Proton

Was ist Schatten-IT – und ist dein Unternehmen anfällig dafür?

What is shadow IT? Proton explains shadow IT risks and shares shadow IT examples. Image shows an illustrated purple computer screen showing six app icons, two of which have red alert notifications in the corners

Verwandte Artikel

The OpenAI logo and an exclamation mark, representing the OpenAI data breach
en
The OpenAI data breach exposed API user data through Mixpanel. Find out what sensitive information was exposed and how to protect your data.
A purple foot on a purple background. An @ icon, a location icon, a link icon, and a shopping cart icon surround the foot
en
Online shopping may be convenient, but it presents privacy risks. Find out how to shop safely and privately online
The GrapheneOS logo, the French flag, and an off switch, representing GrapheneOS leaving France due to encryption concerns
en
GrapheneOS leaves France, warning of encryption backdoors. See why end-to-end encryption matters for Pixel users and how backdoors weaken it.
How local authorities and United States Border Patrol abuse flock cameras
en
AI-driven ALPR systems are a mass dragnet-surveillance system that poses a direct threat to the privacy and freedom of everyone in the US.
a purple cartoon phone screen with an ID card overlaid
en
A new digital ID scheme in the UK is raising concerns among British citizens. We investigate how the scheme could work and the pros and cons
A purple cartoon phone screen with a white background. a pile of coins sits in the bottom left hand corner, and an ID with a fishhook through it in the top right corner
en
Meta isn't just targeting you with ads, it's coaxing you into scams and banned products. And getting rich in the process.