Proton

En son makaleler

What to do if you get a 'compromised passwords' iPhone notification: Proton explains how to find and change your compromised passwords, and protect yourself against data leaks. image shows a phone screen with a notification saying 'Compromised password - The password for your account has appeared in a data leak, putting your acc...'
en
  • Gizlilik yol göstericileri
Gotten a 'compromised passwords' iPhone notification? We explain how to change compromised passwords and prevent your data being leaked online.
en
  • Gizlilik haberleri
The Kaspersky ban raises security and privacy concerns, but you can protect your data by switching to the Proton ecosystem.
How to free up storage space on iPhone.
en
  • Gizlilik yol göstericileri
Need to free up space on iPhone? Read this article and learn how to manage apps and use cloud backups to clear storage on iPhone.
en
  • Kurumlar için
  • Gizlilik yol göstericileri
If you use Microsoft 365 and Outlook for your healthcare business, you may want to consider an alternative to help achieve HIPAA compliance.
en
  • Kurumlar için
This guide will offer an overview of PCI compliance, who is required to comply, and how to secure email containing cardholder data.
Introducing Identities for all Proton Pass users and biometric login on desktop apps for Pass Plus users
en
  • Ürün güncellemeleri
  • Proton Pass
Enhance your productivity and make using the internet easier with Identities and biometric authentication in Proton Pass
en
  • Gizlilik yol göstericileri
Check out our simple explainer on the basics of Bitcoin wallets, how they work, and the features of different types.
Proton reviews popular photo sharing services and reviews the best way to share family photos online privately. Image shows three illustrated photographs with silhouettes of people on them.
en
  • Gizlilik yol göstericileri
The best way to share photos online with family — and keep them private — might not be via iCloud, Google, or social media. But there's a secure alternative.
What is shadow IT? Proton explains shadow IT risks and shares shadow IT examples. Image shows an illustrated purple computer screen showing six app icons, two of which have red alert notifications in the corners
en
  • Kurumlar için
Find out how to identify shadow IT risks and help your workers collaborate in a single, secure IT environment.
en
  • Kurumlar için
  • Gizlilik yol göstericileri
Learn what an email domain is and how to create the best custom email domain for personal or professional use.
How to delete all photos from Google Photos
en
  • Gizlilik yol göstericileri
Find out how to delete photos from Google Photos while keeping them safely stored on your device, and use a private cloud storage app instead.