Email is the #1 target for hackers. Here’s how to secure email for your business

March 20th, 2019 in Security

Email is the primary attack vector for hacking and fraud, and the situation is only getting worse. From 2017 to 2018, email-based attacks on businesses increased 476%, according to the most recent threat survey by the cybersecurity firm Proofpoint. The FBI reports there are around 14,000 email scams each year worldwide, costing companies $12 billion. …

How to create a strong password

March 19th, 2019 in Security

You probably already know some obvious password safety tips, like don’t use “password” as your password. But did you know that a password like “Ch@ll3ng3r%$” is not much more secure? Sure, it mixes upper- and lower-case letters, numbers and special characters, like you’re often advised to do when creating a password for a new account. …

Small business guide to Network Security for business

March 15th, 2019 in Security

Network security is analogous to home security: You are fortifying and controlling access to where your business’s data lives. Network security is nothing more than the ability to prevent (and react to) unauthorized access to, and abuse of, your computer network. This simple definition encompasses a range of possible scenarios, from controlling the spread of …

How data breaches are hurting small businesses

March 7th, 2019 in Privacy, Security

Small businesses are big targets for hackers, but they still aren’t prepared. Data breaches that make the news usually involve massive corporations with vast datasets. But small businesses must also prevent cyberattacks and data breaches, and most don’t feel prepared. “We lost $10,000 due to a cyberattack on our mainframe in which a hacker was …

Let’s settle the password vs. passphrase debate once and for all

March 5th, 2019 in Security

Several years ago, the science comic blogger Randall Munroe, otherwise known as XKCD, posted a comic comparing passwords and passphrases. The illustration attempts to demonstrate mathematically, using information theory, that passwords tend to be weaker than passphrases while also being more difficult to remember. Because of this, people use simpler passwords, write them down, or …

The key to small business cyber security is a culture of security awareness

February 28th, 2019 in Security

Small business cybersecurity is often overlooked, either due to a lack of expertise or funding. This is a mistake. Cyberattacks are costly to mitigate but potentially more costly to recover from after they occur. There are two things cybercriminals want to steal from your employees: your organization’s data and its money. To get either of …

ProtonMail SSL certificates and DarkMatter

February 25th, 2019 in Security

UPDATE Nov. 4, 2019: We are now using SwissSign AG as the certificate authority to issue our SSL/TLS certificate. Learn more about how to verify’s SSL certificate. Earlier today, the Electronic Frontier Foundation reported that the Emirati cybersecurity firm DarkMatter had applied to become a top-level certificate authority. Certificate authorities (CA) issue digital certificates …

How long should your password be?

February 13th, 2019 in Privacy, Security

For decades, information security experts have tried to get people to create stronger passwords by requiring a minimum length (usually eight characters), plus at least one capital letter, one number, and one special character (like @, #, or !). This strategy is now widely considered to be a failure. Many people simply created an obvious …

A cybersecurity guide for small businesses

February 7th, 2019 in Security

The Internet allows businesses of any size to work and reach markets around the world. Unfortunately, this potential for increased productivity and profitability is tempered by the security risks that the Internet presents. The fact is that cybersecurity must be a part of any business plan going forward. This is meant to be a quick …

Response to analysis of ProtonMail’s cryptographic architecture

January 20th, 2019 in Security

Recently, a self-published paper that was not peer reviewed claimed weaknesses in ProtonMail’s cryptographic architecture. The document is rather dense, and the casual reader is unlikely to be able to understand much beyond the alarming conclusion that there are allegedly “serious shortcomings in ProtonMail’s cryptographic architecture.” Below, we analyze these allegations one by one, so …


Email security best practices your team should be following right now

December 13th, 2018 in Security

The single biggest threat to your business’s online security is malicious emails. As owners and managers, it’s up to you to require email security best practices among your employees and institute a security-minded culture within your organization. Contrary to popular myth, the most effective hacking techniques require almost no technical skill. A hacker only needs …

Internet privacy

The ProtonMail guide to taking control of your online privacy

December 6th, 2018 in Privacy, Security

Improve your online privacy with this comprehensive guide, developed by the ProtonMail team. Here, we’ll help you determine your threat model and take steps to achieve online privacy that meets your needs. Updated July 2019 Total Internet privacy is impossible, but you can get close by adjusting your online behavior — and a few of …

Get your secure email account
Create Account

Proton Technologies AG

Chemin du Pré-Fleuri, 3
CH-1228 Plan-les-Ouates, Genève, Switzerland

For support inquiries, please visit

For security related discussions