author-image

Ian Garland

Ian Garland is a distinguished author and cybersecurity expert, boasting over six years of dedicated service as a writer and editor for Comparitech.com. His expertise primarily focuses on privacy, VPN testing and evaluation, and exploring the unique online challenges faced by internet users around the world. His work offers insightful analysis into both emerging and established VPN services, underlining his deep understanding of the digital security landscape.

Holding a first-class Bachelor's degree in Computing from the University of the Highlands and Islands, Ian has established himself as a prominent voice in the field of online security. His insights and analyses have been featured across prestigious platforms including The Gazette, the RSA Cybersecurity Conference blog, RTInsights, Circuit Magazine, and Security Boulevard. His work goes beyond mere reporting, delving into critical examinations of the ever-evolving cyber world.

Outside his professional life, Ian maintains a keen interest in the streaming universe, particularly keeping abreast of the latest developments in the Kodi community. His passion for technology extends into personal projects, where he hones his coding skills. A lover of science fiction, Ian often immerses himself in sci-fi literature, reflecting his fascination with the future and the unknown realms of the digital universe.

View author posts
author-image

Mark Gill

Mark Gill is an experienced writer and editor with a keen focus on digital privacy. After joining the Comparitech team in 2018, Mark established himself as an authority on VPNs. Through his comprehensive articles and reviews, he underscores the many benefits of VPNs, from ensuring online privacy to providing unrestricted access to favorite TV shows and sports events globally.

A graduate of the University of Lincoln, Mark earned a BA (Hons) degree in English and Journalism before relocating to sunny Spain, where he spent half a decade teaching English.This experience enriched Mark's communication skills, which he later channeled into his writing and editing career. Further testament to his dedication to online security, Mark recently completed the Google Cybersecurity Professional Certificate.

When he’s not writing for Comparitech, Mark regularly uses VPNs to keep up with TV shows and sporting events from back home. He also likes to spend his free time mountain biking and following his American football team, the Detroit Lions—not to mention meticulously managing his fantasy football teams!

View author posts
author-image

Paul Bischoff

Paul is Comparitech’s editor and a regular commentator on cyber security and privacy topics in national and international media including New York Times, BBC, Forbes, The Guardian and many others. He's been writing about the tech industry since 2012 for publications like Tech in Asia, Mashable, and various startup blogs.

Paul has an in-depth knowledge of VPNs, having been an early adopter while looking to access the open internet during this time in China.

He previously worked in Beijing as an editor for Tech in Asia, and has been writing and reporting on technology for the last decade. He has also volunteered as a teacher for older adults learning basic tech literacy and cyber awareness. You can find him on Twitter at @pabischoff.

View author posts
author-image

Stephen Cooper

Stephen Cooper has taken a close interest in online security since his thesis on Internet encryption in the early 90s. That formed part of his BSC (Hons) in Computing and Informatics at the University of Plymouth. In those days, encapsulation techniques were just being formulated and Cooper kept an eye on those methodologies as they evolved into the VPN industry. Cooper went on to study an MSC in Advanced Manufacturing Systems and Kingston University. He also holds an MSc Advanced Security and Digital Forensics from Edinburgh Napier University.

Cooper worked as a technical consultant, sitting DBA exams and specializing in Oracle Applications. With a long experience as a programmer, Cooper is able to assess systems by breaking into programs and combing through the code. Knowledge of IT development and operations working practices helps him to focus his reviews on the attributes of software that are really important to IT professionals.

After working as an IT consultant across Europe and the USA, he has become adept at explaining complicated technology in everyday terms. He is a people person with an interest in technology

View author posts
author-image

Ray Walsh

Ray Walsh is a digital privacy expert with over 6 years of experience writing about consumer privacy services including VPNs, password managers, secure email services, and encrypted cloud backups.

Ray graduated from the English department of Exeter University in the UK and has since been quoted over 500 times to express his privacy advocacy opinions in leading publications such as The Times, The Guardian, The Washington Post, CNet, and The Register to name a few. Ray has also been interviewed on the TV and the radio, including on The BBC and Russia Today to answer questions regarding privacy laws and surveillance tech.

Ray has written tech guides, reviews, blogs, news, and opinion pieces for BestVPN, ProPrivacy, Dell Tech Page One, StartPage, and Politics.co.uk – and he is now a happy member of the Comparitech family where he continues his crusade to increase privacy and internet freedom for people around the world.

View author posts
author-image

Aimee O'Driscoll

Aimee is a tech and cybersecurity editor with a focus on consumer privacy and security. She has written for a number of security and tech publications including Security Today and IoT for All. At Comparitech, Aimee covers a range of topics, including digital privacy, online security, VPNs, security software, and cybersecurity education and careers. She is dedicated to providing thorough yet easily digestible information that resonates with fellow lovers of everything digital.

View author posts
author-image

Amakiri Welekwe

Amakiri is a UK-trained technology consultant and cybersecurity evangelist, working at the intersection of security, technology, and people. He has a master’s degree in network systems with over 10 years’ experience in managing IT services and infrastructure. He’s been writing about cybersecurity since 2013.

View author posts
author-image

Tim Keary

Tim writes extensively on network administration topics helping businesses and entrepreneurs to keep their data and assets protected. He was previously the cybersecurity editor at VentureBeat and has been freelance since 2017.

View author posts
author-image

Osman Husain

Osman has been covering tech and related subjects since 2013 and was previously an editor at Tech in Asia. He wholeheartedly believes that the internet should be used for social good and to break down barriers to information. The ongoing witch hunt against net neutrality, he feels, is a recipe for disaster.

View author posts
author-image

Sam Cook

Samuel Cook is a freelance writer who covers a wide range of topics, including internet privacy, security, data journalism, and digital content streaming. He can often be neck-deep in data visualizations.

View author posts
author-image

Craig McCart

Craig McCart stands as a leading expert in cybersecurity , antivirus and VPN technology, boasting over a decade of rich, hands-on experience in the realm of corporate cybersecurity. His tenure at Comparitech has been marked by leveraging this deep reservoir of knowledge, ensuring that his insights in content creation are both insightful and practically grounded.

Immersed in the dynamic field of cybersecurity, Craig meticulously tracks and analyzes the latest developments, translating complex technical concepts into user-friendly VPN guides, comprehensive comparisons, and insightful reviews. His work is tailored to demystify the intricacies of cybersecurity, making it accessible and engaging for a broad audience.

When he's taking a break from being a Comparitech word-wizard, he spends time playing games with his baby (his power-hungry gaming PC).

His typical go-to titles are God of War, New World, and the occasional Metal Gear Solid speedrun (the best game ever, in his opinion).

When he's not gaming, he's with his family (with actual non-gaming computer babies!), enjoying days out and the occasional trip abroad.

View author posts
author-image

Marc Dahan

Marc is a technology journalist with over 15 years experience. He specializes in content related to emerging technologies, cybersecurity, big data, privacy, artificial intelligence, and the politics of technology. He has worked for some of the largest tech companies, such as Deluxe Digital, Sony and Autodesk. During his time at Autodesk, he gave a series of talks on digital security and privacy, designed to give people the means to secure various aspects of their digital lives. Marc is passionate about online privacy and digital freedom.

View author posts
author-image

Tom Blackstone

Tom Blackstone is a former salesperson turned tech writer. Before 2014, he sold home theater systems, televisions, computers, video games, and many other tech products. Since 2014, he has been a full-time writer. During this time, his work included three Ebooks about the Chromecast and Evernote. He has always enjoyed trying out new devices, learning how to use them, and using this knowledge to help others find enjoyment in them.

View author posts
author-image

Josh Lake

Josh Lake is a writer who focuses on the intersections between technology, privacy and security. His work helps companies and individuals get the most out of technological developments, without having to sacrifice their civil liberties or open themselves up to the ever-increasing threats of cybercrime.

View author posts
author-image

Steve Adams

Steve Adams is a professional writer with 15 years experience working with some of the world’s leading technology companies including Hewlett Packard, Ericsson and AutoDesk. He has a passion for taking complex tech, privacy and security topics and making them accessible and easy for anyone to understand.

View author posts
author-image

Liku Zelleke

linkedin-icon

Liku Zelleke is a field support technician at DXC Technology and a prolific blogger. He has over two decades’ experience in the IT industry starting at Ethiopian Airlines in 1997, holding a number of roles during his 25 years with the company from Helpdesk Tech Support through to Database Administrator, Systems Administrator, Network Administrator and a Systems Support Professional.

He hasn’t looked back since the day, years ago, when he discovered he could combine that experience with his other passion: writing. Today, he writes on topics related to network configuration, optimization, and security.

View author posts
author-image

John Cirelly

Strategic technical support professional with seven years of experience in the information technology space. Combines deep industry knowledge with experience providing top of the line technical support.

View author posts
author-image

Jon Watson

Jon is a senior Linux systems administrator currently working in the Internet security field. Most of his time is spent reviewing security related issues and developing ways to mitigate damage or prevent them from happening in the first place. He has articles published in Linux Journal and Linux Magazines and was previously the Tech Channel editor for b5 Media.

View author posts
author-image

William Elcock

William has been fiddling with tech for as long as he remembers. This naturally transitioned into helping friends with their tech problems and then into tech blogging.

View author posts
author-image

Justin Schamotta

Justin Schamotta is an experienced writer, having spent the past two decades covering everything from consumer tech to corporate malfeasance. He's currently studying for a BSc in Data Science, after initially completing a postgraduate diploma in journalism at Cardiff University. When he's not playing with words and numbers, he can normally be found surfing at one of the beaches near his home.

View author posts
author-image

Lee Munson

Lee Munson is Comparitech's Security Researcher. Lee is a regular contributor to the Sophos’ Naked Security blog and Social Media Manager for Brian Honan’s BH Consulting. He is also the proud winner of the Best UK Security Blog and Best European Security Blog at the 2015 European Security Blogger Awards.

View author posts
author-image

Dave Albaugh

Dave Albaugh is a freelance Information Infrastructure Master Technician who consults on computer & network security for small businesses, SOHOs & entrepreneurs. He has documented loads of "knowledge nuggets" for different clients on topics such as security, understanding the technology behind the internet, and the infrastructure behind a computer network, all written in non-techie English. When he's not putting out client's fires, Dave is a roadie for his wife's Taiko group and a non-biker motorcycle enthusiast

View author posts
author-image

Sam Woolfe

Sam Woolfe is a freelance writer and journalist with more than 8 years' experience writing about privacy issues. He is particularly interested in cybersecurity, online privacy, technology ethics, and the issue of mass surveillance.

View author posts
author-image

Aaron Phillips

Aaron Phillips is a technical writer from the Boston metro area. He likes Apple phones, Android tablets, Raspberry Pi, streaming media, and smooth transitions from third to first person.

View author posts
author-image

Kyle Schurman

As a freelance writer for more than two decades, Kyle has experience writing about computers, consumer electronics, software, hardware, operating systems, cybersecurity, online privacy, and various technologies. Some of his first stories were about how to use DOS. (Yes, he’s been doing this awhile.)

View author posts
author-image

James Milin-Ashmore

James Milin-Ashmore, a seasoned cybersecurity expert and VPN specialist, possesses over ten years of extensive experience in writing about online security. His expert insights and comprehensive reviews are regularly featured on leading platforms such as VPN Mentor, Secure Thoughts, Liquid VPN, and AlwaysVPN.

Recognized for his deep understanding of internet security and virtual private networks, James is an acclaimed contributor in the field of cyber protection. When not delving into the digital world of cybersecurity, he enjoys playing FIFA (FC), following various sports, and exploring the scenic trails of Hertfordshire with his dog.

View author posts
author-image

Victoria McIntosh

Victoria McIntosh is an Information and Privacy professional residing in Halifax, Nova Scotia. She holds a Masters in Library and Information Science, and is certified by the International Association of Privacy Professionals as an Information Privacy Technologist. Regularly contributing to the technology community through blogging and providing conference talks, she feels privacy is an important freedom in the digital world, and works best with a fresh cup of coffee in her hands.

View author posts
author-image

Adrian Wengenroth

Adrian is a writer, musician, and visual artist living in Chicago with his two cats Rico and Frankie. He has a diverse background in tech, the recording industry, education, and film and television (not all at the same time).

He’s especially interested in the benefits of VPNs and streaming services for artists, and is passionate about the constant evolution and growth of the entertainment industry. He loves trying out new tech and is also an advocate for preserving Internet history. He can often be found browsing the Internet archives for cool and obscure media.

As a former Genius, he’s a big Apple fan and still helps his dad set up his new Apple devices. When he’s not writing or creating music and art, he’s usually skateboarding.

View author posts
author-image

Sean McGrath

Sean McGrath is Comparitech’s Head of Content. With a technology journalism background, four years in the VPN space and nearly six years heading up content teams, he brings a wealth of knowledge and experience to the role.

From startups to global tech giants, he’s worked alongside the biggest names in the IT industry like Microsoft, Dell EMC, Deloitte, and Lenovo, helping them tell their stories in the most effective way possible. Sean says he thinks of himself as a writer first and foremost. He’s an ardent follower of Orwell’s Six Rules for Writing and his favorite quote is: Je n’ai fait celle-ci plus longue que parce que je n’ai pas eu le loisir de la faire plus courte.

In his spare time, you can find him riding his mountain bike, walking the dogs, flying UAVs, playing pool, and checking his phone every two minutes – a habit he is desperate to break.

View author posts
author-image

Chris Stobing

Chris Stobing is an internet security writer and blogger, born and raised in the heart of Silicon Valley. Surrounded by tech and everything that makes it tick from birth, he's had an interest in internet privacy and networking technology for years, and has come to Comparitech to contribute his knowledge on both.

View author posts
author-image

Penny Hoelscher

Penny Hoelscher has a degree in journalism and a background in legacy programming. But, with an aversion to danger and conflict, she now combines interests in writing and IT safely from behind her computer screen.

View author posts
author-image

Richard Patterson

Richard Patterson is the Founder of Comparitech and has spent the last 13 years building online businesses in the US and UK which empower consumers looking to purchase tech products and services.

View author posts
author-image

Scott Pickard

Scott Pickard worked for a number of years as a network operations and installations engineer at a leading broadband company within the UK that specialised in providing high-speed internet and security. There, he developed an affinity for network administration on an enterprise-scale, which included planning network architecture, maintaining live systems of thousands of customers, and dealing with all manner of issues that arose as part of the role. On a smaller scale, he also worked as an installations and administration engineer to set up customer environments using the latest tech in firewalling, routing, wi-fi, and more.

Now, he’s seeking to combine his insights and experience with his passion for writing to deliver interesting and accessible content that everyone can enjoy.

View author posts
author-image

John Kimball

John Kimball is a software engineer and writer who's developed safety-critical software for aircraft, software engineering tools with scripting languages, and security software for small devices. He has an interest in information security, web development, activist technology, and system/network administration.

View author posts
author-image

David Gilbert

David Gilbert has worked as a journalist for the last decade, and for the last seven years has focused on technology, including cybersecurity, privacy and cryptocurrencies. Most recently he worked as European technology editor at the International Business Times, specialising in covering the global smartphone industry and the dangerous world of cybercrime. Prior to this David worked as the Technology Editor for the UK edition of IBTimes for over three-and-a-half years, winning the prestigious Digital Writer of the Year award at the Online Media Awards in 2013. Previously, he worked as news editor at Trusted Reviews for two years after moving to London from Ireland where he worked for national and regional newspapers for three years.

View author posts
author-image

Ben Schultz

Ben's sysadmin knowledge includes but is not limited to: Windows Server, including IntelliMirror; Windows Domain; DNS; RAID; Network connectivity, and most other admin-related tasks.

View author posts
author-image

David Zomaya

David is a CompTIA Network+ certified technical writer. He has over 5 years of experience in technical roles including support, sysadmin, sysadmin team lead, and director positions.

View author posts
author-image

Stuart Winter-Tear

Stuart is addicted to all things Information Security with a mission to bring quality, pragmatic cyber security knowledge to general IT users, small and startup companies.

View author posts
author-image

David Balaban

David Balaban is a computer security researcher with over 15 years of experience in malware analysis and antivirus software evaluation. David provides expert opinion on contemporary information security matters, including social engineering, penetration testing, threat intelligence, online privacy and white hat hacking.

View author posts
author-image

Ben Stockton

Ben Stockton is a freelance technology writer and former UK college lecturer. He's been writing how-to guides and reviews on various topics since 2018, with a special interest in helping users master using Windows, Linux, and Android devices. He's previously written for sites including How-To Geek and MakeUseOf among others.

View author posts
author-image

Bob Diachenko

Bob heads up Comparitech’s security team of four cyber security researchers. Bob specializes in database security, data privacy, data protection, GDPR and security risks. As part of our research Bob has worked with government agencies and law enforcement to secure exposed data.

View author posts
author-image

Nicholas Fearn

Nicholas Fearn is a freelance technology journalist and copywriter who lives in the Welsh valleys. His work has been published in outlets like the FT, the Independent, the Daily Telegraph, The Next Web, Techradar, T3, Android Central, Computer Weekly, and many others. He has a particular interest in cybersecurity, privacy and VPNs.

View author posts
author-image

Andra Zaharia

linkedin-icon

Helping people make better decisions for their online security and privacy through educational content that changes perspectives and habits.

View author posts
author-image

Gillian Jones

Gillian Jones spent 10 years with the NHS with 5 of them spent working in Information Governance, with responsibility for ensuring compliance throughout the organization for Freedom of Information, Data Protection and Environmental Information Regulations, as well as privacy, confidentiality and information security via auditing, advice and guidance and organization wide training. She holds an ISEB in Data Protection as well as a degrees both in history and creative practice and now works as a freelance writer with a passion for information security and IT

View author posts
author-image

Al Nelson

Al is a writer of both code and words. He specializes in new, interactive forms of technology and always has the perfect emoji for any situation. When he's not furiously typing away, you can find him with his nose in a book or soaking up some sun outdoors, usually with a cat in tow.

View author posts
author-image

Lewis Hatton

Lewis has a longstanding passion for cybersecurity and networking. When he's not testing the latest antivirus and malware protection solutions at work, he's testing them at home... always looking for the very best ways for consumers to protect themselves against an ever-evolving threat landscape.

His goals are to make cybersecurity information available and understandable to everyone, ensuring consumers are always able to make informed decisions.

View author posts
author-image

Jonathan Keane

Jonathan is a freelance tech writer living in Dublin, Ireland, regularly covering areas around security and privacy, from hack attacks to the latest security software.

View author posts