Latest articles

en
- Para empresas
Are you using Google Workspace to operate your healthcare business? If you’re
concerned about HIPAA compliance, you may want to seek an alternative.

en
- Guías de privacidad
What do you call an email conversation? Here's the difference between an email
thread, email string, an email trail, and more — and when you should use which.

en
- Guías de privacidad
Identity theft affects millions of people worldwide, causing billions in damage.
Here are 5 proven methods for identity theft prevention.

- Guías de privacidad
Google es uno de los mayores obstáculos para la privacidad. Este artículo
explorará cómo y por qué hacer deGoogle tú mismo para reclamar y proteger tu
privacidad digital.

en
- Guías de privacidad
What should you do if someone steals your Social Security number? We explain
what you can do if your SSN is stolen and how to protect it.

en
- Guías de privacidad
Compromised passwords are one of the biggest threats for most regular people.
But how do passwords become compromised, and what can you do about it?

en
- Guías de privacidad
Is WeTransfer secure? We review WeTransfer, determine whether it’s safe to use,
and offer our recommendation for a better WeTransfer alternative.

en
- Guías de privacidad
What is a dictionary attack? We go over how these types of cyberattack work and
how you can protect your passwords against them.

- Actualizaciones de producto
- Proton Pass
Proton Pass Monitor es una función de seguridad avanzada que detecta
filtraciones de credenciales y te ayuda a defender tus cuentas.

Aquí hay siete nuevas funciones empresariales para Proton Mail y Proton Calendar
para ayudar a los equipos a colaborar de manera más eficiente.

en
- Guías de privacidad
What is a brute force attack? We go over brute force attack examples and ways to
prevent this type of cyber attack.