new country.

VPN use while travelling
VPNs can help you stay protected on unsecured networks while traveling. But, they’re banned in some countries.

But the real question is, can you do anything when connected to a VPN (maybe even illegal stuff)?

See, a VPN indeed hides your IP address and makes you highly untraceable. But that doesn’t mean it makes you completely untraceable. There are means by which authorities can get to an individual doing illegal activities using a VPN.

So, let’s just keep the VPN to protect your privacy, as it’s designed for.

Free VPNs Vs. Paid VPNs

This is an extremely head-scratching debate that’s been going on for quite a while now—should you use free VPNs or paid VPNs?

See, though there are many free VPNs on the market, they’re limited. You either get slow connections, or you have to compromise on the level of privacy you get from your free VPN. But many free VPNs also have a paid premium service which you can get to enjoy the full benefits.

Another, and the most important, reason I recommend against using free VPNs is that you don’t know if you can trust whoever is on the controlling end. When you connect to a virtual private network, your data goes through their server. So, if the service you’re using is set up by malicious actors, your data can get intercepted and read. It’s similar to the MiTM attacks we discussed above.

So, the best option is to go for a paid service. Here’s a list of some of the best ones in the market.

Note: This post is not sponsored by any of the companies mentioned below.

Nord VPN

NordVPN is probably one of the most recognized brands in the VPN market. With 5,200+ servers worldwide, it’s one of the best options if you’re looking to secure your internet browsing without putting a hole in your wallet.

NordVPN’s subscription starts from $3.29 a month, going up to $11.99 a month.

Express VPN

After recently receiving the CNET Editors’ Choice Award, Express VPN is another excellent option for a secure browsing experience. It has 30,000 IP addresses, with more than 3,000 servers over 160 locations.

Although plans start from $6.67 a month, it also has more features than other premium VPNs on the market.


While Surfshark’s network is much smaller than the ones I mentioned before, it makes it up for this with its speed.

Additionally, this VPN has no cap on how many devices you can run through the same account. If you want your entire home secured with Surfshark, you can do it without purchasing a new subscription.

Surfshark VPN also offers ad-blocking, anti-malware, and tracker-blocking as part of its software.

Final Thoughts

Although internet security is important, it’s just a mere fragment of what you need to do to ensure a safer, healthier life alongside technology.

As modern technology is getting more involved in our lives (see the metaverse, for example), its effects on our physical and mental health are also increasing significantly.

But you don’t need to quit the convenience of modern technology to protect yourself and your loved ones from these effects. You just have to build a healthier relationship with it.

Listen to “The Healthier Tech Podcast” to learn more about benefiting from technology without risking your health and wellbeing.

Don't Miss Out

Get the latest content straight to your inbox

R Blank

R Blank

R Blank is the founder of Healthier Tech and the host of “The Healthier Tech Podcast”, available iTunes, Spotify and all major podcasting platforms.

R has a long background in technology. Previously, R ran a software engineering firm in Los Angeles, producing enterprise-level solutions for blue chip clients including Medtronic, Apple, NBC, Toyota, Disney, Microsoft, the NFL, Ford, IKEA and Mattel.

In the past, he served on the faculty at the University of Southern California Viterbi School of Engineering where he taught software engineering, as well as the University of California, Santa Cruz.

He has spoken at technology conferences around the world, including in the US, Canada, New Zealand and the Netherlands, and he is the co-author of “AdvancED Flex Development” from Apress.

He has an MBA from the UCLA Anderson School of Management and received his bachelor’s degree, with honors, from Columbia University. He has also studied at Cambridge University in the UK; the University of Salamanca in Spain; and the Institute of Foreign Languages in Nizhny Novgorod, Russia.

Connect with R on LinkedIn.

Join Our Email List

Get the latest content from Healthier Tech straight to your inbox. Enter your email address below to join our mailing list.