Proton

Latest articles

Illustration of a hand holding a phone and depicting a grocery cart and other objects to represent sectors in the breach report
  • For business
New incidents uncovered in the 2026 Data Breach Observatory show that small businesses were hit especially hard by cyberattacks.
an image of a purple cartoon envelope with a briefcase logo in the top right corner
  • For business
Find out what qualifies as a data breach in the UK, your legal obligations, and how to report it to the Information Commissioner’s Office.
an image showing a purple cartoon computer screen with a lock icon in the top left and an in tray in the bottom right
  • For business
Learn about ISO 27000: what they are, why they matter for security and compliance, and how to implement ISO-aligned credential controls.
an image of a purple cartoon computer screen with a warning icon in the center and a hand in a stop motion in the top right corner
  • For business
Find out about the data breach risks that UK businesses face and the best practices you need to implement to ensure business continuity.
A purple cartoon computer screen showing six app icons, two of which have warning icons on them
  • For business
Discover what worm viruses are, how they replicate, and how to protect your organization with a secure business password manager.
  • Privacy news
The App Store Accountability Act would require app stores to verify users’ ages and obtain parental consent. Learn how the bill could affect privacy and security.
an image showing two cartoon documents with a shield icon containing a lock icon in the bottom right corner
  • For business
Backups aren’t sufficient to ensure business continuity. Find out what else you need to ensure operational resilience.
an image showing two purple cartoon computer screens with warning icons on them
  • For business
Cybersecurity drives compliance and continuity for businesses of all sizes. Find out how credential governance helps prevent breaches.
an image showing eavesdropping between two purple cartoon mobile phones
  • For business
  • Privacy guides
Eavesdropping attacks can be levied at individuals and businesses, but how do they work? We explain how to protect against them
The ChatGPT and Lumo logos, representing a private ChatGPT alternative
  • Privacy guides
ChatGPT comes with privacy and security risks for your data. But there's a private ChatGPT alternative that's safe to use.
The ChatGPT logo and a question mark, representing uncertainty about whether ChatGPT is safe to use
  • Privacy guides
Is ChatGPT safe to use? Learn the privacy, security, and business risks of AI assistants, what not to share, and a private alternative.