all-in-one privacy solution":["Proton Unlimited is een all-in-one privacy-oplossing"],"Black Friday":["Black Friday"],"No ads. Privacy by default.":["Geen advertenties. Standaard privacy."],"People before profits":["Mensen vóór winst"],"Security through transparency":["Veiligheid door openheid"],"The best Proton Mail ${ BLACK_FRIDAY } deals":["De beste ${ BLACK_FRIDAY }-deals voor Proton Mail"],"The world’s only community- supported email service":["'s Werelds enige door de community ondersteunde e-mailservice"]},"specialoffer:limited":{"${ hours } hour":["${ hours } uur","${ hours } uur"],"${ hoursLeft }, ${ minutesLeft } and ${ secondsLeft } left":["Nog ${ hoursLeft }, ${ minutesLeft } en ${ secondsLeft } resterend"],"${ minutes } minute":["${ minutes } minuut","${ minutes } minuten"],"${ seconds } second":["${ seconds } seconde","${ seconds } seconden"],"Limited time offer":["Aanbieding beperkt geldig"]},"specialoffer:listitem":{"Create multiple addresses":["Maak meerdere e-mailadressen aan"],"Hide-my-email aliases":["Hide-my-email-aliassen"],"Quickly unsubscribe from newsletters":["Meld u eenvoudig af voor nieuwsbrieven"],"Use your own domain name":["Gebruik uw eigen domeinnaam"]},"specialoffer:logos":{"As featured in":["Zoals te lezen in"]},"specialoffer:metadescription":{"Get an encrypted email that protects your privacy":["Kies voor beveiligde e-mail die uw privacy beschermt"]},"specialoffer:metatitle":{"Proton Mail Black Friday Sale - Up to 40% off":["Proton Mail Black Friday Sale - Tot 40% korting"]},"specialoffer:newmetadescription":{"Get up to 40% off Proton Mail subscriptions this Black Friday. Find great deals on our secure end-to-end encrypted email plans.":["Profiteer tijdens Black Friday van wel 40% korting op Proton Mail-abonnementen. Bekijk geweldige aanbiedingen voor onze veilige, end-to-end versleutelde e-mailabonnementen."]},"specialoffer:newmetatitle":{"Proton Mail Black Friday sale | Up to 40% off secure email":["Proton Mail Black Friday Sale | Tot 40% korting op veilige e-mail"]},"specialoffer:note":{"* Billed at ${ TOTAL_SUM } for the first year":["*U betaalt ${ TOTAL_SUM } voor het eerste jaar"],"*Billed at ${ TOTAL_SUM } for the first 2 years":["*U betaalt ${ TOTAL_SUM } voor de eerste 2 jaar"],"30-day money-back guarantee":["30 dagen niet-goed-geld-terug-garantie"],"Billed at ${ TOTAL_SUM } for the first 2 years":["U betaalt ${ TOTAL_SUM } voor de eerste 2 jaar"],"Billed at ${ TOTAL_SUM } for the first year":["U betaalt ${ TOTAL_SUM } voor het eerste jaar"],"You save ${ SAVE_SUM }":["U bespaart ${ SAVE_SUM }"]},"specialoffer:off":{"${ DISCOUNT } off":["−${ DISCOUNT }"],"${ PERCENT_OFF } off":["−${ PERCENT_OFF }"]},"specialoffer:testimonial":{"I love my ProtonMail":["Ik ben fan van ProtonMail"],"My favorite email service":["Mijn favoriete e-mailservice"],"Thanks Proton for keeping us all safe in the complicated internet universe.":["Proton houdt ons allemaal veilig in het complexe internetuniversum."],"You get what you pay for. In the case of big tech, if you pay nothing, you get used. I quit using Gmail and switched to @ProtonMail":["Je krijgt waarvoor je betaalt. In het geval van Big Tech betekent 'gratis' dat je wordt gebruikt. Ik ben gestopt met Gmail en overgestapt op @ProtonMail"]},"specialoffer:time":{"Days":["Dagen"],"Hours":["Uur"],"Min":["Min"]},"specialoffer:title":{"And much more":["En nog veel meer"],"Make your inbox yours":["Personaliseer uw inbox"],"Safe from trackers":["Beschermd tegen trackers"],"Stay organized":["Houd overzicht"],"Black Friday email deals":["Black Friday-deals voor e-mail"],"Don’t just take our word for it":["U hoeft ons niet te geloven"],"Our story":["Ons verhaal"],"Transfer your data from Google in one click":["Zet uw gegevens van Google over met één klik"]},"specialoffer:tooltip":{"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, connect up to 10 devices, access worldwide streaming services, malware and ad-blocker, and more.":["Bekijk geblokkeerde inhoud en surf privé. Met ${ TOTAL_SERVERS } servers in meer dan ${ TOTAL_COUNTRIES } landen, verbinding met maximaal 10 apparaten, wereldwijd toegang tot streamingdiensten, malware- en advertentieblokkering, en meer."],"Easily share your calendar with your family, friends or colleagues, and view external calendars.":["Deel uw agenda eenvoudig met uw familie, vrienden of collega's, en bekijk externe agenda's."],"Includes support for 1 custom email domain, 10 email addresses, 10 hide-my-email aliases, calendar sharing, and more.":["Ondersteuning voor 1 aangepast e-maildomein, 10 e-mailadressen, 10 hide-my-email-aliassen, gedeelde agenda's en meer."],"Includes support for 3 custom email domains, 15 email addresses, unlimited hide-my-email aliases, calendar sharing, and more.":["Ondersteuning voor 3 aangepaste e-maildomeinen, 15 e-mailadressen, onbeperkt hide-my-email-aliassen, gedeelde agenda's en meer."],"Manage up to 25 calendars, mobile apps, secured with end-to-end encryption, 1-click calendar import from Google, and more.":["Beheer tot 25 agenda's, mobiele apps, beveiligd met end-to-end versleuteling, agenda's van Google importeren met 1 klik, en meer."]},"Status Banner":{"At the moment we are experiencing issues with the Proton VPN service":["Momenteel werkt de dienst van Proton VPN niet naar behoren"],"Learn more":["Meer informatie"]},"Status banner":{"Learn more":["Meer informatie"],"Please note that at the moment we are experiencing issues with the ${ issues[0] } service.":["We ondervinden op dit moment problemen met de ${ issues[0] }service."],"We are experiencing issues with one or more services at the moment.":["We ondervinden momenteel problemen met een of meer services."]},"suggestions":{"Suggestions":["Suggesties"]},"Support":{"Sub category":["Subcategorie","Subcategorieën"]},"Support article":{"${ readingTime } min":["${ readingTime } min","${ readingTime } min"],"Category":["Categorie","Categorieën"],"Didn’t find what you were looking for?":["Niet gevonden wat u zocht?"],"General contact":["Algemene contactgegevens"],"Get help":["Krijg hulp"],"Legal contact":["Contactgegevens voor juridische zaken"],"Media contact":["Contactgegevens voor media"],"Partnerships contact":["Contactgegevens voor partnerschappen"],"Reading":["Lezen"]},"Support categories":{"Browse Proton product support":["Zoeken in Proton-productondersteuning"]},"Support category":{"There is no article in this category yet.":["Er zijn nog geen artikelen in deze categorie."]},"Support troubleshooting":{"--- Select ---":["--- Selecteren ---"],"App version":["App-versie"],"Browser":["Browser"],"Check if this helps":["Kijk of dit helpt"],"Choose a category for your question":["Kies een categorie voor uw vraag"],"Choose a product":["Kies een product"],"Did this solve your issue ?":["Heeft dit uw probleem opgelost?"],"Faster assistance is just a few clicks away — please make your selections":["Snellere ondersteuning binnen een paar klikken — maak uw keuze"],"No, contact support":["Nee, contact opnemen met ondersteuning"],"Proton account":["Proton-account"],"Proton Bridge":["Proton Bridge"],"Proton Calendar":["Proton Calendar"],"Proton Drive":["Proton Drive"],"Proton for Business":["Proton for Business"],"Proton Mail":["Proton Mail"],"Proton Pass":["Proton Pass"],"Proton VPN":["Proton VPN"],"Thank you for your feedback":["Bedankt voor uw feedback"],"Troubleshooting":["Probleemoplossing"],"What can we help with ?":["Waar mogen we u bij helpen?"],"Yes":["Ja"]},"support_modal_search_query":{"Search query":["Zoekopdracht"]},"support_search_button":{"Search":["Zoeken"]},"support_search_i_am_looking_for":{"I'm looking for":["Ik ben op zoek naar"]},"SupportForm":{"For a faster resolution, please report the issue from the Bridge app: Help > Report a problem.":["Om problemen sneller op te lossen, meldt u het via de Bridge-app: Help > Een probleem melden."],"Information":["Informatie"]},"SupportForm:option":{"Account Security":["Accountbeveiliging"],"Contacts":["Contactpersonen"],"Custom email domain":["Aangepast e-maildomein"],"Email delivery and Spam":["E-maillevering en spam"],"Encryption":["Versleuteling"],"Login and password":["Inlognaam en wachtwoord"],"Merge aliases and accounts":["Aliassen en accounts samenvoegen"],"Migrate to Proton":["Migreren naar Proton"],"Notifications":["Meldingen"],"Other":["Overig"],"Plans and billing":["Abonnementen en facturering"],"Proton for Business":["Proton for Business"],"Sign up":["Inschrijven"],"Storage":["Opslag"],"Users, addresses, and identities":["Gebruikers, adressen en identiteiten"]},"SupportForm:optionIntro":{"Select a topic":["Kies een onderwerp"]},"swiss_baseed_feature":{"Swiss based":["Gevestigd in Zwitserland"]},"Testimonial":{"Awards":["Awards"],"Customers":["Klanten"],"Featured":["Featured"],"Go to testimonial source":["Naar bron van testimonial"],"Reviews":["Reviews"],"Videos":["Video's"]},"Text":{"Find the plan that's right for you":["Vind het abonnement dat bij u past"],"If you need help, check out our ${ supportLink }.":["Bekijk onze ${ supportLink } als u hulp nodig hebt."],"The page you’re looking for might have been removed, or it could be an\nold link.":["De pagina waarnaar u op zoek bent, is mogelijk verwijderd, of u gebruikt een oude koppeling."]},"Title":{"On this page":["Op deze pagina"],"Related articles":["Gerelateerde artikelen"],"Share ${ thisPage }":["${ thisPage } delen"],"Thank you!":["Bedankt!"],"this page":["deze pagina"]},"Tooltip":{"More information":["Meer informatie"]},"tooltip_calendar":{"Create up to 20 custom & shareable encrypted calendars. On top of that, add up to 5 calendars from friends, family, colleagues, and organizations.":["Maak tot 20 aangepaste en deelbare versleutelde agenda's aan. Voeg daar bovenop tot 5 agenda's toe van vrienden, familie, collega's en organisaties."]},"tooltip_vpn":{"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, highest VPN speed, ${ TOTAL_VPN_CONNECTIONS } VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Bekijk geblokkeerde inhoud en surf privé. Met meer dan ${ TOTAL_SERVERS } servers in meer dan ${ TOTAL_COUNTRIES } landen, de hoogste VPN-snelheid, ${ TOTAL_VPN_CONNECTIONS } VPN-verbindingen, wereldwijde streamingdiensten, malware- en advertentieblokkering, en meer."],"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, highest VPN speed, 10 VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Bekijk geblokkeerde inhoud en surf privé. Met meer dan ${ TOTAL_SERVERS } servers in meer dan ${ TOTAL_COUNTRIES } landen, de hoogste VPN-snelheid, 10 VPN-verbindingen, wereldwijde streamingdiensten, malware- en advertentieblokkering, en meer."]},"version_history_label":{"Version history":["Versiegeschiedenis"]},"version_history_tooltip":{"Store up to ${ versionHistoryNumber } versions of each file for up to ${ years } years":["Bewaar tot ${ versionHistoryNumber } versies van elk bestand tot wel ${ years } jaar"]},"vpn_features_link":{"View VPN plans":["VPN-abonnementen bekijken"]},"vpn_features_useCase":{"Access blocked content and browse privately":["Bekijk geblokkeerde inhoud en surf privé"]}}},"unleashApi":"https://account.proton.me/api"};
// We need to import data (the framework context) from the server
// This Astro feature with define:vars works well but creates an inline script
// So we can't directly import the initFramework helper, we have to store the context
window.frameworkContext = frameworkContext;
})();
How your business can prevent 6 types of cybercrime | Proton
Malware and social engineering are the top two types of cybercrime methods businesses have to face. Here’s how to prevent these attacks from hurting your business.
Each quarter, the security firm Positive Technologies releases statistics on the most common types of cybercrime based on their internal data. The numbers(new window) from the fourth quarter of 2018 shed light on the illegal market for business data and fraud.
The six most common cybercrime attack methods against businesses are use of malware (including ransomware), social engineering, hacking (mainly attacks on servers or blockchains), web attacks (a subset of the hacking category involving injecting websites with malicious code), credential compromise, and distributed denial of service (DDoS).
We’ll use this list as a starting point to talk about prevention strategies. (Note: the total adds up to greater than 100% because of attacks that involve more than one type.)
1. Malware
Over half (55%) of all types of cybercrime involve malware, according to the report. These attacks include spyware and remote administration malware, which give attackers a back seat to everything you do on your device. From there, they can gain login credentials, sensitive business data, or information to help them conduct social engineering attacks. The third most popular kind of malware attack is the dreaded ransomware, which typically locks your device or takes your data hostage until you pay the hacker to release it.
How to prevent malware attacks:
Make sure your operating systems, applications, and plugins are running on the latest versions.
2. Social engineering
Social engineering attacks (31%) don’t rely on technical sophistication so much as trust. Because they prey on human vulnerabilities(new window) instead of technological ones, this type of cybercrime is especially difficult to guard against. Types of social engineering attacks include phishing(new window) and more elaborate physical schemes. For example, an attacker might leave an infected USB near the entryway to your office building in the hopes that an employee will insert it into their computer.
Never click on links or download attachments in emails you weren’t expecting. If a trusted brand asks you to reset your password, do not click the link provided in the email. Better to navigate manually to the website and log in there.
Beware of cold calls, cold emails, unexpected office visitors, and lost USB sticks.
Limit the amount of information you provide on your company’s website, and discourage employees from listing their contact information on the Internet if possible.
In Proton Mail there are extra anti-phishing protections. For instance, all emails from Proton Mail have an Official badge; emails claiming to be from us without this badge are phishing attacks. Additionally, sender spoofing (in which the attacker manipulates the From address) is not possible in emails between Proton Mail accounts.
Typically the term hacking encompasses a wide variety of attacks. Positive Technologies defines it more narrowly in its report: “attacks that take advantage of vulnerabilities in software and services, weaknesses in protection mechanisms, and other shortcomings of targeted systems that do not involve social engineering or malware.” Examples include server-based attacks or the manipulation of blockchain-based services. One-fifth of the cyber crimes involved hacking.
How to prevent hacking:
Use only trusted services with a reputation for strong security. This includes your web hosting provider, cloud services, and IT contractors.
Put monitoring and accountability mechanisms in place for your employees to discourage insider attacks, including strict physical and digital access controls.
Make sure all software is up to date.
Invest in automated tools and security audits.
Encrypt all data.
4. Web attacks
Web attacks represent another fifth of cybercrimes against businesses. These attacks exploit vulnerabilities in websites to access the data of other users of the sites. For example, hackers might inject malicious code into an e-commerce website that allows them to steal customers’ credit card information.
How to prevent web attacks:
You can mitigate web attacks by only working with trusted web developers and using reputable third-party services.
5. Credential compromise
Seventeen percent of attacks involved credential compromise, meaning a hacker uses your login information to gain unauthorized access to your accounts. An attacker can learn your credentials in a number of ways: phishing, social engineering, malware (such as keyloggers), or hacking (gaining access to a database of credentials and cracking the passwords).
Only use services that offer two-factor authentication, and ensure your employees have 2FA enabled. That way, if your credentials are compromised, attackers still cannot access your account.
6. Distributed denial of service (DDoS)
Although few businesses will ever find themselves the target of a DDoS attack (2%), these can be extremely costly and disruptive. DDoS attacks flood a network with traffic, overwhelming it and preventing legitimate users or employees from accessing the service. Once the network is effectively shut down, the hackers typically demand a ransom to restore service.
How to prevent DDoS attacks:
Most DDoS attacks require the use of specialized services that use software to identify and divert malicious traffic.
You can mitigate most of these attacks by using trusted service providers that are committed to security. Proton Mail is the world’s largest end-to-end encrypted email service. Developed by CERN and MIT scientists in 2014, over 10 million people and businesses now use Proton Mail to secure their data and protect their privacy. Learn more about Proton Mail for business(new window).
Proton Mail and Proton VPN are funded by community contributions. If you would like to support our development efforts, you can upgrade to a paid plan(new window). Thank you for your support.
Google is one of the biggest obstacles to privacy. The Big Tech giant may offer
quick access to information online, but it also controls vast amounts of your
personal or business data.
Recently, more people are becoming aware of the actual price you
If you’re a United States citizen or permanent resident, you have a Social
Security number (SSN). This number is the linchpin of much of your existence,
linked to everything from your tax records to your credit cards. Theft is a
massive problem, whic
Compromised passwords are a common issue and probably one of the biggest
cybersecurity threats for regular people. How do passwords get compromised, and
is there anything you can do to prevent it?
* What does compromised password mean?
* How do pa
WeTransfer is a popular service used by millions worldwide to send large files.
You may have wondered if it’s safe or whether you should use it to share
sensitive files. We answer these questions below and present a WeTransfer
alternative that may su
Dictionary attacks are a common method hackers use to try to crack passwords and
break into online accounts.
While these attacks may be effective against people with poor account security,
it’s extremely easy to protect yourself against them by usi
Data breaches are increasingly common. Whenever you sign up for an online
service, you provide it with personal information that’s valuable to hackers,
such as email addresses, passwords, phone numbers, and more. Unfortunately, many
online services f