	{"id":74623,"date":"2018-01-24T11:59:04","date_gmt":"2018-01-24T19:59:04","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=74623"},"modified":"2019-10-31T06:04:39","modified_gmt":"2019-10-31T13:04:39","slug":"the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn\/","title":{"rendered":"Why you should use a VPN &#8211; Intego Mac Podcast, Episode 15"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-73558\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode.png\" alt=\"New Intego Mac Podcast Episode\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>The <a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\">Intego Mac Podcast<\/a> episode 15 is now available!\u00a0After a brief discussion of the week&#8217;s news, this episode offers a\u00a0look at Virtual Private Networks (VPN). Hosts Kirk and Josh\u00a0explain how they work, and when and why you might want to use one.<\/p>\n<p>Check out <a href=\"http:\/\/podcast.intego.com\/15\" target=\"_blank\" rel=\"noopener\">the latest episode<\/a>\u00a0for a roundup of important Apple news you need to know, industry opinions\u00a0about Macs and iOS devices, and how to keep them secure.\u00a0If you like what you hear, be sure to rate and review the Intego Mac Podcast on iTunes!<\/p>\n<p><strong>Have a question? Ask us! <\/strong><\/p>\n<p>A new episode is available weekly, every Wednesday. Want your question aired in our next episode of the Intego Mac Podcast? Listeners and fans of the podcast can <a href=\"http:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"noopener\">contact Intego<\/a> via email at\u00a0podcast@intego.com and ask us any question that your burning heart desires, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>After a brief discussion of the week&#8217;s news, we look at VPNs, virtual private networks. We explain how they work, and when and why you might want to use one.<\/p>\n","protected":false},"author":4,"featured_media":73561,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[4390,13],"tags":[3715,2311],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"After a brief discussion of the week&#039;s news, we look at VPNs, virtual private networks. We explain how they work, and when and why you might want to use one.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why you should use a VPN - Intego Mac Podcast, Episode 15 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"After a brief discussion of the week&#039;s news, we look at VPNs, virtual private networks. We explain how they work, and when and why you might want to use one.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-24T19:59:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-10-31T13:04:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn\/\",\"name\":\"Why you should use a VPN - Intego Mac Podcast, Episode 15 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn\/#primaryimage\"},\"datePublished\":\"2018-01-24T19:59:04+00:00\",\"dateModified\":\"2019-10-31T13:04:39+00:00\",\"description\":\"After a brief discussion of the week's news, we look at VPNs, virtual private networks. We explain how they work, and when and why you might want to use one.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why you should use a VPN &#8211; Intego Mac Podcast, Episode 15\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Why you should use a VPN &#8211; Intego Mac Podcast, Episode 15\",\"datePublished\":\"2018-01-24T19:59:04+00:00\",\"dateModified\":\"2019-10-31T13:04:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn\/#webpage\"},\"wordCount\":163,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-Featured.png\",\"keywords\":[\"Intego Mac Podcast\",\"VPN\"],\"articleSection\":[\"Intego Mac Security Podcast\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"After a brief discussion of the week's news, we look at VPNs, virtual private networks. We explain how they work, and when and why you might want to use one.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn\/","og_locale":"en_US","og_type":"article","og_title":"Why you should use a VPN - Intego Mac Podcast, Episode 15 - The Mac Security Blog","og_description":"After a brief discussion of the week's news, we look at VPNs, virtual private networks. We explain how they work, and when and why you might want to use one.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn\/","og_site_name":"The Mac Security Blog","article_published_time":"2018-01-24T19:59:04+00:00","article_modified_time":"2019-10-31T13:04:39+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn\/","name":"Why you should use a VPN - Intego Mac Podcast, Episode 15 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn\/#primaryimage"},"datePublished":"2018-01-24T19:59:04+00:00","dateModified":"2019-10-31T13:04:39+00:00","description":"After a brief discussion of the week's news, we look at VPNs, virtual private networks. We explain how they work, and when and why you might want to use one.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Why you should use a VPN &#8211; Intego Mac Podcast, Episode 15"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Why you should use a VPN &#8211; Intego Mac Podcast, Episode 15","datePublished":"2018-01-24T19:59:04+00:00","dateModified":"2019-10-31T13:04:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn\/#webpage"},"wordCount":163,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-Featured.png","keywords":["Intego Mac Podcast","VPN"],"articleSection":["Intego Mac Security Podcast","Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-jpB","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/74623"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=74623"}],"version-history":[{"count":12,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/74623\/revisions"}],"predecessor-version":[{"id":87358,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/74623\/revisions\/87358"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/73561"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=74623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=74623"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=74623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}