Choose a secure VPN: encryption algorithm, key length and data authentication