Contrary to popular belief VPN's do not provide security. They provide transport encryption/protection so that your data is hidden between the endpoints. Typically one of the endpoints is behind some secure perimeter so you are assured that its completely intact when it arrives inside. But when the endpoint is on the wild internet all they do is redirect you entry point. Browser exploits, drive by downloads and other exploits work just as well through VPN and TOR. And most VPN's only provide minimal anonymity, at least TOR by design randomly selects exit points on each connection.
As far as surfeasy, and for that matter any vpn service you better really trust the owners of the exit nodes and the code that encapuslates the transport. In surfeasy case shortly that will be a Chinese consortium. Not my first choice for handling data I want to keep private.
So public VPN away if your intent is to look like you are elsewhere and avoiding some region block on a streaming service. Or TOR away and hope you exit nodes are not owned by rogue actor. But typically without immaculate hygiene you are going to still leak your address.
But for security, neither is a solution