all-in-one privacy solution":["O Proton Unlimited é uma solução única de privacidade"],"Black Friday":["Black Friday"],"No ads. Privacy by default.":["Sem anúncios. Privacidade por padrão."],"People before profits":["Pessoas acima do lucro"],"Security through transparency":["Segurança por meio da transparência"],"The best Proton Mail ${ BLACK_FRIDAY } deals":["As melhores ofertas de ${ BLACK_FRIDAY } do Proton Mail"],"The world’s only community- supported email service":["O único serviço de e-mail do mundo apoiado pela comunidade"]},"specialoffer:limited":{"${ hours } hour":["${ hours } hora","${ hours } horas"],"${ hoursLeft }, ${ minutesLeft } and ${ secondsLeft } left":["${ hoursLeft }, ${ minutesLeft }, e ${ secondsLeft } restantes"],"${ minutes } minute":["${ minutes } minuto","${ minutes } minutos"],"${ seconds } second":["${ seconds } segundo","${ seconds } segundos"],"Limited time offer":["Oferta por tempo limitado"]},"specialoffer:listitem":{"Create multiple addresses":["Crie vários endereços"],"Hide-my-email aliases":["Use aliases do hide-my-email"],"Quickly unsubscribe from newsletters":["Cancele a assinatura de newsletters rapidamente"],"Use your own domain name":["Use seu próprio nome de domínio"]},"specialoffer:logos":{"As featured in":["Destaques"]},"specialoffer:metadescription":{"Get an encrypted email that protects your privacy":["Obtenha um e-mail criptografado que proteja sua privacidade"]},"specialoffer:metatitle":{"Proton Mail Black Friday Sale - Up to 40% off":["Oferta de Black Friday do Proton Mail - Até 40% de desconto"]},"specialoffer:newmetadescription":{"Get up to 40% off Proton Mail subscriptions this Black Friday. Find great deals on our secure end-to-end encrypted email plans.":["Obtenha até 40% de desconto nas assinaturas do Proton Mail nesta Black Friday. Confira ótimas ofertas em nossos planos de e-mail seguro com criptografia de ponta a ponta."]},"specialoffer:newmetatitle":{"Proton Mail Black Friday sale | Up to 40% off secure email":["Oferta de Black Friday do Proton Mail - Até 40% de desconto no e-mail protegido"]},"specialoffer:note":{"* Billed at ${ TOTAL_SUM } for the first year":["* Com o preço de ${ TOTAL_SUM } no primeiro ano"],"*Billed at ${ TOTAL_SUM } for the first 2 years":["*Com o preço de ${ TOTAL_SUM } nos primeiros dois anos"],"30-day money-back guarantee":["Garantia de reembolso de 30 dias"],"Billed at ${ TOTAL_SUM } for the first 2 years":["Com o preço de ${ TOTAL_SUM } nos primeiros dois anos"],"Billed at ${ TOTAL_SUM } for the first year":["Com o preço de ${ TOTAL_SUM } no primeiro ano"],"You save ${ SAVE_SUM }":["Economize ${ SAVE_SUM }"]},"specialoffer:off":{"${ DISCOUNT } off":["-${ DISCOUNT }"],"${ PERCENT_OFF } off":["-${ PERCENT_OFF }"]},"specialoffer:testimonial":{"I love my ProtonMail":["Adoro ProtonMail"],"My favorite email service":["Meu serviço favorito de e-mail"],"Thanks Proton for keeping us all safe in the complicated internet universe.":["Agradecemos ao Proton por nos manter a salvo no complicado universo da internet."],"You get what you pay for. In the case of big tech, if you pay nothing, you get used. I quit using Gmail and switched to @ProtonMail":["Você recebe pelo que paga. No caso das grandes tecnologias, você se acostuma quando não paga nada. Parei de usar o Gmail e troquei para o @ProtonMail"]},"specialoffer:time":{"Days":["Dias"],"Hours":["Horas"],"Min":["Min"]},"specialoffer:title":{"And much more":["E muito mais"],"Make your inbox yours":["Deixe a caixa de entrada do seu jeito"],"Safe from trackers":["A salvo de rastreadores"],"Stay organized":["Mantenha-se organizado"],"Black Friday email deals":["Ofertas de e-mail da Black Friday"],"Don’t just take our word for it":["Não confie apenas em nossa palavra"],"Our story":["Nossa história"],"Transfer your data from Google in one click":["Transfira seus dados do Google com um clique"]},"specialoffer:tooltip":{"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, connect up to 10 devices, access worldwide streaming services, malware and ad-blocker, and more.":["Acesse conteúdo bloqueado e navegue com privacidade. Inclui ${ TOTAL_SERVERS } servidores em +${ TOTAL_COUNTRIES } países, conecte até 10 dispositivos, acesse serviços de streaming do mundo todo, malware e bloqueador de anúncios e muito mais."],"Easily share your calendar with your family, friends or colleagues, and view external calendars.":["Compartilhe facilmente seus calendários com amigos, familiares ou colegas e visualize calendários externos."],"Includes support for 1 custom email domain, 10 email addresses, 10 hide-my-email aliases, calendar sharing, and more.":["Inclui suporte para 1 domínio de e-mail personalizado, 10 endereços de e-mail, 10 aliases do hide-my-email, compartilhamento de calendário e muito mais."],"Includes support for 3 custom email domains, 15 email addresses, unlimited hide-my-email aliases, calendar sharing, and more.":["Inclui suporte para 3 domínios de e-mail personalizados, 15 endereços de e-mail, aliases ilimitados do hide-my-email, compartilhamento de calendário e muito mais."],"Manage up to 25 calendars, mobile apps, secured with end-to-end encryption, 1-click calendar import from Google, and more.":["Gerencie até 25 calendários, apps para dispositivos móveis, protegidos com criptografia de ponta a ponta, importação de calendário com 1 clique do Google e muito mais."]},"Status Banner":{"At the moment we are experiencing issues with the Proton VPN service":["No momento estamos enfrentando problemas com o serviço Proton VPN"],"Learn more":["Saiba mais"]},"Status banner":{"Learn more":["Saiba mais"],"Please note that at the moment we are experiencing issues with the ${ issues[0] } service.":["No momento, estamos com problemas no serviço ${ issues[0] }."],"We are experiencing issues with one or more services at the moment.":["No momento, estamos com problemas em um ou mais serviços."]},"suggestions":{"Suggestions":["Sugestões"]},"Support":{"Sub category":["Subcategoria","Subcategorias"]},"Support article":{"${ readingTime } min":["${ readingTime } min","${ readingTime } min"],"Category":["Categoria","Categorias"],"Didn’t find what you were looking for?":["Não encontrou o que procura?"],"General contact":["Contato geral"],"Get help":["Obter ajuda"],"Legal contact":["Contato jurídico"],"Media contact":["Contato de mídia"],"Partnerships contact":["Contato de parcerias"],"Reading":["Leitura"]},"Support categories":{"Browse Proton product support":["Navegar pelo suporte a produtos da Proton"]},"Support category":{"There is no article in this category yet.":["Ainda não há nenhum artigo nesta categoria."]},"Support troubleshooting":{"--- Select ---":["--- Selecionar ---"],"App version":["Versão do aplicativo"],"Browser":["Navegador"],"Check if this helps":["Confira se isso ajuda"],"Choose a category for your question":["Escolha uma categoria para sua pergunta"],"Choose a product":["Selecione um produto"],"Did this solve your issue ?":["Isso resolveu seu problema?"],"Faster assistance is just a few clicks away — please make your selections":["Assistência mais rápida está a apenas alguns cliques de distância — faça suas seleções"],"No, contact support":["Não, entrar em contato com o suporte"],"Proton account":["Conta Proton"],"Proton Bridge":["Proton Bridge"],"Proton Calendar":["Proton Calendar"],"Proton Drive":["Proton Drive"],"Proton for Business":["Proton for Business"],"Proton Mail":["Proton Mail"],"Proton Pass":["Proton Pass"],"Proton VPN":["Proton VPN"],"Thank you for your feedback":["Agradecemos pelo feedback"],"Troubleshooting":["Solução de problemas"],"What can we help with ?":["Como podemos ajudar você?"],"Yes":["Sim"]},"support_modal_search_query":{"Search query":["Consulta de pesquisa"]},"support_search_button":{"Search":["Pesquisar"]},"support_search_i_am_looking_for":{"I'm looking for":["Estou procurando"]},"SupportForm":{"For a faster resolution, please report the issue from the Bridge app: Help > Report a problem.":["Para uma resolução mais rápida, informe o problema no aplicativo Bridge: Ajuda > Comunicar um problema."],"Information":["Informações"]},"SupportForm:option":{"Account Security":["Segurança da conta"],"Contacts":["Contatos"],"Custom email domain":["Domínio de e-mail personalizado"],"Email delivery and Spam":["Entrega de e-mail e spam"],"Encryption":["Criptografia"],"Login and password":["Início de sessão e senha"],"Merge aliases and accounts":["Combinar alias e contas"],"Migrate to Proton":["Migrar para a Proton"],"Notifications":["Notificações"],"Other":["Outros"],"Plans and billing":["Planos e faturamento"],"Proton for Business":["Proton for Business"],"Sign up":["Criar conta"],"Storage":["Armazenamento"],"Users, addresses, and identities":["Usuários, endereços e identidades"]},"SupportForm:optionIntro":{"Select a topic":["Selecione um tópico"]},"swiss_baseed_feature":{"Swiss based":["Sediado na Suíça"]},"Testimonial":{"Awards":["Prêmios"],"Customers":["Clientes"],"Featured":["Em destaque"],"Go to testimonial source":["Ir para a página inicial de depoimentos"],"Reviews":["Avaliações"],"Videos":["Vídeos"]},"Text":{"Find the plan that's right for you":["Encontre o plano certo para você"],"If you need help, check out our ${ supportLink }.":["Se precisar de ajuda, confira nossa ${ supportLink }."],"The page you’re looking for might have been removed, or it could be an\nold link.":["É possível que a página que você está procurando tenha sido removida ou seja um\nlink antigo."]},"Title":{"On this page":["Nesta página"],"Related articles":["Artigos relacionados"],"Share ${ thisPage }":["Compartilhar ${ thisPage }"],"Thank you!":["Obrigado!"],"this page":["esta página"]},"Tooltip":{"More information":["Mais informações"]},"tooltip_calendar":{"Create up to 20 custom & shareable encrypted calendars. On top of that, add up to 5 calendars from friends, family, colleagues, and organizations.":["Crie até 20 calendários compartilháveis personalizados e criptografados. Além disso, é possível adicional até 5 calendários de amigos, família, colegas e organizações."]},"tooltip_vpn":{"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, highest VPN speed, ${ TOTAL_VPN_CONNECTIONS } VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Acesse conteúdo bloqueado e navegue com privacidade. Inclui mais de ${ TOTAL_SERVERS } servidores em mais de +${ TOTAL_COUNTRIES } países, VPN com a mais alta velocidade, ${ TOTAL_VPN_CONNECTIONS } conexões VPN, serviços de streaming no mundo todo, malware e bloqueador de anúncios e muito mais."],"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, highest VPN speed, 10 VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Acesse conteúdo bloqueado e navegue com privacidade. Inclui mais de ${ TOTAL_SERVERS } servidores em mais de +${ TOTAL_COUNTRIES } países, VPN com a mais alta velocidade, 10 conexões VPN, serviços de streaming no mundo todo, malware e bloqueador de anúncios e muito mais."]},"version_history_label":{"Version history":["Histórico de versões"]},"version_history_tooltip":{"Store up to ${ versionHistoryNumber } versions of each file for up to ${ years } years":["Armazene até ${ versionHistoryNumber } versões de cada arquivo por até ${ years } anos"]},"vpn_features_link":{"View VPN plans":["Visualizar planos de VPN"]},"vpn_features_useCase":{"Access blocked content and browse privately":["Acesse conteúdo bloqueado e navegue com privacidade"]}}},"unleashApi":"https://account.proton.me/api"};
// We need to import data (the framework context) from the server
// This Astro feature with define:vars works well but creates an inline script
// So we can't directly import the initFramework helper, we have to store the context
window.frameworkContext = frameworkContext;
})();
A cybersecurity guide for small businesses | Proton
The Internet allows businesses of
any size to work and reach markets around the world. Unfortunately, this
potential for increased productivity and profitability is tempered by the
security risks that the Internet presents. The fact is that cybersecurity must
be a part of any business plan going forward.
This is meant to be a quick guide to help small
businesses begin to secure their data, although some of these steps may require
the assistance of a team of trained IT professionals.
Cybersecurity and data privacy are important for everyone
Data leaks(new window) have become more and more common, and not just tech companies have been affected. Plenty of more traditional companies, such as Mariott, have suffered massive leaks. Not only do these leaks erode consumer confidence, but they are beginning to incur financial penalties and regulations under the GDPR(new window). While certain exceptions are made for small businesses in the GDPR, putting good cybersecurity and data protection practices in place will reduce your exposure.
As profit-seeking entities and organizations with a responsibility to society, small businesses must work to protect the data their customers have entrusted them with.
A threat model(new window) is a method of evaluating security and privacy risks in order to mitigate them strategically. Different kinds of organizations will have different kinds of threats and vulnerabilities(new window). You can use it to determine your business’s own cybersecurity priorities. Start by answering the following questions:
What kind of data do you process in your business?
How is that data handled and protected?
Who has access to that data and under what circumstances?
Answering these three questions will help you know exactly what data you have, where you keep them, and who has access rights to them. Drawing a diagram to visualize these relationships can be very helpful as well. For instance, perhaps you have data securely stored on a local, encrypted server, but then you realize that as the data travels over your business’s network that it is not encrypted, or that too many people have unnecessary access. Creating a threat model will help you identify where the data are vulnerable to hacks and leaks.
Now that you know the data you need
to safeguard and where the potential weak points are, you can start to put
processes in place to protect it.
Protect your network from cyber attacks
Your network is where your
business’s data lives. It must be secured if you are going to protect your
customers’ data, even if it requires technical assistance from professionals. To
get started, you must identify all the devices and connections on your network,
set boundaries between your company’s systems and outside systems, and create
controls that ensure that any unauthorized access to your network can be
stopped or contained.
Another vital part of protecting your network is maintaining the software of connected devices. You can help prevent attackers from installing malware on your company’s devices by keeping your apps and operating systems up to date. Software updates often include security patches for recently discovered vulnerabilities. You should also use anti-virus software.
Passwords and authentication
Passwords are the first line of
defense on your all your company accounts. Make sure that everyone in your
company uses strong, unique passwords to secure their accounts and devices. A
password manager can help your employees generate and store passwords so that they
don’t have to write them down.
The second line of defense is two-factor authentication(new window) (2FA). This is a way to secure accounts with a second piece of information, usually something you have with you on your person, like a code created on an authenticator app or fob.
Tell your employees to avoid using public computers to access their company accounts because keyloggers can record and steal the login information and compromise their account. If your employees absolutely must use a public computer, tell them to be sure they log out of their account afterwards.
Mobile devices present significant
security challenges as they can hold confidential information or access your
corporate network and also be easily stolen or lost. Your cybersecurity plan should
anticipate these eventualities. So it’s essential to have your employees use
strong passwords to protect their devices and make sure they encrypt their data.
There are apps(new window) that allow you to wipe, locate, and potentially identify
the thief if a device is stolen. Also be sure to set up a procedure for
reporting lost or stolen equipment.
Practice email security
Email(new window) has become the primary way of handling a business’s communications, from internal management to customer support. It is also one of the easiest ways for hackers to get into your company’s database. It is crucial you train your employees to be alert for phishing attacks(new window), in which the attacker tries to trick you into clicking on a link, downloading an attachment, or giving up sensitive information (such as entering your username and password into a spoofed webpage).
Encryption is the process of converting readable information into an unreadable string of characters. Without encryption, anyone monitoring the Internet could see all the data being transmitted, from credit cards to chat messages. The vast majority of online services use some form of encryption to protect the data traveling to and from their servers. You should encrypt any data that your company considers sensitive.
However, only a few tech companies encrypt your information in such a way that even the company cannot decrypt it. This kind of encryption is called end-to-end encryption(new window) (E2EE). Often, there is an E2EE alternative to less private services. For example, Proton Mail is a private alternative to Gmail(new window) — and is HIPAA compliant(new window). Instead of Google Drive, which can access your files, your company could use Proton Drive(new window). For notes, Standard Notes(new window) is one E2EE option. These services prevent anyone but the owner (and in Proton Mail’s case, the receiver of the email) from decrypting the file and accessing the data.
For instant messaging, there are a number of options — though the most popular services are still unsecured. Neither Skype for Business(new window) nor Slack(new window) offer E2EE protection for its users. For better chat security and privacy, we recommend using Wire or Signal.
Train your employees and manage access
None of these steps will have any effect unless the employees of your company correctly implement them. Establishing clear, useful guidelines that also detail penalties for violating the company policy is crucial for any cybersecurity plan. All employees should be well versed in standard phishing attacks, strong password best practices, encrypted services, and whom they should contact if they encounter a problem.
To minimize risk, no one employee should have access
to all your company’s data systems. They should only have access to the
specific data they need to perform their jobs, and administrative privileges,
like installing new software, should only be given to trusted, key personnel.
Developing these systems and training your staff on them will be time-intensive, but your employees are your first and last line of defense against data leaks. Now that the GDPR has been implemented, businesses have had to be more forthcoming about data breaches, and the reports have shown human error to be the cause of more data leaks than malicious attacks.
We hope this guide helps you to establish a cybersecurity plan for your business. For businesses interested in a more thorough resource, the Federal Communications Commission has issued a Cyber Security Planning Guide(new window) which will cover much of the same ground in greater detail.
At Proton Mail, we believe that security and privacy are everyone’s responsibility. By following these guidelines and by using security-focused services, you can significantly improve your cybersecurity.
Proton Mail and Proton VPN are funded by community contributions. If you would like to support our development efforts, you can upgrade to a paid plan(new window). Thank you for your support.
Compromised passwords are a common issue and probably one of the biggest
cybersecurity threats for regular people. How do passwords get compromised, and
is there anything you can do to prevent it?
* What does compromised password mean?
* How do pa
WeTransfer is a popular service used by millions worldwide to send large files.
You may have wondered if it’s safe or whether you should use it to share
sensitive files. We answer these questions below and present a WeTransfer
alternative that may su
Dictionary attacks are a common method hackers use to try to crack passwords and
break into online accounts.
While these attacks may be effective against people with poor account security,
it’s extremely easy to protect yourself against them by usi
Data breaches are increasingly common. Whenever you sign up for an online
service, you provide it with personal information that’s valuable to hackers,
such as email addresses, passwords, phone numbers, and more. Unfortunately, many
online services f
Secure, seamless communication is the foundation of every business. As more
organizations secure their data with Proton, we’ve dramatically expanded our
ecosystem with new products and services, from our password manager to Dark Web
Monitoring for cr
On the subject of cybersecurity, one term that often comes up is brute force
attack. A brute force attack is any attack that doesn’t rely on finesse, but
instead uses raw computing power to crack security or even the underlying
encryption.
In this a