Proton

Latest articles

How to protect your business files from AI security threats
en
A survey found businesses inadvertently exposed 3 million sensitive documents this year alone. Learn how to keep your organization's files safe.
The Microsoft Copilot logo and an off switch, representing a step-by-step guide for how to turn off Copilot
en
Find out how to disable Copilot AI on Windows, limit Microsoft’s data collection, and protect your privacy and security from AI training.
en
Join Proton’s 2025 Lifetime Fundraiser and help decide which organizations receive grants supporting privacy, free speech, and human rights.
Inbox detox: How to reclaim your email before Black Friday
en
The average adult receives 80 emails a day, and roughly half of that is spam. Learn how to take control of your inbox before Black Friday makes this even worse.
the Proton Pass logo with a shield icon at the top right corner
en
Following a report about clickjacking at DEF CON 33, we addressed a vulnerability in Proton Pass: Find out more
A computer screen and keyboard with a chain going across the screen, a lock in the centre of it, and a bag with a dollar icon on the bottom right corner
en
Ransomware groups are avoiding large organizations and targeting SMBs for smaller payments instead: Find out how to protect your business
Network security management
en
Network security tools protect your organization’s data, systems, and users from cyber threats. We look at the best solutions for protecting your business.
Pour aider à protéger notre patrimoine culturel, les abonnements Proton Pass Professional sont offerts gratuitement pendant deux ans aux organisations éligibles. En savoir plus.
Meta targets you with scam ads
en
Meta is knowingly targeting you with scams and counterfeit goods ads. Turning off personalized ads is a small but meaningful pushback against this.
The Windows Recall logo and an off switch, representing a step-by-step guide for how to disable Windows Recall
en
Find out how to disable Microsoft Recall on Windows 11, stop it from taking snapshots of your PC activity, and why it raises privacy concerns.
An image showing a computer screen with a key icon at the top left side, with a mobile phone to the right
en
Your business needs BYOD security solutions to help workers protect your critical business data, no matter where they're working from