Proton
For Business

Actualitzacions

an image showing a purple cartoon computer screen with a lock icon in the top left and an in tray in the bottom right
en
  • For business
Learn about ISO 27000: what they are, why they matter for security and compliance, and how to implement ISO-aligned credential controls.
an image of a purple cartoon computer screen with a warning icon in the center and a hand in a stop motion in the top right corner
en
  • For business
Find out about the data breach risks that UK businesses face and the best practices you need to implement to ensure business continuity.
A purple cartoon computer screen showing six app icons, two of which have warning icons on them
en
  • For business
Discover what worm viruses are, how they replicate, and how to protect your organization with a secure business password manager.
an image showing two cartoon documents with a shield icon containing a lock icon in the bottom right corner
en
  • For business
Backups aren’t sufficient to ensure business continuity. Find out what else you need to ensure operational resilience.
an image showing two purple cartoon computer screens with warning icons on them
en
  • For business
Cybersecurity drives compliance and continuity for businesses of all sizes. Find out how credential governance helps prevent breaches.
an image showing eavesdropping between two purple cartoon mobile phones
en
  • For business
  • Privacy guides
Eavesdropping attacks can be levied at individuals and businesses, but how do they work? We explain how to protect against them
en
  • For business
Proton’s small-business survey upends the “SMBs are unprepared” cliché, showing how leaders are investing in security and why it hasn’t fully worked.
An image for a blog about how to avoid insider threats that shows a purple cartoon outline of a person emerging from a computer screen with a warning icon in the top right corner
en
  • For business
Insider threats can be accidental or deliberate, but they're always dangerous: Find out how to protect your business.
en
  • For business
Founders see cybersecurity as a later problem. But early decisions (good or bad) compound. Here's how to secure in your first 100 days.
en
  • For business
This comprehensive guide shows you how to secure business WiFi. We cover WPA3 encryption and strong passphrases to advanced security steps.
ways to securely send sensitive information via email
en
  • For business
Emails you send with most providers aren’t secure, but here’s how you can securely send sensitive information by email.