Proton
small-business-employees-IT-security

In the fight against hackers, your employees are the weakest link

In a previous infographic, we showed that small businesses are prime targets for hackers. One reason is that small businesses often have less capacity to train their employees on IT security. This makes them the perfect target for phishing attacks.

One report even found that most employees were not sure they could spot a phishing email or a spoofed website if they saw one. That leaves your company’s sensitive data vulnerable to theft and ransomware attacks, which threaten to delete your data if you don’t pay the hackers.

References

Cyberark(new window), Global Advanced Threat Landscape Report(new window), 2018

Symantec, Internet Security Threat Report(new window), 2019

Symantec, Internet Security Threat Report(new window), 2017

Verizon, 2018 Data Breach Investigations Report, 11th edition(new window), 2018

Best regards,

The Proton Mail Team

Related articles

A Proton blog cover image showing a phone screen with an empty one time password code field
  • Privacy guides
One time passwords are a common method for authenticating your identity – are they safe? We explain what they are and how to use them safely.
In response to popular demand, our privacy-first AI writing assistant Proton Scribe is now available for free on our Duo and Family plans, in nine different languages.
  • Privacy guides
It’s easy to understand Bitcoin if you know a few simple concepts. This article explains how Bitcoin works and how to start using it.
A collection of images demonstrating the in-product experience for Proton Drive cloud storage for Business
  • For business
  • Product updates
  • Proton Drive
Proton Drive provides private and secure file sharing, document editing, and cloud storage for businesses of all sizes. Take control of your company's data.
An illustration of a meeting minutes document, a speech bubble, and the Docs in Proton Drive logo.
Download a free meeting minutes template to document and keep track of your team’s discussions, decisions, and action plans.
CJIS Compliance and how Proton secures your data
Learn about CJIS compliance, who needs to comply, and how you can access privacy-first tools and services to help meet these standards.