ProtonMail now offers elliptic curve cryptography for advanced security and faster speeds

April 25th, 2019 in Encryption

Elliptic curve cryptography is the most advanced cryptographic system available. Now ProtonMail is making this technology available to all users. For several months, we have been working to implement support for new cryptographic methods in ProtonMail that give users a faster experience with equal or better security. Today, we’re excited to announce that elliptic curve …

We support stronger privacy regulations in California

April 17th, 2019 in Press

ProtonMail has joined 23 other tech companies to endorse the Privacy for All Act of 2019, which would give millions of people more control over their data. We want everyone to have access to online privacy and security. It’s why we created ProtonMail and ProtonVPN. But technological tools alone can’t get us there. We need …

How to stop the 6 most common types of cyber crime methods against businesses

April 11th, 2019 in Security

Malware and social engineering are the top two types of cyber crime methods businesses have to face. Here’s how to prevent these attacks from hurting your business. Each quarter, the security firm Positive Technologies releases statistics on the most common types of cyber crime based on their internal data. The numbers from the fourth quarter …

ProtonMail supports data journalists through the European Journalism Centre

April 8th, 2019 in Press

On Thursday, the European Journalism Centre launched DataJournalism.com, a forum and educational tool for data journalists. We’re excited to support their important work. At the intersection of coding and journalism lies data journalism. Data journalists use analytic and data visualization software to turn raw figures into stories that can inform, surprise, and inspire. Their work …

Email is the #1 target for hackers. Here’s how to secure your business

March 20th, 2019 in Security

Criminals love to attack businesses via email because it gives them direct access to every organization’s weakest link: employees themselves. You can mitigate the threat by following these secure email practices. Email is the primary attack vector for hacking and fraud, and the situation is only getting worse. From 2017 to 2018, email-based attacks on …

How to create a strong password

March 19th, 2019 in Security

The standard advice about strong passwords may leave you vulnerable to hacks. In this article, we tell you how to create a strong password and the best way to keep it safe. You probably already know some obvious password safety tips, like don’t use “password” as your password. But did you know that a password …

Small businesses are big targets for hackers, but they still aren’t prepared

March 7th, 2019 in Security, Uncategorized

Data breaches that make the news usually involve massive corporations with vast datasets. But small businesses must also prevent cyberattacks and data breaches, and most don’t feel prepared. “We lost $10,000 due to a cyberattack on our mainframe in which a hacker was able to access financial data.” “An email was sent from a banking …

Let’s settle the password vs. passphrase debate once and for all

March 5th, 2019 in Security

Should you use a password or passphrase? The question has sparked intense discussion among techies for years. Here’s our recommendation. Several years ago, the science comic blogger Randall Munroe, otherwise known as XKCD, posted a comic comparing passwords and passphrases. The illustration attempts to demonstrate mathematically, using information theory, that passwords tend to be weaker …

The key to small business cyber security is a culture of security awareness

February 28th, 2019 in Security, Uncategorized

Small business cyber security is often overlooked, either due to a lack of expertise or funding. This is a mistake. Cyberattacks are costly to mitigate but potentially more costly to recover from after they occur. Managers can improve their small business’s cyber security by creating a security-conscious culture in the workplace. There are two things …

How long should my password be?

February 13th, 2019 in Privacy, Security

A strong password doesn’t have to be 30 characters long. But if you’re using an eight-character password, you have a good chance of being hacked. This article will help you understand how long your password should be. For decades, information security experts have tried to get people to create stronger passwords by requiring a minimum …

protonmail-blog-gdpr-compliance-guide

Introducing GDPR.eu, a new site to help businesses achieve GDPR compliance

January 8th, 2019 in Articles & News

The General Data Protection Regulation is the world’s toughest data privacy law, threatening enormous fines to violators. Yet businesses have few good resources to help them comply. GDPR.eu is here to change that. The European Union created the GDPR to help individuals achieve a greater degree of privacy and data security online. It was meant …

ProtonMail-import-export-beta

The ProtonMail Import-Export application beta is now available to all paid users

December 20th, 2018 in Articles & News

The Import-Export application lets you transfer emails easily to and from your ProtonMail account. The application is now available to users with paid plans. We’re excited to announce the beta release of the Import-Export app, which is one of the most-requested features in our community feedback forum. With this tool, you can import your entire …

Get your secure email account
Create Account

Proton Technologies AG

Chemin du Pré-Fleuri, 3
CH-1228 Plan-les-Ouates, Genève, Switzerland

For support inquiries, please visit
protonmail.com/support

For security related discussions
security@protonmail.com