Proton
small-business-employees-IT-security

In a previous infographic, we showed that small businesses are prime targets for hackers. One reason is that small businesses often have less capacity to train their employees on IT security. This makes them the perfect target for phishing attacks.

One report even found that most employees were not sure they could spot a phishing email or a spoofed website if they saw one. That leaves your company’s sensitive data vulnerable to theft and ransomware attacks, which threaten to delete your data if you don’t pay the hackers.

References

Cyberark(nouvelle fenêtre), Global Advanced Threat Landscape Report(nouvelle fenêtre), 2018

Symantec, Internet Security Threat Report(nouvelle fenêtre), 2019

Symantec, Internet Security Threat Report(nouvelle fenêtre), 2017

Verizon, 2018 Data Breach Investigations Report, 11th edition(nouvelle fenêtre), 2018

Best regards,

The Proton Mail Team

Articles similaires

en
  • Guides vie privée
If you use multiple Google accounts and want to learn how to change your default Google account once and for all, this guide will help.
A person and a shield on a computer screen, suggesting how Proton parents guide their kids on online privacy
en
See how Proton parents guide their kids on online privacy to raise critical thinkers in a world built for surveillance and manipulation.
A photo icon and synchronization symbol overlaying a cloud, representing automatic photo backup to the cloud
en
See how to back up photos while protecting your privacy using encrypted cloud storage that shields you from scanning, tracking, and profiling.
Learn the best professional email sign-offs, common mistakes to avoid, and real-world examples.
en
Struggling with how to end an email? Learn about the best professional email sign-offs, common mistakes to avoid, and real-world examples.
A phone screen with a speech bubble with a phone number in it
en
Your email address and passwords aren't the only information hackers can use to scam you. Here's what someone can do with your phone number — and how to protect it.
A web application screen with an unlock icon in the bottom right corner
en
Your best defense against a data breach could be improving your web application security: Find out how Proton Pass can help.