Proton

Was ist Schatten-IT – und ist dein Unternehmen anfällig dafür?

What is shadow IT? Proton explains shadow IT risks and shares shadow IT examples. Image shows an illustrated purple computer screen showing six app icons, two of which have red alert notifications in the corners

Verwandte Artikel

Proton Sheets and a screenshot
en
Proton Drive now includes Proton Sheets, giving you secure, encrypted spreadsheets for safer collaboration, organized data, and aligned teams.
Work from home policy templates
en
Create a secure remote work policy that covers eligibility, hours, communication, and data protection. Includes examples and ready-to-use templates.
The OpenAI logo and an exclamation mark, representing the OpenAI data breach
en
The OpenAI data breach exposed API user data through Mixpanel. Find out what sensitive information was exposed and how to protect your data.
A purple foot on a purple background. An @ icon, a location icon, a link icon, and a shopping cart icon surround the foot
en
Online shopping may be convenient, but it presents privacy risks. Find out how to shop safely and privately online
The GrapheneOS logo, the French flag, and an off switch, representing GrapheneOS leaving France due to encryption concerns
GrapheneOS verlässt Frankreich und warnt vor Verschlüsselungs-Backdoors. Erfahre, warum Ende-zu-Ende-Verschlüsselung für Pixel-Benutzer wichtig ist und wie Backdoors sie schwächen.
How local authorities and United States Border Patrol abuse flock cameras
en
AI-driven ALPR systems are a mass dragnet-surveillance system that poses a direct threat to the privacy and freedom of everyone in the US.