all-in-one privacy solution":["Proton Unlimited es una solución de privacidad todo en uno"],"Black Friday":["Black Friday"],"No ads. Privacy by default.":["Sin publicidad. La privacidad por bandera."],"People before profits":["Nos importan las personas, no los beneficios"],"Security through transparency":["Seguridad con transparencia"],"The best Proton Mail ${ BLACK_FRIDAY } deals":["Las mejores ofertas del ${ BLACK_FRIDAY } de Proton Mail"],"The world’s only community- supported email service":["El único servicio de correo electrónico financiado la comunidad"]},"specialoffer:limited":{"${ hours } hour":["${ hours } hora","${ hours } horas"],"${ hoursLeft }, ${ minutesLeft } and ${ secondsLeft } left":["Tiempo restante: ${ hoursLeft }, ${ minutesLeft } y ${ secondsLeft }"],"${ minutes } minute":["${ minutes } minuto","${ minutes } minutos"],"${ seconds } second":["${ seconds } segundo","${ seconds } segundos"],"Limited time offer":["Oferta por tiempo limitado"]},"specialoffer:listitem":{"Create multiple addresses":["Crea varias direcciones"],"Hide-my-email aliases":["Alias de hide-my-email"],"Quickly unsubscribe from newsletters":["Date de baja rápidamente de boletines"],"Use your own domain name":["Usa tu propio nombre de dominio"]},"specialoffer:logos":{"As featured in":["Hablan de nosotros"]},"specialoffer:metadescription":{"Get an encrypted email that protects your privacy":["Apuesta por un servicio de correo electrónico cifrado que protege tu privacidad"]},"specialoffer:metatitle":{"Proton Mail Black Friday Sale - Up to 40% off":["Rebajas de Black Friday de Proton: hasta un 40 % de descuento"]},"specialoffer:newmetadescription":{"Get up to 40% off Proton Mail subscriptions this Black Friday. Find great deals on our secure end-to-end encrypted email plans.":["Contrata Proton Mail con hasta un 40 % de descuento en las rebajas de Black Friday. Encontrarás nuestros planes de correo electrónico cifrado de extremo a extremo al mejor precio."]},"specialoffer:newmetatitle":{"Proton Mail Black Friday sale | Up to 40% off secure email":["Rebajas de Black Friday en Proton Mail | Correo electrónico seguro con hasta un 40 % de descuento"]},"specialoffer:note":{"* Billed at ${ TOTAL_SUM } for the first year":["* A un precio de ${ TOTAL_SUM } durante el primer año"],"*Billed at ${ TOTAL_SUM } for the first 2 years":["*A un precio de ${ TOTAL_SUM } durante los 2 primeros años"],"30-day money-back guarantee":["Garantía de devolución de 30 días"],"Billed at ${ TOTAL_SUM } for the first 2 years":["A un precio de ${ TOTAL_SUM } durante los 2 primeros años"],"Billed at ${ TOTAL_SUM } for the first year":["A un precio de ${ TOTAL_SUM } durante el primer año"],"You save ${ SAVE_SUM }":["Ahorras ${ SAVE_SUM }"]},"specialoffer:off":{"${ PERCENT_OFF } off":["−${ PERCENT_OFF }"]},"specialoffer:testimonial":{"I love my ProtonMail":["Adoro ProtonMail"],"My favorite email service":["Mi servicio de correo electrónico favorito"],"Thanks Proton for keeping us all safe in the complicated internet universe.":["Gracias, Proton, por brindarnos protección en este mundo salvaje de Internet."],"You get what you pay for. In the case of big tech, if you pay nothing, you get used. I quit using Gmail and switched to @ProtonMail":["Dan justo lo que prometen. Si las grandes tecnológicas te ofrecen algo gratis, se aprovechan de ti, por eso dejé de usar Gmail y me pasé a @ProtonMail"]},"specialoffer:time":{"Days":["días"],"Hours":["horas"],"Min":["min"]},"specialoffer:title":{"And much more":["Y mucho más"],"Safe from trackers":["Evita los rastreadores"],"Stay organized":["Mantén el orden"],"Black Friday email deals":["Ofertas en correo electrónico del Black Friday"],"Don’t just take our word for it":["Lee testimonios de otras personas"],"Make your inbox yours":["Toma posesión de tu bandeja de entrada"],"Our story":["Nuestra historia"],"Transfer your data from Google in one click":["Transfiere tus datos de Google con un clic"]},"specialoffer:tooltip":{"Access blocked content and browse privately. Includes ${ TOTAL_VPN_SERVERS }+ servers in ${ TOTAL_VPN_COUNTRIES }+ countries, connect up to 10 devices, access worldwide streaming services, malware and ad-blocker, and more.":["Accede a contenido bloqueado y navega con privacidad. Incluye ${ TOTAL_VPN_SERVERS } servidores en más de ${ TOTAL_VPN_COUNTRIES } países. Conecta hasta 10 dispositivos, accede a servicios de streaming de todo el mundo, bloqueadores de malware y anuncios, etc."],"Easily share your calendar with your family, friends or colleagues, and view external calendars.":["Comparte tu calendario con familiares, amigos y compañeros fácilmente y consulta calendarios externos."],"Includes support for 1 custom email domain, 10 email addresses, 10 hide-my-email aliases, calendar sharing, and more.":["Incluye compatibilidad con 1 dominio de correo electrónico personalizado, 10 direcciones de correo electrónico, 10 alias de hide-my-email, posibilidad de compartir calendario, etc."],"Includes support for 3 custom email domains, 15 email addresses, unlimited hide-my-email aliases, calendar sharing, and more.":["Incluye compatibilidad con 3 dominios de correo electrónico personalizado, 15 direcciones de correo electrónico, alias ilimitados de hide-my-email, posibilidad de compartir calendario, etc."],"Manage up to 25 calendars, mobile apps, secured with end-to-end encryption, 1-click calendar import from Google, and more.":["Gestiona hasta 25 calendarios protegidos con cifrado de extremo a extremo y con opción, por ejemplo, de importar los de Google con un solo clic."]},"Status Banner":{"At the moment we are experiencing issues with the Proton VPN service":["Hay problemas con el servicio de Proton VPN en estos momentos"]},"Status banner":{"Learn more":["Más información"],"Please note that at the moment we are experiencing issues with the ${ issues[0] } service.":["Ten presente que, en estos momentos, el servicio de ${ issues[0] } está dando problemas de funcionamiento."],"We are experiencing issues with one or more services at the moment.":["Uno o varios servicios están dando problemas de funcionamiento en estos momentos."]},"steps":{"Step":["Paso"]},"suggestions":{"Suggestions":["Sugerencias"]},"Support":{"Sub category":["Subcategoría","Subcategorías"]},"Support article":{"${ readingTime } min":["${ readingTime } min","${ readingTime } min"],"Category":["Categoría","Categorías"],"Didn’t find what you were looking for?":["¿No has encontrado lo que buscabas?"],"General contact":["Contacto para consultas generales"],"Get help":["Obtener ayuda"],"Legal contact":["Contacto para cuestiones legales"],"Media contact":["Contacto para prensa y medios de comunicación"],"Partnerships contact":["Contacto para colaboraciones"],"Reading":["Lectura"]},"Support Form Platform option":{"VPN for Android TV":["VPN para Android TV"],"VPN for Apple TV":["VPN para Apple TV"],"VPN for Chromebook":["VPN para Chromebook"]},"Support troubleshooting":{"App version":["Versión de la aplicación"],"Browser":["Navegador"],"Check if this helps":["Comprueba a ver si te sirve"],"Choose a product":["Elegir producto"],"Did this solve your issue?":["¿Te ha resultado útil para resolver el problema?"],"Faster assistance is just a few clicks away":["Solo te separan unos clics de una asistencia más rápida"],"How can we help?":["¿Cómo podemos ayudarte?"],"No, contact support":["No, contactar con el equipo de asistencia"],"Please fill out one field after another":["Rellena un campo después de otro"],"Please make your selections":["Realiza tus selecciones"],"Proton account":["Cuenta de Proton"],"Proton for Business":["Proton for Business"],"Thank you for your feedback":["Gracias por tus comentarios"],"What can we help with?":["¿En qué podemos ayudarte?"],"Yes":["Sí"]},"support_modal_search_query":{"Search query":["Consulta de búsqueda"]},"support_search_button":{"Search":["Buscar"]},"support_search_i_am_looking_for":{"I'm looking for":["Busco"]},"SupportForm":{"For a faster resolution, please report the issue from the Bridge app: Help > Report a problem.":["Para una resolución más rápida, informa del problema desde la aplicación Bridge: Ayuda > Notificar un problema."],"Information":["Información"]},"SupportForm:option":{"Account Security":["Seguridad de la cuenta"],"Contacts":["Contactos"],"Custom email domain":["Dominio de correo electrónico personalizado"],"Email delivery and Spam":["Envío de correos electrónico y spam"],"Encryption":["Cifrado"],"Login and password":["Inicio de sesión y contraseña"],"Merge aliases and accounts":["Fusionar seudónimos y cuentas"],"Migrate to Proton":["Migrar a Proton"],"Notifications":["Notificaciones"],"Other":["Otro"],"Plans and billing":["Planes y facturación"],"Proton for Business":["Proton for Business"],"Sign up":["Regístrate"],"Storage":["Almacenamiento"],"Users, addresses, and identities":["Usuarios, direcciones e identidades"]},"SupportForm:optionIntro":{"Select a topic":["Selecciona un tema"]},"Testimonial":{"Awards":["Premios"],"Customers":["Clientes"],"Featured":["Destacado"],"Go to testimonial source":["Ir a la fuente del testimonio"],"Open source of award":["Fuente disponible del premio"],"Open source of quote":["Fuente disponible del testimonio"],"Reviews":["Opiniones"],"Videos":["Vídeos"],"Watch on TikTok":["Ver en TikTok"],"Watch on YouTube":["Ver en YouTube"]},"TestimonialCategory":{"Awards":["Premios"],"Customers":["Clientes"],"Featured":["Destacado"],"Media":["Medios"],"Reviews":["Opiniones"],"Videos":["Vídeos"]},"Text":{"If you need help, check out our ${ supportLink }.":["Si necesitas ayuda, consulta nuestra ${ supportLink }."],"The page you’re looking for might have been removed, or it could be an\nold link.":["Es posible que la página que buscas haya sido eliminada o que sea un\nenlace antiguo."],"Your question may already have an answer in our knowledge base:":["Puede que haya respuesta a tu pregunta en nuestra base de conocimientos:"]},"Title":{"On this page":["En esta página"],"Page not found":["No se encontró la página"],"Related articles":["Artículos relacionados"],"Share ${ thisPage }":["Compartir ${ thisPage }"],"Switch to Proton Pass - Contact us":["Cambia a Proton Pass - Contáctanos"],"Thank you!":["¡Gracias!"],"this page":["esta página"]},"tooltip_vpn":{"Access blocked content and browse privately. Includes ${ TOTAL_VPN_SERVERS }+ servers in ${ TOTAL_VPN_COUNTRIES }+ countries, highest VPN speed, ${ TOTAL_VPN_CONNECTIONS } VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Accede a contenido bloqueado y navega en privado. Tendrás a tu disposición más de ${ TOTAL_VPN_SERVERS } servidores en más de ${ TOTAL_VPN_COUNTRIES } países, VPN de máxima velocidad, ${ TOTAL_VPN_CONNECTIONS } conexiones VPN, servicios de streaming en todo el mundo, bloqueadores de malware y anuncios, y mucho más."]},"vpn_servers":{"Get Proton VPN Plus":["Obtener Proton VPN Plus"]},"wallet_signup_2024:Action":{"Get Proton Wallet":["Obtener Proton Wallet"]},"wallet_signup_2024:Homepage hero product link title":{"Wallet":["Wallet"]},"wallet_signup_2024:Homepage product navigation bar":{"Wallet":["Wallet"]},"wallet_signup_2024:menu item":{"Bitcoin guide":["Guía sobre Bitcoin"],"Proton Wallet news":["Novedades sobre Proton Wallet"],"Proton Wallet support":["Soporte para Proton Wallet"]},"wallet_signup_2024:Pricing":{"Includes everything in Proton Unlimited and":["Incluye todas las funciones en Proton Unlimited y"],"Limited availability":["Disponibilidad limitada"],"The easiest way to securely own, send, and receive Bitcoin":["La forma más fácil de retener, enviar y recibir Bitcoin con seguridad"]},"wallet_signup_2024:ProductRange":{"Discover Proton Wallet":["Descubre Proton Wallet"],"Store and transact Bitcoin privately with an encrypted self-custody wallet.":["Almacena Bitcoin y negocia de forma privada con una cartera de autocustodia cifrada."]},"wallet_signup_2024:wallet bitcoin":{"Learn about Bitcoin, the Internet's value network.":["Infórmate sobre Bitcoin, la red de valor de internet."]},"wallet_signup_2024:wallet overview":{"Ensure you're always in control of your Bitcoin.":["Asegúrate de tener siempre el control de tu Bitcoin."]},"wallet_signup_2024:wallet security":{"The encrypted, open-source wallet that puts you in control.":["La cartera cifrada de código abierto que te permite controlarlo todo."]}}},"base":"blog","cdn":{"enabledForAssets":true,"enabledForImages":true,"url":"https://pmecdn.protonweb.com/"},"unleashApi":"https://account.proton.me/api"};
window.frameworkContext = frameworkContext;
const context = frameworkContext.base === '' ? '' : `${frameworkContext.base}/`;
window.__toAssetUrl = (filename) => {
if (frameworkContext.cdn !== undefined && frameworkContext.cdn.enabledForAssets === true) {
return `${frameworkContext.cdn.url}${context}${filename}`;
} else {
return `/${context}${filename}`;
}
};
})();
A cybersecurity guide for small businesses | Proton
The Internet allows businesses of
any size to work and reach markets around the world. Unfortunately, this
potential for increased productivity and profitability is tempered by the
security risks that the Internet presents. The fact is that cybersecurity must
be a part of any business plan going forward.
This is meant to be a quick guide to help small
businesses begin to secure their data, although some of these steps may require
the assistance of a team of trained IT professionals.
Cybersecurity and data privacy are important for everyone
Data leaks(ventana nueva) have become more and more common, and not just tech companies have been affected. Plenty of more traditional companies, such as Mariott, have suffered massive leaks. Not only do these leaks erode consumer confidence, but they are beginning to incur financial penalties and regulations under the GDPR(ventana nueva). While certain exceptions are made for small businesses in the GDPR, putting good cybersecurity and data protection practices in place will reduce your exposure.
As profit-seeking entities and organizations with a responsibility to society, small businesses must work to protect the data their customers have entrusted them with.
What kind of data do you process in your business?
How is that data handled and protected?
Who has access to that data and under what circumstances?
Answering these three questions will help you know exactly what data you have, where you keep them, and who has access rights to them. Drawing a diagram to visualize these relationships can be very helpful as well. For instance, perhaps you have data securely stored on a local, encrypted server, but then you realize that as the data travels over your business’s network that it is not encrypted, or that too many people have unnecessary access. Creating a threat model will help you identify where the data are vulnerable to hacks and leaks.
Now that you know the data you need
to safeguard and where the potential weak points are, you can start to put
processes in place to protect it.
Protect your network from cyber attacks
Your network is where your
business’s data lives. It must be secured if you are going to protect your
customers’ data, even if it requires technical assistance from professionals. To
get started, you must identify all the devices and connections on your network,
set boundaries between your company’s systems and outside systems, and create
controls that ensure that any unauthorized access to your network can be
stopped or contained.
Another vital part of protecting your network is maintaining the software of connected devices. You can help prevent attackers from installing malware on your company’s devices by keeping your apps and operating systems up to date. Software updates often include security patches for recently discovered vulnerabilities. You should also use anti-virus software.
Passwords and authentication
Passwords are the first line of
defense on your all your company accounts. Make sure that everyone in your
company uses strong, unique passwords to secure their accounts and devices. A
password manager can help your employees generate and store passwords so that they
don’t have to write them down.
The second line of defense is two-factor authentication(ventana nueva) (2FA). This is a way to secure accounts with a second piece of information, usually something you have with you on your person, like a code created on an authenticator app or fob.
Tell your employees to avoid using public computers to access their company accounts because keyloggers can record and steal the login information and compromise their account. If your employees absolutely must use a public computer, tell them to be sure they log out of their account afterwards.
Mobile devices present significant
security challenges as they can hold confidential information or access your
corporate network and also be easily stolen or lost. Your cybersecurity plan should
anticipate these eventualities. So it’s essential to have your employees use
strong passwords to protect their devices and make sure they encrypt their data.
There are apps(ventana nueva) that allow you to wipe, locate, and potentially identify
the thief if a device is stolen. Also be sure to set up a procedure for
reporting lost or stolen equipment.
Practice email security
Email(ventana nueva) has become the primary way of handling a business’s communications, from internal management to customer support. It is also one of the easiest ways for hackers to get into your company’s database. It is crucial you train your employees to be alert for phishing attacks(ventana nueva), in which the attacker tries to trick you into clicking on a link, downloading an attachment, or giving up sensitive information (such as entering your username and password into a spoofed webpage).
Encryption is the process of converting readable information into an unreadable string of characters. Without encryption, anyone monitoring the Internet could see all the data being transmitted, from credit cards to chat messages. The vast majority of online services use some form of encryption to protect the data traveling to and from their servers. You should encrypt any data that your company considers sensitive.
However, only a few tech companies encrypt your information in such a way that even the company cannot decrypt it. This kind of encryption is called end-to-end encryption(ventana nueva) (E2EE). Often, there is an E2EE alternative to less private services. For example, Proton Mail is a private alternative to Gmail(ventana nueva) — and is HIPAA compliant(ventana nueva). Instead of Google Drive, which can access your files, your company could use Proton Drive(ventana nueva). For notes, Standard Notes(ventana nueva) is one E2EE option. These services prevent anyone but the owner (and in Proton Mail’s case, the receiver of the email) from decrypting the file and accessing the data.
For instant messaging, there are a number of options — though the most popular services are still unsecured. Neither Skype for Business(ventana nueva) nor Slack(ventana nueva) offer E2EE protection for its users. For better chat security and privacy, we recommend using Wire or Signal.
Train your employees and manage access
None of these steps will have any effect unless the employees of your company correctly implement them. Establishing clear, useful guidelines that also detail penalties for violating the company policy is crucial for any cybersecurity plan. All employees should be well versed in standard phishing attacks, strong password best practices, encrypted services, and whom they should contact if they encounter a problem.
To minimize risk, no one employee should have access
to all your company’s data systems. They should only have access to the
specific data they need to perform their jobs, and administrative privileges,
like installing new software, should only be given to trusted, key personnel.
Developing these systems and training your staff on them will be time-intensive, but your employees are your first and last line of defense against data leaks. Now that the GDPR has been implemented, businesses have had to be more forthcoming about data breaches, and the reports have shown human error to be the cause of more data leaks than malicious attacks.
We hope this guide helps you to establish a cybersecurity plan for your business. For businesses interested in a more thorough resource, the Federal Communications Commission has issued a Cyber Security Planning Guide(ventana nueva) which will cover much of the same ground in greater detail.
At Proton Mail, we believe that security and privacy are everyone’s responsibility. By following these guidelines and by using security-focused services, you can significantly improve your cybersecurity.
Proton Mail and Proton VPN are funded by community contributions. If you would like to support our development efforts, you can upgrade to a paid plan(ventana nueva). Thank you for your support.