illustration of a private Internet browser

These browsers actually protect your privacy

December 9th, 2019 in Privacy

Your web browser is the vehicle that carries you around the Internet to your desired websites. As such, it knows precisely what sites you have visited, how long you spent browsing them, and what you clicked on (or almost clicked on). Anyone who has access to your web browser can have a window into your …

The IT security experts at ProtonMail share their tips for securing your business's devices and network.

Get the ProtonMail IT security ebook for small businesses

November 7th, 2019 in Articles & News

IT security is crucial to success in today’s economy. A data breach can cost you time, money, and your customers’ trust. Yet, due to a lack of funding, time, and expertise, most small- and medium-sized businesses (SMEs) are unprepared to deal with basic cyber threats. As a result, most victims of data breaches are small …

illustration of two-factor authentication

If you aren’t using two-factor authentication, your accounts are vulnerable

October 10th, 2019 in Security

Earlier this year, security researchers discovered a fire sale taking place on the dark web: 2.2 billion usernames and passwords that had been stolen in data breaches and compiled into a multi-volume database dubbed as Collection #1-5. With so many passwords leaked, there is a decent chance that yours was among them. (You can check …

Illustration of multi-account support in ProtonMail Android.

Introducing multi-account support for ProtonMail Android

September 10th, 2019 in Releases

Version 1.12 of the ProtonMail Android app makes it easy for anyone to manage multiple ProtonMail accounts right on their phone. This feature allows you to be logged into multiple ProtonMail accounts at the same time, and easily switch between their inboxes. Multi-account support We have received numerous requests from small- and medium-sized business owners, …

An illustration of Kazakhstan government surveillance

Kazakhstan’s aggressive mass surveillance technique explained

August 1st, 2019 in Encryption

Aug. 7, 2019 update: The government has reversed its surveillance strategy, claiming the whole program was a “test” that is now complete, according to Reuters. If you installed a government root certificate on your device, you may now uninstall it without consequence. We have provided instructions in this article below for how to do so …

ProtonMail Android v1.11 illustrated by a fingerprint

ProtonMail Android v1.11 release

May 16th, 2019 in Releases

With ProtonMail Android version 1.11, accessing your encrypted inbox is now faster and more secure. You now have the option to unlock the app with your fingerprint. We are continuously working to make our apps easier to use for our community while maintaining the high-security standards you have come to expect from Proton projects. Allowing …

Top cybersecurity solutions for small businesses

April 3rd, 2019 in Security

Cyber criminals love to target small businesses because they know small and medium-sized businesses, short on time, resources, or expertise, cannot always secure their data. But the cost of not securing your company’s data has never been higher. The data breaches themselves and the GDPR fines make it too expensive for businesses to ignore cybersecurity. …

small-business-employees-IT-security

In the fight against hackers, your employees are the weakest link

March 28th, 2019 in Security

In a previous infographic, we showed that small businesses are prime targets for hackers. One reason is that small businesses often have less capacity to train their employees on IT security. This makes them the perfect target for phishing attacks. One report even found that most employees were not sure they could spot a phishing …

Small business guide to Network Security for business

March 15th, 2019 in Security

Network security is analogous to home security: You are fortifying and controlling access to where your business’s data lives. Network security is nothing more than the ability to prevent (and react to) unauthorized access to, and abuse of, your computer network. This simple definition encompasses a range of possible scenarios, from controlling the spread of …

privacy-rights-and-anti-terror-laws

Preserving privacy rights in anti-terror laws

January 21st, 2019 in Privacy

Our mission is to promote security, privacy, and freedom on the Internet. That encompasses technical solutions, such as ProtonMail and ProtonVPN, but also policy solutions. The right to privacy and user control of personal data will never be safe unless they are also guaranteed by law. Addressing one without the other is a futile endeavor. …

lifetime-account-supporting-charter97

Violence, intimidation, and exile from Belarus: Natalya Radina of Charter97.org

December 18th, 2018 in Articles & News

One such organization is Charter’97, the most popular independent news outlet in Belarus. We spoke with their award-winning editor-in-chief, Natalya Radina.   Edit March 12, 2019: The auction ended on December 24th, 2018. This holiday season, we are giving back to organizations from the ProtonMail community that are furthering our shared causes of online privacy …

Get your secure email account
Create Account

Proton Technologies AG

Chemin du Pré-Fleuri, 3
CH-1228 Plan-les-Ouates, Genève, Switzerland

For support inquiries, please visit
protonmail.com/support

For security related discussions
security@protonmail.com