Proton
For Business

Was ist Schatten-IT – und ist dein Unternehmen anfällig dafür?

What is shadow IT? Proton explains shadow IT risks and shares shadow IT examples. Image shows an illustrated purple computer screen showing six app icons, two of which have red alert notifications in the corners
Kate Menzies

Kate ist Texterin mit sieben Jahren Erfahrung in der engen Zusammenarbeit mit Tech-Produkten. Sie hat in Produktteams für unabhängige Start-ups wie DICE gearbeitet und für klassische Unternehmen wie Microsoft geschrieben. Sie setzt sich leidenschaftlich dafür ein, Technologie für jeden zugänglich zu machen und das Internet vor großen Tech-Konzernen zu schützen.

Verwandte Artikel

In rush for age checks, we’re putting kids’ security at risk
en
Is age verification safe? Learn how age checks can expose children to privacy risks, scams, and data breaches.
What are the alternatives to age verification?
en
  • Privatsphäre-Leitfäden
Explore alternatives to online age verification, from parental controls to zero-knowledge proofs, and how they can protect children without exposing personal data.
en
Over half of SMBs use a business password manager, but they're still not reaping the full benefits. Our research suggests solutions.
Depiction of the user interface of the appointment scheduling tool in Proton Calendar
en
  • Für Unternehmen
  • Proton Calendar
Share a public booking page where your colleagues, clients, or friends can schedule meetings based on your availability.
Age checks and child safety: Online age verification systems fail to protect children
en
Do online age verification systems improve child safety? See how age restrictions and age checks fall short, and what that means for privacy and protection.
What happens after age-verification laws take effect: The chilling effect of online age and ID checks
en
Age verification laws are reshaping the internet. See how ID checks, age filters, and platform rules create chilling effects on speech, access, and privacy.