{"id":36841,"date":"2024-08-20T14:35:56","date_gmt":"2024-08-20T14:35:56","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=36841"},"modified":"2024-08-20T14:35:57","modified_gmt":"2024-08-20T14:35:57","slug":"how-to-get-a-vpn","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/","title":{"rendered":"How to Get a VPN on Any Device (+ Installation Tips)"},"content":{"rendered":"\n<p>A <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vpn-security\/\">virtual private network (VPN)<\/a> is a must for any internet user connecting to business systems. It provides a secure tunnel protecting user identity, encrypts data in transit, and extends the identity and security of the home network to remote users. Use this guide to learn how to get a VPN provider, set it up, and connect your devices for a more secure and safe connection.<\/p>\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_68_1 ez-toc-wrap-left counter-flat ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-66d6d81d9e2f0\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ffffff;color:#ffffff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ffffff;color:#ffffff\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-66d6d81d9e2f0\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/#Determining-the-VPN-You-Need\" title=\"Determining the VPN You Need\">Determining the VPN You Need<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/#How-to-Get-a-VPN-on-PCs\" title=\"How to Get a VPN on PCs\">How to Get a VPN on PCs<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/#How-to-Get-a-VPN-on-Macs\" title=\"How to Get a VPN on Macs\">How to Get a VPN on Macs<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/#How-to-Get-a-VPN-on-iPhones-or-iPads\" title=\"How to Get a VPN on iPhones or iPads\">How to Get a VPN on iPhones or iPads<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/#How-to-Get-a-VPN-on-Android\" title=\"How to Get a VPN on Android\">How to Get a VPN on Android<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/#FAQs\" title=\"FAQs\">FAQs<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/#Bottom-Line-A-VPN-is-Part-of-a-Layered-Security-Solution\" title=\"Bottom Line: A VPN is Part of a Layered Security Solution\">Bottom Line: A VPN is Part of a Layered Security Solution<\/a><\/li><\/ul><\/nav><\/div>\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-top3 row\">\n    \n        <!--\n            ICP Plugin - body top3\n            ----------\n            Category: \n            Country: HK\n        -->\n    <\/div>\n<!-- ICP Plugin: End -->\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\"><span class=\"ez-toc-section\" id=\"Determining-the-VPN-You-Need\"><\/span>Determining the VPN You Need<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Whether it&#8217;s for protecting corporate spreadsheets, bypassing geographic blocks, or anonymizing your use of online services, choosing and installing the right VPN to provide <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security\/\">robust network security<\/a> to your application and device is your first step. Some things to consider:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Application<\/h3>\n\n\n\n<p>Business users might prioritize premium <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security-threats\/\">security features<\/a>, like 256-bit keys for their Advanced Encryption Standard (AES) protection, kill switches to protect devices in case of a VPN failure, or multi-hop networks. Road warriors will value the number and location of VPN servers,&nbsp; as will surfers trying to access geo-blocked content. Gamers and streamers will put a premium on speed. Weigh the importance of features by how you\u2019ll use the connected devices.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Use<\/h3>\n\n\n\n<p>Like most software, VPN clients are system-specific \u2014 Apple versus Windows, iOS versus Android. But under the hood, they also support <a href=\"https:\/\/www.esecurityplanet.com\/networks\/wireguard-vs-openvpn\/\">different protocols<\/a> for different types of devices.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Open VPN:<\/strong> An open-source security protocol that is widely considered the industry standard for VPNs.<\/li>\n\n\n\n<li><strong>Internet Key Exchange (IKE):<\/strong> It is the protocol for Internet Protocol Security (IPSec). It has native support for Extensible Authentication Protocol (EAP), which allows more seamless handoffs between mobile networks.<\/li>\n\n\n\n<li><strong>WireGuard:<\/strong> Valued for its speed, it uses User Datagram Protocol (UDP) to tunnel over Transmission Control Protocol (TCP). This avoids issues that can occur when stacking TCP connections.<\/li>\n\n\n\n<li><strong>Datagram Transport Layer Security (DTLS):<\/strong> Used in products from Cisco Systems Inc., it also works around the TCP-over-TCP issues sometimes experienced with Transport Layer Security (TLS) protocols like Open VPN.<\/li>\n\n\n\n<li><strong>Open SSH (Secure Shell):<\/strong> Provides a limited number of secure channels in a client-server architecture. It is integrated into Windows, Mac, and most Linux operating systems.<\/li>\n<\/ul>\n\n\n\n<p>There are several other protocols. Some are obsolete or feature too many vulnerabilities to be widely used.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Ease of Installation<\/h3>\n\n\n\n<p>If you don\u2019t have your own IT department, this becomes particularly important. The quality of the VPN provider\u2019s support is also a consideration if you\u2019re operating on your own. (It might also be tempting to opt for a free VPN service if you\u2019re in this position. We\u2019ll discuss why you shouldn\u2019t in our FAQ.) Though details may vary from provider to provider, installation processes are, for the most part, similar.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\"><span class=\"ez-toc-section\" id=\"How-to-Get-a-VPN-on-PCs\"><\/span>How to Get a VPN on PCs<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Create a VPN Profile<\/h3>\n\n\n\n<p>For an account connected to your business, it\u2019s best to let IT staff set up your VPN profile. If you\u2019re doing it yourself, visit the <a href=\"https:\/\/apps.microsoft.com\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Store<\/a> to download the app for the VPN service you\u2019ve chosen to use. The VPN provider\u2019s website will provide the connection settings.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240820-how-to-get-a-vpn-figure_a.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"454\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240820-how-to-get-a-vpn-figure_a.jpg\" alt=\"VPN settings window on Microsoft Windows.\" class=\"wp-image-36842\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240820-how-to-get-a-vpn-figure_a.jpg 800w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240820-how-to-get-a-vpn-figure_a-300x170.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240820-how-to-get-a-vpn-figure_a-768x436.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/a><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Go to the Windows Start Menu<\/h3>\n\n\n\n<p>Select Settings&gt;Network and Internet&gt;VPN&gt;<strong>Add a VPN Connection<\/strong>.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>For <strong>the VPN provider<\/strong>, select <strong>Windows (built-in)<\/strong>.<\/li>\n\n\n\n<li>Enter an easy-to-remember <strong>Connection Name<\/strong>.<\/li>\n\n\n\n<li>Enter the <strong>address of the VPN server<\/strong> under <strong>Server Name or Address<\/strong>.<\/li>\n\n\n\n<li>From the drop-down menu, select your <strong>VPN Type<\/strong> (you\u2019ll have to know what <strong>protocol<\/strong> your service is using).<\/li>\n\n\n\n<li>Select your Type of Sign-in Info from the drop-down menu. Unless you have a smart card or certificate from work, choose <strong>User Name and Password<\/strong>.<\/li>\n\n\n\n<li>Enter your <strong>username and password<\/strong>.<\/li>\n\n\n\n<li>Select <strong>Save<\/strong>.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Connect to VPN<\/h3>\n\n\n\n<p>Click on the Network icon in the taskbar. A connect button should display; click on it. Alternatively, you can connect through the settings menu (Settings&gt;Network and Internet&gt;VPN). A pop-up box will request your sign-in information. While you\u2019re online, you can check to see if the VPN is active by clicking the Network icon in the taskbar.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\"><span class=\"ez-toc-section\" id=\"How-to-Get-a-VPN-on-Macs\"><\/span>How to Get a VPN on Macs<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Create your VPN Settings<\/h3>\n\n\n\n<p>For connections to your company VPN, contact your network administrator. If you\u2019re setting up yourself, contact your service provider. In either case, you want the settings to be used. If you\u2019re lucky, they will come in a click-to-open VPN Settings file. If not, you\u2019ll have to enter settings manually.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Select the Apple Menu<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Select <strong>System Settings<\/strong>. Click <strong>Network<\/strong> in the sidebar.<\/li>\n\n\n\n<li>In the <strong>Action<\/strong> pop-up menu, select <strong>Add VPN Configuration<\/strong> and select the type of connection from the drop-down menu.<\/li>\n\n\n\n<li>Enter an easy-to-remember name in the <strong>Display Name<\/strong> field.<\/li>\n\n\n\n<li>Click the <strong>Configuration<\/strong> menu. Choose the type of configuration you want. If you don\u2019t need multiple configurations on your computer, select <strong>Default<\/strong>.<\/li>\n\n\n\n<li>Enter the required settings. Depending on the service provider, this will include server address, account name and password, verification settings, etc.<\/li>\n\n\n\n<li>Select <strong>Create<\/strong>.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Connect to the VPN<\/h3>\n\n\n\n<p>Click the VPN Status icon in the menu bar. If no icon appears:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Go to <strong>System Settings>Control Center<\/strong> in the Apple menu.<\/li>\n\n\n\n<li>Go to the <strong>Menu Bar Only<\/strong> pop-up menu and click on <strong>VPN<\/strong>.<\/li>\n\n\n\n<li>Select <strong>Show<\/strong> or <strong>Hide<\/strong>.<\/li>\n<\/ol>\n\n\n\n<p>The VPN Status icon also offers options to show or hide connection status and connection time, and can switch between VPNs if you have multiple configurations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\"><span class=\"ez-toc-section\" id=\"How-to-Get-a-VPN-on-iPhones-or-iPads\"><\/span>How to Get a VPN on iPhones or iPads<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Choose an App<\/h3>\n\n\n\n<p>Begin by choosing the iPhone-compatible VPN app that best suits your purposes. The app (or provider website) should allow you to create an account, log in, choose your server, and connect simply. If you must configure your iPhone VPN manually:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Go to Settings<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>On your iPhone, click <strong>Settings>General>VPN<\/strong>.<\/li>\n\n\n\n<li>Click on <strong>Type<\/strong> and select your desired protocol. Since you\u2019re using a mobile device, you\u2019ll want to choose <strong>IKEv2<\/strong>, which makes network hops seamless.<\/li>\n\n\n\n<li>Enter your <strong>server name or address<\/strong>, <strong>account name and password<\/strong>, and <strong>remote ID<\/strong> provided by your VPN host. (If you have chosen a protocol option other than IKEv2, you will receive a <strong>pre-shared key<\/strong>.)<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Connect to the VPN<\/h3>\n\n\n\n<p>Click <strong>Done<\/strong> to connect.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\"><span class=\"ez-toc-section\" id=\"How-to-Get-a-VPN-on-Android\"><\/span>How to Get a VPN on Android<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Good news for owners of Google\u2019s Pixel 7 or later phones: these phones have built-in access to free Google VPN service wherever it\u2019s available. For phones running Android 9.0 or later:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Download &amp; Install the Required App<\/h3>\n\n\n\n<p>This could come from the Google Play store, or be a custom app developed in-house and distributed by your administrator.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Go to the <strong>Settings<\/strong> app. Select <strong>Network &amp; Internet>VPN<\/strong>.<\/li>\n\n\n\n<li>Tap <strong>Add<\/strong>. Enter the information and settings provided by your administrator or provider.<\/li>\n\n\n\n<li>Tap <strong>Save<\/strong>.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Connect to the VPN<\/h3>\n\n\n\n<p>Go to <strong>Settings&gt;Network &amp; Internet&gt;VPN<\/strong>. Tap the saved VPN you want, enter your credentials, tap connect, and the associated app will open.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\"><span class=\"ez-toc-section\" id=\"FAQs\"><\/span>FAQs<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">How Much Does a VPN Cost?<\/h3>\n\n\n\n<p>Anywhere from a little to a lot. The price for a VPN subscription varies from provider to provider and reflects the feature set, speed, and geographic distribution of the network, among other things. The biggest factor in the price of a VPN is the length of the contract. A 24-month contract can cost you less than half per month than a monthly contract.<\/p>\n\n\n\n<p>For a business, there\u2019s the option of building and operating your own VPN server. There are obvious advantages to having control over features and accessibility. If you\u2019re already operating in a cloud-based environment, hardware cost is minimal.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Can I Get a Free VPN?<\/h3>\n\n\n\n<p>There are many free VPN services on the market, and they should be approached and evaluated with caution. Speed, reliability, and availability are issues. And the provider has to pay for infrastructure somehow. Likely, that\u2019s either by selling your information to third parties or serving ads. Neither is a good option.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Are Internet Speeds Slower on a VPN?<\/h3>\n\n\n\n<p>The short answer? Yes. Two factors primarily impede your speed. First, your traffic is going through at least one intermediary server, possibly several. Second, your traffic is encrypted and decrypted between points. The number of \u201chops\u201d depends on the geography of the network and your location. (Multihop networks are designed to pass traffic through several servers for security purposes, as each pass offers further encryption of data.)<\/p>\n\n\n\n<p>The slightly longer answer is: In a well-designed network, the slow-down will be negligible, in the low hundreds of milliseconds \u2014 not a serious problem unless you\u2019re a gamer.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Can Anyone Access My VPN?<\/h3>\n\n\n\n<p>VPNs can be hacked. Hackers are forever looking for vulnerabilities in protocols, network management and configuration, encryption, etc. Even some of the biggest names in the VPN business have suffered breaches. On the user end, the usual precautions involving physical access, password security, and guarding against phishing and downloaded exploits apply.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Can I Be Tracked If I Use a VPN?<\/h3>\n\n\n\n<p>Data in transit is safe due to encryption, and your actual IP address can\u2019t be read \u2014 the DNS server&#8217;s IP address appears instead. But in most jurisdictions, law enforcement can get court orders to have your provider turn over log files that can expose your traffic. And if you\u2019re on a company VPN, of course administrators have access to your traffic.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">When Shouldn\u2019t I Use a VPN?<\/h3>\n\n\n\n<p>In some countries, it\u2019s illegal to use a VPN, or there are complex laws regarding their use. Banks often forbid VPN use to prevent traffic from other countries. Some organizations, like schools and businesses, might deny connections from commercial VPNs, and some streaming services prevent VPN use to enforce geographic content blocks.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\"><span class=\"ez-toc-section\" id=\"Bottom-Line-A-VPN-is-Part-of-a-Layered-Security-Solution\"><\/span>Bottom Line: A VPN is Part of a Layered Security Solution<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>VPNs provide a <a href=\"https:\/\/www.esecurityplanet.com\/networks\/types-of-network-security\/\">layer of security and anonymity<\/a> that can be important to protecting your traffic and data, especially in a corporate setting. Any remote traffic to a business network should be cloaked in VPN security, either commercial or custom-built. Ensure that your devices are properly configured for VPN access to minimize hassle and disruption.<\/p>\n\n\n\n<p>However, a VPN is only one component of a layered security solution. Your security suite, both as a user and as a corporate network, needs several other elements, like firewalls, intrusion detection, antivirus protection, and more to complete the picture. And, of course, a policy of user best practices is key.<\/p>\n\n\n\n<p><strong>Begin your security journey by investigating some of the available <a href=\"https:\/\/www.esecurityplanet.com\/products\/enterprise-vpn-solutions\/\">enterprise VPN solutions<\/a>.<\/strong><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6d81d9c061-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d81d9c061\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d81d9c061\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d81d9c061\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d81d9c061\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d81d9c061\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d81d9c061\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Getting a VPN is actually pretty simple. Follow our # step guide for how to get a VPN to start browsing the internet with more privacy.<\/p>\n","protected":false},"author":349,"featured_media":36843,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[],"b2b_audience":[],"b2b_industry":[],"b2b_product":[],"class_list":["post-36841","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Get a VPN on Any Device (+ Installation Tips)<\/title>\n<meta name=\"description\" content=\"Getting a VPN is actually pretty simple. Follow our # step guide for how to get a VPN to start browsing the internet with more privacy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Get a VPN on Any Device (+ Installation Tips)\" \/>\n<meta property=\"og:description\" content=\"Getting a VPN is actually pretty simple. Follow our # step guide for how to get a VPN to start browsing the internet with more privacy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-20T14:35:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-20T14:35:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240820-how-to-get-a-vpn.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Dave Webb\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dave Webb\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/\"},\"author\":{\"name\":\"Dave Webb\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/3c9b12383a10b29aa91531e96fd59bef\"},\"headline\":\"How to Get a VPN on Any Device (+ Installation Tips)\",\"datePublished\":\"2024-08-20T14:35:56+00:00\",\"dateModified\":\"2024-08-20T14:35:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/\"},\"wordCount\":1745,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240820-how-to-get-a-vpn.png\",\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/\",\"name\":\"How to Get a VPN on Any Device (+ Installation Tips)\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240820-how-to-get-a-vpn.png\",\"datePublished\":\"2024-08-20T14:35:56+00:00\",\"dateModified\":\"2024-08-20T14:35:57+00:00\",\"description\":\"Getting a VPN is actually pretty simple. Follow our # step guide for how to get a VPN to start browsing the internet with more privacy.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240820-how-to-get-a-vpn.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240820-how-to-get-a-vpn.png\",\"width\":1400,\"height\":900,\"caption\":\"Image:\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Get a VPN on Any Device (+ Installation Tips)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/3c9b12383a10b29aa91531e96fd59bef\",\"name\":\"Dave Webb\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/David.Webb_.Headshot-Dave-Webb-1-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/David.Webb_.Headshot-Dave-Webb-1-150x150.jpg\",\"caption\":\"Dave Webb\"},\"description\":\"David Webb is a journalist with more than 30 years\u2019 experience, 25 of them specializing in technology. He has edited a number of technology publications, served as Chief Content Officer for IT World Canada, and coached a team to numerous Canadian Online Publishing Awards.\",\"sameAs\":[\"linkedin.com\/in\/david-webb\/584383156\/\"],\"url\":\"https:\/\/www.esecurityplanet.com\/author\/dave-webb\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Get a VPN on Any Device (+ Installation Tips)","description":"Getting a VPN is actually pretty simple. Follow our # step guide for how to get a VPN to start browsing the internet with more privacy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/","og_locale":"en_US","og_type":"article","og_title":"How to Get a VPN on Any Device (+ Installation Tips)","og_description":"Getting a VPN is actually pretty simple. Follow our # step guide for how to get a VPN to start browsing the internet with more privacy.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/","og_site_name":"eSecurity Planet","article_published_time":"2024-08-20T14:35:56+00:00","article_modified_time":"2024-08-20T14:35:57+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240820-how-to-get-a-vpn.png","type":"image\/png"}],"author":"Dave Webb","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Dave Webb","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/"},"author":{"name":"Dave Webb","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/3c9b12383a10b29aa91531e96fd59bef"},"headline":"How to Get a VPN on Any Device (+ Installation Tips)","datePublished":"2024-08-20T14:35:56+00:00","dateModified":"2024-08-20T14:35:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/"},"wordCount":1745,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240820-how-to-get-a-vpn.png","articleSection":["Networks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/","url":"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/","name":"How to Get a VPN on Any Device (+ Installation Tips)","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240820-how-to-get-a-vpn.png","datePublished":"2024-08-20T14:35:56+00:00","dateModified":"2024-08-20T14:35:57+00:00","description":"Getting a VPN is actually pretty simple. Follow our # step guide for how to get a VPN to start browsing the internet with more privacy.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240820-how-to-get-a-vpn.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240820-how-to-get-a-vpn.png","width":1400,"height":900,"caption":"Image:"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-get-a-vpn\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"How to Get a VPN on Any Device (+ Installation Tips)"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/3c9b12383a10b29aa91531e96fd59bef","name":"Dave Webb","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/David.Webb_.Headshot-Dave-Webb-1-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/David.Webb_.Headshot-Dave-Webb-1-150x150.jpg","caption":"Dave Webb"},"description":"David Webb is a journalist with more than 30 years\u2019 experience, 25 of them specializing in technology. He has edited a number of technology publications, served as Chief Content Officer for IT World Canada, and coached a team to numerous Canadian Online Publishing Awards.","sameAs":["linkedin.com\/in\/david-webb\/584383156\/"],"url":"https:\/\/www.esecurityplanet.com\/author\/dave-webb\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/36841"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/349"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=36841"}],"version-history":[{"count":1,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/36841\/revisions"}],"predecessor-version":[{"id":36844,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/36841\/revisions\/36844"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/36843"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=36841"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=36841"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=36841"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=36841"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=36841"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=36841"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}