Meet Hide My IP - A VPN and Data Security Firm
Hide my IP was conceived out of a personal need for a reliable, secure and easy to use VPN client. After the initial release of their variety of PC security tools, Hide My IP experienced a strong interest in VPN, and were encouraged to grow the service by expanding their VPN network with new locations and features. We spoke to a member of staff to get to know the company from the inside out. Here's what we found. Share
What measures are being taken at Hide My IP to prevent outsiders as well as employees from looking at your users' data?
We utilize tiered access control levels and proprietary security solutions, Hide My IP ensures that it's user's private data is well guarded.
We believe that any company responsible for safeguarding private data should reveal only what is needed when necessary regarding operating procedures to prevent unauthorized third parties from obtaining protected client data.
What best practices would you recommend for individuals and businesses using cloud storage services such as dropbox?
Whenever utilizing a cloud storage provider, it is crucial to ensure that any sensitive data is locally encrypted prior to uploading it to the cloud. Strong encryption algorithms like AES with a 256-bit key should be employed for this purpose. By doing so, one can guarantee that neither the cloud storage provider, government entities, nor any third party can access the contents of securely encrypted stored files.
What is the most popular server location at Hide My IP and why?
The United States is our most popular location as we have a high portion of users there who desire an IP address in various cities from around the country. The United States also has some of the least restrictive Internet censorship policies, allowing users located in countries with higher levels of censorship to access the full unfettered as viewed from the United States.
What new trends can we expect to see in the future of online security?
We envision consolidation of smaller security solution providers, an increase in product features and device compatibility, continuation of large data breaches from online service providers, and expansion with product localization into regional markets.