Proton
For Business

Was ist Schatten-IT – und ist dein Unternehmen anfällig dafür?

What is shadow IT? Proton explains shadow IT risks and shares shadow IT examples. Image shows an illustrated purple computer screen showing six app icons, two of which have red alert notifications in the corners
Kate Menzies

Kate ist Texterin mit sieben Jahren Erfahrung in der engen Zusammenarbeit mit Tech-Produkten. Sie hat in Produktteams für unabhängige Start-ups wie DICE gearbeitet und für klassische Unternehmen wie Microsoft geschrieben. Sie setzt sich leidenschaftlich dafür ein, Technologie für jeden zugänglich zu machen und das Internet vor großen Tech-Konzernen zu schützen.

Verwandte Artikel

Depiction of the user interface of the appointment scheduling tool in Proton Calendar
en
  • Für Unternehmen
  • Proton Calendar
Share a public booking page where your colleagues, clients, or friends can schedule meetings based on your availability.
Age checks and child safety: Online age verification systems fail to protect children
en
Do online age verification systems improve child safety? See how age restrictions and age checks fall short, and what that means for privacy and protection.
What happens after age-verification laws take effect: The chilling effect of online age and ID checks
en
Age verification laws are reshaping the internet. See how ID checks, age filters, and platform rules create chilling effects on speech, access, and privacy.
What age verification actually means (and why the term is misleading)
en
What is age verification? Learn how age verification systems, software, and age checks work, including age estimation, age filters, and privacy risks.
an animated clipboard with text, checkmarks, and a shield logo on it. a pen sits on the right side
en
Learn how SMBs can reduce vulnerabilities with a clear incident response plan to detect, contain, and recover from cyber threats.
a purple cylinder with a green shield icon in the top right corner
en
Discover how password management simplifies GDPR compliance, enhances access control, and supports security and accountability.