Ian Garland
Ian Garland is a distinguished author and cybersecurity expert, boasting over six years of dedicated service as a writer and editor for Comparitech.com. His expertise primarily focuses on privacy, VPN testing and evaluation, and exploring the unique online challenges faced by internet users around the world. His work offers insightful analysis into both emerging and established VPN services, underlining his deep understanding of the digital security landscape.
Holding a first-class Bachelor's degree in Computing from the University of the Highlands and Islands, Ian has established himself as a prominent voice in the field of online security. His insights and analyses have been featured across prestigious platforms including The Gazette, the RSA Cybersecurity Conference blog, RTInsights, Circuit Magazine, and Security Boulevard. His work goes beyond mere reporting, delving into critical examinations of the ever-evolving cyber world.
Outside his professional life, Ian maintains a keen interest in the streaming universe, particularly keeping abreast of the latest developments in the Kodi community. His passion for technology extends into personal projects, where he hones his coding skills. A lover of science fiction, Ian often immerses himself in sci-fi literature, reflecting his fascination with the future and the unknown realms of the digital universe.
View author postsPaul Bischoff
Paul is Comparitech’s editor and a regular commentator on cyber security and privacy topics in national and international media including New York Times, BBC, Forbes, The Guardian and many others. He's been writing about the tech industry since 2012 for publications like Tech in Asia, Mashable, and various startup blogs.
Paul has an in-depth knowledge of VPNs, having been an early adopter while looking to access the open internet during this time in China.
He previously worked in Beijing as an editor for Tech in Asia, and has been writing and reporting on technology for the last decade. He has also volunteered as a teacher for older adults learning basic tech literacy and cyber awareness. You can find him on Twitter at @pabischoff.
View author postsMark Gill
Mark Gill is an experienced writer and editor with a keen focus on digital privacy. After joining the Comparitech team in 2018, Mark established himself as an authority on VPNs. Through his comprehensive articles and reviews, he underscores the many benefits of VPNs, from ensuring online privacy to providing unrestricted access to favorite TV shows and sports events globally.
A graduate of the University of Lincoln, Mark earned a BA (Hons) degree in English and Journalism before relocating to sunny Spain, where he spent half a decade teaching English.This experience enriched Mark's communication skills, which he later channeled into his writing and editing career. Further testament to his dedication to online security, Mark recently completed the Google Cybersecurity Professional Certificate.
When he’s not writing for Comparitech, Mark regularly uses VPNs to keep up with TV shows and sporting events from back home. He also likes to spend his free time mountain biking and following his American football team, the Detroit Lions—not to mention meticulously managing his fantasy football teams!
View author postsStephen Cooper
Stephen Cooper has taken a close interest in online security since his thesis on Internet encryption in the early 90s. That formed part of his BSC (Hons) in Computing and Informatics at the University of Plymouth. In those days, encapsulation techniques were just being formulated and Cooper kept an eye on those methodologies as they evolved into the VPN industry. Cooper went on to study an MSC in Advanced Manufacturing Systems and Kingston University. He also holds an MSc Advanced Security and Digital Forensics from Edinburgh Napier University.
Cooper worked as a technical consultant, sitting DBA exams and specializing in Oracle Applications. With a long experience as a programmer, Cooper is able to assess systems by breaking into programs and combing through the code. Knowledge of IT development and operations working practices helps him to focus his reviews on the attributes of software that are really important to IT professionals.
After working as an IT consultant across Europe and the USA, he has become adept at explaining complicated technology in everyday terms. He is a people person with an interest in technology
View author postsRay Walsh
Ray Walsh is a digital privacy expert with over 6 years of experience writing about consumer privacy services including VPNs, password managers, secure email services, and encrypted cloud backups.
Ray graduated from the English department of Exeter University in the UK and has since been quoted over 500 times to express his privacy advocacy opinions in leading publications such as The Times, The Guardian, The Washington Post, CNet, and The Register to name a few. Ray has also been interviewed on the TV and the radio, including on The BBC and Russia Today to answer questions regarding privacy laws and surveillance tech.
Ray has written tech guides, reviews, blogs, news, and opinion pieces for BestVPN, ProPrivacy, Dell Tech Page One, StartPage, and Politics.co.uk – and he is now a happy member of the Comparitech family where he continues his crusade to increase privacy and internet freedom for people around the world.
View author postsCraig McCart
Craig McCart stands as a leading expert in cybersecurity , antivirus and VPN technology, boasting over a decade of rich, hands-on experience in the realm of corporate cybersecurity. His tenure at Comparitech has been marked by leveraging this deep reservoir of knowledge, ensuring that his insights in content creation are both insightful and practically grounded.
Immersed in the dynamic field of cybersecurity, Craig meticulously tracks and analyzes the latest developments, translating complex technical concepts into user-friendly VPN guides, comprehensive comparisons, and insightful reviews. His work is tailored to demystify the intricacies of cybersecurity, making it accessible and engaging for a broad audience.
When he's taking a break from being a Comparitech word-wizard, he spends time playing games with his baby (his power-hungry gaming PC).
His typical go-to titles are God of War, New World, and the occasional Metal Gear Solid speedrun (the best game ever, in his opinion).
When he's not gaming, he's with his family (with actual non-gaming computer babies!), enjoying days out and the occasional trip abroad.
View author postsAimee O'Driscoll
Aimee is a tech and cybersecurity editor with a focus on consumer privacy and security. She has written for a number of security and tech publications including Security Today and IoT for All. At Comparitech, Aimee covers a range of topics, including digital privacy, online security, VPNs, security software, and cybersecurity education and careers. She is dedicated to providing thorough yet easily digestible information that resonates with fellow lovers of everything digital.
View author postsAmakiri Welekwe
Amakiri is a UK-trained technology consultant and cybersecurity evangelist, working at the intersection of security, technology, and people. He has a master’s degree in network systems with over 10 years’ experience in managing IT services and infrastructure. He’s been writing about cybersecurity since 2013.
View author postsSam Cook
Samuel Cook is a SaaS product researcher who's been immersed in both B2B and B2C software for over 10 years in various roles, including technical product writing, marketing, and research. He has also been a prolific and trusted ghostwriter for multiple C-suite executives within B2B SaaS companies, with thought leadership content that has appeared in Forbes and Entrepreneur magazine. As the Head of B2B Strategy and Deveopment, Sam utilizes his experience within the software industry to provide deep and and approachable strategy guides for software buyers across various niches, including internet privacy, IT security, and more. He derives a signficant amount of satisfication from helping software buyers get an advantage in the sales process. He brings together his various experiences, including working previously as a Content Director for a B2B SaaS company, to unravel sometimes confusing product features and marketing language.
View author postsTim Keary
Tim writes extensively on network administration topics helping businesses and entrepreneurs to keep their data and assets protected. He was previously the cybersecurity editor at VentureBeat and has been freelance since 2017.
View author postsOsman Husain
Osman has been covering tech and related subjects since 2013 and was previously an editor at Tech in Asia. He wholeheartedly believes that the internet should be used for social good and to break down barriers to information. The ongoing witch hunt against net neutrality, he feels, is a recipe for disaster.
View author postsMarc Dahan
Marc is a technology journalist with over 15 years experience. He specializes in content related to emerging technologies, cybersecurity, big data, privacy, artificial intelligence, and the politics of technology.
He has worked for some of the largest tech companies (Deluxe Digital, Sony, Autodesk) and is passionate about online privacy and digital freedom.
View author postsTom Blackstone
Tom Blackstone is a former salesperson turned tech writer. Before 2014, he sold home theater systems, televisions, computers, video games, and many other tech products. Since 2014, he has been a full-time writer. During this time, his work included three Ebooks about the Chromecast and Evernote. He has always enjoyed trying out new devices, learning how to use them, and using this knowledge to help others find enjoyment in them.
View author postsSteve Adams
Steve Adams is a professional writer with 15 years experience working with some of the world’s leading technology companies including Hewlett Packard, Ericsson and AutoDesk. He has a passion for taking complex tech, privacy and security topics and making them accessible and easy for anyone to understand.
View author postsJohn Cirelly
Strategic technical support professional with seven years of experience in the information technology space. Combines deep industry knowledge with experience providing top of the line technical support.
View author postsJosh Lake
Josh Lake is a writer who focuses on the intersections between technology, privacy and security. His work helps companies and individuals get the most out of technological developments, without having to sacrifice their civil liberties or open themselves up to the ever-increasing threats of cybercrime.
View author postsLiku Zelleke
Liku Zelleke is a field support technician at DXC Technology and a prolific blogger. He has over two decades’ experience in the IT industry starting at Ethiopian Airlines in 1997, holding a number of roles during his 25 years with the company from Helpdesk Tech Support through to Database Administrator, Systems Administrator, Network Administrator and a Systems Support Professional.
He hasn’t looked back since the day, years ago, when he discovered he could combine that experience with his other passion: writing. Today, he writes on topics related to network configuration, optimization, and security.
View author postsJon Watson
Jon is a senior Linux systems administrator currently working in the Internet security field. Most of his time is spent reviewing security related issues and developing ways to mitigate damage or prevent them from happening in the first place. He has articles published in Linux Journal and Linux Magazines and was previously the Tech Channel editor for b5 Media.
View author postsJustin Schamotta
Justin Schamotta is an experienced writer, having spent the past two decades covering everything from consumer tech to corporate malfeasance. He's currently studying for a BSc in Data Science, after initially completing a postgraduate diploma in journalism at Cardiff University. When he's not playing with words and numbers, he can normally be found surfing at one of the beaches near his home.
View author postsWilliam Elcock
William has been fiddling with tech for as long as he remembers. This naturally transitioned into helping friends with their tech problems and then into tech blogging.
View author postsLee Munson
Lee Munson is Comparitech's Security Researcher. Lee is a regular contributor to the Sophos’ Naked Security blog and Social Media Manager for Brian Honan’s BH Consulting. He is also the proud winner of the Best UK Security Blog and Best European Security Blog at the 2015 European Security Blogger Awards.
View author postsRichard Ernszt
Richard Ernszt is a seasoned technology and VPN writer for Comparitech, with a decade of experience in content creation. His focus on cybersecurity over the past seven years has honed his expertise in VPNs and digital privacy.
Richard holds a Bachelor's degree in English from Babes-Bolyai University, which helped launch his writing career right out of college. His insightful articles have been featured on respected platforms such as ProPrivacy, TechNadu, and CyberWaters.
Outside of work, Richard enjoys creative writing, traveling with friends, staying updated on recent AI advancements, and exploring music production in FLStudio.
View author postsDave Albaugh
Dave Albaugh is a freelance Information Infrastructure Master Technician who consults on computer & network security for small businesses, SOHOs & entrepreneurs. He has documented loads of "knowledge nuggets" for different clients on topics such as security, understanding the technology behind the internet, and the infrastructure behind a computer network, all written in non-techie English. When he's not putting out client's fires, Dave is a roadie for his wife's Taiko group and a non-biker motorcycle enthusiast
View author postsSean McGrath
Sean McGrath is Comparitech’s Head of Content. With a technology journalism background, four years in the VPN space and nearly six years heading up content teams, he brings a wealth of knowledge and experience to the role.
From startups to global tech giants, he’s worked alongside the biggest names in the IT industry like Microsoft, Dell EMC, Deloitte, and Lenovo, helping them tell their stories in the most effective way possible. Sean says he thinks of himself as a writer first and foremost. He’s an ardent follower of Orwell’s Six Rules for Writing and his favorite quote is: Je n’ai fait celle-ci plus longue que parce que je n’ai pas eu le loisir de la faire plus courte.
In his spare time, you can find him riding his mountain bike, walking the dogs, flying UAVs, playing pool, and checking his phone every two minutes – a habit he is desperate to break.
View author postsSam Woolfe
Sam Woolfe is a freelance writer and journalist with more than 8 years' experience writing about privacy issues. He is particularly interested in cybersecurity, online privacy, technology ethics, and the issue of mass surveillance.
View author postsAaron Phillips
Aaron Phillips is a technical writer from the Boston metro area. He likes Apple phones, Android tablets, Raspberry Pi, streaming media, and smooth transitions from third to first person.
View author postsKyle Schurman
As a freelance writer for more than two decades, Kyle has experience writing about computers, consumer electronics, software, hardware, operating systems, cybersecurity, online privacy, and various technologies. Some of his first stories were about how to use DOS. (Yes, he’s been doing this awhile.)
View author postsJames Milin-Ashmore
James Milin-Ashmore, a seasoned cybersecurity expert and VPN specialist, possesses over ten years of extensive experience in writing about online security. His expert insights and comprehensive reviews are regularly featured on leading platforms such as VPN Mentor, Secure Thoughts, Liquid VPN, and AlwaysVPN.
Recognized for his deep understanding of internet security and virtual private networks, James is an acclaimed contributor in the field of cyber protection. When not delving into the digital world of cybersecurity, he enjoys playing FIFA (FC), following various sports, and exploring the scenic trails of Hertfordshire with his dog.
View author postsChris Stobing
Chris Stobing is an internet security writer and blogger, born and raised in the heart of Silicon Valley. Surrounded by tech and everything that makes it tick from birth, he's had an interest in internet privacy and networking technology for years, and has come to Comparitech to contribute his knowledge on both.
View author postsRichard Patterson
Richard Patterson is the Founder of Comparitech and has spent the last 13 years building online businesses in the US and UK which empower consumers looking to purchase tech products and services.
View author postsVictoria McIntosh
Victoria McIntosh is an Information and Privacy professional residing in Halifax, Nova Scotia. She holds a Masters in Library and Information Science, and is certified by the International Association of Privacy Professionals as an Information Privacy Technologist. Regularly contributing to the technology community through blogging and providing conference talks, she feels privacy is an important freedom in the digital world, and works best with a fresh cup of coffee in her hands.
View author postsScott Pickard
Scott Pickard worked for a number of years as a network operations and installations engineer at a leading broadband company within the UK that specialised in providing high-speed internet and security. There, he developed an affinity for network administration on an enterprise-scale, which included planning network architecture, maintaining live systems of thousands of customers, and dealing with all manner of issues that arose as part of the role. On a smaller scale, he also worked as an installations and administration engineer to set up customer environments using the latest tech in firewalling, routing, wi-fi, and more.
Now, he’s seeking to combine his insights and experience with his passion for writing to deliver interesting and accessible content that everyone can enjoy.
View author postsAdrian Wengenroth
Adrian is a writer, musician, and visual artist living in Chicago with his two cats Rico and Frankie. He has a diverse background in tech, the recording industry, education, and film and television (not all at the same time).
He’s especially interested in the benefits of VPNs and streaming services for artists, and is passionate about the constant evolution and growth of the entertainment industry. He loves trying out new tech and is also an advocate for preserving Internet history. He can often be found browsing the Internet archives for cool and obscure media.
As a former Genius, he’s a big Apple fan and still helps his dad set up his new Apple devices. When he’s not writing or creating music and art, he’s usually skateboarding.
View author postsPenny Hoelscher
Penny Hoelscher has a degree in journalism and a background in legacy programming. But, with an aversion to danger and conflict, she now combines interests in writing and IT safely from behind her computer screen.
View author postsJohn Kimball
John Kimball is a software engineer and writer who's developed safety-critical software for aircraft, software engineering tools with scripting languages, and security software for small devices. He has an interest in information security, web development, activist technology, and system/network administration.
View author postsDiana Bucur
Diana Bucur is an experienced writer with a primary focus on digital privacy tools such as VPNs and cybersecurity topics. With more than 5 years of expertise, she has dedicated her career to producing in-depth content on VPN setup, digital protection strategies, and online privacy. Diana has previously worked with TechNadu, ProPrivacy, and CyberWaters, contributing to their extensive cybersecurity content.
Diana graduated in English and Japanese studies, which has sharpened her writing skills and given her a unique perspective on technology. Her background helps her simplify complex tech topics, making them easy to understand for a wide audience. Outside of her professional life, Diana enjoys expressing her creativity through poetry and immersing herself in literature.
View author postsDavid Gilbert
David Gilbert has worked as a journalist for the last decade, and for the last seven years has focused on technology, including cybersecurity, privacy and cryptocurrencies. Most recently he worked as European technology editor at the International Business Times, specialising in covering the global smartphone industry and the dangerous world of cybercrime. Prior to this David worked as the Technology Editor for the UK edition of IBTimes for over three-and-a-half years, winning the prestigious Digital Writer of the Year award at the Online Media Awards in 2013. Previously, he worked as news editor at Trusted Reviews for two years after moving to London from Ireland where he worked for national and regional newspapers for three years.
View author postsBen Schultz
Ben's sysadmin knowledge includes but is not limited to: Windows Server, including IntelliMirror; Windows Domain; DNS; RAID; Network connectivity, and most other admin-related tasks.
View author postsDavid Zomaya
David is a CompTIA Network+ certified technical writer. He has over 5 years of experience in technical roles including support, sysadmin, sysadmin team lead, and director positions.
View author postsDavid Balaban
David Balaban is a computer security researcher with over 15 years of experience in malware analysis and antivirus software evaluation. David provides expert opinion on contemporary information security matters, including social engineering, penetration testing, threat intelligence, online privacy and white hat hacking.
View author postsAl Nelson
Al is a writer of both code and words. He specializes in new, interactive forms of technology and always has the perfect emoji for any situation. When he's not furiously typing away, you can find him with his nose in a book or soaking up some sun outdoors, usually with a cat in tow.
View author postsStuart Winter-Tear
Stuart is addicted to all things Information Security with a mission to bring quality, pragmatic cyber security knowledge to general IT users, small and startup companies.
View author postsAndra Zaharia
Helping people make better decisions for their online security and privacy through educational content that changes perspectives and habits.
View author postsNicholas Fearn
Nicholas Fearn is a freelance technology journalist and copywriter who lives in the Welsh valleys. His work has been published in outlets like the FT, the Independent, the Daily Telegraph, The Next Web, Techradar, T3, Android Central, Computer Weekly, and many others. He has a particular interest in cybersecurity, privacy and VPNs.
View author postsBob Diachenko
Bob heads up Comparitech’s security team of four cyber security researchers. Bob specializes in database security, data privacy, data protection, GDPR and security risks. As part of our research Bob has worked with government agencies and law enforcement to secure exposed data.
View author postsBen Stockton
Ben Stockton is a freelance technology writer and former UK college lecturer. He's been writing how-to guides and reviews on various topics since 2018, with a special interest in helping users master using Windows, Linux, and Android devices. He's previously written for sites including How-To Geek and MakeUseOf among others.
View author postsGillian Jones
Gillian Jones spent 10 years with the NHS with 5 of them spent working in Information Governance, with responsibility for ensuring compliance throughout the organization for Freedom of Information, Data Protection and Environmental Information Regulations, as well as privacy, confidentiality and information security via auditing, advice and guidance and organization wide training. She holds an ISEB in Data Protection as well as a degrees both in history and creative practice and now works as a freelance writer with a passion for information security and IT
View author posts