Please turn JavaScript on
The Proton Blog icon

The Proton Blog

Subscribe to The Proton Blog’s news feed.

Click on “Follow” and decide if you want to get news from The Proton Blog via RSS, as email newsletter, via mobile or on your personal news page.

Subscription to The Proton Blog comes without risk as you can unsubscribe instantly at any time.

You can also filter the feed to your needs via topics and keywords so that you only receive the news from The Proton Blog which you are really interested in. Click on the blue “Filter” button below to get started.

Title: The Proton Blog

Is this your feed? Claim it!

Publisher:  Unclaimed!
Message frequency:  0.87 / day

Message History

Account takeover attacks against businesses are increasing. According to research from Abnormal Security, 83% of organizations surveyed had been impacted by at least one account takeover attack in the previous year, and 26% reported facing an account takeover attempt every week. And in Proton’s


Read full story

The tools your company uses to manage and share files are a statement about how seriously that company considers its data security.

More organizations are recognizing this, with the majority of businesses now touting it as a selling point.

Yet our latest research shows that nearly half of businesses actively marketing secure file sharing as a selling point...


Read full story

When you’re running a business, documents pile up fast. Contracts, employee records, and commercially sensitive client data tend to accumulate haphazardly unless you have a clear document management system.

Digital disorganization has real risks. It’s not just time-consuming to find what you need later, it can lead to operational errors or even security breaches.


Read full story

“What’s the problem?”

That was the response Austrian data strategist Fritz Fahringer got when he raised concerns about companies using private emails to train AI systems when he spoke to an employee at a major US tech company.

The exchange stayed with him. It reinforced something he had already seen firsthand: In parts of the global tech e...


Read full story

Most organizations understand that people play a major role in cyber risk. Far fewer have built a security awareness training program that genuinely changes behavior.

Human-related security risk is rarely one dramatic incident. Realistically, it appears in ordinary moments: an employee clicks a convincing


Read full story