Proton

For business

Email archiving is a quick way to stay secure and compliant
en
  • For business
Archiving email with Proton can boost security, make employees more efficient, ensure your business is legally compliant, and prevent data breaches.
An open letter and a torn document, representing a termination letter template
en
  • For business
Learn how to write a termination letter with our step-by-step guide and use our 8 free, ready-to-edit termination letter templates.
A folder, a user icon, and a shield, representing secure data handling during offboarding
en
  • For business
Learn how to offboard employees and contractors securely — with free ready-to-use offboarding templates you can edit in Proton Docs.
A user icon and a checklist, representing an onboarding checklist
en
  • For business
Make onboarding smoother with 6 free templates for every step, from preboarding to 90-day reviews. Easy to edit and share in Proton Docs.
en
  • For business
One in five law firms reported a cyberattack in the past year. These are the key tools and strategies that can help protect your firm from costly breaches.
A document icon with a briefcase, representing a job description template
en
  • For business
A step-by-step guide with easy tips and examples for writing a job description + 10 free job description templates to edit in Proton Docs.
An envelope icon with a document inside and a small briefcase symbol in the corner, representing a job offer letter
en
  • For business
Download our 4 free job offer letter templates and find out how to write an offer letter to hire the best talent. Quick to edit and use.
How to start an email: 15 professional greetings and opening lines
en
  • For business
Learn how to start an email professionally with our top greetings, openers, and formal examples, and find out what to avoid (and why).
Learn the best professional email sign-offs, common mistakes to avoid, and real-world examples.
en
  • For business
Struggling with how to end an email? Learn about the best professional email sign-offs, common mistakes to avoid, and real-world examples.
A phone screen with a speech bubble with a phone number in it
en
  • For business
Your email address and passwords aren't the only information hackers can use to scam you. Here's what someone can do with your phone number — and how to protect it.
A web application screen with an unlock icon in the bottom right corner
en
  • For business
Your best defense against a data breach could be improving your web application security: Find out how Proton Pass can help.