New VPN Gateway in Norway

Norway VPN Server

Our latest VPN gateway is in Torp, Norway. The new gateway gives Ghost Path customers in Norway a great option for connecting. The new location should be ultra-fast for users in and around Northern Europe.

Ghost Path VPN Gateways

Ghost Path is now operating over 119 servers in 41 different countries, and we’re not slowing down anytime soon. We continue to build our VPN network so that our customers have a close, fast VPN connection no matter where they are globally.

About Ghost Path VPN

Ghost Path is a leading VPN provider in the United States. We offer a 7-day free trial on select VPN accounts, so give us a try today!

The Risks of Online Gaming & How to Stay Safe

Whether you’re an all-out “gamer” or simply enjoy a few hands of online poker every now and then, all that online gaming fun comes with its own set of risks.

WThe risks of online gaminghen we turn to the internet for gaming entertainment often the last think we think about (or want to think about) is the fact that we’re opening ourselves up to potentially be the victim of scams, identity theft or viruses.

If you spend any time gaming, then take a few minutes to read through the risks below and how to avoid them!

The Risks…

  • Large, online gaming communities may feel “friendly” but the truth is, you’re surrounded by strangers, which means you could unthinkingly share too much personal info like your full name, email address, age or even online passwords.
  • When you download “cheats” you could actually be downloading corrupt software that contains viruses.
  • Illegally downloading games could lead to severe penalties or even prosecution.
  • Getting rid of old game consoles, computers, mobile devices, etc. that still contain your personal info can put you at risk of identity theft.

Ok, now that you recognize some of the risks of online gaming, let’s go over how to protect yourself so you can keep on gaming without the worry.

How to Stay Safe…

  • Make sure you have updated antivirus software.
  • Only play authorized, legitimate versions of games that you have obtained/purchased legally and from the proper sources.
  • Choose a secure username that does not reveal personal info.
  • Create strong and long passwords.
  • Never share personal info with other players.
  • Keep your game software up-to-date.
  • Delete all personal info before disposing of or selling unwanted gaming devices.
  • Establish rules and guidelines for your children when they’re playing online (and model good behavior)!

To protect yourself even further, consider setting up a VPN so that you can mask your location and identity and never worry about online gaming hazards again! For more information about getting a Virtual Private Network, click HERE.

 

Risks & safety measures inspired by this post on GetSafeOnline.org.

10 People Who Need a VPN [infographic]

Do you need a VPN?

We’ll get to the answer to that question in a minute, but first, let’s back it up.

Do you know what a VPN is?

VPN is a Virtual Private Network. And, it’s an effective, safe and easy way to add security and privacy to both public and private networks. Basically, it enables you to freely use and browse the Internet without the fear of putting yourself at risk of cybercrimes, hackers, or geographic restrictions.

As you can imagine, having a VPN can be really beneficial, but there are specific groups of people who really can benefit from having a VPN.

If you’re wondering if you are a one of them, check out the infographic below to find out!


Click HERE to view infographic in a new page.

 

For even more info about how a VPN can benefit you, visit GhostPath.com.

What The Big Dogs Are NOT Telling You About The Security Of Your Mobile Device

Screen Shot 2014-09-02 at 10.57.29 AMEver feel like you’re not getting the whole story?

Well, we’ve done some digging and it turns out that there’s quite a lot that the big dogs (namely Google and Apple) are NOT telling you about the security of your mobile device.

According to a recent Unisys study on workplace mobile habits, it was found that many business users access important corporate data using non-secure methods, like public WiFi. Plus, an increasing number of employees are accessing their workplace’s business applications on their personal devices, putting both themselves, sensitive data and their company at risk.

And worse, most people don’t give a second thought to the security of their devices before logging on at a WiFi hotspot or checking their email using mobile data.

Here are some enlightening facts about our mobile device habits & security:

  • By 2020 there will be 50 billion (yes, with a b) internet-connected devices
  • 51% of organizations have experience data loss in the last year from non-secure device usage
  • 32% of Americans say they prefer to use simple passwords; a practice that puts you & your data at risk
  • In a recent media company security breach, it was uncovered that 3,000 users had the password “123456” and 2,000 users used “password” as their password

In order to better protect yourself, your data & your mobile device, get a VPN (virtual private network), which will encrypt your data and protect your privacy no matter what device you use to connect to the Internet.

 

This post was inspired by this infographic.

3 Myths & Truths About Your Child’s Safety Online

Screen Shot 2014-08-25 at 11.26.27 AMThere’s a lot of talk these days about the many risks of children being online.

We hear news story after news story about cyberbullying, online child predators, and others with malicious intent lurking around every corner. Sure, there are risks, and practicing safe online usage is essential, but most of the time the benefits of the Internet far outweigh the potential hazards.

In today’s post, we’re debunking some common myths about your child’s safety online, and we’ll fill you in on the real truths of each situation.

MYTH #1: Social media transforms kids into bullies.

TRUTH: Social media is just another outlet for bullying — it doesn’t turn kids into bullies. Most kids who engage in online bullying are also often bullies at school and usually have another reason for acting out, like family issues, school problems, etc. The most productive thing to do is for parents and teachers to educate themselves about the warning signs of bullying so that they can step-in before the behavior goes too far.

MYTH #2: Never post photos of your children on social media — it’s too dangerous!

TRUTH: By using the appropriate privacy settings, you can post pictures AND keep your children safe. To ensure that your kids remain safe & protected, (1) use privacy settings that limit your posts’ reach to only family and trusted friends, (2) limit your audience by using photo-share sites that require a login to see pictures, like Flickr, and (3) don’t tag or identify your children in the photos.

MYTH #3: Strict parental control setting are the best way to protect your children online.

TRUTH: Using just one measure for online security gives you a false sense of safety. Parental controls are just one piece of the puzzle, you also need to openly discuss online safety precautions with your children, share the risks of being online, establish agreed-upon rules, and encourage your children to be both responsible and respectful when online.

To further protect your children from online risks, consider setting up a VPN to ensure privacy, security & safety while online. For more information, click HERE.

 

This post was inspired by this article.

 

Censorship & Security Issues While Traveling

If you’re a frequent traveler, you likely know the headaches and risks that can arise with censorship, geographic restrictions and unsecured WiFi.

In our wired world, we often take for granted the ease and security of connecting to the Internet at home, and then when we travel, we’re suddenly hit with outrageous usage fees, limited access and compromised public WiFi that puts our data and identities at risk.

Well, we put together a fun infographic that demonstrates the censorship and security issues travelers face, as well as a solution that’ll remove the blocks and the worry!

Travel VPN Infographic

For more info about VPNs (virtual private networks), click here.

7 Rules for Safer Online Shopping

For most people online shopping has become the norm.

Our busy schedules prevent us from trekking to the mall every time we need something, so instead we visit online retailers to fulfill our shopping needs.

Safe online shopping

But, not all online shopping destinations are created equal, and while many sites are trustworthy and legitimate, there are a number of fake online retailers that are just waiting to rip you off.

Luckily, a little online shopping savvy can go a long way to protecting you, your money and your identity.

Read through our online shopping rules below to keep yourself safe online.

  1. Stick to sites that you know & trust. Instead of starting your online shopping with a search engine, begin at a trusted retailer like Amazon, Target, Lowe’s or Macy’s. Search engines can lead you to places that are not trustworthy, especially if you venture past the first page or two of search results. Also, check the spelling of the site’s name (Amazon.com versus Amazn.com*). Many “copycat” sites try to get your money by looking “familiar”, and check the top-level domain as well (Amazon.com versus Amazon.net*). *These are fictitious examples.
  2. Use credit cards. Credit cards tend to be the safest option for online shopping because you have recourse. If an ordered item is never delivered or you find fraudulent charges on your card, the credit card company will work with you to remedy those issues and get you your money back. But, if you use a debit card or give access to your bank account, it can be a lot more challenging to get your money back after you fall prey to a scam. Check your statements regularly, and keep an eye out for suspicious activity.
  3. Keep a paper trail. Whenever you make purchases online, be sure to save any and all documentation that you receive via email in an email folder or, better yet, print hard copies of receipts, terms of sale, product descriptions, and any emails that you exchange with the retailer. Again, this will be helpful and necessary should you find yourself the target on an online shopping scam.
  4. Only shop with the “lock”. Any time you’re about to make an online purchase, look for the lock. Make sure that the site has SSL (secure sockets layer) encryption installed. You can determine if it does because an SSL url will begin with https:// (instead of http://). Typically, a little lock icon will also appear next to the site’s url or in the status bar; another indication of a secure site.
  5. Shut down your machine. Do you typically leave your computer running and connected to the Internet 24/7? While that may seem like no big deal to you, it means that you’re leaving your machine open to cybercriminals all day and night. This gives hackers the opportunity to infest your system with malware and commit cybercrimes. Instead, after making a purchase, turn off your computer and protect yourself and your money!
  6. Don’t overshare! Only fill out the necessary (i.e. “starred”) information when making on online purchase. No online retailer needs your birth date, social security number, or other unnecessary personal data to complete your transaction. Don’t make it easy for online criminals, instead be cautious, don’t over share, and you’ll protect yourself from identity theft.
  7. Use a secure connection. Don’t conduct your online shopping while using unsecured public WiFi. This is an open invitation to hackers, peeping Toms, and identity theft. Instead, wait to make online purchases from a secure network like your home or place of work.

If you want to further protect yourself, your money and your identity while shopping online, consider getting a VPN. For more details about how a Virtual Private Network can improve your online experience, visit Ghost Path.

4 Questions to Ask BEFORE Buying a VPN

If you regularly use public WiFi, travel for work, worry about Internet security, or simply value you privacy, you’re probably considering getting a VPN (Virtual Private Network).

4 questions for your VPN provider

A VPN is essentially a protective “tunnel” that secures the connection between your laptop, smartphone or tablet and the Internet. This ensures that all your online activity is protected from hackers, peeping toms, or others with malicious intent who are using the same network.

But, before you got out and buy one, it’s important to consider your needs and usage habits so that you choose the best possible VPN for you!

Here are 4 questions to consider before you buy a VPN:

  1. Do you regularly travel out of the country? Many of your favorite services, like Netflix, Hulu, or Amazon on Demand, are blocked once you travel outside of the USA, and many decide to get a VPN to bypass these limitations. To ensure you get the right one for you, ask your VPN service provider if they have exit servers in the U.S. meaning that you can “appear” to be in the United States when you’re actually enjoying a cappuccino in Rome. (GhostPath VPN is totally equipped to help you bypass any foreign country limitation, so you can catch up on House of Cards even while you’re abroad.)
  2. Can it be used across all your devices? You may think you only need a VPN for your computer, but the truth is more and more Internet security breaches are occurring on our smartphones and tablets because they’re portable and we can easily use them in public (often on unsecured WiFi networks). (Our GhostPath VPN works seamlessly with laptops, computers, smartphones and tablets, so no matter what device you’re using, you’re covered!)
  3. Can I use it on my router? Using a VPN in conjunction with your wireless router is a great way to protect all of your internet connected devices in one fell swoop. (GhostPath supports using DD-WRT to connect to the VPN at the router level, meaning all your internet connected devices are protected. Keep in mind DD-WRT will only work if it’s supported by your router.)
  4. Are there any limitations? Make sure to ask about bandwidth limitations, as that can greatly impact your user experience. Also, ask if the VPN you’re considering works with all service providers. (GhostPath syncs with all major operating systems including Windows, Mac OS X, Ubuntu, Android, and iOS. And, there are no download limits, no throttling, and no maximum number of server changes! You are free to use our service however you see fit.)

Click here for more information on our VPN service.

 

Some questions inspired by this post from PC World.

The Actual Time It Takes Hackers To Crack a Password + Celeb Phone Hacking

How long does it take to break a password?Do you ever wonder how secure your passwords are?

In light of the recent celebrity phone hacking scandal which resulted in revealing pictures of 100 celebs being posted and shared online and via social media, you’re probably wondering how secure your own passwords are.

The hacker, in this case, “took advantage of a security flaw in Apple’s online backup service, iCloud. Many online services lock someone out after several unsuccessful attempts to log in, but not Apple’s Find My iPhone app and iCloud. That has been changed by Apple in the aftermath of the nude celebrity photo scandal. But with unlimited guesses, a computer program can generate and test thousands of potential passwords until an account is entered. It is called a brute force attack. The tendency of many people to choose weak passwords and to use the same password for each service helped. Once a celebrity’s Find My iPhone app password is discovered, the same password often can access iCloud. People might never know their accounts have been compromised.” (quote from CNN.com)

With that in mind, if your passwords resemble something along the lines of “123456” or “password” or you use the same password for all sites, you’re putting yourself unnecessarily at risk.

Smart hackers are adept at breaking codes in little time, and when you use a simple or common password, you’re opening yourself up to be the victim of online crime.

Here is the actual time it take a hacker to break a password:

  • Lowercase, 6 characters = 5 minutes
  • Lowercase, 9 characters = 2 months
  • Uppercase & Lowercase, 6 characters = 5.5 hours
  • Uppercase & Lowercase, 9 characters = 88 years
  • 6 characters with numbers & symbols = 8.5 days
  • 9 characters with numbers & symbols = 19,985 years

As you can see, adding a length and complexity to your passwords pays off BIG TIME.

Here’s a little tip, instead of using simple words for your passwords, use phrases. For example: “Time flies when you’re having fun!” becomes “TFlyzwhenurhavinFUN!”

A password like that won’t be cracked for millennia! 

And, be sure to use a different password or password variation for every site with a secure log-in.

For extra protection, look into a Virtual Private Network to protect your data and privacy on all your devices, anywhere in the world! Read more HERE.

For the full scoop on the celebrity phone hacking scandal, watch the video below.

Screen Shot 2014-09-05 at 10.38.23 AM

 

This post was inspired by an element of this infographic.