December 14, 2021
NordVPN: Latest Feature Releases
Want to know why NordVPN stands as a top contender for privacy and security? It’s because they [...]
Make an informed decision about which VPN service is right for you
Disclaimer: Partnerships & affiliate links help us create better content. Learn how.
Whether a cybersecurity newbie or expert, there’s always something new to learn. In light of the ever-changing tech landscape, we’re kicking off a new series around protecting your smart devices and personal data online. First up, we sat down with NordVPN’s Data Privacy Expert, Daniel Markuson, to discuss his take on the subject and the privacy industry as a whole.
Daniel oversees NordVPN’s entire resource center where they provide blogs, guides, and how-tos to assist VPN users and privacy enthusiasts alike. He began his career in journalism and was quickly exposed to the data privacy issues inherent online. We ask Daniel his take on current privacy trends, recommendations for online safety, and so much more.
Here’s what he had to say for our series on the Top 5 Ways to Protect Your Devices & Personal Data:
I’ve studied journalism and early on started focusing on digital privacy topics. The more I delved, the more potential issues of online security opened up to me. So for the last eight years, I’ve been working for Nord Security and doing what I love the most: educating the public on how to be safer and more private on the internet.
For me, like most people who don’t come from the IT field, seeing the actual cases of leaked personal data and cybercrime damage was a real eye-opener. At the time, VPN was still mainly used by tech-savvy people, but you could already see its potential.
Well, as soon as I started working for Nord Security, using our cybersecurity tools became a natural necessity. After all, you need to maintain a thorough hands-on approach with cybersecurity tools to educate people about online risks.
With the first wave of the pandemic, we saw a spike in demand for our VPN business solution NordLayer. Many businesses had to build remote work processes, and a lot of people turned to VPN technology for necessity reasons.
Sure! NordVPN is the world’s most advanced VPN service provider used by over 14 million internet users worldwide. NordVPN offers numerous features, like double VPN encryption, blocking malicious sites, DNS leak protection, automatic Kill Switch, and many more. NordVPN has over 5,000 servers in 60 countries worldwide and offers one of the best prices on the market. According to AV-test results, it’s also the fastest VPN in the market, which is essential for our clients in the media-rich internet we have today.
Our motto is to strive to make the internet better than it is today: without online threats, censorship, and surveillance. A reliable VPN service can offer a path to that, but our users must trust that our words align with our actions. So we always aim to provide the highest possible transparency with the help of extensive audits from third parties.
Take back your online privacy with a secure VPN.
Working for NordVPN, I went from being a digital privacy enthusiast to an experienced internet security expert. I oversee the blog section where our team shares news, stories, and tips to help people stay private and secure. I’m proud that we can provide quality content for different audiences: from people only starting to learn the basics of securing their online activities to engineers interested in more in-depth analysis.
Well, in the cybersecurity field, new threats and attack vectors rise all the time. So to offer our users the next level of online privacy and security, our R&D team always needs to focus on new technologies. In Q4 this year, we’re planning to introduce a few exciting features not seen in the VPN market before. Final tests are happening, and we all are looking forward to seeing them in action.
NordPass is another app from the Nord Security product family. It’s a password manager powered by the latest technology for the highest security. The NordPass team developed it with affordability, simplicity, and ease-of-use in mind, giving users safe access to their passwords on desktop, mobile, and browsers. Besides, all passwords are encrypted on the device, so only the user can access them.
As password managers go, it’s an excellent tool. But I like to think it also goes above and beyond that concept. Yes, it’s there to store your passwords, but also all other sensitive information: credit cards, alarm codes, anything. And it will nudge you in the right direction if you use old passwords or try to reuse them. Not to mention that if your account is breached and its details are out there in the wild, you’ll get a prompt notification.
As I mentioned earlier, the trust factor is a critical element in this market. I don’t know if there is a more straightforward way to earn your user’s trust in your VPN service than transparency. Apart from regular and fully disclosed audits from reputable third parties, I’m proud of the open bug bounty program we are running. Of course, managing it requires dedicated infrastructure and more resources than having a closed program, but this is how our industry keeps going forward.
I suspect the average users today are far more aware of the tracking and storing of their personal data than, say, a few years prior. So the important follow-up question is, what changed? Well, I believe at least two notable factors are contributing to increased public awareness. The first one is a wave of large-scale cyber-attacks that happened during the pandemic. They received extensive media coverage, and for many, showed the potential damage cybercrime could do to businesses and individuals if their data gets leaked in such an attack. It made people think not only about whether they should update their old passwords but also about all their sensitive information that a potential breach could reveal.
The second factor is public and institutional pressure on tech giants to implement better measures on data handling. The data privacy laws like GDPR in Europe or CCPA in California were a strong starting point. But for an average user, it translated into clicking a few extra boxes when opening a web page. On the other hand, it led to welcome initiatives like the now-famous Apple’s iOS 14.5 App Tracking Transparency update. It was a really graphic example for people to understand just how much data they generate and give away.
Unless you’ve spent your entire life without ever touching any connected device and without signing up for any service, you most likely have a lot of data attached to your online identity. Those little bits of information, for example, gender, age, or ethnicity, are called data attribution points.
If you single one or a few data points out, it might seem like a harmless thing to disclose when filling your information in some online form. What evil can anybody do knowing that chess is your hobby? But when thousands of separate data points of your online activity are gathered in one place, one can paint a pretty clear picture of your real-life identity. And then it becomes a tempting target for third parties. They collect those large databases of your data and sell it to other third parties, like marketers, risk assessment agencies, financial institutions, or others. And after all that, you might see a targeted ad for a new set of chess figures.
So let’s take that chess set example. If you are lucky enough and that chess set is something you actually need but would have never found by yourself, it is a successful case. But in real life, experiences are not always that precise. For example, you might get bombarded on different sites and social pages by the same obtrusive ad for a thing you don’t need. Why? Only because you happened to open some random online shop page. We all want a certain level of convenience, but the question is at what cost, and more importantly, do we know that cost? Some people don’t mind the existence of an elaborate model of their likes, dislikes, and activities if that gives them a more convenient experience. The problem often is that most online users do not know the other side of this personal data trade-off.
Cyber-attacks will likely still be happening, and internet freedom, in general, might continue to shrink. I believe that the privacy industry will continue to expand to meet the demand from a growing base of internet users who will be even more aware of online threats. And let’s not forget that expectations formed in other digital industries, like ease of use, will still be there. So cybersecurity solutions might go in the direction of an all-in-one package, offering one convenient ecosystem for security and privacy needs.
I think we could see a duel between AI-enhanced security solutions and adaptive malicious software on the far point in the cybersecurity horizon. While the true AI capabilities are yet to be seen, it might be the next best thing for cybercriminals to launch sophisticated attacks. And it will require equally competent AI models to analyze user infrastructures to see the potential weak points.
Sadly, there are no silver bullets in the cybersecurity field that could guarantee you 100% safety and privacy. That’s why a holistic approach is always the best way to deal with online threats. But, if I need to recommend only one thing apart from having a trusted VPN service, I’d go with multiple-factor authentication. If possible, enable and use the MFA for all websites where you are storing your personal data. So in the event of a compromised password, the malicious actor will have a much harder time accessing your information.
I would recommend investing more in a capable and secure Wi-Fi router at home. The best options are usually more expensive than the generic models offered by most ISPs. But in return, you will have more features, like the ability to install a VPN directly into the router and regular OS updates.
The most secure option would be to learn Linux-based OS fundamentals and spend considerable time learning all ins and outs of that framework. However, that is usually not the option for the majority of computer users. The main thing to do when using your current operating system is to know and follow the essential security tips, like regular updates, using robust cybersecurity tools, not abusing the administrator rights, and others.
Our blog section offers a wide range of topics on privacy and cybersecurity. Readers can find answers to the most pressing questions, in-depth analyses, how-to tutorials, detailed engineering posts, and news on cybersecurity topics from all around the world.
I would invite your readers to follow NordVPN blog news or catch me on Twitter or LinkedIn.
Interviewer: Paula Novo is the Site Editor for AlwaysVPN and HighSpeedOptions. Beginning her career in the telecom industry, Paula has honed in on VPN services and their role in helping users take back their online privacy. As internet freedom continues to diminish, Paula hopes to bring awareness to issues of online privacy and security to as many users as possible.
Want to know why NordVPN stands as a top contender for privacy and security? It’s because they [...]
NordVPN is one of the best ways to get past any troublesome Netflix blocks, allowing the user to [...]
|__cfduid||1 month||The cookie is used by cdn services like CloudFlare to identify individual clients behind a shared IP address and apply security settings on a per-client basis. It does not correspond to any user ID in the web application and does not store any personally identifiable information.|
|cookielawinfo-checkbox-advertisement||1 year||The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Advertisement".|
|cookielawinfo-checkbox-analytics||1 year||This cookies is set by GDPR Cookie Consent WordPress Plugin. The cookie is used to remember the user consent for the cookies under the category "Analytics".|
|cookielawinfo-checkbox-necessary||1 year||This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".|
|cookielawinfo-checkbox-non-necessary||1 year||This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Non-necessary".|
|cookielawinfo-checkbox-performance||1 year||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".|
|cookielawinfo-checkbox-functional||1 year||The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".|
|cookielawinfo-checkbox-others||1 year||No description|