Proton

Последние статьи

en
  • Для бизнеса
Criminals love to attack businesses via email because it gives them direct access to every organization’s weakest link: employees themselves. You can mitigate the threat by following these secure email practices.
en
  • Советы о конфиденциальности
In this article, we tell you how to create a strong password and the best way to keep it safe.
en
  • Для бизнеса
This guide can help your small business take control of network security and secure your business’s data and future.
en
  • Новости о продуктах
  • Proton Mail
In the past week, the Russian government has been attempting to prevent Russian citizens from sending messages to Proton Mail. We believe this block is unjustified, and we will restore full services to users in Russia.
protonmail-blog-eu-funding
en
  • Новости Proton
We are happy to announce that the European Commission has awarded €2 million to Proton AG, the parent company of Proton Mail and Proton VPN, to develop a suite of encrypted services.
en
  • Для бизнеса
Cybercriminals don't differentiate between small and large. Last year, 58% of victims were small business. Here's how to avoid becoming the next victim.
en
  • Для бизнеса
Managers can improve their small business’s cybersecurity by creating a security-conscious culture in the workplace. Learn more in this guide.
en
  • Новости Proton
Earlier today claims appeared that Proton Mail is compromised because of an alleged connection between our SSL certificates and DarkMatter, a shadowy cybersecurity company. These allegations are false, as we will explain.
en
  • Советы о конфиденциальности
A strong password doesn’t have to be 30 characters long. But if you’re using an eight-character password, you have a good chance of being hacked.
en
  • Для бизнеса
Every small business faces unique difficulties in securing its data. This guide will help you determine your threat model and take the steps necessary to protect your company.
privacy-rights-and-anti-terror-laws
en
  • Мнения
Terrorist content has no place on any online platform, but we must also preserve our fundamental human rights even as we prevent terrorists and other criminals from abusing the Internet.