Proton
small-business-employees-IT-security

In a previous infographic, we showed that small businesses are prime targets for hackers. One reason is that small businesses often have less capacity to train their employees on IT security. This makes them the perfect target for phishing attacks.

One report even found that most employees were not sure they could spot a phishing email or a spoofed website if they saw one. That leaves your company’s sensitive data vulnerable to theft and ransomware attacks, which threaten to delete your data if you don’t pay the hackers.

References

Cyberark(nouvelle fenêtre), Global Advanced Threat Landscape Report(nouvelle fenêtre), 2018

Symantec, Internet Security Threat Report(nouvelle fenêtre), 2019

Symantec, Internet Security Threat Report(nouvelle fenêtre), 2017

Verizon, 2018 Data Breach Investigations Report, 11th edition(nouvelle fenêtre), 2018

Best regards,

The Proton Mail Team

Articles similaires

Proton Lifetime Fundraiser 7th edition
en
Learn how to join our 2024 Lifetime Account Charity Fundraiser, your chance to win our most exclusive plan and fight for a better internet.
The cover image for a Proton Pass blog about zero trust security showing a dial marked 'zero trust' turned all the way to the right
en
Cybersecurity for businesses is harder than ever: find out how zero trust security can prevent data breaches within your business.
How to protect your inbox from an email extractor
en
Learn how an email extractor works, why your email address is valuable, how to protect your inbox, and what to do if your email address is exposed.
How to whitelist an email address and keep important messages in your inbox
en
Find out what email whitelisting is, why it’s useful, how to whitelist email addresses on different platforms, and how Proton Mail can help.
The cover image for Proton blog about cyberthreats businesses will face in 2025, showing a webpage, a mask, and an error message hanging on a fishing hook
en
Thousands of businesses of all sizes were impacted by cybercrime in 2024. Here are the top cybersecurity threats we expect companies to face in 2025—and how Proton Pass can protect your business.
A graphic interpretation of a block of how many gigabytes in a terabyte
en
Learn how many GB are in a TB and discover the best way to securely store and share your files — no matter their size.