Proton
small-business-employees-IT-security

In a previous infographic, we showed that small businesses are prime targets for hackers. One reason is that small businesses often have less capacity to train their employees on IT security. This makes them the perfect target for phishing attacks.

One report even found that most employees were not sure they could spot a phishing email or a spoofed website if they saw one. That leaves your company’s sensitive data vulnerable to theft and ransomware attacks, which threaten to delete your data if you don’t pay the hackers.

References

Cyberark(new window), Global Advanced Threat Landscape Report(new window), 2018

Symantec, Internet Security Threat Report(new window), 2019

Symantec, Internet Security Threat Report(new window), 2017

Verizon, 2018 Data Breach Investigations Report, 11th edition(new window), 2018

Best regards,

The Proton Mail Team

Related articles

TikTok ban: Switching to RedNote? Your privacy is at stake.
As the treat of a TikTok ban looms, many U.S. users are flocking to a new TikTok alternative called RedNote. But should they be?
Big Tech's annual fines (the cash in red) are dwarfed by its annual free cash flow
Big Tech fines reached more than $8 billion in 2024. Unfortunately, not even this fine will give Big Tech pause. But progress is being made.
How to send large video files securely
Size limits, quality compression, and privacy concerns can make figuring out how to share large video files a hassle. Here’s how to do it simply and securely.
Learn the basics of email format, such as subject line, opening paragraph, sign-off, and signature, with practical tips and examples.
Learn the basics of email format, such as subject line, opening paragraph, sign-off, and signature, with practical tips and examples.
Proton Lifetime Fundraiser raised over $1 million
We raised over $1 million this year to directly support organizations on the front lines of the fight for online privacy and freedom.
The cover image for a Proton Pass blog comparing SAML and OAuth as protocols for business protection
SAML and OAuth help your workers access your network securely, but what's the difference? Here's what you need to know.