Data privacy and cyber security expert.
Joe has been working in the VPN field for over seven years, and has a passion for analysis and debate. He loves learning new technologies and software, and regularly uses everything from Kali Linux to Pro-tools. When not writing about digital security, Joe helps businesses improve their website usability and spends his free time playing guitar and reading about data science, IoT, and philosophy.
-
US Healthcare Data Breach StatisticsRead Guide
Healthcare data breaches increased by 2733% between 2009 and 2019 in the United States. The alarming frequency of such attacks has resulted in the majority of Americans’ healthcare data being exposed. The origins of healthcare data breaches range from disgruntled employees to state sponsored hackers. On many occasions, the data ends up for sale on […]
-
Your Ultimate Guide to Tor BrowserRead Guide
Tor Browser is software that lets you surf the internet and use all web services anonymously. Nobody — not even government organizations, law enforcers, or big corporations — would be able to check your browsing history or track your location.
-
DNS Over HTTPS: What is it? Does it protect users?Read Guide
The Domain Name System (DNS) is the phone book of the Internet. When people use the web, they don’t type in the IP address of the website that they want to visit. Instead, they use a domain name, like www.google.com. The job of DNS is to convert this domain name into an IP address that […]
-
Cyberwarfare statistics: A decade of geopolitical attacksRead Guide
There have been almost 500 documented geopolitical cyber attacks around the world since 2009. Making cyberwarfare a major technological threat to nations and their citizens. In this article, we hope to break down some of the numbers and gain insight into the nature of these attacks, where they originate from, and who they’re targeting. Key […]
-
Internet Surveillance and How to Keep Your Activity PrivateRead Guide
Surveillance offers government agencies the ability to gain a deep understanding of a target. This can often be to prevent terrorism or other serious crime, but more and more we are seeing surveillance as a matter of course, and people are becoming so used to it that many don’t even care. Some forms of internet […]
-
VPN Router vs VPN on Device – Which is Better?Read Guide
If you’ve read a few of our guides you’ll know how strongly we advocate the use of VPNs to protect your online privacy and break down the walls of censorship. So today we’re going to look at setting up and using a VPN on your router so you can protect every device on your home […]
-
GDPR is in Full Force – Are You Compliant?Read Guide
The European General Data Protection Regulation is widely misunderstood by many small businesses. It’s one of those topics that many people have some idea about and are keen to talk loudly about, while frequently missing the point, although few really understand it. At its core, GDPR governs how businesses must protect EU citizens’ data, and […]
-
How to Use the Internet Privately – Ultimate GuideRead Guide
Many people these days know that their internet browsing is not particularly private, but most aren’t aware of quite how much they are being tracked. In this guide I will explain the most common methods of tracking, and how to overcome them and keep your internet usage private. Changing your browser or search engine won’t […]
-
How to watch ITV in the USA – Three Troubleshooting TipsRead Guide
ITV, and other United Kingdom-based streaming services such as BBC iPlayer, use geo-blocking to block access from outside the UK. Here we set out, step-by-step, how to use a VPN to access ITV from the US or anywhere else outside the UK: Get ExpressVPN Launch ExpressVPN and connect to a UK server Go to the […]
-
A Beginners Guide to VPNsRead Guide
Chances are by now you already know a bit about VPNs and what they do. Perhaps you’ve heard they’re useful for unblocking content on Netflix, or getting around internet restrictions at school or work, but you may want to develop a much better understanding of how they work before parting with any cash. Up until […]