Email is the #1 target for hackers. Here’s how to secure your business

March 20th, 2019 in Security

Criminals love to attack businesses via email because it gives them direct access to every organization’s weakest link: employees themselves. You can mitigate the threat by following these secure email practices. Email is the primary attack vector for hacking and fraud, and the situation is only getting worse. From 2017 to 2018, email-based attacks on …

How to create a strong password

March 19th, 2019 in Security

The standard advice about strong passwords may leave you vulnerable to hacks. In this article, we tell you how to create a strong password and the best way to keep it safe. You probably already know some obvious password safety tips, like don’t use “password” as your password. But did you know that a password …

Network security for business: the first step to preventing data breaches

March 15th, 2019 in Security

Network security can be complex and confusing, but it’s essential that small businesses get it right. This guide explains basic network security measures and how to implement them on your company’s network. Network security is analogous to home security: You are fortifying and controlling access to where your business’s data lives. Network security is nothing …

Small businesses are big targets for hackers, but they still aren’t prepared

March 7th, 2019 in Security, Uncategorized

Data breaches that make the news usually involve massive corporations with vast datasets. But small businesses must also prevent cyberattacks and data breaches, and most don’t feel prepared. “We lost $10,000 due to a cyberattack on our mainframe in which a hacker was able to access financial data.” “An email was sent from a banking …

Let’s settle the password vs. passphrase debate once and for all

March 5th, 2019 in Security

Should you use a password or passphrase? The question has sparked intense discussion among techies for years. Here’s our recommendation. Several years ago, the science comic blogger Randall Munroe, otherwise known as XKCD, posted a comic comparing passwords and passphrases. The illustration attempts to demonstrate mathematically, using information theory, that passwords tend to be weaker …

The key to small business cyber security is a culture of security awareness

February 28th, 2019 in Security, Uncategorized

Small business cyber security is often overlooked, either due to a lack of expertise or funding. This is a mistake. Cyberattacks are costly to mitigate but potentially more costly to recover from after they occur. Managers can improve their small business’s cyber security by creating a security-conscious culture in the workplace. There are two things …

ProtonMail SSL certificates and DarkMatter

February 25th, 2019 in Security, Uncategorized

Earlier today claims appeared that ProtonMail is compromised because of an alleged connection between our SSL certificates and DarkMatter, a shadowy cybersecurity company. These allegations are false, as we will explain. Earlier today, the Electronic Frontier Foundation reported that the Emirati cybersecurity firm DarkMatter had applied to become a top-level certificate authority. Certificate authorities (CA) …

How long should my password be?

February 13th, 2019 in Privacy, Security

A strong password doesn’t have to be 30 characters long. But if you’re using an eight-character password, you have a good chance of being hacked. This article will help you understand how long your password should be. For decades, information security experts have tried to get people to create stronger passwords by requiring a minimum …

A cybersecurity guide for small businesses

February 7th, 2019 in Security

Every small business faces unique difficulties in securing its data. This guide will help you determine your threat model and take the steps necessary to protect your company. The Internet allows businesses of any size to work and reach markets around the world. Unfortunately, this potential for increased productivity and profitability is tempered by the …

Response to analysis of ProtonMail’s cryptographic architecture

January 20th, 2019 in Security

Recently, a self-published paper that was not peer reviewed claimed weaknesses in ProtonMail’s cryptographic architecture. The document is rather dense, and the casual reader is unlikely to be able to understand much beyond the alarming conclusion that there are allegedly “serious shortcomings in ProtonMail’s cryptographic architecture.” Below, we analyze these allegations one by one, so …

protonmail-email-security-best-practices

Email security best practices your team should be following right now

December 13th, 2018 in Security

The single biggest threat to your business’s online security is malicious emails. As owners and managers, it’s up to you to require email security best practices among your employees and institute a security-minded culture within your organization.   Contrary to popular myth, the most effective hacking techniques require almost no technical skill. A hacker only …

protonmail-internet-privacy-guide

A complete guide to Internet privacy

December 6th, 2018 in Privacy, Security

Not everyone needs the same level of Internet privacy. This guide will help you determine your threat model and take steps to achieve online privacy that meets your needs. Total Internet privacy is impossible, and any service that claims to offer it is lying. But anyone can increase their Internet privacy by adjusting their online …

Get your secure email account
Create Account

Proton Technologies AG

Chemin du Pré-Fleuri, 3
CH-1228 Plan-les-Ouates, Genève, Switzerland

For support inquiries, please visit
protonmail.com/support

For security related discussions
security@protonmail.com