<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>The Proton Blog</title><description>News from the front lines of privacy and security</description><link>https://proton.me/blog/</link><language>en</language><feed_url>https://proton.me/blog/feed</feed_url><item><title>What is the App Store Accountability Act?</title><link>https://proton.me/blog/app-store-accountability-act</link><guid isPermaLink="true">https://proton.me/blog/app-store-accountability-act</guid><description>The App Store Accountability Act would require app stores to verify users’ ages and obtain parental consent. Learn how the bill could affect privacy and security.</description><pubDate>Wed, 11 Mar 2026 17:23:43 GMT</pubDate><content:encoded>
&lt;p&gt;Lawmakers in the United States are considering new legislation that would change how app stores verify users’ ages and manage parental consent. The App Store Accountability Act would require major app stores to verify users’ age categories and obtain parental approval before minors can download apps or make in-app purchases.&lt;/p&gt;



&lt;p&gt;Supporters say the measure would help parents better understand and control the apps their children use. Critics argue it could introduce new privacy and security risks by requiring companies to collect and store sensitive personal information.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What the App Store Accountability Act would do&lt;/h2&gt;



&lt;p&gt;The &lt;a href=&quot;https://www.congress.gov/bill/119th-congress/house-bill/3149/text&quot;&gt;App Store Accountability Act (H.R. 3149)&lt;/a&gt; was introduced in the U.S. House of Representatives in May 2025 by Representatives John James (R-MI) and Gus Bilirakis (R-FL). The bill aims to safeguard children online by giving parents clearer information about apps and requiring parental consent for minors.&lt;/p&gt;



&lt;p&gt;The proposal would apply to large app store providers with more than five million users in the United States.&lt;/p&gt;



&lt;p&gt;If enacted, the law would require app stores to:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Request age information and verify a user’s age category when an account is created.&lt;/li&gt;



&lt;li&gt;Place users into age categories, including under 13, 13–15, 16–17, and adults.&lt;/li&gt;



&lt;li&gt;Link minors to a verified parental account before they can download apps or make purchases.&lt;/li&gt;



&lt;li&gt;Obtain verifiable parental consent before minors access apps or make in-app purchases.&lt;/li&gt;



&lt;li&gt;Share age-category signals with app developers so apps can determine whether a user is a minor and whether parental consent has been granted.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;The bill would also require app developers to notify app stores if their apps undergo significant changes, such as new data collection practices or monetization features. If those changes affect minors, app stores would need to notify the parent linked to the account and obtain new parental consent.&lt;/p&gt;



&lt;p&gt;The Federal Trade Commission would enforce the law, and state attorneys general could also bring legal actions against companies that fail to comply.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;How age verification would work&lt;/h2&gt;



&lt;p&gt;Under the proposed law, users would provide age information when creating an app store account. App stores would then verify that information using a commercially available &lt;a href=&quot;https://nvlpubs.nist.gov/nistpubs/ir/2024/NIST.IR.8525.pdf&quot;&gt;age-verification method&lt;/a&gt; designed to reasonably ensure accuracy.&lt;/p&gt;



&lt;p&gt;If a user is identified as a minor, the account must be connected to a verified parental account. Parents would then provide verifiable &lt;a href=&quot;https://fpf.org/verifiable-parental-consent-the-state-of-play/&quot;&gt;parental consent&lt;/a&gt; before the child could download apps or make purchases.&lt;/p&gt;



&lt;p&gt;App stores would send an age-category signal to app developers indicating whether a user is a child, teenager, or adult, and whether parental consent has been obtained.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;State laws and the Texas App Store Accountability Act&lt;/h2&gt;



&lt;p&gt;Several states, including Utah, Texas, Louisiana, and Alabama, have passed similar app store age-verification laws.&lt;/p&gt;



&lt;p&gt;Some of these laws have faced legal challenges. For example, a federal court &lt;a href=&quot;https://storage.courtlistener.com/recap/gov.uscourts.txwd.1172869998/gov.uscourts.txwd.1172869998.65.0.pdf&quot;&gt;blocked enforcement&lt;/a&gt; of a &lt;a href=&quot;https://storage.courtlistener.com/recap/gov.uscourts.txwd.1172869998/gov.uscourts.txwd.1172869998.65.0.pdf&quot;&gt;Texas law requiring app stores &lt;/a&gt;to verify the age of all users at the app-store level, with a judge comparing the requirement to forcing bookstores to check every customer’s ID before allowing entry.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Privacy and security concerns about the App Store Accountability Act&lt;/h2&gt;



&lt;p&gt;While many policymakers support stronger protections for children online, critics have &lt;a href=&quot;https://www.rstreet.org/commentary/no-conscripting-the-app-stores-doesnt-solve-the-problems-with-age-verification/&quot;&gt;raised privacy concerns&lt;/a&gt; about the approach taken in the App Store Accountability Act.&lt;/p&gt;



&lt;p&gt;One concern is that all users—including adults—would need to verify their age, even if they only want to download apps that do not require age restrictions. This could require users to provide identifying information such as government-issued IDs or biometric data.&lt;/p&gt;



&lt;p&gt;Some privacy advocates also warn that centralized age-verification systems could create new databases containing sensitive personal information, which may become targets for hackers or data breaches.&lt;/p&gt;



&lt;p&gt;Others argue that the system could be easy to bypass, since users could access many online services through web browsers instead of downloading apps through app stores.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What happens next&lt;/h2&gt;



&lt;p&gt;The bill recently advanced out of the &lt;a href=&quot;https://www.mediaite.com/online/gop-led-app-store-bill-ramps-up-amid-dire-privacy-concerns/&quot;&gt;House Energy and Commerce Committee&lt;/a&gt;. The next step would be a vote in the full House of Representatives.&lt;/p&gt;



&lt;p&gt;However, the bill still faces hurdles before becoming law, including potential revisions in the Senate and ongoing debates over privacy, security, and the most effective ways to protect children online.&lt;/p&gt;
</content:encoded><category>Privacy news</category><author>Edward Komenda</author></item><item><title>Business continuity strategies: why backups alone are not enough</title><link>https://proton.me/blog/business-continuity-strategies</link><guid isPermaLink="true">https://proton.me/blog/business-continuity-strategies</guid><description>Backups aren’t sufficient to ensure business continuity. Find out what else you need to ensure operational resilience.</description><pubDate>Wed, 11 Mar 2026 13:28:58 GMT</pubDate><content:encoded>
&lt;p&gt;Most teams start their business continuity strategies with the same assumption: &lt;em&gt;If we have backups, we can recover.&lt;/em&gt; Backups are important, but they’re only one piece of continuity, and often not the element that fails first.&lt;/p&gt;



&lt;p&gt;In modern, cloud-heavy environments, the fastest path to downtime is often loss of access: stolen credentials, locked-out administrators, misconfigured identity settings, or an incident that forces you to revoke access faster than you can restore systems. If your team can’t sign in, approve changes, rotate secrets, or coordinate response securely, having clean backups won’t get operations back online.&lt;/p&gt;



&lt;p&gt;This article explains what business continuity strategies are (and how they connect to disaster recovery planning), why backups alone create blind spots, and which security-focused controls strengthen a business continuity plan in practice—especially around access and credential security.&lt;/p&gt;



&lt;p&gt;It also shows where a &lt;a href=&quot;https://proton.me/business/pass&quot;&gt;business password manager&lt;/a&gt; like Proton Pass for Business fits into business networks: helping teams reduce credential risk and keep access controls usable, auditable, and resilient.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#business-continuity-strategies&quot;&gt;What are business continuity strategies?&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#backups&quot;&gt;Why backups alone are not enough&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#access-credential-security&quot;&gt;What is the role of access and credential security in continuity planning?&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#strengthen-business-continuity&quot;&gt;Which measures strengthen business continuity beyond backups?&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#proton-pass&quot;&gt;How does Proton Pass for Business support continuity strategies?&lt;/a&gt;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;business-continuity-strategies&quot;&gt;What are business continuity strategies?&lt;/h2&gt;



&lt;p&gt;Business continuity is the set of plans, processes, and procedures an organization uses to keep essential functions running during and after disruptions. It typically includes risk assessment, emergency response procedures, communication plans, backup and recovery, staff training, as well as a regular schedule for testing and updating that plan.&lt;/p&gt;



&lt;p&gt;A business continuity plan is where these strategies become operational: who does what, in what order, with which tools, and what “acceptable service” looks like under pressure.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Business continuity vs. disaster recovery planning&lt;/h3&gt;



&lt;p&gt;Business continuity strategies often get conflated with disaster recovery planning, and both are sometimes confused with incident response. They work together, but they solve different problems.&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Incident response &lt;/strong&gt;focuses on the security event itself: detecting what’s happening, containing the threat, removing it from affected systems, and investigating impact so you can prevent recurrence.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Disaster recovery &lt;/strong&gt;focuses on restoring IT systems and data after disruption — for example, infrastructure failure, corrupted databases, or a cloud region outage.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Business continuity planning &lt;/strong&gt;focuses on keeping essential operations running during disruption, even when technology is degraded. It covers people, processes, vendors, communications, and decision-making — and defines how the business continues to deliver critical services while recovery is underway.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;This distinction is important. The &lt;a href=&quot;https://ithandbook.ffiec.gov/it-booklets/business-continuity-management/?utm_source=chatgpt.com&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;FFIEC’s Business Continuity Management booklet&lt;/a&gt; (written for financial institutions but broadly applicable) emphasizes that business continuity planning is about maintaining, resuming, and recovering the business, not only the technology.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Why having a continuity strategy matters&lt;/h3&gt;



&lt;p&gt;A continuity plan that lives in a folder and hasn’t been tested isn’t a strategy; it’s just a document. An actual strategy is something you can run:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;You know which functions are truly critical.&lt;/li&gt;



&lt;li&gt;You’ve defined what “downtime” means in measurable terms.&lt;/li&gt;



&lt;li&gt;You’ve rehearsed scenarios that stress the whole organization, not just the IT team.&lt;/li&gt;



&lt;li&gt;You can prove controls work and improve them over time.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;That’s why business continuity overlaps with governance and compliance. Many frameworks (such as ISO 22301 for business continuity management, sector rules, customer questionnaires) want evidence that continuity is repeatable, owned, and tested, not improvised.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;backups&quot;&gt;Why backups alone are not enough&lt;/h2&gt;



&lt;p&gt;Backups solve a specific problem: data restoration. However, incidents rarely arrive as a neat “data lost” event. In the real world, disruptions create multiple constraints at once, and backups don’t address several of the most common failure modes.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Backups don’t help if you can’t access the systems that restore them&lt;/h3&gt;



&lt;p&gt;A continuity plan often assumes your administrators can sign in, elevate privileges, and execute recovery workflows. But many incidents begin with credential compromise, identity provider lockouts, or account takeover. If attackers get in first, they may change passwords, rotate keys, add new admin accounts, or disrupt your identity stack. Recovery then becomes a race for control, not a restore-from-backup task.&lt;/p&gt;



&lt;p&gt;This is one reason incident response planning belongs next to business continuity planning, not as a separate security document. &lt;a href=&quot;https://proton.me/blog/incident-response&quot;&gt;Proton’s incident response guide&lt;/a&gt; stresses that incident response starts with understanding threats and defining actions you’ll take when affected, which directly impacts how quickly you recover access.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Backups don’t prevent downtime caused by everything else&lt;/h3&gt;



&lt;p&gt;Backups won’t stop the kinds of disruptions that shut teams down before any data restore even begins, for example:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;A &lt;a href=&quot;https://proton.me/blog/aws-outage&quot;&gt;widespread SaaS outage&lt;/a&gt; that blocks access to core tools.&lt;/li&gt;



&lt;li&gt;A credential phishing campaign that forces mass password resets and account lockdowns.&lt;/li&gt;



&lt;li&gt;A malicious configuration change that breaks permissions or sharing.&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;https://proton.me/blog/ransomware-threats-smbs&quot;&gt;Ransomware&lt;/a&gt; that disrupts endpoints and authentication.&lt;/li&gt;



&lt;li&gt;A vendor incident that requires urgent access revocation and customer communication.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;In all of these scenarios, the immediate continuity question is the same: Can we keep operating safely while we fix this? Backups may help later, but they don’t solve the first-hour problem.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Backups don’t reduce legal and compliance exposure from data access&lt;/h3&gt;



&lt;p&gt;Backups restore data; they don’t undo unauthorized access. If sensitive information was accessed or exfiltrated, you may still face contractual obligations, regulatory reporting, or customer trust impacts, even if you restore systems perfectly.&lt;/p&gt;



&lt;p&gt;This is where continuity strategies should include preventive controls and detection — and needs tight alignment with security and incident response — because recoverable is not the same as acceptable.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Backups can fail, and attackers know it&lt;/h3&gt;



&lt;p&gt;Backup failure isn’t always technical. Common issues include:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Incomplete coverage (critical SaaS data wasn’t backed up)&lt;/li&gt;



&lt;li&gt;Stale backups (recovery point objective is worse than assumed)&lt;/li&gt;



&lt;li&gt;Untested restores (the backup exists but cannot be restored quickly)&lt;/li&gt;



&lt;li&gt;Unavailability of required credentials and keys in an incident.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;According to the FFIEC booklet, the effectiveness of a business continuity plan can only be validated through testing or practical application. If you haven’t tested restoring workflows under realistic constraints (limited staff, stressed systems, uncertain scope, access restrictions), you don’t know your real recovery time.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Backups don’t address the human continuity problem&lt;/h3&gt;



&lt;p&gt;Continuity is also about coordination: who approves emergency actions, how you communicate internally, how you avoid unsafe workarounds, and how you maintain accountability. If your only plan is to restore from backup, you’re underestimating the operational complexity of incidents.&lt;/p&gt;



&lt;p&gt;This is why business continuity strategies are increasingly security-focused: the same weaknesses that cause breaches (weak access control, inconsistent credential hygiene, unclear ownership) also provoke extended downtime.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;access-credential-security&quot;&gt;What is the role of access and credential security in continuity planning?&lt;/h2&gt;



&lt;p&gt;If backups are the recovery layer, access and credential security are the control layer, the part that determines whether you can act quickly and safely during disruption.&lt;/p&gt;



&lt;p&gt;In practical continuity terms, credentials matter because they control:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Who can execute recovery actions (restore, rotate, revoke, isolate).&lt;/li&gt;



&lt;li&gt;How fast you can contain the incident (disable accounts, cut access, reset keys).&lt;/li&gt;



&lt;li&gt;How confident you are in your environment (audit trails, verified changes, least privilege).&lt;/li&gt;



&lt;li&gt;Whether people can keep working securely (without copying secrets into chats or personal notes).&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;This is why the best business continuity strategies treat credential governance as a continuity requirement, not just an IT hygiene item.&lt;/p&gt;



&lt;p&gt;A technology risk management program can help you formalize this. &lt;a href=&quot;https://proton.me/blog/technology-risk-management-plan&quot;&gt;Proton’s technology risk management plan article&lt;/a&gt; explicitly frames risk management as a way to prevent major incidents, which includes creating incident response plans and reducing the spread of sensitive data by using secure password managers and secure storage.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;strengthen-business-continuity&quot;&gt;Which measures strengthen business continuity beyond backups?&lt;/h2&gt;



&lt;p&gt;Below, you’ll find seven security-focused measures that strengthen continuity in modern environments. You don’t need to implement them all at once. The goal is to reduce your most likely downtime drivers and to make recovery actions feasible under stress.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;1. Define continuity requirements around critical workflows&lt;/h3&gt;



&lt;p&gt;Start with the question: What needs to keep working for us to deliver essential services? Then map the supporting tools, people, and dependencies.&lt;/p&gt;



&lt;p&gt;A good business impact analysis and an accurate risk assessment are widely recognized as foundational to an effective business continuity plan. This is where you define what unacceptable downtime looks like to your business, which functions are time-critical, and where the biggest dependency risks live.&lt;/p&gt;



&lt;p&gt;From a security angle, continuity planning should extend beyond core infrastructure. You must consider:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Identity providers and admin consoles.&lt;/li&gt;



&lt;li&gt;Password and key storage.&lt;/li&gt;



&lt;li&gt;Shared inboxes and customer communication channels.&lt;/li&gt;



&lt;li&gt;Finance tools and payment workflows.&lt;/li&gt;



&lt;li&gt;Vendor access paths and integrations.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;If a disruption blocks access to any of these systems, teams may be unable to operate or execute recovery steps. At that moment, downtime is an access problem, not a data-loss problem.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;2. Treat access control as a continuity control&lt;/h3&gt;



&lt;p&gt;Access control is often discussed as security, but it’s also continuity engineering. During an incident, you need to reduce risk quickly without breaking the business.&lt;/p&gt;



&lt;p&gt;Practical continuity-minded access patterns include:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Least-privilege roles for day-to-day work.&lt;/li&gt;



&lt;li&gt;Separate admin accounts (used only when needed).&lt;/li&gt;



&lt;li&gt;Clear break glass procedures for emergency access.&lt;/li&gt;



&lt;li&gt;Documented ownership for critical systems and vaults.&lt;/li&gt;



&lt;li&gt;Scheduled access reviews and offboarding controls.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;The point isn’t to add bureaucracy; it’s to ensure you can change access rapidly and confidently when the environment is unstable.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;3. Centralize credential governance&lt;/h3&gt;



&lt;p&gt;Shadow access happens when credentials are stored outside controlled systems: browser-saved passwords, shared spreadsheets, notes, ticket comments, or temporary chat messages. These shortcuts feel productive until you’re trying to contain an incident and discover you don’t know who has access to what. A key finding of our &lt;a href=&quot;https://proton.me/business/smb-cybersecurity-report&quot;&gt;2026 SMB cybersecurity report&lt;/a&gt; was that teams with password managers often didn’t use them.&lt;/p&gt;



&lt;p&gt;Centralized credential governance means:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Credentials live in a controlled system.&lt;/li&gt;



&lt;li&gt;Sharing is deliberate and revocable.&lt;/li&gt;



&lt;li&gt;Offboarding isn’t a scavenger hunt.&lt;/li&gt;



&lt;li&gt;Rotations can happen without breaking workflows.&lt;/li&gt;



&lt;li&gt;You can prove your controls exist.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;This is a continuity win as much as a security win: the fewer unknown credentials that exist, the fewer emergency resets you need.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;4. Elaborate a credential compromise playbook&lt;/h3&gt;



&lt;p&gt;Credential compromise often triggers the most disruptive continuity actions: e.g., mass resets, revoked sessions, forced &lt;a href=&quot;https://proton.me/blog/what-is-two-factor-authentication-2fa&quot;&gt;multi-factor authentication (MFA)&lt;/a&gt; changes, access reviews, and emergency communications. If you’ve never rehearsed it, the situation becomes chaotic quickly.&lt;/p&gt;



&lt;p&gt;A credential compromise playbook should answer:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;How do we detect signs of compromise?&lt;/li&gt;



&lt;li&gt;Who can revoke access and where?&lt;/li&gt;



&lt;li&gt;What do we rotate first (high-privilege accounts, shared vaults, API keys)?&lt;/li&gt;



&lt;li&gt;How do we communicate changes without leaking secrets?&lt;/li&gt;



&lt;li&gt;How do we keep customer-facing operations running during resets?&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;This is where incident response and continuity overlap directly. Incident response planning is not an extra. It’s how you stop relying on improvisation and start relying on continuity.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;5. Use encryption to reduce impact, not just for compliance&lt;/h3&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/learn/encryption&quot;&gt;Encryption&lt;/a&gt; is typically framed as a compliance checkbox. In continuity terms, encryption reduces blast radius when things go wrong.&lt;/p&gt;



&lt;p&gt;Examples:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Encrypted credential vaults protected by access keys reduce the risk of secrets being exposed through device compromise or insecure storage.&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;https://proton.me/security/end-to-end-encryption&quot;&gt;End-to-end encryption&lt;/a&gt; models limit visibility of sensitive content, which can matter for risk posture and &lt;a href=&quot;https://proton.me/blog/data-protection-best-practices&quot;&gt;data protection&lt;/a&gt;.&lt;/li&gt;



&lt;li&gt;Strong encryption also supports safer collaboration (sharing access without exposing secrets in plain text).&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;This is also where many teams get stuck: they want encryption, but they worry it will slow down work. The right tools make encryption part of normal workflows, not a special process people use to bypass.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;6. Make security awareness operational&lt;/h3&gt;



&lt;p&gt;In many organizations, the first continuity break is a human workaround: someone shares a password over chat because a teammate is locked out; someone uses a personal account to keep work moving; someone approves an urgent access request without checking scope.&lt;/p&gt;



&lt;p&gt;This is why security awareness is a continuity control. It reduces the chance that a disruption becomes worse through reactive behavior.&lt;/p&gt;



&lt;p&gt;If you need a practical baseline for small teams that still applies to enterprise habits, Proton’s roundup of &lt;a href=&quot;https://proton.me/blog/cyber-security-solutions-small-business&quot;&gt;cybersecurity solutions for small businesses&lt;/a&gt; emphasizes choosing tools that reduce risk without requiring heavy time or budget investment.&lt;/p&gt;



&lt;p&gt;The aim is simple: make secure actions the easiest actions, especially when people are stressed.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;7. Test your plan like you expect it to fail, and improve continuously&lt;/h3&gt;



&lt;p&gt;A continuity plan that hasn’t been tested is still an assumption. Testing shows what actually works under pressure: whether recovery steps are executable, access rights are correct, credentials can be retrieved securely when required, communication paths hold up, vendor dependencies are clear, and your critical functions were prioritized correctly. &lt;/p&gt;



&lt;p&gt;The FFIEC booklet explicitly affirms that business continuity planning is only proven through testing or real-world use, so tabletop exercises should reflect modern scenarios, such as:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Authentication outage tied to a SaaS provider.&lt;/li&gt;



&lt;li&gt;A credential compromise that forces rapid rotations&lt;/li&gt;



&lt;li&gt;Ransomware that requires isolation and emergency access changes.&lt;/li&gt;



&lt;li&gt;A vendor incident that demands fast containment and coordinated communications.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Therefore, treat what you’ve learned like product work: capture the gaps, assign owners, set deadlines, and retest until the plan is reliable.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;proton-pass&quot;&gt;How does Proton Pass for Business support continuity strategies?&lt;/h2&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/business/pass&quot;&gt;Proton Pass for Business&lt;/a&gt; is not a full business continuity platform, and it doesn’t replace backup systems, DR infrastructure, or broader governance. Where it supports business continuity strategies most directly is in a high-leverage continuity control area: credentials and access.&lt;/p&gt;



&lt;p&gt;Continuity efforts often fail in the messy middle of incidents: when teams are trying to contain risk, keep operations running, and coordinate changes without leaking secrets or losing control. Proton Pass for Business helps reduce that chaos by making secure credential practices easier to adopt and enforce.&lt;/p&gt;



&lt;p&gt;Here’s how it maps to continuity needs:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Secure, centralized credential storage and sharing.&lt;/strong&gt; Proton Pass is designed for business credential management, helping teams avoid storing secrets in scattered documents or chats, therefore enabling safer sharing patterns.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Administrative controls and governance.&lt;/strong&gt; Proton Pass for Business includes team management and security policies (including rules around sharing and 2FA), which support continuity governance as organizations scale.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Visibility through logs and reporting.&lt;/strong&gt; During disruption, visibility matters. You need to know what changed and when. Proton Pass offers usage logs and reporting, so admins can review activity across team accounts.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Trust through transparency.&lt;/strong&gt; Proton’s approach emphasizes verifiable security: Proton Pass is open source, and Proton publishes independent audits, supporting organizations that seek evidence-based security controls.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Dark web monitoring.&lt;/strong&gt; &lt;a href=&quot;https://proton.me/pass/pass-monitor&quot;&gt;Pass Monitor&lt;/a&gt; alerts admins and team members if logins stored in their Proton Pass vaults appear in breach datasets, so they can rotate affected credentials early and reduce post-compromise risk.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Password health check.&lt;/strong&gt; Pass Monitor also flags weak or reused passwords (and inactive 2FA), helping teams fix risky credentials before they’re exploited.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;In continuity terms, the value is practical: fewer unknown credentials, less insecure workarounds during incidents, faster rotations when compromise is suspected, and clearer accountability for access changes. That’s how access and password management stop being just security and become operational resilience.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Final takeaway: continuity is a system, not a backup job&lt;/h3&gt;



&lt;p&gt;Backups are necessary, but modern business continuity strategies require more than recovery storage. They ask for a plan you can run under pressure, controls you can prove, and access practices that won’t collapse when the environment becomes unstable.&lt;/p&gt;



&lt;p&gt;If you want a practical roadmap to strengthen continuity through security, with quick wins you can implement now, &lt;a href=&quot;https://proton.me/business/security-guide&quot;&gt;&lt;strong&gt;download Proton’s comprehensive security ebook for growing businesses&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;/p&gt;
</content:encoded><category>For business</category><author>Kate Menzies</author></item><item><title>What does cybersecurity have to do with compliance and business continuity?</title><link>https://proton.me/blog/cybersecurity-compliance</link><guid isPermaLink="true">https://proton.me/blog/cybersecurity-compliance</guid><description>Cybersecurity drives compliance and continuity for businesses of all sizes. Find out how credential governance helps prevent breaches.</description><pubDate>Wed, 11 Mar 2026 12:57:28 GMT</pubDate><content:encoded>
&lt;p&gt;Compliance has evolved from a legal requirement into a core pillar of operational resilience.&amp;nbsp; Identity, authentication, and credential governance are now central to regulatory audits and compliance frameworks.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;The attack that compromised at least 11 US government departments began with malicious code hidden in a trusted vendor&amp;#8217;s software update. By the time it was publicly acknowledged in December 2020, the SolarWinds breach had exposed the Treasury Department, the Department of Justice, the Pentagon and other federal agencies to Russian intelligence operatives who spent months inside extremely sensitive networks.&lt;/p&gt;



&lt;p&gt;In a different attack revealed just three months later, hackers were found to have accessed 150,000 security cameras at hospitals, prisons, and police departments after finding a security company’s super admin credentials exposed online. The company, Verkada, provides cloud-based, AI-powered physical security systems that integrate video surveillance, access control, environmental sensors, alarms, and visitor management into a single platform, making such an attack particularly devastating.&lt;/p&gt;



&lt;p&gt;In both cases, attackers entered through a single point of weakness, then moved into systems affecting critical infrastructure and global enterprises. The implications are clear:&lt;strong&gt; &lt;/strong&gt;inadequate credential controls have the potential to transform preventable vulnerabilities into catastrophic breaches. It’s partly why regulators have taken a strong stance on cybersecurity compliance.&lt;/p&gt;



&lt;p&gt;Despite such expensive lessons, credential theft and &lt;a href=&quot;https://proton.me/blog/types-of-identity-theft&quot;&gt;account takeover&lt;/a&gt; remain among the most consistent attack vectors as billions of compromised credentials continue to circulate in criminal markets. While leadership attention often centers on sophisticated exploits and advanced threats, the most damaging breaches still begin with compromised logins and basic human error.&lt;/p&gt;



&lt;p&gt;This guide explains how cybersecurity practices directly support compliance and business continuity, with practical, business-focused steps you can implement immediately.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#compliance&quot;&gt;What is compliance in cybersecurity?&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#cybersecurity-failures&quot;&gt;Why do cybersecurity failures impact compliance and continuity?&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#poor-password-management&quot;&gt;How does poor password management create compliance risk?&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#security-practices&quot;&gt;Which security practices support compliance requirements?&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#proton-pass&quot;&gt;Align security, compliance, and continuity with Proton Pass for Business&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#cybersecurity-foundations&quot;&gt;Compliance and continuity depend on cybersecurity foundations&lt;/a&gt;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;compliance&quot;&gt;What is compliance in cybersecurity?&lt;/h2&gt;



&lt;p&gt;Cybersecurity compliance means aligning your technical and organizational safeguards with the laws, regulations, standards, and internal policies that govern your data and systems. More than simply avoiding fines or passing audits, compliance is about demonstrating that your controls are real, consistently applied, and effective under pressure.&lt;/p&gt;



&lt;p&gt;In practice, compliance answers three simple questions: What are you required to protect? How are you protecting it? Can you prove it?&lt;/p&gt;



&lt;p&gt;Most cybersecurity compliance requirements fall into three buckets:&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Data protection regulations&lt;/h3&gt;



&lt;p&gt;These are laws that dictate how personal and sensitive data must be collected, processed, stored, and secured. Examples include &lt;a href=&quot;https://proton.me/support/is-proton-mail-gdpr-compliant&quot;&gt;GDPR&lt;/a&gt;, CCPA, and sector-specific privacy rules. They typically require documented safeguards, breach notification procedures, as well as clear governance over data handling.&lt;/p&gt;



&lt;p&gt;It looks like this: if a customer asks what data you hold about them, you must be able to locate, produce, correct, or delete it within defined timelines. That requires data inventories, &lt;a href=&quot;https://proton.me/blog/network-access-control&quot;&gt;access controls&lt;/a&gt;, retention rules, and response workflows. In other words, it’s much more than a privacy policy notice or a pop-up on your website.&lt;/p&gt;



&lt;p&gt;If a breach occurs, regulators will expect timestamps, logs, incident reports, and proof of containment actions, not general assurances.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Industry standards&lt;/h3&gt;



&lt;p&gt;These frameworks define baseline security expectations for organizations and service providers. SOC 2, &lt;a href=&quot;https://proton.me/blog/iso-27001-secure-file-collaboration&quot;&gt;ISO 27001&lt;/a&gt;, and PCI DSS are common in many industries. Customers, partners, or procurement teams usually require compliance with these standards, which are often contract-driven, before signing deals.&lt;/p&gt;



&lt;p&gt;Practically, this encompasses controls such as role-based access, change management records, vendor risk reviews, encryption standards, and monitored logging. For instance, under PCI DSS, payment data environments must be segmented and tightly access-controlled.&lt;/p&gt;



&lt;p&gt;Under SOC 2, you must show that access is reviewed regularly and revoked when roles change. Auditors will sample tickets, logs, and access lists to confirm adherence.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Internal governance&lt;/h3&gt;



&lt;p&gt;Internal governance turns external obligations into day-to-day operating rules. These include your access control policies, retention schedules, acceptable use rules, incident response playbooks, and vendor onboarding requirements.&lt;/p&gt;



&lt;p&gt;For instance, if your policy says terminated employees lose access immediately, compliance means you can show the offboarding checklist, the access removal tickets, and the system logs confirming deactivation for every such event.&lt;/p&gt;



&lt;p&gt;Compliance is really about traceability and responsibility. Auditors and regulators demand traceability: who owns each control, how it&amp;#8217;s enforced, how often it&amp;#8217;s reviewed, and what evidence confirms it happened.&lt;/p&gt;



&lt;p&gt;This accountability extends far beyond IT. Marketing, HR, finance, and even sales teams all handle sensitive data, making these functions part of the compliance surface.&lt;/p&gt;



&lt;p&gt;Compliance is also continuous, not episodic. Regulations evolve; tools change; vendors rotate. Treating compliance as a one-time certification creates drift between documented controls and actual practice, generating a gap that becomes obvious during audits, investigations, or customer due diligence. Maintaining continuous review and testing helps keep compliance real, not cosmetic.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;cybersecurity-failures&quot;&gt;Why do cybersecurity failures impact compliance and continuity?&lt;/h2&gt;



&lt;p&gt;When security controls fail, the damage can be difficult to contain. A single intrusion or compromised account can trigger a compliance breach, then escalate into an operational crisis. The progression is fast, public, and costly. According to &lt;a href=&quot;https://www.pwc.com/gx/en/news-room/press-releases/2024/pwc-2025-global-digital-trust-insights.html&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;PwC’s 2025 Global Digital Trust Insights&lt;/a&gt; report, the average cost of a data breach for surveyed companies is estimated at US$3.3M. &lt;/p&gt;



&lt;p&gt;Consider how a typical breach unfolds. When unauthorized access exposes customer or employee data, the immediate security incident quickly becomes a legal obligation. Privacy regulations impose strict breach notification timelines and documentation standards. For instance, GDPR requires notification within 72 hours, and similar obligations exist across US state laws and sector-specific regulations.&lt;/p&gt;



&lt;p&gt;Small businesses are no less exposed to these risks than large enterprises. For instance, a local retailer that relies on point-of-sale systems and online orders can face significant downtime, lost revenue, and lasting reputational damage if its network is compromised.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;The risk is even greater for businesses running e-commerce operations without dedicated security resources. For a practical breakdown of these risks as well as affordable ways to address them, see our &lt;a href=&quot;https://proton.me/blog/smb-cybersecurity-report&quot;&gt;SMB cybersecurity report&lt;/a&gt; and our guide to &lt;a href=&quot;https://proton.me/blog/cyber-security-solutions-small-business&quot;&gt;cybersecurity for small businesses&lt;/a&gt;.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;The cost of reactive compliance&lt;/h3&gt;



&lt;p&gt;Organizations that miss these deadlines, submit incomplete reports, or cannot demonstrate reasonable safeguards face dual exposure: both the original breach and a subsequent compliance violation. During enforcement proceedings, regulators consistently examine whether foundational controls (multi-factor authentication, periodic access reviews, and comprehensive logging) were properly implemented and maintained.&lt;/p&gt;



&lt;p&gt;Threat intelligence consistently points to the same vulnerability: credential compromise and access control gaps remain the most common entry points. As recent research indicates, &lt;a href=&quot;https://www.secpod.com/blog/story-of-cyberattack-16-billion-leaked-credentials-the-mega-leak/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;billions of credentials&lt;/a&gt; have been exposed through infostealer malware and phishing campaigns, making account takeover one of the most prevalent breach techniques.&lt;/p&gt;



&lt;p&gt;Sadly, incident reports frequently reveal that security tools were deployed but not operationally effective, meaning logs went unreviewed, alerts remained untuned, and dormant accounts accumulated over time.&lt;/p&gt;



&lt;p&gt;Auditors refer to this as the “control on paper” problem: security measures are in place, but they aren’t effective in real-world conditions.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;When security controls exist in theory but fail in practice&lt;/h3&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/blog/ransomware-threats-smbs&quot;&gt;Ransomware&lt;/a&gt; incidents illustrate the compliance-continuity connection particularly well. When you lose access to your data, it doesn&amp;#8217;t suspend regulatory obligations. Being suddenly unable to retrieve customer records, respond to lawful requests, or produce audit trails compounds the problem, meaning the ransomware incident actually triggers new reporting obligations and regulatory inquiries.&lt;/p&gt;



&lt;p&gt;The gap often widens because organizations test incident response and disaster recovery in isolation. In practice, an &lt;a href=&quot;https://proton.me/blog/incident-response&quot;&gt;incident response&lt;/a&gt; (IR) plan prioritizes containment, evidence preservation, and eradication, while a disaster recovery (DR) plan focuses on restoring systems and business operations.&lt;/p&gt;



&lt;p&gt;During an active ransomware event, those priorities can collide when recovery begins before containment is complete, or backups are restored without full confidence that the threat has been removed. Such a misalignment reveals itself in serious incidents, when time is limited and coordination matters most.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Where continuity plans break down&lt;/h3&gt;



&lt;p&gt;Business continuity failures are often rooted in security oversights:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Backups are online and get encrypted along with production data:&lt;/strong&gt; When backups aren’t isolated, ransomware can encrypt both primary and recovery copies, eliminating the organization’s clean restore point and forcing prolonged downtime or ransom negotiations.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Recovery and admin accounts lack multi-factor authentication:&lt;/strong&gt; Without &lt;a href=&quot;https://proton.me/blog/what-is-two-factor-authentication-2fa&quot;&gt;multi-factor authentication (MFA)&lt;/a&gt;, privileged accounts become easy targets for credential theft or brute-force attacks, allowing attackers to disable backups, delete logs, or expand lateral access.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Critical credentials live in personal files, chat threads, or email:&lt;/strong&gt; Informal methods of storing sensitive credentials increase the risk of leakage during phishing or account compromise, accelerating attacker movement across systems.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Access to recovery systems depends on one or two individuals:&lt;/strong&gt; Single points of dependency create operational bottlenecks during incidents and increase risk if those individuals are unavailable or compromised.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Runbooks exist but aren’t reachable when core systems are offline:&lt;/strong&gt; If recovery documentation is stored within affected systems, teams lose procedural guidance precisely when structured response is most critical, leading to delays and missteps.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Actionable fixes for such oversights are straightforward but frequently overlooked. Standard operating procedures call for regularly maintained offline or immutable backups, strong authentication protection for all recovery accounts, storing &lt;a href=&quot;https://proton.me/blog/pass-secure-link-sharing&quot;&gt;shared credentials&lt;/a&gt; in controlled vaults, and running full recovery exercises at least once annually.&lt;/p&gt;



&lt;p&gt;There is also a long-tail trust effect because regulators, customers, and partners evaluate response quality as much as incident severity. Detection speed, clarity of communication, quality of logs, and proof of corrective action all influence outcomes. Two organizations can experience similar breaches and face very different regulatory penalties and commercial fallout based on how prepared and transparent their response was.&lt;/p&gt;



&lt;p&gt;Post-incident reviews reveal a consistent pattern where controls existed but weren&amp;#8217;t enforced, reviews were scheduled but not performed, and exceptions were granted and never revisited. When security incidents occur, they expose operational reality and reveal whether compliance and continuity controls function as lived practices or merely exist as well-written documents.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;poor-password-management&quot;&gt;How does poor password management create compliance risks?&lt;/h2&gt;



&lt;p&gt;Credential weakness is still one of the most common root causes behind security and compliance incidents. This is caused by friction generated by complicated or lengthy login requirements for business networks.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Traditional password habits are hard to sustain at scale. Password reuse is a classic example, where one third-party breach can unlock multiple internal systems if credentials are reused. From a compliance standpoint, that means regulated data can be exposed through an unrelated service failure.&lt;/p&gt;



&lt;p&gt;Many frameworks explicitly require safeguards against unauthorized access, but weak credential hygiene undermines that requirement.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Shared account security&lt;/h3&gt;



&lt;p&gt;Shared accounts create significant compliance challenges. When multiple people use the same login, individual accountability becomes difficult to demonstrate. Most regulatory frameworks require user-level traceability, meaning the ability to show who accessed what and when.&lt;/p&gt;



&lt;p&gt;Without structured credential controls, shared logins weaken audit trails and complicate control validation. Centralized access management with individual credentials and activity visibility helps restore traceability while maintaining operational efficiency.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/blog/remote-work-policy&quot;&gt;Remote work&lt;/a&gt; and SaaS sprawl increase the risk. Complex work arrangements sometimes require staff to log in from multiple devices, locations, and &lt;a href=&quot;https://proton.me/blog/network-security-best-practices&quot;&gt;networks&lt;/a&gt;. Contractors may also need limited access for temporary projects. Then, without centralized credential governance, organizations quickly lose visibility into who has access to what—and from where.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Common credential control expectations&lt;/h3&gt;



&lt;p&gt;Most compliance frameworks don’t prescribe specific tools, but they do set clear expectations for how access to systems and data should be controlled. In practice, those expectations tend to converge around a common set of credential management principles.&lt;/p&gt;



&lt;p&gt;Common credential control expectations include:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Unique user identities for system access&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;https://proton.me/support/business-activity-monitor&quot;&gt;Access logging&lt;/a&gt; tied to individuals&lt;/li&gt;



&lt;li&gt;Periodic access reviews&lt;/li&gt;



&lt;li&gt;Privileged account protection&lt;/li&gt;



&lt;li&gt;Credential lifecycle controls&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;When password management becomes difficult to maintain, people improvise. Credentials end up stored in notes, reused across systems, or shared over messaging tools. Those workarounds bypass both security safeguards and compliance controls, even when policies exist on paper.&lt;/p&gt;



&lt;p&gt;The practical fix is not stricter rules alone, but better tooling and workflows. When secure credential handling is easier than insecure shortcuts, everyday behavior aligns with policy instead of working around it. In particular, purpose-built business password managers are designed to close this gap.&lt;/p&gt;



&lt;p&gt;Here’s a closer look at how Proton’s dedicated &lt;a href=&quot;https://proton.me/business/pass&quot;&gt;business password platform&lt;/a&gt; helps solve this credential control nightmare.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;security-practices&quot;&gt;Which security practices support compliance requirements?&lt;/h2&gt;



&lt;p&gt;Strong compliance does not come from isolated controls or one-off fixes. It grows from layered, integrated security practices that work together across systems, teams, and workflows. Regulators and auditors increasingly search for evidence that controls are not only defined but also consistently enforced and aligned with how the organization actually operates.&lt;/p&gt;



&lt;p&gt;The most effective programs focus on a few core practice areas that show up across nearly every compliance framework.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;1. Access control and identity&lt;/h3&gt;



&lt;p&gt;Access control sits at the center of both security and compliance. It governs who can access systems, data, and services, under what conditions, and with what level of privilege. In practical terms, this includes identity verification, permission management, and ongoing monitoring of access behavior.&lt;/p&gt;



&lt;p&gt;Policies alone are not enough. Compliance frameworks expect access boundaries to be enforced automatically and consistently, not manually or informally. That means access decisions should be driven by identity and role, not convenience.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/blog/tech-startup-security-expert&quot;&gt;Least-privilege design&lt;/a&gt; is one of the most effective control patterns regulators look for. Each person receives only the access required to perform their role and nothing more. This approach reduces the blast radius of breaches, limits accidental exposure, and aligns cleanly with audit expectations. It does require upfront role mapping, granular permissions, and regular review cycles, but it pays off by reducing both risk and remediation effort.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;2. Unified control mapping&lt;/h3&gt;



&lt;p&gt;As regulatory scope expands, many organizations struggle under overlapping requirements. GDPR, SOC 2, ISO standards, and sector-specific rules often ask for similar controls, just expressed differently.&lt;/p&gt;



&lt;p&gt;Mature compliance programs avoid managing these requirements in isolation. Instead, they map obligations to a unified control framework that shows how each control satisfies multiple regulations at once. This approach reduces duplication, simplifies documentation, and makes audits more predictable.&lt;/p&gt;



&lt;p&gt;From a continuity perspective, unified mapping also clarifies priorities during incidents. Teams know which controls matter most, what evidence must be preserved, and which regulatory timelines apply when systems are under stress.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;3. Incident response readiness&lt;/h3&gt;



&lt;p&gt;Having an &lt;a href=&quot;https://proton.me/blog/incident-response&quot;&gt;incident response&lt;/a&gt; plan on paper is essential, but documentation alone is not enough to demonstrate compliance. Regulators increasingly assess whether organizations can execute those plans under real conditions.&lt;/p&gt;



&lt;p&gt;Effective readiness typically includes:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Clearly defined incident roles and decision authority&lt;/li&gt;



&lt;li&gt;Communication templates and escalation paths&lt;/li&gt;



&lt;li&gt;Regulatory notification procedures tied to specific thresholds&lt;/li&gt;



&lt;li&gt;Evidence preservation methods to support audits and investigations&lt;/li&gt;



&lt;li&gt;Regular tabletop and simulation exercises&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;This preparation directly supports business continuity. When an incident occurs, teams are not improvising under pressure. They can contain damage, meet reporting obligations, and restore operations faster, all while maintaining compliance.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;4. Remote and distributed security controls&lt;/h3&gt;



&lt;p&gt;Remote and hybrid work environments have fundamentally changed the compliance landscape. Data now moves across devices, networks, and locations that traditional perimeter controls were never designed to protect.&lt;/p&gt;



&lt;p&gt;To keep compliance intact, controls must travel with the data. That means enforcing:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Strong authentication across all access points&lt;/li&gt;



&lt;li&gt;Encrypted communications by default&lt;/li&gt;



&lt;li&gt;Endpoint safeguards for managed and unmanaged devices&lt;/li&gt;



&lt;li&gt;Cloud-aware monitoring that reflects how services are actually used&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Compliance obligations do not shrink when staff work remotely. In fact, regulators often expect stronger identity and access controls in distributed environments, precisely because visibility and oversight are harder to maintain.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;5. AI and data governance&lt;/h3&gt;



&lt;p&gt;AI systems introduce new compliance considerations because they typically process large volumes of data, including personal or regulated information. Even when AI tools are experimental or internal, governance expectations still apply.&lt;/p&gt;



&lt;p&gt;Compliance programs should clearly document:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Data sources used for training or inference&lt;/li&gt;



&lt;li&gt;The scope and purpose of processing&lt;/li&gt;



&lt;li&gt;Retention and deletion behavior&lt;/li&gt;



&lt;li&gt;Third-party exposure and vendor dependencies&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;As automation increases, governance must keep pace. Regulators are less concerned with whether AI is used and more with whether organizations understand and control how data flows through those systems.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;6. The unifying principle: usability&lt;/h3&gt;



&lt;p&gt;Across all of these areas, one principle consistently determines the success or failure of controls: usability.&lt;/p&gt;



&lt;p&gt;Controls that block legitimate work get bypassed. Controls that align with real workflows get followed. When security practices support how people actually work, compliance stops being an obstacle and starts reinforcing operational resilience.&lt;/p&gt;



&lt;p&gt;Practical security enables practical compliance—and that’s what keeps businesses running when conditions are less than ideal.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;proton-pass&quot;&gt;Align security, compliance, and continuity with Proton Pass for Business&lt;/h2&gt;



&lt;p&gt;Credential governance and access traceability are two of the most common (and most frequently failed) control areas in compliance audits and post-incident investigations.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Organizations often struggle to answer fundamental questions: Who has access to what? Why do they have it? When was it last reviewed? Can it be revoked quickly? Just as important, do we have visibility into password health, such as weak, reused, or compromised credentials, and exposure to known &lt;a href=&quot;https://proton.me/pass/pass-monitor&quot;&gt;data breaches&lt;/a&gt;?&lt;/p&gt;



&lt;p&gt;Without centralized oversight and reporting, these gaps remain hidden until an audit or incident forces scrutiny. Business password management platforms are designed to close that operational gap.&lt;/p&gt;



&lt;p&gt;Proton Pass for Business, our &lt;a href=&quot;https://proton.me/business/pass&quot;&gt;business password manager&lt;/a&gt;, positions credential management as a governance and resilience control, not just a convenience feature. It provides organizations with a structured way to manage identities, credentials, and shared access across teams, with built-in auditability and policy enforcement.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Compliance-aligned access governance&lt;/h3&gt;



&lt;p&gt;Many regulatory and audit frameworks require extensive access oversight, including unique user identification, controlled credential sharing, and demonstrable access oversight.&lt;/p&gt;



&lt;p&gt;Proton Pass for Business supports these requirements through structured access governance that is practical to operate day to day. It provides administrative visibility through activity logs and reporting on credential access, password changes, sharing actions, and identified risks such as weak or exposed credentials, helping organizations maintain traceability and demonstrate control effectiveness during audits.&lt;/p&gt;



&lt;p&gt;Organizations can implement controls such as:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Enforcing unique credentials per user and per service&lt;/li&gt;



&lt;li&gt;Moving from informal shared logins to secure, traceable credential sharing&lt;/li&gt;



&lt;li&gt;Structuring vault access based on defined responsibilities, with controlled sharing &lt;/li&gt;



&lt;li&gt;Restricting who can view, edit, or share specific credentials&lt;/li&gt;



&lt;li&gt;Maintaining recorded histories of credential access and changes&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;In practical terms, this means you can replace informal password sharing over email or chat with policy-based sharing tied to roles and teams. During audits, instead of explaining process intent, you can show system-level enforcement and access records.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Visibility across distributed environments&lt;/h3&gt;



&lt;p&gt;Modern access sprawl is driven by SaaS adoption, remote work, and contractor ecosystems. Credentials end up scattered across browsers, devices, spreadsheets, and personal password stores. That fragmentation makes compliance reviews and access certifications slow and error-prone.&lt;/p&gt;



&lt;p&gt;Centralized credential vaulting changes that. Security and IT teams gain a consolidated view of business-critical accounts and who can access them. That makes periodic access reviews, which are required under many frameworks, operationally feasible.&lt;/p&gt;



&lt;p&gt;Actionable practices enabled by centralized credential platforms include:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Running quarterly access reviews by vault or role&lt;/li&gt;



&lt;li&gt;Rapidly removing access when employees change roles or leave&lt;/li&gt;



&lt;li&gt;Identifying orphaned or unused accounts&lt;/li&gt;



&lt;li&gt;Standardizing how high-risk credentials are stored and shared&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Instead of chasing passwords across systems, reviewers work from a controlled inventory.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Continuity and incident response support&lt;/h3&gt;



&lt;p&gt;Business continuity plans often fail on a simple point: responders can’t get the access they need when systems are under stress. Credentials go missing, get locked in personal vaults, or are known only to one administrator. That turns a recoverable incident into extended downtime.&lt;/p&gt;



&lt;p&gt;Secure, centralized credential vaulting supports continuity by ensuring that authorized responders can reach critical systems without weakening controls. Teams can predefine emergency access groups, segregate high-risk credentials, and ensure recovery accounts are stored with strong protection.&lt;/p&gt;



&lt;p&gt;Operationally, this supports continuity measures such as:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Securing backup system credentials separately from production&lt;/li&gt;



&lt;li&gt;Protecting admin and recovery accounts with strong authentication&lt;/li&gt;



&lt;li&gt;Ensuring at least two authorized roles can access critical credentials&lt;/li&gt;



&lt;li&gt;Documenting and testing emergency access workflows&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Continuity stops being dependent on individual memory and starts being system-supported.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Governance and audit readiness&lt;/h3&gt;



&lt;p&gt;From an audit and governance standpoint, credential platforms provide usable evidence, not just policy statements. Auditors and assessors typically want artifacts, including logs, histories, access lists, and proof of review.&lt;/p&gt;



&lt;p&gt;Centralized credential management within Proton Pass helps produce that evidence through:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Access detailed activity logs for all credentials&lt;/li&gt;



&lt;li&gt;Clear ownership and vault structures&lt;/li&gt;



&lt;li&gt;Demonstrable policy enforcement&lt;/li&gt;



&lt;li&gt;Access and visibility into shared vault access and stored item log events &lt;/li&gt;



&lt;li&gt;Controlled and reviewable sharing records&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;That shortens audit cycles and reduces remediation findings tied to identity and access management.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;cybersecurity-foundations&quot;&gt;Compliance and continuity depend on cybersecurity foundations&lt;/h2&gt;



&lt;p&gt;Cybersecurity, compliance, and business continuity are now structurally linked. You aren’t able to maintain one without the others. Security incidents create compliance gaps, which lead to operational vulnerability. Continuity plans will fail without secure, reliable access to systems and data.&lt;/p&gt;



&lt;p&gt;Resilient organizations don’t chase perfect security or compliance, because neither exists. Instead, they build integrated control environments where security practices support regulatory obligations and continuity planning assumes real-world threat conditions.&lt;/p&gt;



&lt;p&gt;That integration requires leadership backing, regular control testing, workflow-friendly tools, and continuous refinement. When done right, security becomes a business enabler that supports growth, partnerships, expansion, and customer trust.&lt;/p&gt;



&lt;p&gt;For many organizations, the most practical place to start is strengthening the fundamentals: identity, access, credential governance, incident readiness, and auditability.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;At Proton, building a secure environment is a top priority. Find out &lt;a href=&quot;https://proton.me/blog/cyber-security-solutions-small-business&quot;&gt;how to enhance your cybersecurity&lt;/a&gt; with our guidelines and dedicated tools.&lt;/p&gt;
</content:encoded><category>For business</category><author>Ben Wolford</author></item><item><title>What is an eavesdropping attack? Everything you need to know</title><link>https://proton.me/blog/eavesdropping</link><guid isPermaLink="true">https://proton.me/blog/eavesdropping</guid><description>Eavesdropping attacks can be levied at individuals and businesses, but how do they work? We explain how to protect against them</description><pubDate>Wed, 11 Mar 2026 11:11:59 GMT</pubDate><content:encoded>
&lt;p&gt;Most of the time, &amp;#8220;eavesdropping&amp;#8221; means listening in on a conversation in public, but hackers are more clever. For them, eavesdropping means listening in on a conversation between &lt;em&gt;two devices&lt;/em&gt;.&lt;/p&gt;



&lt;p&gt;An eavesdropping attack gives criminals or spies access to personal data and business networks, helping them extract data, steal money, and potentially commit fraud.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What is an eavesdropping attack?&lt;/h2&gt;



&lt;p&gt;Hackers use eavesdropping attacks to access data that&amp;#8217;s being shared between devices, such as the activity on your phone while you&amp;#8217;re connected to a public WiFi network. They can do this using a few different methods:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Keystroke logging (or keylogging) &lt;/strong&gt;allows someone to see what you&amp;#8217;re typing on your keyboard without your knowledge. This can be done using either software or hardware, and may be used by governments or law enforcement to monitor suspicious activity. However, keylogging can also be deployed as a form of spyware. By seeing what you&amp;#8217;re typing, hackers can collect sensitive information, such as passwords for banking apps.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Man-in-the-middle (&lt;/strong&gt;&lt;strong&gt;MITM&lt;/strong&gt;&lt;strong&gt;) attacks &lt;/strong&gt;are a way for a hacker to insert themselves into an email conversation or gain access to a WiFi connection and silently monitor data being shared. There are different ways to launch MITM attacks, such as &lt;a href=&quot;https://proton.me/blog/phishing-attacks&quot;&gt;HTTPS spoofing&lt;/a&gt;, session hijacking, and malware.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Unsecured networks such as free public WiFi &lt;/strong&gt;are one of the easiest ways to illicitly gain access to devices. Unencrypted networks can be monitored without much effort on a hacker&amp;#8217;s side; they don&amp;#8217;t even need to convince you to click a link. A fake hotspot set up to look like public WiFi can also trick you into connecting to it, and once you&amp;#8217;re connected hackers can see the activity on your device.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Network sniffing &lt;/strong&gt;uses software to take snapshots of data being transmitted over a network without sending it to a different location or changing it at all. It can be used safely by IT admins to monitor network connections for security purposes, but it can also be used by hackers to collect sensitive information from your devices. This type of attack uses your computer&amp;#8217;s network interface card (NIC) to allow someone to capture and access pieces (known as packets) of data.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Unsecured accounts with weak passwords &lt;/strong&gt;grant hackers very easy access to your digital life. It isn&amp;#8217;t even necessary to launch an attack if your passwords can be found on the dark web. If and when a data breach occurs for an online service you use, a single password can grant access to all of your online accounts if you aren&amp;#8217;t creating strong and unique passwords for each account and using &lt;a href=&quot;https://proton.me/authenticator&quot;&gt;two-factor authentication&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Why do hackers use eavesdropping attacks?&lt;/h2&gt;



&lt;p&gt;Despite there being many ways to launching eavesdropping attacks, there&amp;#8217;s one main goal: &lt;strong&gt;to intercept sensitive, unencrypted data&lt;/strong&gt; &lt;strong&gt;and exploit it.&lt;/strong&gt; Eavesdropping attacks are an extremely effective way to steal personal data from individuals, and sensitive and proprietary information from businesses.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;How do eavesdropping attacks affect individuals?&lt;/h3&gt;



&lt;p&gt;Eavesdropping can be used to target individuals already known to a bad actor or to identify future victims for future phishing scams, blackmail, or identity fraud.&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Financial loss is a significant risk if an individual is targeted by an eavesdropping attack. Your online banking portal login details or your credit card information can be targeted, leading you to potential financial loss and identity fraud.&lt;/li&gt;



&lt;li&gt;Hackers can blackmail you by stealing personal data such as your medical information, private conversations, or browsing history.&lt;/li&gt;



&lt;li&gt;If you&amp;#8217;re targeted by an eavesdropping attack while you&amp;#8217;re using a &lt;a href=&quot;https://proton.me/blog/byod-policy&quot;&gt;personal device&lt;/a&gt; for work purposes, hackers could access sensitive business data. Loss of this data could result in penalties at work or even legal consequences if proprietary or sensitive customer data is stolen.&lt;/li&gt;



&lt;li&gt;Stalkerware or intimate partner surveillance (IPS) can be used to remotely monitor someone&amp;#8217;s location as well as what to see they&amp;#8217;re doing on their devices and even deprive them of access to their bank accounts. This is known as &lt;a href=&quot;https://refugetechsafety.org/what-is-tech-abuse/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;tech abuse&lt;/a&gt; and is used as a means of domestic control and abuse. More resources can be accessed through the &lt;a href=&quot;https://www.thehotline.org/resources/technology-facilitated-abuse/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;National Domestic Violence Hotline&lt;/a&gt; in the US and &lt;a href=&quot;https://www.nationaldahelpline.org.uk/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Refuge&lt;/a&gt; in the UK.&lt;/li&gt;
&lt;/ul&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;How do eavesdropping attacks affect businesses?&lt;/h3&gt;



&lt;p&gt;While the risks of eavesdropping attacks can be dangerous for individuals, they can also be catastrophic for businesses.&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Reputational damage is caused when your customers or your clients find out that your business has been affected by a cyberattack: it&amp;#8217;s difficult and sometimes impossible to rebuild this trust.&lt;/li&gt;



&lt;li&gt;Operational continuity isn&amp;#8217;t possible when your business is actively being targeted by a cyberattack. Employees could lose access to critical data and systems.&lt;/li&gt;



&lt;li&gt;Businesses are also vulnerable to financial loss if financial documents or banking information are stolen. &lt;a href=&quot;https://proton.me/blog/smb-cybersecurity-report&quot;&gt;Smaller businesses&lt;/a&gt; may not be able to recover from a significant loss.&lt;/li&gt;



&lt;li&gt;Fines can be imposed against businesses if sensitive customer data isn&amp;#8217;t adequately stored and protected according to your local data protection regulations.&lt;/li&gt;



&lt;li&gt;Your business data may appear on the &lt;a href=&quot;https://proton.me/business/pass/breach-observatory&quot;&gt;dark web&lt;/a&gt; once it&amp;#8217;s been stolen. This leaves you open to increased scams and spam in the future as hackers see your business as a target. An eavesdropping attack is an ideal way for bad actors to see exactly what they can get from your business and plan further attacks in the future such as &lt;a href=&quot;https://proton.me/blog/what-is-phishing&quot;&gt;phishing attacks&lt;/a&gt; and &lt;a href=&quot;https://proton.me/blog/ransomware-threats-smbs&quot;&gt;ransomware&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;How to protect yourself against eavesdropping attacks&lt;/h2&gt;



&lt;p&gt;It&amp;#8217;s not too difficult to make sure that your data and your devices are protected against all kinds of cyberattacks. You don&amp;#8217;t need to be a tech expert, you just need the right approach and the right tools.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Use a VPN&lt;/h3&gt;



&lt;p&gt;A &lt;a href=&quot;https://protonvpn.com/&quot;&gt;secure VPN&lt;/a&gt; encrypts the data your devices send and receive: if the data is encrypted, hackers can&amp;#8217;t intercept it. VPNs can protect all of your devices, including phones, tablets, laptops, and PCs so that you can use the internet with total privacy. It&amp;#8217;s also advisable to avoid public WiFi, especially if it&amp;#8217;s unsecured. Ads, trackers, and eavesdropping can all be prevented just by switching on your VPN.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Protect your accounts&lt;/h3&gt;



&lt;p&gt;The passwords you use to protect your accounts are more important than you might think. Repeating the same password for multiple accounts means it&amp;#8217;s much easier for your accounts to be hacked. Make sure you&amp;#8217;re creating a different &lt;a href=&quot;https://proton.me/pass/password-generator&quot;&gt;strong password&lt;/a&gt; for each account, and use a &lt;a href=&quot;https://proton.me/pass&quot;&gt;secure password manager&lt;/a&gt; to store, autofill, and even share your passwords securely.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Protect your personal data&lt;/h3&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/blog/what-is-data-privacy&quot;&gt;Data privacy&lt;/a&gt; helps you to prevent too much of your personal information ending up online where you can&amp;#8217;t control who can see it. To protect your personal data, don&amp;#8217;t share sensitive information like your email address, name, or date of birth unless it&amp;#8217;s necessary (for example, on a health insurance website or a government services portal). You can hide your personal email address by using &lt;a href=&quot;https://proton.me/pass/aliases&quot;&gt;email aliases&lt;/a&gt;, which hide your real email address and protect you from spam, scams, and tracking. The more you hide your personal data online, the harder it is for anyone to target you.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Use two-factor authentication&lt;/h3&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/blog/what-is-two-factor-authentication-2fa&quot;&gt;Two-factor authentication (2FA)&lt;/a&gt; creates an extra layer of protection for your accounts. It&amp;#8217;s an additional step to logging in which makes it much harder for someone else to access your account. There are different forms of 2FA available such as &lt;a href=&quot;https://proton.me/blog/what-is-biometric-data&quot;&gt;biometric logins&lt;/a&gt;, PIN codes, codes generated using an &lt;a href=&quot;https://proton.me/authenticator&quot;&gt;authenticator app&lt;/a&gt;, and physical security keys. You can also create &lt;a href=&quot;https://proton.me/blog/what-is-a-passkey&quot;&gt;passkeys&lt;/a&gt; for your accounts if they&amp;#8217;re supported by the service you&amp;#8217;re using.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Regularly update your devices and your apps&lt;/h3&gt;



&lt;p&gt;One of the easiest ways to make sure your devices are secure is to regularly update your operating system (OS) and your apps. Updates protect you against vulnerabilities in older versions, so you can protect yourself just by making sure you&amp;#8217;re using the latest version of your device&amp;#8217;s OS and any apps installed.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;How to protect your business against eavesdropping attacks&lt;/h2&gt;



&lt;p&gt;In a world where many employees work remotely and use their &lt;a href=&quot;https://proton.me/blog/byod-policy&quot;&gt;own devices&lt;/a&gt;, the attack surface for businesses has grown significantly. Protecting your business network against eavesdropping attacks takes a different form than protecting an individual&amp;#8217;s devices, but it&amp;#8217;s achievable with rigorous focus on monitoring your network traffic, reviewing access logs, and putting adequate security measures in place.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Use a business VPN&lt;/h3&gt;



&lt;p&gt;Data encryption protects anything being sent or received within your business network. A &lt;a href=&quot;https://proton.me/business/vpn&quot;&gt;business VPN&lt;/a&gt; encrypts all traffic and can also create a secure working environment that team members can log into on any device from any location without compromising the security of your network. Team members are protected against IP tracking and malware, no matter where they are. Sensitive information is protected when it&amp;#8217;s encrypted, meaning your business can remain compliant with &lt;a href=&quot;https://proton.me/business/iso-27001-certification&quot;&gt;ISO 27001&lt;/a&gt;, &lt;a href=&quot;https://proton.me/business/gdpr&quot;&gt;GDPR&lt;/a&gt;, and &lt;a href=&quot;https://proton.me/business/healthcare&quot;&gt;HIPAA&lt;/a&gt; regulations.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Improve your password management&lt;/h3&gt;



&lt;p&gt;Password management within your business can be simplified with a &lt;a href=&quot;https://proton.me/business/pass&quot;&gt;business password manager&lt;/a&gt;. Team members can &lt;a href=&quot;https://proton.me/support/pass-business-policies&quot;&gt;generate passwords&lt;/a&gt; according to your business&amp;#8217;s requirements, then store them in shared vaults for teams, even sharing them outside your network securely if needed with &lt;a href=&quot;https://proton.me/blog/pass-secure-link-sharing&quot;&gt;secure links&lt;/a&gt;. Protecting accounts that have access to sensitive data protects your business network from becoming an attractive prospect for hackers.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Strengthen access management&lt;/h3&gt;



&lt;p&gt;If gaining access to your business network requires proper identification and authentication, it&amp;#8217;s more difficult for anyone to sneak in undetected. Operating with the principle of least privilege means making sure that team members only have access to the systems, apps, and data they strictly require for their roles. Your IT admins can then implement tools such as sharing policies, &lt;a href=&quot;https://proton.me/blog/what-is-sso&quot;&gt;single sign-on (SSO)&lt;/a&gt;, and enforced 2FA to make sure that only the right people have access to your network.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Monitor network traffic&lt;/h3&gt;



&lt;p&gt;To detect an eavesdropper in your network, you need to check your traffic. IT admins should regularly review the activity within your systems, looking for logins from new IP addresses, devices or locations, or irregular behavior such as sharing multiple documents. Usage logs are a helpful tool for spotting suspicious activity and acting accordingly. If your access management is organized well, all an admin needs to do is revoke access to an affected user or shut down an affected system in order to stop the hacker in their tracks.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Protect yourself against eavesdropping attacks with the right tools&lt;/h2&gt;



&lt;p&gt;No matter whether you&amp;#8217;re looking to protect yourself or your business, Proton has a suite of privacy-first tools designed to &lt;a href=&quot;https://proton.me/learn/encryption&quot;&gt;encrypt&lt;/a&gt; your personal data and your online behavior. Eavesdropping attacks rely on people being careless when it comes to their privacy, so don&amp;#8217;t let hackers get the best of you.&lt;/p&gt;
</content:encoded><category>For business</category><category>Privacy guides</category><author>Kate Menzies</author></item><item><title>OpenAI trains on your data, but there’s a free, private ChatGPT alternative</title><link>https://proton.me/blog/chatgpt-alternative</link><guid isPermaLink="true">https://proton.me/blog/chatgpt-alternative</guid><description>ChatGPT comes with privacy and security risks for your data. But there&apos;s a private ChatGPT alternative that&apos;s safe to use.</description><pubDate>Tue, 10 Mar 2026 18:51:42 GMT</pubDate><content:encoded>
&lt;p&gt;AI assistants like ChatGPT promise to make work faster and easier. But every time you enter &lt;a href=&quot;https://proton.me/blog/sensitive-information&quot;&gt;sensitive information&lt;/a&gt;, describe a confidential problem, or ask a personal question, you are handing over &lt;a href=&quot;https://proton.me/blog/what-is-your-data-worth&quot;&gt;valuable data&lt;/a&gt; that can be collected, processed, and shared beyond what you intended.&lt;/p&gt;



&lt;p&gt;Big Tech AI tools collect and analyze user interactions to improve their models and monetize their platforms, raising serious concerns about intellectual property and data ownership. Public concern peaked in March 2025, when &lt;a href=&quot;https://quitgpt.org/&quot;&gt;more than four million users&lt;/a&gt; pledged to leave ChatGPT after a controversial partnership with the US government raised fears about mass surveillance and government access to AI training data.&lt;/p&gt;



&lt;p&gt;As &lt;a href=&quot;https://proton.me/blog/ai-privacy-concerns&quot;&gt;AI privacy&lt;/a&gt; and &lt;a href=&quot;https://proton.me/blog/ai-security-risks&quot;&gt;security issues&lt;/a&gt; become more widely understood, many people are now looking for a private ChatGPT alternative that lets them use AI without giving up control of their data.&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;a href=&quot;#why&quot;&gt;Why do you need a ChatGPT alternative?&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#private-alternative&quot;&gt;What a private alternative to ChatGPT looks like&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#switch&quot;&gt;Switch to private AI&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;why&quot;&gt;Why do you need a ChatGPT alternative?&lt;/h2&gt;



&lt;p&gt;AI assistants like ChatGPT can be incredibly useful, but they’re not designed to be private workspaces. Like many Big Tech platforms, ChatGPT collects data from user interactions, including your prompts, uploaded files, and usage patterns. This data may be stored, reviewed by humans for quality control, or used to improve AI models.&lt;/p&gt;



&lt;p&gt;Because conversations aren’t protected with &lt;a href=&quot;https://proton.me/learn/encryption/types-of-encryption/zero-access&quot;&gt;zero-access encryption&lt;/a&gt;, the platform itself or its partners may be able to access the data you submit. Anything you type into an AI chat could be stored, analyzed, or exposed in the event of a &lt;a href=&quot;https://proton.me/blog/openai-data-breach&quot;&gt;breach&lt;/a&gt;, which creates risks for both individuals and organizations. Prompts may reveal sensitive &lt;a href=&quot;https://proton.me/blog/personal-data&quot;&gt;personal information&lt;/a&gt;, while employees might unknowingly paste confidential company data into AI tools, exposing intellectual property or client information.&lt;/p&gt;



&lt;p&gt;At the same time, OpenAI has begun introducing &lt;a href=&quot;https://proton.me/blog/chatgpt-ads/&quot;&gt;ads into ChatGPT&lt;/a&gt; for some users, raising even more questions about how it monetizes user interactions and what role personal data plays. It&amp;#8217;s no wonder why many people are questioning &lt;a href=&quot;https://proton.me/blog/is-chatgpt-safe&quot;&gt;how safe ChatGPT really is&lt;/a&gt;, especially for sensitive information.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;private-alternative&quot;&gt;What a private alternative to ChatGPT looks like&lt;/h2&gt;



&lt;p&gt;If you’re uneasy about handing over your personal and business data every time you use an AI assistant, you&amp;#8217;re not alone — and you&amp;#8217;re not out of options. We built Lumo to be everything the current generation of AI tools isn’t: private, secure, transparent, and built to work for you, not for advertisers or &lt;a href=&quot;https://proton.me/blog/data-brokers&quot;&gt;data brokers&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;Here&amp;#8217;s what makes Lumo unique:&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;No logs&lt;/h3&gt;



&lt;p&gt;When you send a message, it’s securely transmitted to our servers using &lt;a href=&quot;https://proton.me/blog/lumo-security-model#user-to-lumo&quot;&gt;bidirectional asymmetric encryption&lt;/a&gt; — a form of &lt;a href=&quot;https://proton.me/learn/encryption/types-of-encryption/what-is-end-to-end&quot;&gt;end-to-end encryption&lt;/a&gt;. Lumo processes your query on servers in Europe that we control, generates a response, and then immediately deletes your data.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Zero-access encrypted chat history&lt;/h3&gt;



&lt;p&gt;If you use Lumo with a Proton Account, your chat history is saved with &lt;a href=&quot;https://proton.me/learn/encryption/types-of-encryption/zero-access&quot;&gt;zero-access encryption&lt;/a&gt;, so you&amp;#8217;re the only one who can access it. Or, if you prefer not to keep any history at all, you can use Lumo in Ghost mode, where nothing is saved after your session ends. Either way, you own and control your data, not Proton.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Not used for AI training&lt;/h3&gt;



&lt;p&gt;Your conversations are never used to train the model. Unlike other AI tools that learn from user data, Lumo doesn’t feed your chats back into the system, where they can potentially be leaked or used to profile you.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Built and hosted in Europe&lt;/h3&gt;



&lt;p&gt;Lumo is hosted on European servers and operates under European legal jurisdiction. Unlike Big Tech based in the US, you&amp;#8217;re &lt;a href=&quot;https://proton.me/blog/us-warrantless-surveillance&quot;&gt;protected from warrantless&lt;/a&gt; or mass surveillance regimes.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Open source and transparent&lt;/h3&gt;



&lt;p&gt;Unlike AI tools similar to ChatGPT that rely on closed proprietary systems, Lumo uses &lt;a href=&quot;https://proton.me/community/open-source&quot;&gt;open-source models&lt;/a&gt; and &lt;a href=&quot;https://proton.me/community/open-source&quot;&gt;open source code&lt;/a&gt; for all our apps. Anyone can review how these models operate and confirm that there’s no silent tracking or unauthorized data collection.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;No third-party data sharing&lt;/h3&gt;



&lt;p&gt;Big Tech AI assistants send your data to vendors, partners, or other third parties. With Lumo, your chats are encrypted from your device to our servers, processed privately, and then deleted.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;No ads&lt;/h3&gt;



&lt;p&gt;Lumo never shows ads and never uses your conversations for targeted ads. Unlike many AI platforms that rely on advertising or behavioral data to generate revenue, Lumo is supported by subscriptions — not by profiling users. That means your interactions stay private and the assistant’s responses aren’t influenced by advertisers.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;switch&quot;&gt;Switch to private AI&lt;/h2&gt;



&lt;p&gt;With Lumo, you can stop worrying about the type of sensitive data you enter into an AI chatbot. You can:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Draft contracts with confidential legal or business details.&lt;/li&gt;



&lt;li&gt;Upload proprietary documents without worrying about leaks.&lt;/li&gt;



&lt;li&gt;Analyze sensitive personal data like PII, HR records, or client information with full control.&lt;/li&gt;



&lt;li&gt;Explore private medical questions without exposing your health data.&lt;/li&gt;



&lt;li&gt;Write, code, or brainstorm — all without leaving a digital paper trail.&lt;/li&gt;



&lt;li&gt;Work on long-term projects using files, chats, and instructions in a private encrypted workspace.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Try Lumo now and see what AI looks like when your privacy matters most. And when you’re ready to bring that same level of privacy to your workplace, Lumo for Business helps your team collaborate securely and stay productive without compromising sensitive company data.&lt;/p&gt;



&lt;div class=&quot;flex flex-wrap justify-center gap-2&quot;&gt;
&lt;a class=&quot;btn inline-block rounded-full font-bold btn-small btn-solid-purple&quot; href=&quot;https://lumo.proton.me/&quot;&gt;Use Lumo now&lt;/a&gt;
&lt;a class=&quot;btn inline-block rounded-full font-bold btn-small btn-outlined-purple&quot; href=&quot;https://lumo.proton.me/business&quot;&gt;Get Lumo for Business&lt;/a&gt;
&lt;/div&gt;



&lt;p&gt;You can also download Lumo from &lt;a href=&quot;https://play.google.com/store/apps/details?id=me.proton.android.lumo&quot;&gt;Google Play&lt;/a&gt; or &lt;a href=&quot;https://apps.apple.com/us/app/lumo-by-proton/id6746714949&quot;&gt;App Store&lt;/a&gt;.&lt;/p&gt;
</content:encoded><category>Privacy guides</category><author>Elena Constantinescu</author></item><item><title>Is ChatGPT safe to use? Here’s what you should know.</title><link>https://proton.me/blog/is-chatgpt-safe</link><guid isPermaLink="true">https://proton.me/blog/is-chatgpt-safe</guid><description>Is ChatGPT safe to use? Learn the privacy, security, and business risks of AI assistants, what not to share, and a private alternative.</description><pubDate>Thu, 05 Mar 2026 17:09:00 GMT</pubDate><content:encoded>
&lt;p&gt;ChatGPT is a powerful &lt;a href=&quot;https://lumo.proton.me/&quot;&gt;AI assistant&lt;/a&gt; used by million of users &lt;a href=&quot;https://proton.me/blog/ai-in-daily-life&quot;&gt;daily&lt;/a&gt;, but is it safe to use? It’s owned and operated by OpenAI, one of the largest tech companies in the world. And like many Big Tech platforms, OpenAI collects large amounts of user data. That data is not protected with &lt;a href=&quot;https://proton.me/learn/encryption/types-of-encryption/zero-access&quot;&gt;zero-access encryption&lt;/a&gt;, so the company can divulge it to business partners (including advertising and analytics companies), the &lt;a href=&quot;https://proton.me/blog/us-warrantless-surveillance&quot;&gt;government&lt;/a&gt;, and hackers in the event of a &lt;a href=&quot;https://proton.me/business/pass/breach-observatory&quot;&gt;data breach&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;Behind the scenes, OpenAI&amp;#8217;s &lt;a href=&quot;https://proton.me/blog/llm&quot;&gt;large language models (LLM)&lt;/a&gt; are constantly learning from what you type. Sensitive questions, like asking about health symptoms, legal matters, or intellectual property, can feed into complex profiling systems or help train AI models used far beyond your original intent.&lt;/p&gt;



&lt;p&gt;Concerns about how AI companies handle user data are growing. In March 2026, &lt;a href=&quot;https://quitgpt.org/&quot;&gt;over 2.5 million users&lt;/a&gt; pledged to leave ChatGPT after a controversial partnership with the US government raised questions about how AI systems are deployed and governed. It’s a reminder that when you interact with an AI assistant without strong privacy protections, you may be sharing more information than you realize.&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;a href=&quot;#risks&quot;&gt;Is ChatGPT safe? The risks of using AI like ChatGPT and other Big Tech&lt;/a&gt;
&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;a href=&quot;#personal-privacy&quot;&gt;Personal privacy&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#business-risk&quot;&gt;Business risk&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#no-transparency&quot;&gt;Lack of transparency&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#things&quot;&gt;Things you should never share with ChatGPT&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#how-to&quot;&gt;How to stay safe when using ChatGPT&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#private-ai&quot;&gt;Switch to a private AI assistant&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;risks&quot;&gt;Is ChatGPT safe? The risks of using AI like ChatGPT and other Big Tech&lt;/h2&gt;



&lt;p&gt;Before choosing AI tools like ChatGPT, &lt;a href=&quot;https://proton.me/blog/turn-off-gemini-on-android&quot;&gt;Gemini&lt;/a&gt;, &lt;a href=&quot;https://proton.me/blog/turn-off-meta-ai-facebook&quot;&gt;Meta AI&lt;/a&gt;, &lt;a href=&quot;https://proton.me/blog/turn-off-copilot&quot;&gt;Copilot&lt;/a&gt;, and &lt;a href=&quot;https://proton.me/blog/deepseek&quot;&gt;DeepSeek&lt;/a&gt;, it&amp;#8217;s worth understanding their &lt;a href=&quot;https://proton.me/blog/ai-security-risks&quot;&gt;security&lt;/a&gt; and &lt;a href=&quot;https://proton.me/blog/ai-privacy-concerns&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://proton.me/blog/ai-privacy-concerns&quot;&gt;privacy risks&lt;/a&gt;:&lt;/p&gt;



&lt;figure class=&quot;wp-block-table is-style-stripes&quot;&gt;&lt;table class=&quot;has-fixed-layout&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;Risk&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;&lt;strong&gt;Potential impact&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;&lt;strong&gt;Why it matters&lt;/strong&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Data collection and logging&lt;/td&gt;&lt;td&gt;Prompts, file uploads, and interaction patterns may be stored&lt;/td&gt;&lt;td&gt;Can be used for AI training, behavioral profiling, or human review&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Lack of zero-access encryption&lt;/td&gt;&lt;td&gt;Conversations may be accessed by OpenAI and its partners&lt;/td&gt;&lt;td&gt;Increases risk of exposing sensitive data&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Regulatory and IP concerns&lt;/td&gt;&lt;td&gt;GDPR/HIPAA exposure or proprietary data leaks&lt;/td&gt;&lt;td&gt;Legal liability and financial consequences&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Closed-source system&lt;/td&gt;&lt;td&gt;Limited transparency into data handling&lt;/td&gt;&lt;td&gt;Requires trust in OpenAI&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;In-app ads&lt;/td&gt;&lt;td&gt;Increased tracking and profiling&lt;/td&gt;&lt;td&gt;Unclear how chat data informs personalized ads&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/figure&gt;



&lt;h3 class=&quot;wp-block-heading&quot; id=&quot;personal-privacy&quot;&gt;Personal privacy&lt;/h3&gt;



&lt;p&gt;Here&amp;#8217;s what you risk by using ChatGPT:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;ChatGPT may collect the information you enter — such as questions, responses, and how you interact with the tool — to train its AI models. If you upload a resume, legal document, a medical report, or another file with &lt;a href=&quot;https://proton.me/blog/personal-data&quot;&gt;personal data&lt;/a&gt;, that content may be stored and processed too.&lt;/li&gt;



&lt;li&gt;Even if you never enter your name or other personal data, your prompts can reveal patterns over time, such as health concerns, religious doubts, political leanings, family status, or emotional state. Combined with your &lt;a href=&quot;https://protonvpn.com/what-is-my-ip-address&quot;&gt;IP address&lt;/a&gt; and other technical identifiers, these patterns can be used to build detailed behavioral profiles.&lt;/li&gt;



&lt;li&gt;You might be able to opt out of AI training, but your &lt;a href=&quot;https://proton.me/blog/ai-chat-logs&quot;&gt;conversations are still logged&lt;/a&gt; and sensitive details might be seen by human reviewers if they&amp;#8217;re flagged, such as when you submit feedback.&lt;/li&gt;



&lt;li&gt;Your chat history is protected while being sent and stored, but it&amp;#8217;s not protected with &lt;a href=&quot;https://proton.me/learn/encryption/types-of-encryption/zero-access&quot;&gt;zero-access encryption&lt;/a&gt;, so OpenAI or a third party can still access your past conversations.&lt;/li&gt;



&lt;li&gt;In July 2025, thousands of shared ChatGPT conversations &lt;a href=&quot;https://www.fastcompany.com/91376687/google-indexing-chatgpt-conversations&quot;&gt;appeared in Google search results&lt;/a&gt;, exposing deeply personal exchanges that users likely assumed were private. OpenAI soon pulled the feature and said it was working with Google to de-index the results, but the incident highlights how easily AI interactions can slip into the public domain without you realizing it.&lt;/li&gt;



&lt;li&gt;In early 2026, OpenAI introduced &lt;a href=&quot;https://proton.me/blog/chatgpt-ads&quot;&gt;ads for ChatGPT&lt;/a&gt; users on the free and ChatGPT Go plans. Despite assurances that ads won’t influence responses or involve sharing personal data with advertisers, the move follows a well-established Big Tech pattern in which advertising eventually becomes normalized after initial privacy concerns.&lt;/li&gt;
&lt;/ul&gt;



&lt;h3 class=&quot;wp-block-heading&quot; id=&quot;business-risk&quot;&gt;Business risk&lt;/h3&gt;



&lt;p&gt;OpenAI is a US company, so using ChatGPT can raise data protection concerns and risks of leaking &lt;a href=&quot;https://proton.me/blog/sensitive-information&quot;&gt;sensitive information&lt;/a&gt;. If you’re based in Europe or elsewhere, your data could still be subject to US jurisdiction since it&amp;#8217;s processed by a US company. Here&amp;#8217;s what that means:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Without strong data protection guarantees, your organization risks fines or regulatory scrutiny under laws such as &lt;a href=&quot;https://proton.me/blog/ai-gdpr&quot;&gt;GDPR&lt;/a&gt; and &lt;a href=&quot;https://priceschool.usc.edu/news/why-doctors-using-chatgpt-are-unknowingly-violating-hipaa/&quot;&gt;HIPAA&lt;/a&gt;.&lt;/li&gt;



&lt;li&gt;You risk leaks by training AI models on your company data. For example, employees might enter proprietary code, confidential contracts, or client information into ChatGPT, potentially exposing intellectual property, trade secrets, or customer data.&lt;/li&gt;



&lt;li&gt;OpenAI may share data with partners, vendors, other third parties, or through app integrations — which could have weaker privacy protections or different data policies. In 2025, a &lt;a href=&quot;https://proton.me/blog/openai-data-breach&quot;&gt;breach involving one of OpenAI’s analytics vendors&lt;/a&gt; exposed identifying information about API customers.&lt;/li&gt;



&lt;li&gt;Under US laws like the Patriot Act or FISA (Foreign Intelligence Surveillance Act), companies can be compelled to &lt;a href=&quot;https://proton.me/blog/us-warrantless-surveillance&quot;&gt;provide data to government agencies&lt;/a&gt;, often with secrecy orders that prevent them from notifying users.&lt;/li&gt;
&lt;/ul&gt;



&lt;h3 class=&quot;wp-block-heading&quot; id=&quot;no-transparency&quot;&gt;Lack of transparency&lt;/h3&gt;



&lt;p&gt;The above are known risks. But what&amp;#8217;s especially risky about ChatGPT (and other closed source software) is what you aren&amp;#8217;t permitted to know.&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;The code of ChatGPT’s apps are not &lt;a href=&quot;https://proton.me/community/open-source&quot;&gt;open source&lt;/a&gt;, so there’s no public oversight into how it works, what it logs, or how it processes your data behind the scenes. You must rely on OpenAI’s policies and trust that the system handles data responsibly.&lt;/li&gt;



&lt;li&gt;Although OpenAI has released open-weight models that can be publicly examined, the AI models that ChatGPT uses aren&amp;#8217;t open source so you can&amp;#8217;t check how the data was pre-trained on large datasets.&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;things&quot;&gt;Things you should never share with ChatGPT&lt;/h2&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-large&quot;&gt;&lt;img width=&quot;725&quot; height=&quot;1024&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_725,h_1024,c_scale/f_auto,q_auto/v1772726837/wp-pme/is-chatgpt-safe-diagram/is-chatgpt-safe-diagram.png?_i=AA&quot; alt=&quot;A diagram of things you shouldn&amp;#039;t share with ChatGPT&quot; class=&quot;wp-post-104489 wp-image-104504 wp-image-104517&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;421 KB&quot; data-optsize=&quot;106 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;74.9&quot; data-version=&quot;1772726837&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_725,h_1024,c_scale/f_auto,q_auto/v1772726837/wp-pme/is-chatgpt-safe-diagram/is-chatgpt-safe-diagram.png?_i=AA 725w, https://res.cloudinary.com/dbulfrlrz/images/w_212,h_300,c_scale/f_auto,q_auto/v1772726837/wp-pme/is-chatgpt-safe-diagram/is-chatgpt-safe-diagram.png?_i=AA 212w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_1084,c_scale/f_auto,q_auto/v1772726837/wp-pme/is-chatgpt-safe-diagram/is-chatgpt-safe-diagram.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1088,h_1536,c_scale/f_auto,q_auto/v1772726837/wp-pme/is-chatgpt-safe-diagram/is-chatgpt-safe-diagram.png?_i=AA 1088w, https://res.cloudinary.com/dbulfrlrz/images/w_1450,h_2048,c_scale/f_auto,q_auto/v1772726837/wp-pme/is-chatgpt-safe-diagram/is-chatgpt-safe-diagram.png?_i=AA 1450w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_2214,c_scale/f_auto,q_auto/v1772726837/wp-pme/is-chatgpt-safe-diagram/is-chatgpt-safe-diagram.png?_i=AA 1568w, https://res.cloudinary.com/dbulfrlrz/images/w_1813,h_2560,c_scale/f_auto,q_auto/v1772726837/wp-pme/is-chatgpt-safe-diagram/is-chatgpt-safe-diagram.png?_i=AA 1813w&quot; sizes=&quot;auto, (max-width: 725px) 100vw, 725px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;p&gt;Even though ChatGPT can be helpful, you should never treat it like a secure vault for sensitive information. Avoid entering anything that could harm you, your company, or others if it were stored, reviewed, or accidentally exposed:&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Passwords and authentication data&lt;/strong&gt;, such as account passwords, two-factor authentication (2FA) codes, backup authentication codes, or private API keys.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Government identification numbers&lt;/strong&gt;, including Social Security, national ID, passport, driver&amp;#8217;s license, and tax identification numbers.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Financial and banking information&lt;/strong&gt;, such as credit or debit card numbers, IBANs, online banking credentials, investment account logins, or Bitcoin wallet private keys.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Highly sensitive personal data&lt;/strong&gt; that could be used to identify or track you or your family, such as home address and phone number, birth date, or private photos or documents.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Health information&lt;/strong&gt;, such as medical reports, diagnostic records, insurance numbers, patient IDs, or detailed health histories tied to your identity.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Confidential work or company data&lt;/strong&gt;, including proprietary source code, internal strategy documents, confidential contracts, customer databases, client details, financial projections, unpublished reports, or NDAs.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Legal and privileged information&lt;/strong&gt;, such as attorney-client communications, legal case strategies, evidence documents, or confidential settlement discussions.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;how-to&quot;&gt;How to stay safe when using ChatGPT&lt;/h2&gt;



&lt;p&gt;You don’t have to avoid AI tools entirely, but you should treat them like public-facing services rather than private workspaces. A few simple habits can significantly reduce your risk:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Avoid sharing sensitive information you wouldn&amp;#8217;t want stored, reviewed, or exposed publicly.&lt;/li&gt;



&lt;li&gt;Remove identifying details or replace them with placeholders or fictional examples.&lt;/li&gt;



&lt;li&gt;Only upload files that do not contain sensitive or confidential information.&lt;/li&gt;



&lt;li&gt;Treat AI chats like emails or support tickets that could be seen by other people.&lt;/li&gt;



&lt;li&gt;Review privacy settings and disable settings like chat history, memory, or AI training.&lt;/li&gt;



&lt;li&gt;Delete conversations you no longer need to reduce how much personal information remains associated with your account.&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;private-ai&quot;&gt;Switch to a private AI assistant&lt;/h2&gt;



&lt;p&gt;If you’re concerned about sharing personal or business information with AI tools, try Lumo. Our private &lt;a href=&quot;https://proton.me/blog/chatgpt-alternative&quot;&gt;ChatGPT alternative&lt;/a&gt; never logs your conversations or uses them for model training. Your data is protected with &lt;a href=&quot;https://proton.me/blog/lumo-security-model#user-to-lumo&quot;&gt;bidirectional asymmetric encryption&lt;/a&gt; (a form of &lt;a href=&quot;https://proton.me/security/end-to-end-encryption&quot;&gt;end-to-end encryption&lt;/a&gt;) and processed on European servers controlled by Proton.&lt;/p&gt;



&lt;p&gt;When you use Lumo with a Proton Account, your conversations are protected with zero-access encryption, meaning only you can read them — not even Proton. For maximum privacy, Ghost mode allows you to use Lumo without saving any history at all.&lt;/p&gt;



&lt;p&gt;Lumo uses &lt;a href=&quot;https://proton.me/community/open-source&quot;&gt;open-source&lt;/a&gt; models, so anyone can verify that no hidden tracking or data collection occurs.&lt;/p&gt;



&lt;p&gt;Try Lumo now and see what AI looks like when your privacy matters most. And when you’re ready to bring that same level of privacy to your workplace, Lumo for Business helps your team collaborate securely and stay productive without compromising sensitive company data.&lt;/p&gt;



&lt;div class=&quot;flex flex-wrap justify-center gap-2&quot;&gt;
&lt;a class=&quot;btn inline-block rounded-full font-bold btn-small btn-solid-purple&quot; href=&quot;https://lumo.proton.me/&quot;&gt;Use Lumo now&lt;/a&gt;
&lt;a class=&quot;btn inline-block rounded-full font-bold btn-small btn-outlined-purple&quot; href=&quot;https://lumo.proton.me/business&quot;&gt;Get Lumo for Business&lt;/a&gt;
&lt;/div&gt;



&lt;p&gt;You can also download Lumo from &lt;a href=&quot;https://play.google.com/store/apps/details?id=me.proton.android.lumo&quot;&gt;Google Play&lt;/a&gt; or &lt;a href=&quot;https://apps.apple.com/us/app/lumo-by-proton/id6746714949&quot;&gt;App Store&lt;/a&gt;.&lt;/p&gt;
</content:encoded><category>Privacy guides</category><author>Elena Constantinescu</author></item><item><title>The Proton guide to privacy at protests</title><link>https://proton.me/blog/how-to-protect-privacy-at-protests</link><guid isPermaLink="true">https://proton.me/blog/how-to-protect-privacy-at-protests</guid><description>Protesters can expose personal information that puts them at risk. Here’s how to keep your identity private and your devices secure at a demonstration.</description><pubDate>Tue, 03 Mar 2026 15:35:11 GMT</pubDate><content:encoded>
&lt;p&gt;From Minneapolis to Munich to Tehran, people are taking to the streets as a form of political expression. The right to peaceful assembly and protest are bedrocks of democracy, and we support everyone’s ability to exercise these rights. Proton’s mission is to protect people’s privacy and freedom from surveillance and censorship. For this reason, protesters across the political spectrum and around the world have turned to our &lt;a href=&quot;https://proton.me/mail&quot;&gt;encrypted email&lt;/a&gt;, &lt;a href=&quot;https://protonvpn.com/&quot;&gt;VPN&lt;/a&gt;, and other services to keep their communications and online activity safe from monitoring and attacks.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Digital privacy is only one concern; demonstrators must protect themselves offline too. Governments are monitoring protests with increasingly draconian methods, like the &lt;a href=&quot;https://hongkongfp.com/2025/10/04/hong-kong-to-install-surveillance-cameras-with-ai-facial-recognition/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;thousands of CCTV cameras&lt;/a&gt; with AI facial recognition in Hong Kong, and the &lt;a href=&quot;https://www.americanimmigrationcouncil.org/blog/ice-ai-surveillance-tracking-americans/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;surveillance creep&lt;/a&gt; and rise of Immigration and Customs Enforcement (ICE) raids in cities all over the US. &lt;/p&gt;



&lt;p&gt;ICE has deployed mobile biometric tools, such as the &lt;a href=&quot;https://en.wikipedia.org/wiki/Mobile_Fortify&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Mobile Fortify app&lt;/a&gt;, which allows agents to identify individuals in a crowd by pointing a smartphone camera at their face or fingerprints, which matches them against federal databases. Because the biometric matches are considered definitive, US citizens have been wrongfully detained after being misidentified by the technology.&lt;/p&gt;



&lt;figure class=&quot;wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio&quot;&gt;&lt;div class=&quot;wp-block-embed__wrapper&quot;&gt;
&lt;iframe loading=&quot;lazy&quot; title=&quot;The Tech ICE Uses To Spy On You&quot; width=&quot;750&quot; height=&quot;422&quot; src=&quot;https://www.youtube-nocookie.com/embed/b1K7yLWs2DM?feature=oembed&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;
&lt;/div&gt;&lt;/figure&gt;



&lt;p&gt;Federal agencies are also &lt;a href=&quot;https://proton.me/blog/us-warrantless-surveillance&quot;&gt;circumventing the need for search warrants&lt;/a&gt; by purchasing bulk location data from commercial data brokers. If you have apps on your phone that collect and sell your movement history, agencies can use this data to identify individuals back to their homes or workplaces.&lt;/p&gt;



&lt;p&gt;In the face of these privacy threats, this guide explains how to defend your rights at a protest in three important areas: your phone, your communications in the cloud, and your face. It’s critical that you remain in control of each of these “identifiers” so you can peacefully voice your opinion without fear of repression or repercussions for exercising your rights.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Secure your phone&lt;/h2&gt;



&lt;p&gt;Smartphones have made it much easier for protesters to record what’s happening in front of them, and video recordings can be powerful calls to action and tools to hold those in power accountable. However, smartphones also contain massive amounts of personal information and are constantly transmitting data.&lt;/p&gt;



&lt;p&gt;Many law enforcement agencies in the US use IMSI-catchers (often called &lt;a href=&quot;https://sls.eff.org/technologies/cell-site-simulators-imsi-catchers&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Stingrays&lt;/a&gt;), which act like fake phone towers to track your location and phone number. While modern 5G networks have better built-in protections, authorities can use jamming techniques to force your phone onto older, less secure 4G or 2G networks to bypass those safeguards.&lt;/p&gt;



&lt;p&gt;If you want to protect your data, you have three primary options:&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Leave your phone at home&lt;/h3&gt;



&lt;p&gt;This one is self-explanatory: The authorities won’t be able to track your phone at the protest if you don’t have it. To avoid suspicion, leave your phone on while you are at the protest. For maximum digital privacy, you should not bring any device that can create an external connection, including smartwatches, fitness trackers, or Bluetooth headphones.&lt;/p&gt;



&lt;p&gt;Depending on your &lt;a href=&quot;https://proton.me/blog/what-is-a-threat-model&quot;&gt;threat model&lt;/a&gt;, you might decide the extra privacy of leaving your phone behind is not worth the inconvenience.&amp;nbsp;&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Bring a clean phone&lt;/h3&gt;



&lt;p&gt;The phone you use every day is linked to your identity, and you could leave it at home (but still on) to make sure authorities cannot access it. If you want a phone with you at the protest, you could buy a new, cheap phone. However, for this to be effective, there are steps you will need to follow. This new phone can only be used at protests. You should not turn it on before you arrive at the protest, and you should turn it off before you leave. You will need a new SIM card. You cannot use your regular SIM in your “protest-only” phone. You should only load the apps that are essential. And you should not link your protest phone to your normal phone in any way.&lt;/p&gt;



&lt;p&gt;If you buy a cheap, unlocked Android device and a prepaid SIM that you only turn on and use at the protest, it will be very difficult for anyone to track or identify you. Do not log in to it with your Google account (or your iCloud account if it’s an iPhone). To be extra cautious, you should buy the phone and SIM with cash or a gift card. You could also use a trusted VPN provider, like &lt;a href=&quot;https://protonvpn.com/&quot;&gt;Proton VPN&lt;/a&gt;, to access the &lt;a href=&quot;https://protonvpn.com/blog/f-droid-download/&quot;&gt;open source app repository F-Droid&lt;/a&gt; and download the apps you want for the protest. The goal is to put as little personal information as possible on this protest phone.&lt;/p&gt;



&lt;p&gt;Buying a new prepaid phone can be expensive, especially if you’re only going to use it for one afternoon. If a new one costs too much, you can bring your regular phone, but precautions must be taken.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Turn off all location data and keep your phone off until you need it&lt;/h3&gt;



&lt;p&gt;This is the most convenient but least private option. If you must use your primary phone, take these steps to minimize your data trail:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Reset your advertising ID:&lt;/strong&gt; This is a hidden ID that apps can use to track you. On Android, go to &lt;strong&gt;Settings &gt; Security and privacy &gt; Privacy controls &gt; Ads&lt;/strong&gt; and tap &lt;strong&gt;Reset/Delete Advertising ID&lt;/strong&gt;. On iOS, go to &lt;strong&gt;Settings &gt; Privacy &amp;amp; Security &gt; Tracking&lt;/strong&gt; and ensure &lt;strong&gt;Allow Apps to Request to Track&lt;/strong&gt; is off.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Use airplane mode:&lt;/strong&gt; Keep your phone in Airplane Mode whenever you aren&amp;#8217;t actively using it to stop it pinging nearby towers.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Use a Faraday bag:&lt;/strong&gt; This is a small pouch that blocks all radio signals. It is more reliable than simply turning your phone off, as some modern devices may still be tracked even when they appear to be off.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Disable 2G:&lt;/strong&gt; If your phone allows it, turn off 2G to prevent IMSI-catchers from forcing your phone onto an old, unencrypted connection.&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Encrypt your phone&lt;/h2&gt;



&lt;p&gt;Regardless of which phone you bring, if you have one at a protest, you should &lt;a href=&quot;https://proton.me/learn/encryption&quot;&gt;encrypt&lt;/a&gt; it. This will prevent the police or anyone who gets physical access to your phone from accessing your data. If you set a passcode on your iOS device, it is already encrypted. Most Android devices also automatically encrypt themselves, but if you are uncertain, you can tap &lt;strong&gt;Settings&lt;/strong&gt;, then &lt;strong&gt;Security&lt;/strong&gt;, and see if &lt;strong&gt;Device Encryption&lt;/strong&gt; has been activated.&lt;/p&gt;



&lt;p&gt;You should also make sure you update your device’s settings so that it does not display notifications when the screen is locked.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Turn off biometrics on your phone&lt;/h2&gt;



&lt;p&gt;Do not use &lt;a href=&quot;https://proton.me/blog/biometric-authentication&quot;&gt;biometric authentication&lt;/a&gt;, like face or fingerprint scans, to secure your iOS or Android device. While the legal landscape is shifting, it remains unsettled. In early 2026, some US courts ruled that compelling a person to unlock their phone with a thumbprint is a &lt;a href=&quot;https://www.biometricupdate.com/202506/biometric-privacy-on-trial-the-constitutional-stakes-in-united-states-v-brown&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;“testimonial act” protected by the Fifth Amendment&lt;/a&gt;. However, other courts disagree, and federal agencies like ICE use warrants that explicitly authorize them to forcibly hold a phone to your face or use your fingers to bypass security.&lt;/p&gt;



&lt;p&gt;It is much harder for authorities to legally or physically force you to provide a memorized passcode.&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Use a strong passcode:&lt;/strong&gt; For the best security, your PIN or passcode should be at least 10 digits long, avoid obvious sequences, and ideally include numbers and letters if possible.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Enable lockdown mode:&lt;/strong&gt; On both iOS and modern Android devices, you can quickly enter a lockdown state (usually by holding the power and volume buttons) to instantly disable biometrics and require a passcode for the next unlock.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Know your rights:&lt;/strong&gt; In the US, you are generally not obligated to share your passcode with law enforcement. However, in countries like the UK and Australia, authorities can legally compel you to hand over your password or face criminal charges.&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Use secure messaging apps that are end-to-end encrypted&lt;/h2&gt;



&lt;p&gt;If you are at a protest and are worried about your privacy, you should not use SMS. It is the easiest messaging method for law enforcement to intercept. Instead, you should use an &lt;a href=&quot;https://proton.me/learn/encryption/types-of-encryption/what-is-end-to-end&quot;&gt;end-to-end encrypted&lt;/a&gt; secure messaging app. The most secure messaging app is Signal, which is operated by a nonprofit and collects almost no metadata.&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Use &lt;strong&gt;disappearing messages&lt;/strong&gt; so that if your phone is seized, your past conversations are already gone.&lt;/li&gt;



&lt;li&gt;You can hide your phone number and use a username, which prevents your identity from being linked to your account if a stranger adds you in a group chat.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Although &lt;a href=&quot;https://proton.me/blog/is-whatsapp-safe&quot;&gt;WhatsApp&lt;/a&gt; is end-to-end encrypted, Facebook controls the metadata. While they can&amp;#8217;t read your messages, they do record who you message and when. Law enforcement can request this metadata to map out protest networks.&lt;/p&gt;



&lt;p&gt;Apple’s iMessage is also end-to-end encrypted, but &lt;a href=&quot;https://proton.me/blog/apple-icloud-privacy&quot;&gt;only if you turn on Advanced Data Protection&lt;/a&gt;. But please note, if you turn on iCloud backup on your iOS device for WhatsApp or iMessage, your messages will be saved in an unencrypted state.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Protesters &lt;strong&gt;should not use Bridgefy&lt;/strong&gt;. Despite marketing itself as a “protest app” and an end-to-end encrypted messaging service, it is not end-to-end encrypted and should not be trusted with sensitive communications.&lt;/p&gt;



&lt;p&gt;Bridgefy uses Bluetooth and a mesh network routing so that users can message each other without an internet connection. However, a group of researchers devised a series of attacks against the app and discovered it puts an incredible amount of user data at risk. As &lt;a href=&quot;https://arstechnica.com/features/2020/08/bridgefy-the-app-promoted-for-mass-protests-is-a-privacy-disaster/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Ars Technica reported&lt;/a&gt;, even attackers with only moderate resources can deanonymize users, decrypt and read messages, and tamper with messages in transit.&lt;/p&gt;



&lt;p&gt;The researchers shared these vulnerabilities with Bridgefy in April, but they have not yet been fixed.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Use end-to-end encrypted email&lt;/h2&gt;



&lt;p&gt;Email services like Gmail or Outlook can scan your messages and provide them to law enforcement. If you need to coordinate privately using email, it’s important that all members of the conversation are using a secure email service that supports &lt;a href=&quot;https://proton.me/learn/encryption#types&quot;&gt;end-to-end encryption&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Conversations in Proton Mail are end-to-end encrypted (meaning only the sender and recipient can access the contents of the message) when both parties are using Proton (or another &lt;a href=&quot;https://proton.me/support/how-to-use-pgp&quot;&gt;PGP-enabled service&lt;/a&gt;). Otherwise, the communication will be &lt;a href=&quot;https://proton.me/blog/zero-access-encryption&quot;&gt;zero-access encrypted&lt;/a&gt;, meaning Proton won’t have access to the messages, but the service of the person you’re writing to will unless you &lt;a href=&quot;https://proton.me/support/password-protected-emails&quot;&gt;password-protect your emails&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;Proton Mail also lets you send &lt;a href=&quot;https://proton.me/support/expiration&quot;&gt;self-destructing messages&lt;/a&gt;, which are erased from your recipient’s inbox at a specified time you set.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;To protect your inbox from physical searches, you should use app-level PIN protection. This requires a code or biometric check specifically for the Proton Mail app, meaning that even if someone manages to unlock your phone, they will still be blocked from your emails. For an added layer of physical privacy, you can use the &lt;a href=&quot;https://proton.me/support/mail-discreet-app-icon&quot;&gt;discreet app icon feature&lt;/a&gt; to change the Proton Mail icon on your home screen to look like a generic utility app, such as a calculator or weather app. This makes it much less obvious that you have a secure communication tool installed if your phone is inspected.&lt;/p&gt;



&lt;p&gt;Proton is &lt;a href=&quot;https://proton.me/blog/switzerland&quot;&gt;based in Switzerland&lt;/a&gt;, so your data is protected by some of the world&amp;#8217;s strongest privacy laws. We are prohibited by Swiss law from responding to any foreign data requests unless they are approved by a Swiss court, providing a vital legal barrier against overreaching surveillance.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Be wary of posting to social media&lt;/h2&gt;



&lt;p&gt;You can put yourself and other protesters at risk by posting on social media. There is little point in going through the effort to protect your smartphone from being monitored if you share everything you are doing on Facebook, X, or TikTok.&lt;/p&gt;



&lt;p&gt;In 2026, federal agencies use AI-driven social media monitoring to scrape protest photos and videos. These tools can identify you or your friends through facial recognition, unique tattoos, or even the metadata hidden in your files. To preserve your privacy, be mindful of the information you share about yourself and the protest in general. If you do take pictures, ensure that all faces and identifying features are blurred or covered first.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Strip photos and videos of faces and metadata&lt;/h2&gt;



&lt;p&gt;If you must post to social media, be careful what information your photos inadvertently expose. When you take a photo or video with your smartphone, it records metadata (also known as &lt;a href=&quot;https://proton.me/blog/exif-data&quot;&gt;EXIF metadata&lt;/a&gt;), which includes the exact time, date, and GPS coordinates of where the image was captured.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;You can prevent your smartphone camera from adding location metadata in your &lt;a href=&quot;https://www.digitaltrends.com/mobile/how-to-remove-location-data-from-iphone-photos-in-ios-13/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;iOS&lt;/a&gt; and &lt;a href=&quot;https://www.howtogeek.com/303410/how-to-prevent-android-from-geotagging-photos-with-your-location/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Android&lt;/a&gt; settings, but for photos you have already taken, you should scrub the data before sharing. The most effective way to do this quickly is to use the Signal app.&lt;/p&gt;



&lt;p&gt;Open Signal and select a photo as if you are sending it, then use the blur tool to hide faces. Signal automatically strips out all EXIF metadata and hides facial features in a way that is difficult for AI to reverse.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Taking a screenshot is a popular way to hide data, because they do not carry the original GPS metadata. However, screenshots may still contain metadata from your device, such as the time of the capture or your phone&amp;#8217;s model. For a more thorough approach, use specialized tools like &lt;a href=&quot;https://www.privmeta.com/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;PrivMeta&lt;/a&gt; or &lt;a href=&quot;https://everestpipkin.github.io/image-scrubber/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Image Scrubber&lt;/a&gt;, which allow you to wipe metadata and paint over faces while your phone is in airplane mode.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Tip:&lt;/strong&gt; Pixelation can sometimes be undone, so covering faces with solid black boxes or opaque digital stickers is a much more secure way to protect identities.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Your face is your identity&lt;/h2&gt;



&lt;p&gt;If you are at a protest, it’s impossible to control who takes photos of you. To protect your privacy, you should plan on covering your face in a way that disrupts modern AI. While medical masks were once sufficient, current surveillance technology can often identify individuals by analyzing only the area around the eyes and the bridge of the nose.&lt;/p&gt;



&lt;p&gt;To be effective in 2026, you should use a combination of items to break up your facial symmetry. A wide-brimmed hat pulled low can block overhead cameras, while large, wrap-around sunglasses can obscure the key landmarks around your eyes. Using a bandana or neck gaiter that covers from the bridge of your nose down to your chest is much more effective than a simple mask.&lt;/p&gt;



&lt;p&gt;For even greater protection, consider garments or makeup that use specific patterns designed to confuse AI. Look into &lt;a href=&quot;https://en.wikipedia.org/wiki/Computer_vision_dazzle&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;computer vision dazzle&lt;/a&gt; (CV Dazzle), which uses high-contrast shapes to hide the bridge of the nose and eyes.&lt;/p&gt;



&lt;p&gt;Finally, remember that law enforcement also uses unique identifiers like tattoos, bright-colored hair, or specific logos on your clothing to track you. Covering these with long sleeves, gloves, or plain, unbranded layers is just as important as covering your face.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Final takeaways&lt;/h2&gt;



&lt;p&gt;As a Swiss organization, we are politically neutral; however, we are unequivocal in our defense of citizens’ &lt;a href=&quot;https://proton.me/blog/protesters-free-speech&quot;&gt;fundamental human rights&lt;/a&gt;. We believe everyone, including protesters, has the right to security, privacy, and freedom. Peaceful popular protests are often catalysts for long-overdue policy changes. If you are protesting peacefully and you want to protect your privacy, you should:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Secure your phone (or leave it at home)&lt;/li&gt;



&lt;li&gt;Use end-to-end encrypted messaging and &lt;a href=&quot;https://proton.me/mail&quot;&gt;private email&lt;/a&gt; apps&lt;/li&gt;



&lt;li&gt;Be careful about posting on social media&lt;/li&gt;



&lt;li&gt;Scrub out identifying information from photos and videos&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;It is also important to note that as a Swiss organization, Proton Mail is subject to Swiss law, meaning we will take firm action against those who use our service for purposes that are illegal in Switzerland. We have clear &lt;a href=&quot;https://proton.me/legal/terms&quot;&gt;terms and conditions&lt;/a&gt; as well as a zero-tolerance policy for crime. If any user violates those terms and conditions or uses Proton in the commission of a crime under Swiss law, such as the destruction of property, we will disable their account.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;We’re proud that Proton Mail and Proton VPN have become tools that protesters and demonstrators use to share their voices. We are firm in our stance that everyone has the right to privacy, and we hope this guide helps peaceful protesters stay safe.&lt;/p&gt;



&lt;p&gt;UPDATE Aug. 25, 2020: This story now includes information about the Bridgefy messaging app.&lt;/p&gt;



&lt;p&gt;UPDATE June 17, 2025: Added information about license plate scanners, Faraday bags, and Signal removing EXIF data.&lt;/p&gt;



&lt;p&gt;UPDATE March 3, 2026: Updated to include information on federal biometric surveillance (Mobile Fortify), the data broker loophole, and 2026 legal rulings on compelled biometric unlocking.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;&lt;em&gt;You can get a &lt;a href=&quot;https://proton.me/mail/pricing&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;free secure email account from Proton Mail here&lt;/a&gt;.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;&lt;em&gt;We also provide a &lt;a href=&quot;https://protonvpn.com/free-vpn/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;free VPN service&lt;/a&gt; to protect your privacy. Proton Mail and Proton VPN are funded by community contributions. If you would like to support our development efforts, you can &lt;a href=&quot;https://pme.protonblog.tech/support/upgrading-to-new-proton-plan&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;upgrade to a paid plan&lt;/a&gt;. Thank you for your support.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;



&lt;p&gt;***&lt;/p&gt;



&lt;p&gt;Feel free to share your feedback and questions with us via our official social media channels on &lt;a href=&quot;https://twitter.com/ProtonMail&quot;&gt;Twitter&lt;/a&gt; and &lt;a href=&quot;https://www.reddit.com/r/ProtonMail/&quot;&gt;Reddit&lt;/a&gt;. &lt;/p&gt;
</content:encoded><category>Privacy guides</category><author>Richie Koch</author></item><item><title>How to know if your phone is hacked — and what to do next</title><link>https://proton.me/blog/how-to-know-if-your-phone-is-hacked</link><guid isPermaLink="true">https://proton.me/blog/how-to-know-if-your-phone-is-hacked</guid><description>Your phone can be hacked just like your computer, but how can you tell? Find out how to know if your phone is compromised.</description><pubDate>Tue, 03 Mar 2026 11:24:37 GMT</pubDate><content:encoded>
&lt;p&gt;You probably know your computer can be hacked, but did you know your phone can be, too?&lt;/p&gt;



&lt;p&gt;Your phone is likely how you text friends and family, make healthcare appointments, shop online, and manage your bank accounts, making it an ideal target for hackers to access your personal data very quickly.&lt;/p&gt;



&lt;p&gt;If your phone is hacked, you&amp;#8217;re vulnerable to &lt;a href=&quot;https://proton.me/blog/identity-theft-protection&quot;&gt;identity fraud&lt;/a&gt; and, potentially, serious financial loss. We&amp;#8217;ll help you understand exactly how your phone can be hacked and what you can do to prevent it.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;How can someone hack your phone?&lt;/h2&gt;



&lt;p&gt;There are several paths hackers can take to target and break into your mobile device.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Public WiFi&lt;/h3&gt;



&lt;p&gt;Connecting to a public WiFi network presents a lot of risks. Hackers can create public hotspots with names that look legitimate in order to trick you into connecting to them. When you connect to a fake hotspot, you may be directed to a landing page and prompted to create an account in order to connect to the internet. Once you&amp;#8217;re connected, hackers will be able to see everything you&amp;#8217;re doing and collect data that may include your email address and passwords in order to access your online accounts. If you connect to public WiFi that isn&amp;#8217;t password protected, hackers can also use man-in-the-middle attacks to insert themselves between your device and the website or app you’re using, intercepting or even altering your data.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;How to protect yourself against public WiFi attacks:&lt;/strong&gt;&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Use a &lt;a href=&quot;https://protonvpn.com/&quot;&gt;secure VPN&lt;/a&gt; to hide your online activity&lt;/li&gt;



&lt;li&gt;Use caution when connecting to public WiFi networks (and consider not doing it)&lt;/li&gt;
&lt;/ul&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Malicious apps&lt;/h3&gt;



&lt;p&gt;Hackers are able to hide malware in apps uploaded to fake app stores or sent to you via phishing emails.If you&amp;#8217;ve accidentally downloaded a malicious app, a hacker can gain access to your phone and your online accounts. They can also find sensitive data about you, and potentially use it to commit identity fraud.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;How to protect yourself against malicious phone apps:&lt;/strong&gt;&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Never click a link or download an app sent to you by someone you don&amp;#8217;t know via email or text&lt;/li&gt;



&lt;li&gt;Only download apps from official app stores&lt;/li&gt;
&lt;/ul&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Phishing scams and malware&lt;/h3&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/blog/what-is-phishing&quot;&gt;Phishing&lt;/a&gt; is a tactic hackers use to trick you into revealing personal data or downloading a malicious app (also known as &lt;a href=&quot;https://protonvpn.com/blog/what-is-malware&quot;&gt;malware&lt;/a&gt;). A hacker can gain access to your phone by &lt;a href=&quot;https://proton.me/support/scam-call-alert&quot;&gt;posing as a customer service agent&lt;/a&gt; or an authority figure and convincing you to hand over login credentials for your accounts. If you download malware from a fake app store or an email sent to you by a hacker, the app can be used to gain access to other apps on your phone.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;How to protect yourself against phishing scams and malware:&lt;/strong&gt;&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Use &lt;a href=&quot;https://proton.me/pass/aliases&quot;&gt;email aliases&lt;/a&gt; to hide your personal email address when you&amp;#8217;re creating new accounts online&lt;/li&gt;



&lt;li&gt;Switch off email aliases and create new ones if you start to receive spam emails&lt;/li&gt;



&lt;li&gt;Never give out your personal information via email, phone call, or text unless you&amp;#8217;ve verified that you&amp;#8217;re speaking to a legitimate governmental or business representative. They&amp;#8217;ll never ask you for your password, so never give that out.&lt;/li&gt;
&lt;/ul&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;SIM-swapping&lt;/h3&gt;



&lt;p&gt;A &lt;a href=&quot;https://proton.me/blog/types-of-identity-theft&quot;&gt;SIM-swap&lt;/a&gt; attack is a type of identity theft that hackers can use to convince your mobile carrier to switch your phone service over to a new SIM card in their possession. They can then perform an account takeover, gaining access to your &lt;a href=&quot;https://proton.me/blog/what-can-someone-do-with-your-phone-number&quot;&gt;phone number&lt;/a&gt; and all the apps you use on your phone.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;How to protect yourself against SIM-swapping attacks:&lt;/strong&gt;&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Don&amp;#8217;t share personal information such as your phone number online&lt;/li&gt;



&lt;li&gt;Create &lt;a href=&quot;https://proton.me/pass/password-generator&quot;&gt;strong passwords&lt;/a&gt; for all of your online accounts&lt;/li&gt;



&lt;li&gt;Use &lt;a href=&quot;https://proton.me/blog/what-is-two-factor-authentication-2fa&quot;&gt;two-factor authentication (2FA)&lt;/a&gt; to create extra protection for your accounts&lt;/li&gt;
&lt;/ul&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Surveillance&lt;/h3&gt;



&lt;p&gt;In more extreme cases, software such as &lt;a href=&quot;https://www.amnesty.org.uk/latest/bahrain-devices-three-activists-hacked-notorious-pegasus-spyware-new-investigation/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Pegasus spyware&lt;/a&gt; can be sold to governments for surveillance purposes. This type of spyware can be deployed without the device owner taking any action, granting full access to all of the apps and data stored on the device as well as the camera and microphone. According to an investigation conducted by the Forbidden Stories consortium and Amnesty International, Pegasus spyware has been used against &amp;#8220;at least 180 journalists [&amp;#8230;] in countries like India, Mexico, Hungary, Morocco and France, among others.&amp;#8221; This type of hack is more likely to affect high-profile or politically sensitive workers, so it isn&amp;#8217;t common.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;How to protect yourself against government surveillance:&lt;/strong&gt;&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Consider extra safety precautions if you&amp;#8217;re a politically exposed person such as &lt;a href=&quot;https://proton.me/support/proton-sentinel&quot;&gt;high security programs&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;Consider using a &lt;a href=&quot;https://www.youtube.com/watch?v=7iaAgup85gk&quot;&gt;dumb phone&lt;/a&gt; if you&amp;#8217;re traveling&lt;/li&gt;



&lt;li&gt;If you have a phone that connects to the internet, use a &lt;a href=&quot;https://protonvpn.com/blog/why-use-vpn-mobile&quot;&gt;VPN&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;How to check if your phone has been hacked&lt;/h2&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Check your phone&amp;#8217;s battery life&lt;/h3&gt;



&lt;p&gt;If the battery level on your phone suddenly decreases much faster than usual, this is a very common sign that your phone has been hacked. This is caused by malware running on your phone so that hackers can collect your data, and potentially even activate your phone&amp;#8217;s microphone or camera remotely.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Check your signal&lt;/h3&gt;



&lt;p&gt;If your phone is suddenly unable to connect to your mobile carrier, make phone calls, or send texts for no reason, you may have been affected by a SIM-swapping attack. If you don&amp;#8217;t move quickly, hackers will be able to access everything on your phone and you may be locked out of your accounts or see fraudulent transactions being made from your bank account. Contact your service provider to make sure that there are no issues with your network, and if there aren&amp;#8217;t then you&amp;#8217;ll need to confirm with your provider that you&amp;#8217;ve been affected by a SIM swap attack.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Check your phone for unusual behavior&lt;/h3&gt;



&lt;p&gt;Unusual behavior may look like your phone crashing or restarting unexpectedly. You may see random pop-ups or ads that you haven&amp;#8217;t seen before, as well as strange activity such as your phone taking a long time to load or the battery suddenly overheating. You may receive security alerts you haven&amp;#8217;t seen before that hackers have generated, or you might start receiving a high volume of spam or phishing emails. If your phone starts acting suspiciously, you may have been hacked.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Check your settings and data usage&lt;/h3&gt;



&lt;p&gt;If the settings on your phone suddenly change without warning, for instance camera and microphone access for apps or two-factor authentication being switched off for your accounts, your phone could have been hacked. If you&amp;#8217;re unsure of the settings you should use for your apps, look for &lt;a href=&quot;https://proton.me/blog/turn-off-gemini-gmail&quot;&gt;handy app guides&lt;/a&gt; online about exactly what the apps on your phone can do and what they have access to.&lt;/p&gt;



&lt;p&gt;You should also check for any unusual spikes in data usage on your phone. This could be a sign that your device has downloaded new apps or malware without your permission, or that it&amp;#8217;s downloaded a large amount of data.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Check your phone for apps you don&amp;#8217;t recognize&lt;/h3&gt;



&lt;p&gt;Go through your phone&amp;#8217;s library to make sure that there aren&amp;#8217;t any apps you didn&amp;#8217;t download. If you spot an app you aren&amp;#8217;t sure about, check online to see if it could have come preinstalled on your phone. Make sure that you know the purpose of every app on your phone, and if you can&amp;#8217;t be sure, you can perform a hard reset to restore your phone to factory settings.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What to do if your phone was hacked&lt;/h2&gt;



&lt;p&gt;Here&amp;#8217;s a step-by-step guide for what to do if you know that your phone has been hacked.&lt;/p&gt;



&lt;ol class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Back up your photos, files, and contacts&lt;/strong&gt;. If there&amp;#8217;s anything on your device that you want to save, make sure you back it up to &lt;a href=&quot;https://proton.me/drive&quot;&gt;secure cloud storage&lt;/a&gt;.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Reset your phone to factory settings&lt;/strong&gt;. This will get rid of any malware and malicious apps.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Update your OS to the latest version after resetting your phone.&lt;/strong&gt; Updating your phone will protect you from existing vulnerabilities in the device&amp;#8217;s OS that hackers could exploit.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Download apps manually from the official app store.&lt;/strong&gt; Don&amp;#8217;t use automatic backup to restore your apps: you might download malware apps again. Instead, go to your device&amp;#8217;s official app store and don&amp;#8217;t visit any third party app stores.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Change your passwords&lt;/strong&gt;, focusing on sensitive apps such as online banking, email, and cloud storage apps.&lt;/li&gt;
&lt;/ol&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;How to prevent your phone from being hacked&lt;/h2&gt;



&lt;p&gt;Your phone requires a different security approach than your laptop or PC does: it&amp;#8217;s unlikely that you need antivirus protection, but you still need to take care when you&amp;#8217;re downloading apps and where you&amp;#8217;re sharing sensitive data. Thankfully, by taking the following steps you can protect your phone.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Regularly update your operating system and your apps&lt;/strong&gt;: One of the most important tools in your arsenal is simply regularly updating your phone and everything on it. Hackers exploit weaknesses in older versions of device operating systems and apps, so regular updates help you ensure that you&amp;#8217;re protecting yourself from known vulnerabilities.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Only download official apps&lt;/strong&gt;: When you&amp;#8217;re looking for apps, make sure you&amp;#8217;re visiting the official app store for your device e.g., Apple&amp;#8217;s App Store or the Google Play Store. Unregulated third-party app stores may allow hackers to upload malware, so it isn&amp;#8217;t worth using them.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Use a VPN&lt;/strong&gt;: A VPN will hide your online activity, making it much harder for a hacker to intercept your phone. You&amp;#8217;re less vulnerable to being spied on when you&amp;#8217;re connected to a &lt;a href=&quot;https://protonvpn.com/&quot;&gt;secure VPN&lt;/a&gt;, even if you&amp;#8217;re connected to public Wi-Fi. Proton VPN protects your privacy and keeps no logs of what you do online, meaning what you do online on your phone is hidden from hackers, advertisers, and governments.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Don&amp;#8217;t ever give out your login credentials&lt;/strong&gt;: No customer service agent or representative for a company or governmental agency will ever ask you for your login credentials. If you&amp;#8217;re asked to give your email address or password on the phone, or via email or text, it&amp;#8217;s highly likely that you&amp;#8217;re being targeted by a scammer. If you need to share your passwords securely with a family member or a friend, it&amp;#8217;s possible to do this safely with a &lt;a href=&quot;https://proton.me/pass&quot;&gt;password manager&lt;/a&gt;, but you should never give your login credentials to anyone you don&amp;#8217;t know.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Use a password manager&lt;/strong&gt;: As mentioned above, a password manager will help you share passwords securely if you need to. Securing your accounts is easy with the right tool: Proton Pass protects your passwords, keeping them in a single, secure location for you to access when you need, instead of spreading them across insecure locations such as written notes or documents. All of the passwords to your banking apps, your government services, your online shopping accounts, and more can be easily stored, autofilled, and even securely shared with family and friends if necessary.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Use two-factor authentication&lt;/strong&gt;: &lt;a href=&quot;https://proton.me/blog/what-is-two-factor-authentication-2fa&quot;&gt;Two-factor authentication (2FA)&lt;/a&gt; creates an extra way to verify your identity when you log into one of your online accounts. As well as a password, you can use a &lt;a href=&quot;https://proton.me/blog/what-is-biometric-data&quot;&gt;biometric login&lt;/a&gt;, a single-use code generated by a &lt;a href=&quot;https://proton.me/authenticator&quot;&gt;secure authenticator app&lt;/a&gt;, or a security key. There are many ways you can make it harder for a hacker to access your account, and it&amp;#8217;s worth activating 2FA for as many of your accounts as you can.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Ensure your phone stays safe in the future&lt;/h2&gt;



&lt;p&gt;Choosing the right tools is half the battle when it comes to keeping your devices safe. With so many malicious apps and phishing scams online, how can you stay safe? With a secure &lt;a href=&quot;https://protonvpn.com/&quot;&gt;VPN&lt;/a&gt; and &lt;a href=&quot;https://proton.me/pass&quot;&gt;password manager&lt;/a&gt;, you can protect your sensitive data, your devices, and your online life, no matter your level of tech expertise. Proton puts your privacy first and gives you the power to protect yourself from bad actors online.&lt;/p&gt;
</content:encoded><category>Privacy guides</category><author>Kate Menzies</author></item><item><title>Are AI toys safe? A major leak exposes troubling privacy gaps</title><link>https://proton.me/blog/ai-toys-safety</link><guid isPermaLink="true">https://proton.me/blog/ai-toys-safety</guid><description>An AI-powered toy left 50,000 children’s chat transcripts exposed. Here’s what the incident reveals about data collection, storage, and the risks for kids.</description><pubDate>Fri, 27 Feb 2026 18:55:56 GMT</pubDate><content:encoded>
&lt;p&gt;AI-powered toys are among the latest tech marketed to families: plushies, robots, and dolls that can talk back, remember details, and interact conversationally with children using large language models.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;But beneath the friendly promotions lie serious safety, privacy, and developmental concerns that have drawn increasing scrutiny from researchers, consumer groups, and child advocates.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Children chat logs exposed&lt;/h2&gt;



&lt;p&gt;A striking example surfaced in January 2026, when security researchers Joseph Thacker and Joel Margolis &lt;a href=&quot;https://josephthacker.com/hacking/2026/01/29/bondu-smart-toy-vulnerability.html&quot;&gt;discovered&lt;/a&gt; that an AI toy called Bondu left more than &lt;a href=&quot;https://www.wired.com/story/an-ai-toy-exposed-50000-logs-of-its-chats-with-kids-to-anyone-with-a-gmail-account/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;50,000 children’s chat transcripts exposed&lt;/a&gt; on a web-based console. By simply logging in with a Gmail account — no special credentials — they accessed entire conversation histories, names, birthdates, family details, and even device information tied to young users.&lt;/p&gt;



&lt;p&gt;That exposure underscores a creepier truth: many AI toys store and process detailed data about children to provide context back to language models like GPT-5 and Gemini. The richer the dataset, the more sensitive the information. Yet infrastructure security, access controls, and data minimization are often afterthoughts in product design.&lt;/p&gt;



&lt;p&gt;Beyond privacy flaws, other incidents reveal tangible psychological risks. Investigations have found some AI toys capable of offering instructions on dangerous items, discussing explicit content, or &lt;a href=&quot;https://komonews.com/news/consumer/ai-chatbot-toy-holiday-shopping-for-kids-labubu-lafufu-unsafe-toys-how-to-spot-hidden-risks-that-could-harm-your-child-consumer-awareness&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;generating unsafe replies during testing&lt;/a&gt;. Advocacy groups like &lt;a href=&quot;https://fairplayforkids.org/pf/aitoyadvisory&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Fairplay for Kids&lt;/a&gt; and Common Sense Media &lt;a href=&quot;https://www.commonsensemedia.org/press-releases/common-sense-media-warns-against-ai-toy-companions-after-research-reveals-safety-risks&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;warn that these toys can undermine healthy development&lt;/a&gt;, encourage obsessive focus on machines, blur boundaries between real relationships and algorithmic responses, and prey on children’s trust.&lt;/p&gt;



&lt;p&gt;Experts also raise concerns about emotional attachment. AI toys are designed to remember past conversations and present themselves as empathetic companions. Children who naturally trust voices they hear may over-rely on these devices, potentially hindering resilience, social skills, and real world bonding.&lt;/p&gt;



&lt;p&gt;Here’s a look at what’s at stake.&amp;nbsp;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;The privacy and security risks of AI toys&lt;/h2&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Data collection often exceeds what families expect.&lt;/li&gt;



&lt;li&gt;Storage of transcripts, profiles, and preferences creates high-value targets for attackers.&lt;/li&gt;



&lt;li&gt;Poor authentication and API flaws can expose data broadly.&lt;/li&gt;



&lt;li&gt;Third-party AI services may see or process children’s conversational content.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;These risks are not new. Earlier generations of connected toys like &lt;a href=&quot;https://en.wikipedia.org/wiki/2017_CloudPets_data_breach&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;CloudPets and My Friend Cayla suffered major breaches&lt;/a&gt; or were banned for insecurity, but AI integration amplifies them by increasing data volume and personalization.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Psychological and developmental concerns&lt;/h2&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;AI companions can confuse developing social understanding.&lt;br&gt;Exposure to inappropriate or dangerous content is possible even with safeguards.&lt;/li&gt;



&lt;li&gt;Heavy reliance on AI may &lt;a href=&quot;https://fairplayforkids.org/pf/aitoyadvisory&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;crowd out imaginative play critical for growth&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Should you use AI toys at all?&lt;/h2&gt;



&lt;p&gt;Ideally, no.  At least not right now.&lt;/p&gt;



&lt;p&gt;AI toys combine microphones, cloud storage, large language models, and detailed behavioral profiling in products designed for children. At this stage, there is no reliable guarantee that the data collected will remain private, secure, or free from misuse. Security flaws, excessive data retention, and unpredictable AI outputs are still common across the industry.&lt;/p&gt;



&lt;p&gt;If you can avoid introducing an AI-connected toy into your child’s environment, that is the safest option.&lt;/p&gt;



&lt;p&gt;If you decide to use one anyway, here’s how to reduce the risks.&lt;/p&gt;



&lt;p&gt;If you’re a parent, here’s how to limit the risks&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Choose the least connected option.&lt;/strong&gt; Prefer toys that process interactions locally and store minimal data.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Read the privacy policy carefully.&lt;/strong&gt; Look for what is stored, how long it’s retained, and whether conversations are shared with third parties.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Disable unnecessary features.&lt;/strong&gt; Turn off cloud backups, data sharing, and voice recording storage where possible.&lt;br&gt;&lt;strong&gt;Use strong account security.&lt;/strong&gt; Enable two-factor authentication and unique passwords.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Keep devices out of bedrooms.&lt;/strong&gt; Avoid placing internet-connected microphones in private spaces.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Have conversations with your child.&lt;/strong&gt; Make sure they understand the toy is not a real friend and should not replace real relationships.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Consumer advocacy groups have recommended avoiding these products entirely for young children, especially under age five.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;A case for stricter standards&lt;/h2&gt;



&lt;p&gt;AI toys may promise learning and companionship, but current evidence shows multiple layers of risk spanning privacy, security, and child development.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;The Bondu exposure is a vivid reminder that “safety” is about much more than content control. It’s about how systems are built, what they collect, and how they protect the most vulnerable users. As this technology evolves, so must the safeguards designed to keep children truly safe.&lt;/p&gt;



&lt;p&gt;&lt;/p&gt;
</content:encoded><category>Privacy news</category><author>Edward Komenda</author></item><item><title>What 3,000 SMBs revealed about cyber risk in 2026</title><link>https://proton.me/blog/smb-cybersecurity-report</link><guid isPermaLink="true">https://proton.me/blog/smb-cybersecurity-report</guid><description>Proton’s small-business survey upends the “SMBs are unprepared” cliché, showing how leaders are investing in security and why it hasn’t fully worked.</description><pubDate>Thu, 26 Feb 2026 12:23:02 GMT</pubDate><content:encoded>
&lt;p&gt;Startups, family businesses, boutique consulting firms —&amp;nbsp;these are the companies most at risk of cybersecurity attacks. And they know it. So they’ve been taking precautions to stay safe from hackers: adopting tools, tightening policies, and investing in employee training.&lt;/p&gt;



&lt;p&gt;Despite these precautions, nearly one in four SMBs fell victim to cyberattacks in the past 12 months alone.&lt;/p&gt;



&lt;p&gt;These are among the major findings of Proton’s 2026 SMB Cybersecurity Report, a global study that surveyed 3,000 decision-makers at companies with fewer than 250 employees across six key markets: US, UK, Brazil, France, Germany, and Japan.&lt;/p&gt;



&lt;p&gt;Our report offers data and lessons that go beyond the generic &lt;em&gt;and false&lt;/em&gt; “SMBs are unprepared” cliché, showing how leaders are actually investing in cybersecurity and why those investments have failed to protect so many of them.&lt;/p&gt;



&lt;div class=&quot;text-center&quot;&gt;&lt;a class=&quot;btn inline-block rounded-full font-bold btn-small btn-solid-purple&quot; href=&quot;https://proton.me/business/smb-cybersecurity-report&quot;&gt;Download the free report&lt;/a&gt;&lt;/div&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Why we ran this study&lt;/h2&gt;



&lt;p&gt;At Proton, we regularly survey our community to understand how people use technology and where they feel their sensitive data is vulnerable. With these insights, we can develop new products and features or make recommendations to the customers that depend on our &lt;a href=&quot;https://proton.me/business&quot;&gt;encrypted business solutions&lt;/a&gt;. We identified a gap in the research when it comes to SMBs.&lt;/p&gt;



&lt;p&gt;Much of today’s cybersecurity research still assumes an enterprise-level setup, with bigger budgets, in‑house security experts, and a CISO in every meeting. That’s not the reality for most SMBs, where the same person may well be signing off on sales targets, lunch orders, and security policies.&lt;/p&gt;



&lt;p&gt;We commissioned this report to answer a simple question: What is the real-world risk for SMBs, and what measures are they taking to protect themselves?&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Here’s what our report found&lt;/h2&gt;



&lt;p&gt;With such a large-scale survey, we could identify several surprising and sweeping conclusions that were consistent across SMBs in multiple industries and countries.&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Spending is up, but security isn’t:&lt;/strong&gt; Many SMBs have run formal risk assessments, introduced regular audits, and rolled out modern measures like multi-factor authentication and password managers. On paper, they look significantly more mature than the stereotype of the unprotected small business. And yet, many still report serious cyber incidents within the same year — often with financial damage that can wipe out months of investment or even halt operations. Well over 1 million small- and medium-sized businesses suffered a cyberattack last year, taking into account the number of SMBs in the markets we studied.&lt;br&gt;&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Human error can’t be patched:&lt;/strong&gt; People remain one of the biggest vulnerabilities in SMB security. Organizations are not ignoring this; most invest in security awareness training and phishing education. But many businesses also acknowledge that confidence in employees’ ability to spot and avoid every threat is limited. Credential sharing tells this story clearly. Even in companies that have rolled out password managers, logins still circulate via email, messaging apps, shared documents, calls, and written notes.&lt;br&gt;&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Cloud and AI has expanded the attack surface:&lt;/strong&gt; Almost all of the businesses we surveyed now rely on major cloud providers for core operations, and many have started to integrate AI tools into their workflows. What stands out is the gap between dependency and confidence. Businesses frequently assume that being on a large platform means their data is automatically safe, even when they can’t clearly explain where it is stored, how it is encrypted, or who can access it.&lt;br&gt;&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Security is now a selling point:&lt;/strong&gt; A clear majority of SMBs say that demonstrating strong data protection has become critical for winning new business, and only a small fraction say clients never ask about security. It’s no wonder. When businesses are attacked, the damage isn’t limited to the business that suffered the breach. It cascades outward. Your partners’ data can be exposed, their operations disrupted, their reputation tarnished, and their own customers put at risk.&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Get the full report&lt;/h2&gt;



&lt;p&gt;Proton gives people and organizations meaningful control over their data through end‑to‑end encryption, open standards, privacy-first Swiss jurisdiction, and a business model that doesn’t depend on exploiting user information.&lt;/p&gt;



&lt;p&gt;With the SMB Cybersecurity Report 2026, we’re extending that same philosophy to the way smaller organizations understand their risk.​ For small business leaders, the report provides a practical benchmark. &lt;strong&gt;The report includes four key insights and five actionable recommendations for your SMB.&lt;/strong&gt; You’ll gain clues into whether your security posture is as strong as you think it is, where it needs reinforcing, and what to prioritize next.&lt;/p&gt;



&lt;p&gt;You can explore the full findings, including regional trends, sector differences, and concrete recommendations, in the complete SMB Cybersecurity Report 2026.&lt;/p&gt;



&lt;div class=&quot;text-center&quot;&gt;&lt;a class=&quot;btn inline-block rounded-full font-bold btn-small btn-solid-purple&quot; href=&quot;https://proton.me/business/smb-cybersecurity-report&quot;&gt;Download the free report&lt;/a&gt;&lt;/div&gt;
</content:encoded><category>For business</category><author>Raphael Auphan</author></item></channel></rss>