Why you can trust ZDNET
:ZDNET independently tests and researches products to bring you our best recommendations and advice. When you buy through our links, we may earn a commission.Our process
'ZDNET Recommends': What exactly does it mean?
ZDNET's recommendations are based on many hours of testing, research, and comparison shopping. We gather data from the best available sources, including vendor and retailer listings as well as other relevant and independent reviews sites. And we pore over customer reviews to find out what matters to real people who already own and use the products and services we’re assessing.
When you click through from our site to a retailer and buy a product or service, we may earn affiliate commissions. This helps support our work, but does not affect what we cover or how, and it does not affect the price you pay. Neither ZDNET nor the author are compensated for these independent reviews. Indeed, we follow strict guidelines that ensure our editorial content is never influenced by advertisers.
ZDNET's editorial team writes on behalf of you, our reader. Our goal is to deliver the most accurate information and the most knowledgeable advice possible in order to help you make smarter buying decisions on tech gear and a wide array of products and services. Our editors thoroughly review and fact-check every article to ensure that our content meets the highest standards. If we have made an error or published misleading information, we will correct or clarify the article. If you see inaccuracies in our content, please report the mistake via this form.
A virtual private network (VPN) can be an important tool in your online protection routine, but only if you know exactly what a VPN can and can't do. Used properly, a VPN can enhance your security and privacy, but it's not a replacement for other tools. For further information, check out our guide on what is a VPN.
The basic concept behind a VPN is simple: software running on your PC encrypts every bit of network traffic before it reaches your PC's network adapter, then it sends that encrypted data to a remote server that's operated by the VPN service. That remote server sends the data to the public internet. The encrypted "tunnel" between your device and the VPN server is what makes the network both virtual and private. Many corporate networks will only allow remote connections over a VPN. Still, you can also buy consumer-grade VPN software for connecting to untrusted networks, such as those found in airports and coffee shops.
The benefit of this type of network is twofold. First, it prevents anyone on your local network from spying on your internet traffic. That's especially important if you're using a Wi-Fi network that's not under your control.
Second, it allows you to disguise your location, which prevents some types of tracking and also makes it possible to bypass geographic restrictions on some services. If you're in Europe and want to watch a movie that's restricted to the US, you might be able to fool the streaming service by connecting to a VPN in the US.
Even the best VPNs are resource-intensive and can take a huge toll on your network bandwidth, which is why you should only employ them when you need them.
When I'm in an airport or hotel, I prefer to tether my mobile phone to my laptop (or bring a device with a built-in cellular connection) to avoid the risks that come with that untrusted network. But if the cellular signal is weak or unavailable and I have no other choice than to connect to that public Wi-Fi, I use the paid FastVPN service from NameCheap. My colleague Jason Perlow uses ExpressVPN.
"It's compatible with OpenVPN, an open source VPN protocol," he says, "which means I can use it with all the devices I own -- iOS, Android, Windows, even on my network firewall."
Regardless of which option you choose, nothing in that virtual private network looks for threats to your PC. If you download a piece of malicious software or visit a website that contains a drive-by exploit, the fact that your network is private is irrelevant. The same is true if you or someone in your home or office gets taken in by a phishing email. Typing your credentials into a bogus website generally leads to bad outcomes, and a VPN won't magically protect you from that sort of error.
For effective protection against malware, you need security software that's specifically designed to sniff out malicious software, regardless of how it's delivered.