Proton
small-business-employees-IT-security

In a previous infographic, we showed that small businesses are prime targets for hackers. One reason is that small businesses often have less capacity to train their employees on IT security. This makes them the perfect target for phishing attacks.

One report even found that most employees were not sure they could spot a phishing email or a spoofed website if they saw one. That leaves your company’s sensitive data vulnerable to theft and ransomware attacks, which threaten to delete your data if you don’t pay the hackers.

References

Cyberark(nueva ventana), Global Advanced Threat Landscape Report(nueva ventana), 2018

Symantec, Internet Security Threat Report(nueva ventana), 2019

Symantec, Internet Security Threat Report(nueva ventana), 2017

Verizon, 2018 Data Breach Investigations Report, 11th edition(nueva ventana), 2018

Best regards,

The Proton Mail Team

Artículos relacionados

TikTok ban: Switching to RedNote? Your privacy is at stake.
en
As the treat of a TikTok ban looms, many U.S. users are flocking to a new TikTok alternative called RedNote. But should they be?
Big Tech's annual fines (the cash in red) are dwarfed by its annual free cash flow
en
Big Tech fines reached more than $8 billion in 2024. Unfortunately, not even this fine will give Big Tech pause. But progress is being made.
How to send large video files securely
en
Size limits, quality compression, and privacy concerns can make figuring out how to share large video files a hassle. Here’s how to do it simply and securely.
Learn the basics of email format, such as subject line, opening paragraph, sign-off, and signature, with practical tips and examples.
en
Learn the basics of email format, such as subject line, opening paragraph, sign-off, and signature, with practical tips and examples.
Proton Lifetime Fundraiser raised over $1 million
en
We raised over $1 million this year to directly support organizations on the front lines of the fight for online privacy and freedom.
The cover image for a Proton Pass blog comparing SAML and OAuth as protocols for business protection
en
SAML and OAuth help your workers access your network securely, but what's the difference? Here's what you need to know.