Proton
small-business-employees-IT-security

In the fight against hackers, your employees are the weakest link

In a previous infographic, we showed that small businesses are prime targets for hackers. One reason is that small businesses often have less capacity to train their employees on IT security. This makes them the perfect target for phishing attacks.

One report even found that most employees were not sure they could spot a phishing email or a spoofed website if they saw one. That leaves your company’s sensitive data vulnerable to theft and ransomware attacks, which threaten to delete your data if you don’t pay the hackers.

References

Cyberark(новое окно), Global Advanced Threat Landscape Report(новое окно), 2018

Symantec, Internet Security Threat Report(новое окно), 2019

Symantec, Internet Security Threat Report(новое окно), 2017

Verizon, 2018 Data Breach Investigations Report, 11th edition(новое окно), 2018

Best regards,

The Proton Mail Team

Статьи по теме

en
  • Советы о конфиденциальности
If you use multiple Google accounts and want to learn how to change your default Google account once and for all, this guide will help.
A person and a shield on a computer screen, suggesting how Proton parents guide their kids on online privacy
en
  • Советы о конфиденциальности
See how Proton parents guide their kids on online privacy to raise critical thinkers in a world built for surveillance and manipulation.
A photo icon and synchronization symbol overlaying a cloud, representing automatic photo backup to the cloud
en
  • Советы о конфиденциальности
See how to back up photos while protecting your privacy using encrypted cloud storage that shields you from scanning, tracking, and profiling.
Learn the best professional email sign-offs, common mistakes to avoid, and real-world examples.
en
  • Для бизнеса
Struggling with how to end an email? Learn about the best professional email sign-offs, common mistakes to avoid, and real-world examples.
A phone screen with a speech bubble with a phone number in it
en
  • Для бизнеса
Your email address and passwords aren't the only information hackers can use to scam you. Here's what someone can do with your phone number — and how to protect it.
A web application screen with an unlock icon in the bottom right corner
en
Your best defense against a data breach could be improving your web application security: Find out how Proton Pass can help.