Photo Credit: ifc.com

 Being a privacy minded individual is the first thing you should consider in the ever growing digital age.


The convergence of Telecom and IT has opened the door for significant B2B activity in the ICT industry and left a lot of room for data security to be improved along the way. According to Wikipedia, in the field of telecommunications, data retention or data preservation, generally refers to the storage of call detail records (CDRs) of telephony and internet traffic and transaction data (IPDRs) by governments and commercial organizations. In the case of government data retention, the data stored is usually of telephone calls made and received, emails sent and received, and websites visited. Location data is also collected.


The data retention scheme as controversial as it was back in 2015 and continues to be, made its way through the Senate, march of last year in Australia, increasing the levels of surveillance over its citizens. Legal regulations of this caliber can reveal all sorts of data about you at the metadata level or security agencies- Australian or otherwise.


Having a robust VPN to encrypt your personal data is  nowadays, the only way to Zion.


And as we’re not looking to exhaust the “hide everything I do” reasoning; we mainly believe that a VPN is not paramount to activity that borders on illegal, but the very symbol of our right to the privacy acumen. My IP.io stands for data security and flexibility in the professional VPN understanding.


Across the world, businesses use VPNs to connect to remote data centers, or for employees to connect remotely to the physical network of their workplace, while individuals can use VPNs to get access to network resources when they’re not physically on the same LAN (local area network), or as a method for securing and encrypting their information from the potential liabilities that lie ahead once exposed to unsecured networks such as public WiFis or hotspots.


Adding an extra hop to the route between your PC and sites like Facebook, your data location can be easily camouflaged.




 neo vs. smith

 Photo Credit: hero.wikia.com

your internal data, sites, git repositories, banking credentials and all information will be coated in multiple layers of encryption;


as IT is being challenged to enable safe access to employees remotely by providing mobile VPN, secure email, encrypted containers and virtual desktop infrastructure (VDI), living outside the data security paradigm is simply not smart anymore, whether we’re talking about corporate or personal data;


A simple VPN download gets you a new location identity so that you can use geographically dispersed resources;


Bypassing Internet censorship in countries where censorship is applied;


You can share files and sensitive information inside a secured group away from prying eyes;





 Photo Credit: fliwave.com

Popularized by Milton Friedman back ’75 the phrase “There is no such thing as a free lunch remains of great economic relevance today in describing things like “opportunity costs”. However enticing, free VPNS seldom defeat the purpose of what a Virtual private network should be.


A VPN service implies having servers in various countries. The maintenance or renting costs can amount a few figures, depending on volume.


“When the product is free. You are the product”-

using their users as servers by converting them into a botnet, some VPN providers have been revealed, while others admit in their lawyer-eese terms of service, they can sell your bandwidth to other companies.

In other words, by searching a bargain  you can be faced with two main issues:

  1. Slower computer and internet connection: as you’re sharing your bandwidth and processor with others;
  2. Higher Security Risks: assuming responsibility for what other users do online, that can be tracked down back to your IP.

In depth analytics of your use data can be sold to third parties companies. Choosing a VPN provider, like My IP.io, that goes on a “no log kept” policies is the best approach to the matter.

  • ADS

modifying the web code to show ads is a common practice for “free” VPN services. 


A good VPN will have its own servers and encryption protocols designed for it, reducing possible security failures to a minimum. Free VPN services are often an open door to malware and can be easily used by scammers.


In the FREE vs. PAID matter, its is important to understand that most legit businesses will offer 7 days of free trial, but a free connection on a indefinite period of time is sure to get its profit elsewhere;  in ways that can harm your security and defeat the whole purpose of having a VPN in the first place.


We suggest you do yourself a favor and invest a good 5 bucks for a reliable VPN like the dedicated VPN you can get from My IP.io or from another reliable provider.


As a general rule, mundane but so incredibly important,  reading the company’s Terms of Service and the Privacy Policy, before buying a vpn service is a thing you should really consider. Ideally, these documents are in plain English and not lawyer-eese



A common misconception goes to say that US VPN services are legally required to log activity on their network. While required to cooperate with US law enforcement, as opposed to other countries, the location of servers is often more important.

Not compliant with DMCA are a lot of server locations outside the US.




Very useful when playing online games or logging into services such as banks, Paypal, e-mail providers, etc., a static IP is an underated asset, than not many VPN providers, big names (surprisingly enough), offer.


The ones that do offer a dedicated IP will charge the service as add on and will not always be that transparent about prices.

At My IP.io you can get your own static IP address for as little as $5/ month.


Many times, a dynamic VPN service can be rejected by services like gmail, for example. By using a shared VPN IP, Google may flag your account and require 2factor authentication.


For the record, is Google’s.

This is their dedicated IP address and no one else’s, the unique address on the web that has been attached to the domain name google.com.

To have and to hold, a pretty alluring thought!


By Purchasing a Dedicated IP your site is the only one on the Internet that will be using that unique IP address.

Apart from the alluring sound of it, with a dedicated IP address, processes are allowed to run for more than 10 minutes as long as they aren’t consuming too much of the server’s memory, which would result in a CPU throttling. Moreover, certain voice chat programs require a dedicated IP address before they can be setup and used or if you have a program that sends out emails every so many seconds, such as from a mailing list program like DaDa Mail, then you would need to get a dedicated IP address, if it’s going to take more than 10 minutes to send out the emails.


MyIP.io is a self-managed VPN network platform, delivering fast, secure and reliable VPN service , designed with the professional focus in mind. Our platform caters to a wide demographic through three channeled directions:Personal,Dedicated and Business, so it makes for a wonderful choice for corporate or personal use at the same time.


Engineered as a global platform,MyIP.io is a VPN service provider committed to developing applications and services that preserve an open and secure Internet experience while respecting user privacy.


MyIP.io is the result of the craftsmanship of our engineers, with many years of experience supporting large-scale, custom deployments for businesses , telecommunications companies, multi-service operators and enterprises.” Dave Wilson, CEO My IP.io


Freedom is #inevitable

My IP.io and efw.io team up for automation

As part of a continuous and strategic process, My IP.io, the VPN platform of choice for professionals, and Elastic Firewall, the next generation firewall management tool team up for automation. Heading towards a holistic security approach of Unified threat management (UTM) or unified security management (USM), My IP.io welcomes Elastic Firewall as a network security solution.

The perks of automation

The ability to perform tasks at superhuman levels are typically between “three and ten times the cost.” to quote the “classics” at McKinsey on the fundamentals of workplace automation( you can read here the whole white paper)

The above statement couldn’t be more similar to our own experience with the Elastic Firewall tool.
So, long story short we tested Elastic Firewall, the linux iptables firewall automation tool, that you can find on efw.io and here are the features that got us most excited:

  • simple, smooth integration process, designed on three different levels: Free, the most blunt of all versions available, followed by the Basic and the Enterprise, the more advanced counterparts in terms of integration, interface and capabilities;
  • control over Linux Iptables on multiple machines;
  • costs: using the Elastic Firewall tool we managed to gain full control over a series of repetitive and tiring actions, reducing a lot of the traction off the backs of your IT specialists or completely relieving our IT from the tiring tasks of firewall management;
  • a single deck interface appending rules in the chain through master deck interface enabled us to manage huge workloads of linux iptables firewalls in just a few clicks. Seeing is believing;
  • multivendor supportElastic Firewall lets you automate and manage network security policies for all leading vendors and platforms;
  • keeping application in perfect alignment: through cross-departmental management, security and network teams combined;
  • reduce errors: appending rules in the command line manually leaves a lot of room for errors which may lead to disruptions. Do not fret, this tool is the way to increased accuracy of changes, reducing mistakes, and speeding up the overall workflow of changes.

Having tested the service, we think Elastic Firewall tool is the way towards single racked mountable network appliance and definitely the way towards saving one of the most valuable resource of the known universe: time.

Freedom of tiring, repetitive workloads is finally attainable.


6 ways to secure your data while travelling

The prospect of having internet access just about anywhere can be a “glittering lure”, to quote Don Draper on his Canon technology sales pitch. Beyond the immediate allurement, a more in depth acknowledgement of the potential liabilities that lie ahead once exposed to unsecured networks such as public WiFis or hotspots while travelling, is a risk to be reckoned with. Take aerial tech, the next big thing, bringing the Internet to everyone, everywhere, through drones, sats or high altitude balloons and you can easily paint the picture of what connectivity will come to mean, in terms of penetration and prevalence. Though we’re not there yet, one thing is for sure: it will happen.

buy vpn

Taking the path of data security is a no brainer in the ever evolving mobile connectivity environment of today and while your data may be well protected inside the enterprise gates, what happens when you travel and need to rely on unencrypted channels? More importantly, what happens with both your corporate and personal data as you use a range of personal devices that may or may not come with hardware encryption?

Banning corporate data access from personal smartphones or blocking enterprise email orVPN access on unknown devices its already a thing of the past, since IT is being challenged to enable safe access to employees remotely by providing mobileVPN, secure email, encrypted containers and virtual desktop infrastructure (VDI). Living outside the data security paradigm is simply not smart anymore, whether we’re talking about corporate or personal data, it makes no difference really.

Particularly when travelling, the threat of a potential attack is real. Maybe you’re one of the lucky ones, who never experienced this kind of security issues but don’t rest on luck, there’s always a first time. Our friendly advice is: better yet, take all precautions then resume to “it will never happen to me” losing attitude. Here’s our top 6 tips for keeping your data secure, while travelling:

  1. Update Software: almost all software update releases patch a serie of security vulnerabilities so keeping your software up to date is a good idea
  2. Turn off cookies and autofill: a little inconvenience can go a long way toward data security
  3. Chose your apps wisely: do some due diligence before downloading apps.
  4. Be sure that all of your mobile devices have a remote wipe or autowipe feature. For Apple’s iPhone and iPad, there’s Apple’s MobileMe service. If one of your devices gets stolen, you can quickly and remotely perform a factory reset from any computer connected to the Internet, wiping out all of the device’s data and even locking it indefinitely.
  5. Make sure you use a VPN connection in public wireless networks
  6. Change passwords regularly: use strong passwords and change them every 6 months.