Proton
For Business

Was ist Schatten-IT – und ist dein Unternehmen anfällig dafür?

What is shadow IT? Proton explains shadow IT risks and shares shadow IT examples. Image shows an illustrated purple computer screen showing six app icons, two of which have red alert notifications in the corners
Kate Menzies

Kate ist Texterin mit sieben Jahren Erfahrung in der engen Zusammenarbeit mit Tech-Produkten. Sie hat in Produktteams für unabhängige Start-ups wie DICE gearbeitet und für klassische Unternehmen wie Microsoft geschrieben. Sie setzt sich leidenschaftlich dafür ein, Technologie für jeden zugänglich zu machen und das Internet vor großen Tech-Konzernen zu schützen.

Verwandte Artikel

an animated clipboard with text, checkmarks, and a shield logo on it. a pen sits on the right side
en
Learn how SMBs can reduce vulnerabilities with a clear incident response plan to detect, contain, and recover from cyber threats.
a purple cylinder with a green shield icon in the top right corner
en
Discover how password management simplifies GDPR compliance, enhances access control, and supports security and accountability.
warrantless surveillance
en
As Section 702 renewal approaches, lawmakers warn VPN users could be treated as “foreign” under US surveillance law, exposing a new privacy risk.
Meta targets you with scam ads
en
Meta is testing Instagram Plus, a new paid subscription that lets people anonymously view Stories, plus other features. What it means for privacy.
An american flag, the statue of liberty, a hand holding a phone with an unlock icon on the screen overlaid on top of bar charts
en
67% of US state legislators have been affected by data breaches at least once: What does this mean for US citizens?
A smartphone with an eye inside, surrounded by logos of Google, Apple, and Meta, representing government requests to user data held by Big Tech
en
Proton research shows how government access to Big Tech data is reshaping parenting and putting children’s privacy at risk.