Proton

Latest articles

an image showing two purple cartoon computer screens with warning icons on them
en
Cybersecurity drives compliance and continuity for businesses of all sizes. Find out how credential governance helps prevent breaches.
an image showing eavesdropping between two purple cartoon mobile phones
en
  • Руководства по конфиденциальности
Eavesdropping attacks can be levied at individuals and businesses, but how do they work? We explain how to protect against them
The ChatGPT and Lumo logos, representing a private ChatGPT alternative
  • Руководства по конфиденциальности
Использование ChatGPT связано с рисками для конфиденциальности и безопасности ваших данных. Но существует конфиденциальная альтернатива ChatGPT, которая безопасна в использовании.
The ChatGPT logo and a question mark, representing uncertainty about whether ChatGPT is safe to use
en
  • Руководства по конфиденциальности
Is ChatGPT safe to use? Learn the privacy, security, and business risks of AI assistants, what not to share, and a private alternative.
Illustration of a hand holding a megaphone in the air
en
  • Руководства по конфиденциальности
Protesters can expose personal information that puts them at risk. Here’s how to keep your identity private and your devices secure at a demonstration.
an image of a purple cartoon phone with an unlocked logo on the screen and a black alert icon in the top right of the screen
en
  • Руководства по конфиденциальности
Your phone can be hacked just like your computer, but how can you tell? Find out how to know if your phone is compromised.
An AI-powered toy left 50,000 children’s chat transcripts exposed. Here’s what the incident reveals about data collection, storage, and the risks of AI products for kids.
en
  • Новости конфиденциальности
An AI-powered toy left 50,000 children’s chat transcripts exposed. Here’s what the incident reveals about data collection, storage, and the risks for kids.
en
Proton’s small-business survey upends the “SMBs are unprepared” cliché, showing how leaders are investing in security and why it hasn’t fully worked.
Photos of individuals and locks, representing deepfake prevention techniques
en
  • Руководства по конфиденциальности
Deepfakes are getting harder to spot. Find out how to prevent deepfakes by protecting your photos, videos, and voice with practical tips.
An image for a blog about how to avoid insider threats that shows a purple cartoon outline of a person emerging from a computer screen with a warning icon in the top right corner
en
Insider threats can be accidental or deliberate, but they're always dangerous: Find out how to protect your business.
en
Founders see cybersecurity as a later problem. But early decisions (good or bad) compound. Here's how to secure in your first 100 days.