Proton

Per a empreses

Email archiving is a quick way to stay secure and compliant
en
  • Per a empreses
Archiving email with Proton can boost security, make employees more efficient, ensure your business is legally compliant, and prevent data breaches.
An open letter and a torn document, representing a termination letter template
en
  • Per a empreses
Learn how to write a termination letter with our step-by-step guide and use our 8 free, ready-to-edit termination letter templates.
A folder, a user icon, and a shield, representing secure data handling during offboarding
en
  • Per a empreses
Learn how to offboard employees and contractors securely — with free ready-to-use offboarding templates you can edit in Proton Docs.
A user icon and a checklist, representing an onboarding checklist
en
  • Per a empreses
Make onboarding smoother with 6 free templates for every step, from preboarding to 90-day reviews. Easy to edit and share in Proton Docs.
en
  • Per a empreses
One in five law firms reported a cyberattack in the past year. These are the key tools and strategies that can help protect your firm from costly breaches.
A document icon with a briefcase, representing a job description template
en
  • Per a empreses
A step-by-step guide with easy tips and examples for writing a job description + 10 free job description templates to edit in Proton Docs.
An envelope icon with a document inside and a small briefcase symbol in the corner, representing a job offer letter
en
  • Per a empreses
Download our 4 free job offer letter templates and find out how to write an offer letter to hire the best talent. Quick to edit and use.
How to start an email: 15 professional greetings and opening lines
en
  • Per a empreses
Learn how to start an email professionally with our top greetings, openers, and formal examples, and find out what to avoid (and why).
Learn the best professional email sign-offs, common mistakes to avoid, and real-world examples.
en
  • Per a empreses
Struggling with how to end an email? Learn about the best professional email sign-offs, common mistakes to avoid, and real-world examples.
A phone screen with a speech bubble with a phone number in it
en
  • Per a empreses
Your email address and passwords aren't the only information hackers can use to scam you. Here's what someone can do with your phone number — and how to protect it.
A web application screen with an unlock icon in the bottom right corner
en
  • Per a empreses
Your best defense against a data breach could be improving your web application security: Find out how Proton Pass can help.