<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>The Proton Blog</title><description>News from the front lines of privacy and security</description><link>https://proton.me/</link><language>en</language><feed_url>https://proton.me/feed</feed_url><item><title>Introducing Proton Pass for AI agents: The password manager for AI that keeps
you in control</title><link>https://proton.me/blog/pass-access-tokens</link><guid isPermaLink="true">https://proton.me/blog/pass-access-tokens</guid><description>Proton Pass access tokens let you share credentials with AI agents securely. Granular permissions, time limits, and full audit logs. You stay in control.</description><pubDate>Thu, 21 May 2026 11:50:58 GMT</pubDate><content:encoded>
&lt;p&gt;AI agents can automate your most essential tasks, giving you an edge in the workplace or saving you time to do more of what really matters. But getting the maximum benefits often requires access to your private accounts, which is fraught with dangers.&lt;/p&gt;



&lt;p&gt;To give you better control over your AI agent, Proton Pass now offers credential sharing via &lt;a href=&quot;https://proton.me/pass/access-tokens&quot;&gt;AI access tokens&lt;/a&gt;. Now you can easily give AI agents the credentials they need and nothing else, while monitoring their activity and staying organized. Every time an agent needs one of your credentials, it will have to give a reason, so you always know what your agent is doing and why.&lt;/p&gt;



&lt;p&gt;Create access tokens from your Proton Pass settings and start deploying advanced AI automations in minutes. &lt;strong&gt;AI access tokens are now included at no extra cost on Pass Plus (included in Proton Unlimited), Pass Family, Pass Professional, and &lt;/strong&gt;&lt;a href=&quot;https://proton.me/business&quot;&gt;&lt;strong&gt;Proton Workspace&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt; &lt;/strong&gt;— no expensive add-on required. You can now get the full benefits of agentic AI with reduced security risks while staying in complete control.&lt;/p&gt;



&lt;div class=&quot;text-center&quot;&gt;&lt;a class=&quot;btn inline-block rounded-full font-bold btn-small btn-solid-purple&quot; href=&quot;https://proton.me/pass/pricing&quot;&gt;Get Proton Pass&lt;/a&gt;&lt;/div&gt;



&lt;figure class=&quot;wp-block-video aligncenter&quot;&gt;&lt;video height=&quot;563&quot; style=&quot;aspect-ratio: 1000 / 563;&quot; width=&quot;1000&quot; controls src=&quot;https://res.cloudinary.com/dbulfrlrz/video/upload/f_auto,q_auto/v1779356068/wp-pme/ai-agent_blog_1469793646d.webm?_i=AA&quot;&gt;&lt;/video&gt;&lt;/figure&gt;



&lt;p class=&quot;has-text-align-center&quot;&gt;&lt;a href=&quot;https://proton.me/support/pass-access-tokens&quot;&gt;&lt;strong&gt;Learn how to use access tokens&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Use your AI agent with confidence&lt;/h2&gt;



&lt;p&gt;Individuals and companies are deploying AI agents at breakneck speed. But the rollout has so far been uneven, inefficient, and unsafe. Most companies that have AI usage policies are violating them constantly. A &lt;a href=&quot;https://www.mckinsey.com/capabilities/quantumblack/our-insights/the-state-of-ai&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;survey from McKinsey&lt;/a&gt; found that while 62% of companies are experimenting with AI agents, only 23% are actually scaling AI agent usage. Why? In part because until now, it&amp;#8217;s been difficult to give AI agents safe access to account credentials.&lt;/p&gt;



&lt;p&gt;Most apps are still built for people, not AI agents that operate through APIs, Model Context Protocol (MCP) calls, and command-line tools. As a result, when an AI agent needs a credential, you might provide it in plaintext on an ad hoc basis or using complicated methods requiring specialized knowledge. Many people understandably just skip the AI agent altogether rather than take the risk, missing out on exponential efficiency gains.&lt;/p&gt;



&lt;p&gt;Proton Pass for AI solves this problem by allowing you to share access in a convenient, auditable, and structured way — with a single prompt.&lt;/p&gt;



&lt;p&gt;With Proton Pass, you can:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Segment and control access:&lt;/strong&gt; Organize unique credentials for your agent inside dedicated vaults, sharing only what you need and nothing else.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Monitor credential usage activity:&lt;/strong&gt; Every time your AI agent needs a credential, it leaves an audit log including a reason for access, so you can review and monitor every login.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Restrict and revoke access:&lt;/strong&gt; Set an expiration for each access token and shut off access at any time.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Now it&amp;#8217;s easier to stay organized when sharing multiple credentials with your agent, while keeping visibility and control over how they&amp;#8217;re used.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Enable dozens of AI use cases, securely&lt;/h2&gt;



&lt;p&gt;AI access tokens are easy to set up. In your Proton Pass settings, create a new access token and copy and paste the setup instructions to your AI agent. Then simply ask your agent to perform actions that require access to the items you&amp;#8217;ve shared with it.&lt;/p&gt;



&lt;p&gt;Within minutes, you&amp;#8217;ll be able to have your agent perform any number of time-saving tasks autonomously: Ask your agent to check your bank&amp;#8217;s transaction history and categorize spending for the month, pull data from your fitness tracker and create a weekly wellness report, or ask your CRM to summarize the last three interactions with a specific client before a call with them.&lt;/p&gt;



&lt;p&gt;Even if you&amp;#8217;re not using an AI agent, you can also use access tokens in your own scripts and automatons, using the &lt;a href=&quot;https://protonpass.github.io/pass-cli/commands/item/#list&quot;&gt;list of commands&lt;/a&gt; that &lt;a href=&quot;https://proton.me/blog/proton-pass-cli&quot;&gt;Pass CLI&lt;/a&gt; accepts.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;How Proton Pass protects your credentials&lt;/h2&gt;



&lt;p&gt;Proton Pass uses end-to-end encryption to secure your usernames, passwords, API keys, bank cards, and other items. Whatever you store in Proton Pass is only accessible to you, unless you choose to securely share it. AI access tokens are our newest secure sharing option to bring password management into the age of agentic AI.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Read-only vault access&lt;/h3&gt;



&lt;p&gt;Proton Pass vaults are encrypted digital containers for your items, such as logins, aliases, and credit card details. You can assign items to different vaults and then create access tokens specific to those vaults. AI agents only access the items they need and nothing else, and they won&amp;#8217;t be able to create or edit items.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;593&quot; height=&quot;409&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_593,h_409,c_scale/f_auto,q_auto/v1778750710/wp-pme/access-tokens-access-2/access-tokens-access-2.png?_i=AA&quot; alt=&quot;Manage vault access 2&quot; class=&quot;wp-post-144371 wp-image-138905&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;27 KB&quot; data-optsize=&quot;5 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;82&quot; data-version=&quot;1778750710&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1778750710/wp-pme/access-tokens-access-2/access-tokens-access-2.png?_i=AA 593w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_207,c_scale/f_auto,q_auto/v1778750710/wp-pme/access-tokens-access-2/access-tokens-access-2.png?_i=AA 300w&quot; sizes=&quot;auto, (max-width: 593px) 100vw, 593px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;p&gt;For extra security, you can also set an expiration for each token, from one hour to one year, after which it can no longer be used.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Every access is logged and explained&lt;/h3&gt;



&lt;p&gt;Every time an AI agent uses an access token, this is logged and a reason for the access must be provided. These logs are easy to access, so you always know exactly what your AI agents are doing and why.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-large&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;600&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_600,c_scale/f_auto,q_auto/v1778750724/wp-pme/access-tokens-activity-2/access-tokens-activity-2.png?_i=AA&quot; alt=&quot;See exactly what your agent is doing. And why.&quot; class=&quot;wp-post-144371 wp-image-138926&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;157 KB&quot; data-optsize=&quot;23 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;85.5&quot; data-version=&quot;1778750724&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_600,c_scale/f_auto,q_auto/v1778750724/wp-pme/access-tokens-activity-2/access-tokens-activity-2.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_176,c_scale/f_auto,q_auto/v1778750724/wp-pme/access-tokens-activity-2/access-tokens-activity-2.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_450,c_scale/f_auto,q_auto/v1778750724/wp-pme/access-tokens-activity-2/access-tokens-activity-2.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_901,c_scale/f_auto,q_auto/v1778750724/wp-pme/access-tokens-activity-2/access-tokens-activity-2.png?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1778750724/wp-pme/access-tokens-activity-2/access-tokens-activity-2.png?_i=AA 1552w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;p&gt;&lt;a href=&quot;https://proton.me/support/pass-access-tokens&quot;&gt;&lt;strong&gt;Learn how to use access tokens&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Your agent does the work – you stay in control&lt;/h2&gt;



&lt;p&gt;Agentic AI can greatly amplify your personal productivity or improve your team&amp;#8217;s workflows, but it&amp;#8217;s vital that we harness its full power securely. Proton Pass lets you do just that, allowing you to embrace the efficiency of autonomous agents without surrendering control.&lt;/p&gt;



&lt;p&gt;Whether you&amp;#8217;re managing Jira tickets, analyzing energy usage, or researching papers, you can let your AI do the heavy lifting with greater peace of mind. Thanks to granular permissions, strict time limits, and full audit logs that explain every action, your sensitive data remains secure while your agent gets to work.&lt;/p&gt;



&lt;div class=&quot;text-center&quot;&gt;&lt;a class=&quot;btn inline-block rounded-full font-bold btn-small btn-solid-purple&quot; href=&quot;https://proton.me/pass/pricing&quot;&gt;Get Proton Pass&lt;/a&gt;&lt;/div&gt;
</content:encoded><category>Proton Pass</category><author>Son Nguyen Kim</author></item><item><title>Passkeys for business: should your company move beyond passwords?</title><link>https://proton.me/business/blog/passkeys-for-business</link><guid isPermaLink="true">https://proton.me/business/blog/passkeys-for-business</guid><description>Learn about passkeys for business, where adoption makes sense, and how to manage passkeys and passwords together during the transition.</description><pubDate>Wed, 20 May 2026 14:12:59 GMT</pubDate><content:encoded>
&lt;p&gt;For many companies, &lt;a href=&quot;https://proton.me/pass/passkeys&quot;&gt;passkeys&lt;/a&gt; are growing in popularity. They’re a practical way to reduce phishing risk, improve login security, and cut down on the weaknesses that come with password-only authentication.&lt;/p&gt;



&lt;p&gt;However, businesses can’t replace passwords everywhere overnight. Passkey support has expanded across major platforms, identity providers, and business tools, but most companies still run in mixed environments. Some apps are ready for passkeys today, but others still depend on passwords, &lt;a href=&quot;https://proton.me/blog/what-is-two-factor-authentication-2fa&quot;&gt;two-factor authentication&lt;/a&gt; (2FA) flows, or security questions for admin workflows and account recovery.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;So the real question is not whether passwords disappear tomorrow. It is whether your organization should start adopting passkeys for business accounts now, where they make the most sense, and how to manage the transition without creating unnecessary difficulty for employees or your IT team.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What are passkeys and how they work&lt;/h2&gt;



&lt;p&gt;A &lt;a href=&quot;https://proton.me/blog/what-is-a-passkey&quot;&gt;passkey&lt;/a&gt; replaces a traditional password with a cryptographic key pair. One key is public and stored by the service or app. The other is private and stays on the user’s device or in their credential manager.&lt;/p&gt;



&lt;p&gt;A password is a shared secret between the user and the service. Passkeys remove the shared-secret model and are designed to authenticate only with the legitimate service, not with a fake site set up to capture login information.&lt;/p&gt;



&lt;p&gt;When you sign in to a service with a passkey, the service sends a cryptographic challenge. The private key responds only after you unlock your device with a &lt;a href=&quot;https://proton.me/blog/what-is-biometric-data&quot;&gt;biometric&lt;/a&gt; method or a local PIN. The key never leaves the device, and the service does not store a password-equivalent secret that can later be stolen or cracked.&lt;/p&gt;



&lt;p&gt;Passkeys are both secure and easy to easy.&amp;nbsp; Instead of typing a password, you can choose the account they want to log in to and unlock your device the same way you already do every day, whether with Face ID, a fingerprint, Windows Hello, or a local PIN.&lt;/p&gt;



&lt;p&gt;For businesses, passkeys require extra consideration. They’re secure and useful but they require proper management. Passkeys are created, stored, and managed by a chosen credential manager, often the standard one built into the operating system or browser unless another provider is used.&lt;/p&gt;



&lt;p&gt;Passkeys are an authentication technology, but they’re also a management decision. If employees are going to use them across work devices, shared workflows, and multiple SaaS tools, your business needs a clear approach to storage, syncing, recovery, and governance.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Passkeys vs passwords: what should businesses choose?&lt;/h2&gt;



&lt;p&gt;The main security advantage of passkeys for business is that they remove several of the weaknesses attackers rely on most in password-based systems.&lt;/p&gt;



&lt;p&gt;Passwords can be weak and easy to guess with &lt;a href=&quot;https://proton.me/blog/what-is-brute-force-attack&quot;&gt;brute force attacks&lt;/a&gt;. Weak passwords can also be reused across work and personal accounts. They can be &lt;a href=&quot;https://proton.me/blog/what-is-phishing&quot;&gt;phished&lt;/a&gt;, intercepted, and exposed in third-party breaches. Even when businesses enforce strong &lt;a href=&quot;https://proton.me/business/blog/password-policy-template&quot;&gt;password policies&lt;/a&gt;, the underlying password model still leaves room for credential theft.&lt;/p&gt;



&lt;p&gt;Passkeys improve on that model. Because authentication is tied to a cryptographic key pair rather than a shared secret, there is no password for an employee to type into a fake login page and no reusable credential for an attacker to steal and use elsewhere. Passkeys authenticate only with the legitimate service they were created for, which makes them resistant to phishing attacks designed to imitate real login pages.&lt;/p&gt;



&lt;p&gt;They also reduce the risk created by stolen credential databases. In a password-based environment, a &lt;a href=&quot;https://proton.me/business/blog/data-breach-prevention-uk&quot;&gt;data breach&lt;/a&gt; can expose password-related data that may later be cracked or reused in credential stuffing attacks. With passkeys, the service stores only the public key, which cannot be used to recreate the private key held by the user. That makes large-scale credential theft far less useful to attackers.&lt;/p&gt;



&lt;p&gt;For businesses, this translates into practical security gains. Passkeys can reduce account compromise linked to phishing, lower the risk created by password reuse, and strengthen protection for high-risk identities such as admins, finance teams, HR, and executives.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;However, stronger authentication doesn’t eliminate the need for sound access management. Businesses still need trusted devices, clear identity policies, an &lt;a href=&quot;https://proton.me/business/blog/incident-response&quot;&gt;incident response plan&lt;/a&gt;, and role-based access controls. Passkeys make the authentication layer more resilient, but they work best as part of a broader security model rather than as an isolated fix.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;The current state of business passkey adoption&lt;/h2&gt;



&lt;p&gt;For businesses, the market has clearly moved past the experimentation stage.The shift is already visible in enterprise adoption data. In early 2025, the &lt;a href=&quot;https://fidoalliance.org/research-state-of-passkey-deployment-in-the-enterprise-a-snapshot-of-deployments-employee-sign-ins-us-uk/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;FIDO Alliance&lt;/a&gt; reported that 87% of organizations surveyed in the US and UK had either deployed passkeys or were in the process of rolling them out, and 47% had already deployed them to at least some employees. Among organizations using passkeys, 62% reported improved sign-in success rates, 58% reported a better user experience, and 50% said passkeys had helped reduce IT costs linked to passwords and account recovery.&lt;/p&gt;



&lt;p&gt;Passkeys are a viable option for businesses today, especially in identity layers, email environments, and high-value administrative workflows. But it is still not enough to assume that every application in a real-world SaaS stack is ready for a full passkey rollout.&lt;/p&gt;



&lt;p&gt;Many business tools, legacy enterprise applications, vendor portals, and niche SaaS products still rely on passwords, MFA patterns, or recovery models that do not fully support passkeys. Even when a major platform offers passkey support, that support may not extend cleanly across every workflow, fallback path, or administrative scenario.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;So the state of adoption in 2026 is best understood as transitional. Passkeys are real, valuable, and increasingly mainstream, but hybrid authentication is still the operational reality for most businesses.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;How to adopt a hybrid model for passkeys for business&lt;/h2&gt;



&lt;p&gt;The operational reality is that the path forward is not a clean break from passwords. It is a hybrid model that combines passkeys where they are available with strong password security where passwords are still necessary.&lt;/p&gt;



&lt;p&gt;A fully &lt;a href=&quot;https://proton.me/blog/passwordless&quot;&gt;passwordless environment&lt;/a&gt; is possible in more controlled settings, especially when a company has tight control over its devices, identity systems, and application access. But that is not the norm for most organizations.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;In practice, teams still depend on a mix of third-party tools and services: some already support passkeys and others still rely entirely on passwords or fallback credentials for recovery, administration, and legacy workflows.&lt;/p&gt;



&lt;p&gt;A more practical adoption model is necessary. Businesses need to introduce passkeys where they meaningfully reduce risk, especially in high-value or phishing-prone environments, while continuing to protect the systems that remain password-based. Just as important, they need to manage both models in a way that feels consistent for employees and does not create gaps in oversight or governance.&lt;/p&gt;



&lt;p&gt;Because passkeys aren’t universal yet, &lt;a href=&quot;https://proton.me/blog/what-is-a-password-manager&quot;&gt;password management&lt;/a&gt; is still essential. A &lt;a href=&quot;https://proton.me/business/pass&quot;&gt;business password manager&lt;/a&gt; is no longer just a place to store passwords. It becomes the layer that helps companies manage the transition from one authentication model to another without losing control of either.&lt;/p&gt;



&lt;p&gt;For businesses, that means passkey adoption is not only a question of authentication technology. It is also a question of how credentials are stored, synced, recovered, and governed across the organization.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;A closer look at passwordless authentication for business&lt;/h2&gt;



&lt;p&gt;Most businesses aren’t moving from passwords to passkeys in a single step. They are managing a mixed environment where some accounts can use passkeys today, while others still rely on passwords, legacy login flows, or fallback credentials. That makes credential management more complex, not less.&lt;/p&gt;



&lt;p&gt;In that context, the role of a &lt;a href=&quot;https://proton.me/business/blog/5-reasons-you-need-to-use-a-business-password-manager&quot;&gt;business password manager&lt;/a&gt; starts to shift. It is no longer only a place to store passwords. It becomes the layer that helps teams manage both password-based and passkey-based access in a secure, consistent way across devices, browsers, and operating systems.&lt;/p&gt;



&lt;p&gt;Proton Pass for Business can help organizations support both passwords and passkeys. It gives businesses a practical way to move toward modern authentication without losing control over the systems that are not ready to follow at the same pace.&lt;/p&gt;



&lt;p&gt;For IT teams, that matters not just from a usability perspective, but from a governance one as well. Policy enforcement, 2FA enforcement, audit logs, provisioning, and role-based sharing controls all become part of the transition.&lt;/p&gt;



&lt;p&gt;This is what makes passkey adoption a broader operational decision, not just a login experience upgrade. If employees create and manage passkeys in fragmented ways across personal devices and default consumer tools, your business can end up with inconsistent recovery processes, weak visibility, and unclear ownership. A managed platform helps avoid that by giving IT a way to support adoption while maintaining oversight.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Why businesses will always need access management&lt;/h3&gt;



&lt;p&gt;Even in a future where passkeys are supported across most business systems, your organization still needs an access management layer. The challenge of managing access does not disappear just because passwords do.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Businesses still need a consistent way to store and sync credentials across devices, manage recovery if an employee loses access to a device, control how credentials are shared or delegated, and maintain visibility over access as people join, change roles, or leave the organization.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;In that scenario, the value of an &lt;a href=&quot;https://proton.me/business/pass/enterprise-password-manager&quot;&gt;enterprise password manager&lt;/a&gt; shifts from simply storing passwords to helping IT manage passkey-based access in a more controlled, secure, and governable way.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Your first steps to implementing passkeys&lt;/h2&gt;



&lt;p&gt;Not every account needs to move at the same pace. Passkeys should be implemented for accounts that would create the greatest risk if compromised.&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Admin accounts&lt;/strong&gt; are usually the clearest first priority. If one of these accounts is phished or misused, the impact can extend far beyond a single team member’s account. &lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Finance teams&lt;/strong&gt; are another strong early priority, since they are frequent targets for fraud, payment redirection, and executive impersonation. &lt;/li&gt;



&lt;li&gt;&lt;strong&gt;HR accounts&lt;/strong&gt; also deserve attention because they often sit close to sensitive employee data, onboarding workflows, and identity-related systems.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;It also helps to look beyond the job role in your organization and think about exposure in terms of workflow. Passkeys tend to make the most sense in environments where employees regularly sign in to high-value systems from managed devices and where phishing risk is a real concern. That often includes identity platforms, email ecosystems, cloud consoles, and other security-sensitive internal tools.&lt;/p&gt;



&lt;p&gt;By contrast, low-risk applications, rarely used tools, or vendor-controlled systems may not need to be part of the first rollout, especially when support is still limited or recovery flows are not mature. A phased approach usually creates better outcomes than trying to make every system follow the same timeline.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;How to start your phased passkey adoption program&lt;/h2&gt;



&lt;p&gt;Introducing passkeys to your business environment requires a structured rollout. The goal is to introduce stronger authentication where it makes the most impact, while keeping the rest of the environment secure and manageable during the transition.&lt;/p&gt;



&lt;p&gt;A practical adoption plan usually includes a few core steps:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Map your current authentication environment.&lt;/strong&gt; Start by identifying which tools already support passkeys, which support &lt;a href=&quot;https://proton.me/blog/universal-2nd-factor-u2f&quot;&gt;FIDO2&lt;/a&gt; or WebAuthn more broadly, which are tied to identity providers that can enforce phishing-resistant authentication, and which still remain password-only. This gives you a realistic view of where passkeys can deliver immediate value and where existing login flows still need to stay in place.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Define how passkeys will be managed.&lt;/strong&gt; This is one of the most important decisions in the rollout. You’ll need to determine whether passkeys will be handled through platform-native credential managers, third-party tools, or a hybrid approach. A &lt;a href=&quot;https://proton.me/business/pass&quot;&gt;business password manager&lt;/a&gt; that also supports passkeys can be especially valuable here, because it helps reduce fragmentation across supported and unsupported apps.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Prepare employees for the new sign-in experience.&lt;/strong&gt; Teams do not need a technical explanation of the cryptography behind passkeys, but they do need to understand what changes in practice. That includes how sign-in will work, what recovery options exist, and how passkeys fit alongside the passwords they may still need in other systems. A good rollout makes secure behavior feel simple and familiar.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Keep your password program strong during the transition.&lt;/strong&gt; Passkeys may reduce dependence on passwords over time, but they do not eliminate the need for strong password security in the meantime. Businesses still need unique passwords, 2FA where appropriate, &lt;a href=&quot;https://proton.me/pass/password-sharing&quot;&gt;secure sharing&lt;/a&gt; controls, and clear lifecycle governance for the systems that are not yet ready to move.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;A phased rollout works best when it treats passkeys as part of a broader authentication strategy, not as a standalone feature. The companies that get the most value from passkeys are usually the ones that introduce them gradually, manage them centrally, and keep the rest of their credential environment under control at the same time.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Common business concerns about passkeys&lt;/h2&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;What happens if an employee loses their device?&lt;/h3&gt;



&lt;p&gt;If the lost device is the only place where the passkey is stored, the employee may not be able to sign in until access is recovered through another enrolled device, a backup &lt;a href=&quot;https://proton.me/authenticator&quot;&gt;authenticator&lt;/a&gt;, or an approved recovery process. Passkey rollout should not depend on a single device with no fallback plan.&lt;/p&gt;



&lt;p&gt;Businesses need to decide in advance how employees will regain access, who can approve recovery, and which accounts require stronger safeguards. A &lt;a href=&quot;https://proton.me/business/pass&quot;&gt;business password manager&lt;/a&gt; can help by storing and syncing passkeys across authorized devices, which reduces dependence on one phone or laptop and gives the business a more controlled way to manage access continuity.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Can passkeys work across multiple devices and operating systems?&lt;/h3&gt;



&lt;p&gt;Yes, but the experience depends on how passkeys are stored and managed. Some organizations may be comfortable with synced passkeys across employee devices, while others may prefer more tightly controlled or device-bound approaches for higher-risk roles. The important point is that cross-device use should be designed deliberately, not assumed to work the same way in every team or every environment.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;What if some apps support passkeys and others still require passwords?&lt;/h3&gt;



&lt;p&gt;That is the reality for most businesses today. Passkey adoption does not require every application to move at once. In practice, most companies will run a hybrid authentication model for some time, using passkeys where they are supported and keeping strong password management in place for systems that are not yet ready.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Will passkeys make password managers unnecessary?&lt;/h3&gt;



&lt;p&gt;Not really. Even in a more passkey-heavy environment, businesses still need a way to manage credentials consistently across users, devices, and systems. That includes storage, syncing, access control, recovery, visibility, and governance. In other words, the need for credential management remains, even as the credential type changes.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Are passkeys ready for every business system today?&lt;/h3&gt;



&lt;p&gt;No. Support has expanded significantly, especially across major platforms and identity providers, but many business tools still rely on passwords, older MFA flows, or fallback recovery models. That is why phased adoption tends to work better than trying to force universal rollout too early.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Do passkeys remove the need for broader access controls?&lt;/h3&gt;



&lt;p&gt;No. Passkeys strengthen authentication, but businesses still need device trust, role-based access controls, recovery planning, and clear governance. They reduce phishing risk and remove reusable secrets, but they work best as part of a broader security model.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;So, should your company move beyond passwords?&lt;/h2&gt;



&lt;p&gt;For most businesses, the answer is yes, but through a phased transition rather than an all-at-once replacement. If your company already relies on major enterprise platforms with passkey support, faces &lt;a href=&quot;https://proton.me/blog/what-is-phishing&quot;&gt;meaningful phishing risk&lt;/a&gt;, and wants to reduce its dependence on shared secrets, then passkey adoption is worth starting now.&lt;/p&gt;



&lt;p&gt;For businesses, that usually leads to a clearer conclusion: start adopting passkeys where they offer immediate security value, keep &lt;a href=&quot;https://proton.me/pass/download&quot;&gt;strong credential management&lt;/a&gt; in place for everything else, and make sure both are supported within a secure, well-governed access strategy.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Building the bridge from passwords to passkeys&lt;/h2&gt;



&lt;p&gt;That is ultimately what good passkey adoption looks like in business: not hype, not all-or-nothing migration, but a controlled shift toward phishing-resistant authentication where it matters most.&lt;/p&gt;



&lt;p&gt;Enterprise support for passkeys is now real across major platforms. But coverage is still incomplete enough that most businesses need a bridge strategy rather than an immediate transition.&lt;/p&gt;



&lt;p&gt;That is where Proton Pass for Business fits naturally. It helps teams manage credentials securely, enforce policies consistently, and support both modern authentication workflows and password-based systems. Access management, identity management, and monitoring are made easier for IT teams: Proton Pass offers centralized administration, SCIM provisioning, SSO support, audit logs, vault-level permissions, and company-wide policy controls.&lt;/p&gt;



&lt;p&gt;If your business is ready to adopt passkeys and improve password security, try our &lt;a href=&quot;https://proton.me/business/pass&quot;&gt;business password manager&lt;/a&gt; for free or &lt;a href=&quot;https://proton.me/business/contact?pd=pass&quot;&gt;get in touch with our sales team&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
</content:encoded><category>For business</category><author>Ben Wolford</author></item><item><title>How businesses can detect and prevent account takeover attacks</title><link>https://proton.me/business/blog/account-takeover-attacks</link><guid isPermaLink="true">https://proton.me/business/blog/account-takeover-attacks</guid><description>Learn what an account takeover is, how it can happen, and how businesses can detect and prevent attacks.</description><pubDate>Tue, 19 May 2026 16:53:22 GMT</pubDate><content:encoded>
&lt;p&gt;Account takeover attacks against businesses are increasing. According to research from Abnormal Security, 83% of organizations surveyed had been impacted by at least one account takeover attack in the previous year, and 26% reported facing an account takeover attempt every week. And in Proton’s &lt;a href=&quot;https://proton.me/business/smb-cybersecurity-report&quot;&gt;SMB Cybersecurity Report&lt;/a&gt;, we found that 1 in 4 small businesses have been hacked despite their cybersecurity measures.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;The financial impact can be severe, too. Research from IBM reports that &lt;a href=&quot;https://proton.me/business/pass/breach-observatory&quot;&gt;data breaches&lt;/a&gt; involving vendor compromise and account takeover average nearly USD 5 million in costs, with containment timelines often exceeding 250 days.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;That combination of frequency and impact helps explain why account takeover is so dangerous for businesses: attackers can simply sign in with legitimate credentials and begin operating from inside the organization, often before anyone realizes the account is no longer trustworthy.&lt;/p&gt;



&lt;p&gt;In the UK, the government’s &lt;em&gt;Cyber Security Breaches Survey 2025&lt;/em&gt; report also shows that takeover attempts and compromised accounts form part of the wider incident picture. For businesses, that makes account takeover more than a login issue. It is an identity security, fraud, and business continuity risk.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#what-is&quot;&gt;What is an account takeover attack?&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#how-account&quot;&gt;How account takeover differs from traditional attacks&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#most-common&quot;&gt;The most common account takeover methods&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#why-business&quot;&gt;Why business accounts are high-value targets&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#detection-signals&quot;&gt;Detection signals businesses should watch out for&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#business-impact&quot;&gt;The business impact of account takeover&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#practical-response&quot;&gt;Your practical response plan for a suspected account takeover&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#building-stronger&quot;&gt;Building a stronger security culture around account access&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#proton-pass&quot;&gt;How Proton Pass for Business reduces account takeover risk&lt;/a&gt;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;what-is&quot;&gt;What is an account takeover attack?&lt;/h2&gt;



&lt;p&gt;Cybercriminals launch account takeover attacks by gaining unauthorized access to a legitimate account and then using it for malicious purposes. In business environments, that usually means obtaining an employee’s password, intercepting their authentication flow, or otherwise gaining valid access to a work account.&lt;/p&gt;



&lt;p&gt;Once inside, an attacker can read internal communications, change account settings, move into connected apps, export confidential files, or impersonate the employee in conversations with colleagues, vendors, or customers. Because the attacker has gained valid access rather than forcing their way in through a visibly broken system, the activity looks like business as usual.&lt;/p&gt;



&lt;p&gt;This is what makes business account compromise so dangerous. An attacker may appear to be a normal user until damage is already underway.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;how-account&quot;&gt;How account takeover differs from traditional attacks&lt;/h2&gt;



&lt;p&gt;Account takeover is so disruptive because it isn’t as easy to spot as the kind of obvious attack or breach many teams expect.&lt;/p&gt;



&lt;p&gt;Business security teams often look for &lt;a href=&quot;https://protonvpn.com/blog/what-is-malware&quot;&gt;malware&lt;/a&gt;, exploited vulnerabilities, corrupted systems, or suspicious code execution. In an account takeover incident, no system may have been breached in the usual sense because the attacker has used legitimate credentials and ordinary sign-in flows.&lt;/p&gt;



&lt;p&gt;This difference is important because teams need to look for credential abuse rather than perimeter intrusion. When an attacker signs in using the same login page as everyone else using valid credentials, the activity doesn’t appear suspicious in isolation.&lt;/p&gt;



&lt;p&gt;Detection then depends less on spotting technical issues and more on noticing unusual behavior, such as strange login patterns, unexpected password resets, or abnormal access requests.&lt;/p&gt;



&lt;p&gt;In other words, account takeover often succeeds by abusing the organization’s normal trust model.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;most-common&quot;&gt;The most common account takeover methods&lt;/h2&gt;



&lt;p&gt;Attackers can use several well-established methods to gain access to business accounts. Some are opportunistic, while others are highly targeted.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Credential stuffing&lt;/h3&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/blog/what-is-credential-stuffing-attack&quot;&gt;Credential stuffing&lt;/a&gt; happens when attackers take usernames and passwords leaked in data breaches and test them against other services. This works because people often reuse passwords across both personal and work accounts.&lt;/p&gt;



&lt;p&gt;This makes &lt;a href=&quot;https://proton.me/pass/password-generator&quot;&gt;unique passwords&lt;/a&gt; one of your organization’s best defenses against account takeover. &lt;a href=&quot;https://proton.me/business/pass/breach-observatory-details&quot;&gt;Proton’s Data Breach Observatory&lt;/a&gt; shows that names and email addresses appear in nearly 9 out of 10 breaches, while passwords are exposed in 47% of incidents. When those credentials are reused across services, one breach quickly creates account takeover risk.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Phishing&lt;/h3&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/blog/what-is-phishing&quot;&gt;Phishing&lt;/a&gt; remains one of the most common routes into business accounts. It can be used to steal passwords, session tokens, or MFA approvals, all of which can feed directly into account takeover.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;SIM swapping&lt;/h3&gt;



&lt;p&gt;SIM swapping happens when an attacker convinces a mobile carrier to transfer a victim’s number to a SIM card they control. If a business still relies heavily on &lt;a href=&quot;https://proton.me/blog/stop-using-sms&quot;&gt;SMS&lt;/a&gt;-based authentication, then attackers can easily intercept login codes.&lt;/p&gt;



&lt;p&gt;To protect against sim-swapping, &lt;a href=&quot;https://proton.me/blog/what-is-two-factor-authentication-2fa&quot;&gt;two-factor authentication&lt;/a&gt; (2FA) methods are much more secure and suitable for higher-risk business accounts.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;2FA fatigue and session theft&lt;/h3&gt;



&lt;p&gt;Even when 2FA is enabled, attackers may try to wear users down with repeated approval prompts or steal session tokens through phishing and malware. 2FA is essential, but it isn’t sufficient on its own.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Password spraying&lt;/h3&gt;



&lt;p&gt;Password spraying is a type of &lt;a href=&quot;http://e&quot;&gt;brute force attack&lt;/a&gt;, where attackers try a set of commonly used passwords across many accounts. Instead of hammering one user with hundreds of guesses, they test weak defaults like “Welcome123!” or predictable company-based patterns against a wider pool of employees.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;why-business&quot;&gt;Why business accounts are high-value targets&lt;/h2&gt;



&lt;p&gt;Business accounts are attractive because of the data and funds they potentially hold. A compromised email account can enable business email compromise: for example, business payment fraud is a scam in which criminals tailor an email to an organization, impersonate a legitimate contact, and try to redirect payments or obtain sensitive information.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;A compromised admin account can be even more damaging. It may allow attackers to reset passwords, access additional systems, export data, or weaken security controls. Once that happens, a single compromised identity can lead to a much larger incident.&lt;/p&gt;



&lt;p&gt;Even ordinary employee accounts may connect to:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Email and calendars.&lt;/li&gt;



&lt;li&gt;CRM and customer support tools.&lt;/li&gt;



&lt;li&gt;HR and payroll systems.&lt;/li&gt;



&lt;li&gt;Cloud storage.&lt;/li&gt;



&lt;li&gt;Internal chat and collaboration platforms.&lt;/li&gt;



&lt;li&gt;Shared credentials and password vaults.&lt;/li&gt;



&lt;li&gt;Developer or infrastructure tools.&lt;br&gt;&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Corporate account hijacking goes beyond just fraud. It’s an access control problem that can have organization-wide consequences.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;detection-signals&quot;&gt;Detection signals businesses should watch out for&lt;/h2&gt;



&lt;p&gt;Because account takeover often begins with valid credentials, detection depends on spotting irregular behavior.&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Unusual login times or locations:&lt;/strong&gt; A login from an unfamiliar country, region, or time pattern can be suspicious, especially if it is followed by configuration changes.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Unexpected password reset requests:&lt;/strong&gt; Employees receiving reset emails they did not request may be seeing early signs of an attempted takeover.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Unfamiliar devices or browsers:&lt;/strong&gt; a login from a never-before-seen device is worth reviewing, particularly when paired with unusual app access or sharing behavior.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;2FA prompts not initiated by the account owner:&lt;/strong&gt; Unexpected 2FA approvals can signal that someone already has an account password and is trying to get through the second layer.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Mailbox or forwarding rule changes: &lt;/strong&gt;Attackers who compromise email accounts often create rules to hide messages, forward mail, or preserve access.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Unusual activity in sensitive tools:&lt;/strong&gt; A user suddenly accessing finance systems, admin dashboards, exports, or shared secrets in ways that don’t fit their normal responsibilities may indicate compromise.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Suspicious changes in vaults or shared credentials:&lt;/strong&gt; if passwords are modified, re-shared, or accessed in unusual ways, it may be a sign of account misuse rather than normal collaboration.&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;business-impact&quot;&gt;The business impact of account takeover&lt;/h2&gt;



&lt;p&gt;The reason account takeover fraud is so serious is that one compromised identity can suddenly create several kinds of damage. There is the immediate fraud risk. An attacker may impersonate an executive, employee, or vendor to request payment changes or confidential information.&lt;/p&gt;



&lt;p&gt;There is also the data risk. A compromised account may expose contracts, customer data, internal files, or sensitive communications.&lt;/p&gt;



&lt;p&gt;Then, there is the operational risk. Teams may have to lock accounts, rotate credentials, revoke access, review logs, verify communications, and check for lateral movement.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;If the attacker reaches privileged systems, the incident can escalate far beyond one compromised account. They may be able to deploy &lt;a href=&quot;https://proton.me/business/blog/ransomware-threats-smbs&quot;&gt;ransomware&lt;/a&gt;, maintain access to critical systems, or enable wider compromise across the environment.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;At that point, the issue is no longer simply securing a user’s identity. It can disrupt operations, delay recovery, and affect the organization’s ability to function normally, which is why account takeover must be accounted for in business continuity planning.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;practical-response&quot;&gt;Your practical response plan for a suspected account takeover&lt;/h2&gt;



&lt;p&gt;Even with strong preventive controls in place, businesses still need to be ready to respond quickly when an account takeover is suspected. A fast, structured response can help contain the incident before it spreads to other systems or workflows.&lt;/p&gt;



&lt;ol class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;The first step is to contain the risk by &lt;strong&gt;temporarily disabling the affected account, &lt;/strong&gt;revoking active sessions, and resetting credentials. Teams should then review recent login activity and any suspicious changes linked to the account. If the account has broader permissions or access to sensitive tools, the response should move even faster.  &lt;/li&gt;



&lt;li&gt;From there, the focus should &lt;strong&gt;shift to scope&lt;/strong&gt;. Businesses need to understand what the attacker may have accessed, changed, or used while inside the account, including email rules, connected apps, shared credentials, and signs of lateral movement.&lt;/li&gt;



&lt;li&gt;It is also important to &lt;strong&gt;contain any related exposure&lt;/strong&gt;. A compromised identity may affect finance processes, vendor communications, internal tools, or customer data, so response should not stop at the account itself.&lt;/li&gt;



&lt;li&gt;Once the immediate risk is under control, the incident should be used to strengthen what failed, whether that means improving credential hygiene, tightening 2FA enforcement, or improving detection through activity logs and identity monitoring workflows. These tools help surface suspicious login patterns, such as unusual locations, repeated failed attempts, odd-hour access, or unexpected account changes, so security teams can investigate earlier.&lt;/li&gt;
&lt;/ol&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;building-stronger&quot;&gt;Building a stronger security culture around account access&lt;/h2&gt;



&lt;p&gt;Account takeover thrives when access is treated as a convenience issue instead of a security discipline.&lt;/p&gt;



&lt;p&gt;A stronger security culture means employees understand that credentials are not just personal logins. They are access keys to business systems, customer trust, and operational continuity. It also means organizations make the secure path the easy path by giving teams proper tools, clear policies, and centralized support.&lt;/p&gt;



&lt;p&gt;That is where &lt;a href=&quot;https://proton.me/business/blog/enterprise-password-manager&quot;&gt;enterprise password managers&lt;/a&gt;, passkeys, dark web monitoring, stronger 2FA practices, and secure offboarding work together. These controls help reduce credential reuse, improve account hygiene, and limit how much damage one compromised account can do. &lt;/p&gt;



&lt;p&gt;Detection belongs to the wider monitoring layer, but password managers can still support it by generating logs and reports that feed into investigation and alerting systems. Together, these controls make account takeover harder to execute and easier to contain.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;proton-pass&quot;&gt;How Proton Pass for Business reduces account takeover risk&lt;/h2&gt;



&lt;p&gt;Many account takeover incidents start with exposed, weak, or reused credentials, then escalate because employees don’t have a consistent way to generate strong passwords, store them securely, use 2FA reliably, or spot early signs of exposure. Proton Pass for Business reduces that risk by making stronger account practices easier to apply across teams, not just easier to recommend.&amp;nbsp;&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Stronger password hygiene at scale&lt;/h3&gt;



&lt;p&gt;A &lt;a href=&quot;https://proton.me/pass/security&quot;&gt;secure password manager&lt;/a&gt; supports strong password generation, autofill, secure storage, and secure sharing, which helps teams move away from reused passwords, browser sprawl, and informal credential handling.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;This is essential for preventing account takeover because attackers often rely on password reuse and predictable login habits to turn one exposed credential into access across multiple services. Proton Pass also supports &lt;a href=&quot;https://proton.me/pass/passkeys&quot;&gt;passkeys&lt;/a&gt;, which reduce reliance on passwords for supported services and offer phishing-resistant sign-in protection. It also offers a built-in 2FA authenticator and autofilling TOTP codes, which makes stronger login habits easier to use consistently.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Better visibility into exposed and risky credentials&lt;/h3&gt;



&lt;p&gt;Proton Pass includes &lt;a href=&quot;https://proton.me/pass/pass-monitor&quot;&gt;Pass Monitor&lt;/a&gt;, which offers password health insights, dark web monitoring alerts for breached emails, and visibility into inactive 2FA. In practice, that helps organizations identify weak, reused, or already-exposed credentials before they are abused in credential stuffing or follow-on takeover attempts.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;A business password manager is ideal for account takeover prevention. It helps team members safely store and manage credentials, as well as helping teams identify the ones most likely to create downstream risk.&amp;nbsp;&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;More usable 2FA in day-to-day work&lt;/h3&gt;



&lt;p&gt;2FA helps make a stolen password less useful on its own, but adoption often breaks down when it feels inconvenient or fragmented. Proton Pass helps here by supporting a built-in 2FA authenticator and autofill for &lt;a href=&quot;https://proton.me/blog/one-time-password&quot;&gt;OTP&lt;/a&gt; codes, which makes stronger login habits easier to use consistently across supported accounts. That does not replace broader identity controls, but it does narrow one of the practical gaps attackers often exploit.&amp;nbsp;&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Admin control and security signals that support investigations&lt;/h3&gt;



&lt;p&gt;Proton Pass also contributes useful admin and security visibility through reporting, logs, and activity information. This helps organizations review credential-related activity, support internal investigations, and feed relevant signals into broader security workflows where needed.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;How Proton Sentinel complements Proton Pass for Business&lt;/h3&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/blog/sentinel-high-security-program&quot;&gt;Proton Sentinel&lt;/a&gt; is an advanced account protection program available across eligible Proton plans that creates a stronger layer of protection for Proton Accounts themselves, including stricter challenges for suspicious login attempts, greater visibility into logins and account changes, and 24/7 escalation of suspicious events to security analysts.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;That makes it relevant for protecting access to the Proton Account and, by extension, the sensitive data stored inside Proton services. But it should not be presented as if it detects suspicious logins across a company’s entire SaaS stack.&lt;/p&gt;



&lt;p&gt;Proton Pass for Business helps reduce account takeover risk by improving password hygiene, making MFA easier to use, surfacing exposed or weak credentials earlier, and giving teams better control over how credentials are managed across the organization. Proton Pass for Business strengthens the credential practices that attackers most often exploit, while Proton Sentinel can add another layer of protection for the Proton account itself.&lt;/p&gt;



&lt;p&gt;Ready to start? Protect your business accounts from takeover with Proton Pass — try it for free or &lt;a href=&quot;https://proton.me/business/contact?pd=pass&quot;&gt;speak to our sales team&lt;/a&gt;.&lt;/p&gt;
</content:encoded><category>For business</category><author>Kate Menzies</author></item><item><title>Why secure file sharing is your competitors’ biggest bluff</title><link>https://proton.me/business/blog/secure-file-sharing-for-smbs</link><guid isPermaLink="true">https://proton.me/business/blog/secure-file-sharing-for-smbs</guid><description>Most companies claim secure file sharing as a selling point, but few can back it up. Here&apos;s how to turn it into your competitive edge.</description><pubDate>Mon, 18 May 2026 15:41:51 GMT</pubDate><content:encoded>
&lt;p&gt;The tools your company uses to manage and share files are a statement about how seriously that company considers its data security.&lt;/p&gt;



&lt;p&gt;More organizations are recognizing this, with the majority of businesses now touting it as a selling point.&lt;/p&gt;



&lt;p&gt;Yet our latest research shows that nearly half of businesses actively marketing secure file sharing as a selling point can&amp;#8217;t actually back up the claim — and most may not even be aware their file sharing service is unsafe. The clients evaluating them, however, are increasingly able to tell the difference.&lt;/p&gt;



&lt;p&gt;If you&amp;#8217;re already operating with genuinely secure file-sharing practices, including end-to-end encryption, this is your moment to use that as a competitive edge.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;How SMBs actually handle file sharing&lt;/h2&gt;



&lt;p&gt;Our &lt;a href=&quot;https://proton.me/business/blog/smb-cybersecurity-report&quot; type=&quot;link&quot; id=&quot;https://proton.me/business/blog/smb-cybersecurity-report&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;SMB Cybersecurity Report&lt;/a&gt; 2026 surveyed 3,000 founders, executives, and IT leaders across the US, UK, France, Germany, Brazil, and Japan, giving a detailed picture of how small and mid-sized businesses actually handle file sharing in practice, not just in policy.&lt;/p&gt;



&lt;p&gt;When asked if they highlight &lt;a href=&quot;https://proton.me/business/drive&quot; type=&quot;link&quot; id=&quot;https://proton.me/business/drive&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;file-sharing&lt;/a&gt; as a selling point in competing for new business, nearly 76% of companies said “yes” or “sometimes, depending on the client”. &lt;/p&gt;



&lt;p&gt;Additionally, 65% said it was “critically important” or “very important” to&amp;nbsp;demonstrate secure handling of client data when winning new business.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;But of these same companies:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;46% use non-end-to-end encrypted (non-E2EE) cloud services&lt;/li&gt;



&lt;li&gt;35% still share sensitive client files by regular email&lt;/li&gt;



&lt;li&gt;32% do so by physical means, including USB drives and printed copies.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Despite the prevalence of non-secure means of file sharing, 45% of SMBs are very confident or completely confident in the security of their file-sharing practices in protecting client confidentiality.&lt;/p&gt;



&lt;p&gt;This is a significant disconnect — and a significant opportunity. Nearly half of the businesses leading with security as a selling point are doing so without the proper tools or practices to support the claim.&lt;/p&gt;



&lt;p&gt;That means the playing field isn&amp;#8217;t as competitive as it looks. For businesses that have genuinely embedded secure file sharing into how they operate, the gap isn&amp;#8217;t a threat; it&amp;#8217;s an opening.&lt;/p&gt;



&lt;p&gt;All this points to the fact that security is no longer a nice-to-have, but an expectation. &lt;/p&gt;



&lt;p&gt;File sharing safety has become a standard competitive argument, and the businesses that can immediately prove this — with specific tools, verifiable practices, and documented processes — are the ones converting security from a back-office investment into a genuine differentiator.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Where does your business stand?&lt;/h2&gt;



&lt;p&gt;File sharing sits at the intersection of operational efficiency and client trust. Many businesses have optimized for the former without fully accounting for the latter — and that&amp;#8217;s precisely where the gap opens up.&lt;/p&gt;



&lt;p&gt;Taking a close, hard look at your company&amp;#8217;s file sharing practices is key to understanding which side of the camp you sit on. This includes asking the following questions:&lt;/p&gt;



&lt;p&gt;Who holds your encryption keys? If your files are stored with a mainstream cloud provider, the answer is most likely with them, not you. &lt;/p&gt;



&lt;p&gt;Standard encryption on platforms like &lt;a href=&quot;https://proton.me/blog/is-google-drive-secure&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Google Drive&lt;/a&gt;, &lt;a href=&quot;https://proton.me/blog/is-dropbox-secure&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Dropbox&lt;/a&gt;, or &lt;a href=&quot;https://proton.me/business/microsoft-365-alternative&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Microsoft OneDrive&lt;/a&gt; protects data in transit, but the provider retains access to the files themselves. Your data isn&amp;#8217;t private from the platform — it&amp;#8217;s only protected from outside parties. &lt;/p&gt;



&lt;p&gt;That&amp;#8217;s a meaningful distinction, and one that increasingly sophisticated clients are aware of.&lt;/p&gt;



&lt;p&gt;Has your team shared a client file by email or other non-secure means in the last 30 days? Regular email, Slack messages, and printed documents aren’t end-to-end encrypted. &lt;/p&gt;



&lt;p&gt;Files sent this way are prone to being exposed and intercepted at multiple points in transit. If the answer is yes, that&amp;#8217;s a gap between your security posture and the claims your business may be making.&lt;/p&gt;



&lt;p&gt;Can you prove the security of your file sharing platform or systems? If that question would give you pause, your security practices may not be as embedded — or as defensible — as you think. &lt;/p&gt;



&lt;p&gt;Being able to explain and ideally demonstrate your business&amp;#8217;s security measures will inspire confidence in prospective clients and facilitate deals.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Strategies for secure file sharing&lt;/h2&gt;



&lt;p&gt;For most businesses, file sharing happens dozens or hundreds of times a day across multiple tools, teams, and client relationships. &lt;/p&gt;



&lt;p&gt;That scale is exactly why getting it right matters — and why getting it wrong compounds exposure and risk.&lt;/p&gt;



&lt;p&gt;The good news? Closing the gap between claiming security and demonstrating it doesn&amp;#8217;t require rebuilding how your business operates. &lt;/p&gt;



&lt;p&gt;It means making a few deliberate choices and enforcing them consistently enough that they become a credible part of how you present yourself to clients.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;1. Move to end-to-end encrypted cloud storage.&lt;/strong&gt; Look for a provider like &lt;a href=&quot;https://proton.me/business/drive&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Proton Drive&lt;/a&gt; where files are &lt;a href=&quot;https://proton.me/security/end-to-end-encryption&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;encrypted on-device&lt;/a&gt; before upload, and where you — not the provider — hold the encryption keys. Zero-access architecture means that even if the provider is compromised, your data isn&amp;#8217;t readable. That&amp;#8217;s a key difference from mainstream cloud storage, and a claim you can easily make to clients with full confidence.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;2. Make secure sharing the default by design.&lt;/strong&gt; Security policies only work when they&amp;#8217;re easier to follow than to bypass. Build your &lt;a href=&quot;https://proton.me/business/drive/secure-file-sharing-for-business&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;file-sharing workflow&lt;/a&gt; so that the most secure option is also the most intuitive. Every file sent by email because it was faster, every link shared through an unencrypted channel because the client preferred it — those are liabilities your business is choosing to accept.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;3. Extend encryption to your backups. &lt;/strong&gt;Encrypted storage provides limited protection if your backups live somewhere that doesn&amp;#8217;t apply the same standard. Ensure that the zero-access principle extends to how and where you store backup copies of client data — and that you, not a third-party provider, control the keys.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;4. Document and communicate your practices clearly. &lt;/strong&gt;This is where security stops being a compliance checkbox and starts being a business development asset. Be specific about what your tools protect and how, and anticipate questions that clients have at the top of mind on how their files are managed, stored, and shared. The businesses that can answer that clearly and demonstrably aren&amp;#8217;t just more secure — they&amp;#8217;re more compelling.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Turn security into your new selling point&lt;/h2&gt;



&lt;p&gt;Most businesses share files dozens of times daily without giving it a second thought. &lt;/p&gt;



&lt;p&gt;Every document shared through non-encrypted means another avenue of risk, while simultaneously leaving opportunity on the table. With much of the market still making claims they can’t back up, this is your chance to close the gap in verifiable ways and cut ahead of the competition.&lt;/p&gt;



&lt;p&gt;But true business security doesn’t stop at just how you share and manage files. &lt;/p&gt;



&lt;p&gt;Our &lt;a href=&quot;https://proton.me/business/smb-cybersecurity-report&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;SMB Cybersecurity Report 2026&lt;/a&gt; shows where your peers stand on security today, where gaps often appear (and are likely to be missed), and what businesses getting it right are doing differently. Get all these insights for free in our full report.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/business/smb-cybersecurity-report&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;&amp;lt;Download the report&gt;&lt;/a&gt;&lt;/p&gt;
</content:encoded><category>For business</category><author>Alanna Alexander</author></item><item><title>6 document management best practices</title><link>https://proton.me/business/blog/document-management-best-practices</link><guid isPermaLink="true">https://proton.me/business/blog/document-management-best-practices</guid><description>A practical guide to on how to organize files, manage access, and build a secure document management system.</description><pubDate>Mon, 18 May 2026 15:21:59 GMT</pubDate><content:encoded>
&lt;p&gt;When you’re running a business, documents pile up fast. Contracts, employee records, and commercially sensitive client data tend to accumulate haphazardly unless you have a clear document management system.&lt;/p&gt;



&lt;p&gt;Digital disorganization has real risks. It’s not just time-consuming to find what you need later, it can lead to operational errors or even security breaches. &lt;/p&gt;



&lt;p&gt;When the wrong version of a document circulates, agreements could be executed on incorrect terms, and sensitive information could be unintentionally disclosed. These problems stem from poor document management and result in compliance issues and eroded trust.&lt;/p&gt;



&lt;p&gt;Documentation management isn’t just about keeping your files organized; it’s about maintaining control. It helps ensure the right information is trusted, limits unnecessary access to sensitive data, and gives you visibility into who can view, change, or share &lt;a href=&quot;https://proton.me/business/blog/digital-data&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;business data&lt;/a&gt;. &lt;/p&gt;



&lt;p&gt;In this guide, you’ll learn:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;What documentation management is&lt;/li&gt;



&lt;li&gt;Why businesses need a method for managing documents&lt;/li&gt;



&lt;li&gt;6 document management best practices&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What is documentation management?&lt;/h2&gt;



&lt;p&gt;Document management is how your business stores, organizes, retrieves, and controls access to its files.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Most businesses use document management systems (DMS) to control documents centrally. These are cloud storage platforms, such as Google Drive and Proton Drive, that let teams upload files, organize them in folders, set access permissions, and keep everything in one place. &lt;/p&gt;



&lt;p&gt;A good DMS reduces version confusion and duplicated work, while giving teams clear visibility into where important files are kept.  &lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;File management vs. document management&lt;/h3&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/business/blog/file-management&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;File management&lt;/a&gt; focuses on basic organization — folder structures, naming conventions, and storage locations. Document management builds on this foundation by introducing governance features such as version control, permissions, and activity tracking. If file management is your filing cabinet, document management is the cabinet plus the lock and the logbook.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Note: Organization is not the same as control&lt;/h3&gt;



&lt;p&gt;Many businesses implement document management systems to centralize files and restore order. But structure alone doesn’t guarantee that sensitive information remains protected. Not all DMS offer &lt;a href=&quot;https://proton.me/learn/encryption/types-of-encryption/what-is-end-to-end&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;end-to-end encryption&lt;/a&gt;, which means files remain readable by the provider. This leaves you without control over your data and open to security risks — a breach of their systems becomes a breach of your data. Staying in control means your business data stays protected, and that access is limited to the people you authorize, no matter what happens to the provider. &lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Why businesses need a method for managing documents&lt;/h2&gt;



&lt;p&gt;Poor document management creates problems you’ve likely encountered:&amp;nbsp;&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Slow down your productivity: &lt;/strong&gt;The most obvious cost of poor document management is wasted time. And &lt;a href=&quot;https://socpub.com/articles/improper-document-management-83-workers-are-forced-recreate-existing-documents-16347&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;research&lt;/a&gt; backs this up — 96% of employees struggle to locate the most recent version of a document, and 83% have had to recreate files because they couldn&amp;#8217;t find the original. That’s hours lost on searching for and recreating files, time that could’ve been spent on work that moves your business forward.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Create confusion in collaborative work: &lt;/strong&gt;When no one knows which version of a document is current, work gets duplicated, decisions stall, and errors slip through. In distributed teams, this uncertainty spreads quickly, leading to missed deadlines and underbaked deliverables. &lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Accidentally expose sensitive data: &lt;/strong&gt;Weak access controls leave you vulnerable to breaches and careless mistakes. In a study of financial services companies, &lt;a href=&quot;https://info.varonis.com/hubfs/docs/research_reports/2021-Financial-Data-Risk-Report.pdf&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;over 64%&lt;/a&gt; had sensitive files accessible to every employee. One misconfigured folder is all it takes to expose client data and end a business relationship.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Make compliance harder to prove: &lt;/strong&gt;In sensitive industries such as &lt;a href=&quot;https://proton.me/business/drive/hipaa-compliant-cloud-storage-for-healthcare&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;healthcare&lt;/a&gt; and finance, clear evidence of how documents are stored, accessed, and retained is required. If you can’t show compliance, you&amp;#8217;re facing regulatory fines and damaged client relationships.&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;6 document management best practices&lt;/h2&gt;



&lt;p&gt;Here are six best practices to help you build a document management system that’s organized, secure, and easy to use.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;1. Store your files in a single location&lt;/h3&gt;



&lt;p&gt;Centralizing makes finding the right file much easier and eliminates the need to search across inboxes, local drives, and cloud accounts. Set rules and permissions that contain documents in one place rather than spread across multiple systems with different limitations.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;2. Establish folder structures and naming conventions — and apply them consistently&lt;/h3&gt;



&lt;p&gt;Organize folders by function or department (marketing, finance, HR, etc.), then by consistent subcategories such as year, project, or client name. For file names, include identifiers that make searching easy, such as dates, version numbers, and document type: ClientName_Contract_2025-01-15_v2.pdf. It’s much easier to find than &amp;#8220;Final_revised_FINAL.pdf&amp;#8221;.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;3. Control who accesses sensitive documents&lt;/h3&gt;



&lt;p&gt;Not every employee needs access to every document in your company — a graphic designer doesn’t need to see employee records or financial reports. Set permissions that limit access to documents for only the right people and review permissions regularly. Outdated permissions from role changes, project completions, or employee departures &lt;a href=&quot;https://proton.me/business/blog/spreadsheet-security-business-survey&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;create hidden security and privacy liabilities&lt;/a&gt;. If your team handles financial records, customer information, or product plans, maintaining confidentiality is part of running the business. When you lose track of who can access that data, the consequences can include regulatory scrutiny, lost deals, and reputational damage. &lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;4. Track versions closely&lt;/h3&gt;



&lt;p&gt;Imagine this: Five employees, editing five different copies of the same document. Which one do you use? When work goes through multiple hands, version control is essential. Tools, like &lt;a href=&quot;https://proton.me/drive/docs&quot;&gt;collaborative documents&lt;/a&gt;, that allow your team to work on the same document simultaneously, make version control even easier. Changes become visible as they happen. Features such as inline comments, suggested edits, and version history reduce the back-and-forth that can slow teams down, especially when working across time zones.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;5. Password-protect files that are shared externally&lt;/h3&gt;



&lt;p&gt;Sensitive files often need to be shared with investors, partners, or customers. When you share externally, follow a simple rule: access should remain identifiable, time-bound, and easy to revoke. Use sharing links with password protection and expiration dates rather than open links or email attachments. This way, access remains under your control; you can see who has it, limit how long they have it, and revoke it when necessary.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;6. Choose a DMS with strong security foundations&lt;/h3&gt;



&lt;p&gt;Familiar tools like Google Drive are convenient solutions, but that convenience comes at the expense of your privacy and security. A fully encrypted DMS ensures files are encrypted before they leave your device, and that only you and your intended recipients can decrypt them.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Not sure which platform to choose? Ask who holds the encryption keys and what jurisdiction the provider operates under. This reduces the risk that sensitive business data can be read, leaked, or misused. It also influences how well your security holds up during incidents, audits, or disputes.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Build your document management system with Proton Drive&lt;/h2&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/business/drive&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Proton Drive&lt;/a&gt; is a privacy-first platform that supports document management best practices without compromising on security.&lt;/p&gt;



&lt;p&gt;Enterprise DMS solutions are complex and costly; not every business needs or wants that. Proton Drive lets you build your document management system on a privacy-driven foundation that allows your teams to safely organize, manage, and share files.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Proton Drive is end-to-end encrypted by default, so you can trust that no one but you and the people you share with can access your files — not even Proton can. And being based in &lt;a href=&quot;https://proton.me/blog/switzerland&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Switzerland&lt;/a&gt;, your documents are protected by some of the strictest privacy laws in the world. &lt;/p&gt;



&lt;p&gt;With Proton Drive as your document management system, you can:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Store all your business files in one place, protected by end-to-end encryption. Proton Drive is &lt;a href=&quot;https://proton.me/business/iso-27001-certification&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;ISO 27001&lt;/a&gt; certified and supports compliance with &lt;a href=&quot;https://proton.me/business/drive/hipaa-compliant-cloud-storage-for-healthcare&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;HIPAA&lt;/a&gt; and &lt;a href=&quot;https://proton.me/business/gdpr&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;GDPR&lt;/a&gt;.&lt;/li&gt;



&lt;li&gt;Set permissions at the file or folder level to control who can view or edit sensitive documents.&lt;/li&gt;



&lt;li&gt;Access previous versions of your files for &lt;a href=&quot;https://proton.me/blog/drive-version-history&quot;&gt;up to 10 years&lt;/a&gt;, so you can review or restore earlier drafts when needed.&lt;/li&gt;



&lt;li&gt;Create and edit documents with your team using &lt;a href=&quot;https://proton.me/drive/docs&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Proton Docs&lt;/a&gt; and &lt;a href=&quot;https://proton.me/drive/sheets&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Sheets&lt;/a&gt;. Changes sync instantly, and version history keeps everyone aligned.&lt;/li&gt;



&lt;li&gt;Share files with &lt;a href=&quot;https://proton.me/drive/file-sharing/password-protection&quot;&gt;password-protected&lt;/a&gt; links and expiration dates. Recipients don&amp;#8217;t need a Proton account, and you can revoke access at any time.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Look no further for &lt;a href=&quot;https://proton.me/business/drive&quot; type=&quot;link&quot; id=&quot;https://proton.me/business/drive&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;a document management solution&lt;/a&gt; that prioritizes security without the complexity.&lt;/p&gt;
</content:encoded><category>For business</category><author>Alanna Alexander</author></item><item><title>If you don’t control your data, who does? A European strategist explains</title><link>https://proton.me/business/blog/data-sovereignty-for-european-businesses</link><guid isPermaLink="true">https://proton.me/business/blog/data-sovereignty-for-european-businesses</guid><description>Austrian data strategist Fritz Fahringer explains how European businesses can reclaim data sovereignty with everyday tools.</description><pubDate>Fri, 15 May 2026 17:00:06 GMT</pubDate><content:encoded>
&lt;p&gt;&lt;strong&gt;“What’s the problem?”&lt;/strong&gt;&lt;/p&gt;



&lt;p&gt;That was the response Austrian data strategist Fritz Fahringer got when he raised concerns about companies using private emails to train AI systems when he spoke to an employee at a major US tech company.&lt;/p&gt;



&lt;p&gt;The exchange stayed with him. It reinforced something he had already seen firsthand: In parts of the global tech ecosystem, access to customer data is more than a technical capability. It’s a business model. &lt;/p&gt;



&lt;p&gt;To Fahringer, that represents a growing breach of trust between technology providers and the organizations that depend on them.&lt;/p&gt;



&lt;p&gt;Fahringer, who previously led the development of &lt;a href=&quot;https://www.datahub.tirol/news&amp;amp;remotepageid=34808&quot;&gt;datahub.tirol&lt;/a&gt; — one of Europe&amp;#8217;s first trust-based regional data spaces, has spent years designing secure data-sharing systems and digital infrastructure for businesses and public institutions. &lt;/p&gt;



&lt;p&gt;He saw firsthand how uncertainty over who can access, control, or benefit from data has held organizations back. It has slowed innovation, increased risk, and made leaders hesitant to adopt new technologies.&lt;/p&gt;



&lt;p&gt;Fahringer isn’t alone in questioning these assumptions. For many European organizations, the possibility that providers may access, analyze, or monetize sensitive information is becoming &lt;a href=&quot;https://proton.me/business/europe-tech-watch&quot; type=&quot;link&quot; id=&quot;https://proton.me/business/europe-tech-watch&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;a practical business risk&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;Could a provider processes or transfers data in a way that conflict with &lt;a href=&quot;https://proton.me/business/gdpr&quot; type=&quot;link&quot; id=&quot;https://proton.me/business/gdpr&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;GDPR&lt;/a&gt; or local regulations, the company using the tool may still be responsible? Could sensitive customer data, product plans, negotiations be exposed, accessed internally by the provider, or used in unintended ways? Could their data might be used to &lt;a href=&quot;https://proton.me/blog/ai-gdpr&quot; type=&quot;link&quot; id=&quot;https://proton.me/blog/ai-gdpr&quot;&gt;train models&lt;/a&gt; or improve services that ultimately benefit the provider or even competitors?&lt;/p&gt;



&lt;p&gt;These are the concerns that bring businesses to VALTYROL, Fahringer&amp;#8217;s business that is singularly focused on helping decision-makers take a more intentional approach to how their data is handled.&lt;/p&gt;



&lt;p&gt;In this conversation, we speak to him about how breaking away from &lt;a href=&quot;https://proton.me/blog/data-sovereignty&quot; type=&quot;link&quot; id=&quot;https://proton.me/blog/data-sovereignty&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;inherited tech dependencies&lt;/a&gt; — and owning the systems your data flows through — often begins with everyday tools like email and meetings&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;&lt;strong&gt;Let’s start with the fundamentals. Why should companies question who they depend on to run their technology?&lt;/strong&gt;&lt;/h3&gt;



&lt;p&gt;Because those decisions have long-term consequences. If you rely heavily on providers whose priorities or legal environments you don’t control, you can gradually lose strategic flexibility and visibility over how your data is used.&lt;/p&gt;



&lt;p&gt;In the past, it was sometimes difficult to explain why sovereignty matters. Many people didn’t really think about where their data was stored or who ultimately had access to it.&lt;/p&gt;



&lt;p&gt;But in the age of AI — and also with the current geopolitical tensions — people are starting to understand that data is a strategic resource. If your data is stored and processed by companies outside your jurisdiction, you lose a certain level of control over how it can be used.&lt;/p&gt;



&lt;p&gt;That’s why many organizations in Europe are beginning to &lt;a href=&quot;https://proton.me/blog/european-alternative-us-tech-survey&quot; type=&quot;link&quot; id=&quot;https://proton.me/blog/european-alternative-us-tech-survey&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;rethink their dependencies&lt;/a&gt;. They want to understand who operates their infrastructure and what happens to their data.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;&lt;strong&gt;What’s stopping businesses from breaking away from default reliance on global technology providers?&lt;/strong&gt;&lt;/h3&gt;



&lt;p&gt;When I started my own company, I wanted to do things differently from the beginning.&lt;/p&gt;



&lt;p&gt;My digital tools were scattered across many providers — Gmail, different cloud services, a VPN from another company. Most of them were based in the United States.&lt;/p&gt;



&lt;p&gt;I decided to move everything into a more sovereign setup. I switched my &lt;a href=&quot;https://proton.me/business/mail&quot;&gt;email&lt;/a&gt;, &lt;a href=&quot;https://proton.me/business/pass&quot;&gt;password manager&lt;/a&gt;, &lt;a href=&quot;https://proton.me/business/vpn&quot;&gt;VPN&lt;/a&gt;, and &lt;a href=&quot;https://proton.me/business/drive&quot;&gt;cloud storage&lt;/a&gt; to Proton.&lt;/p&gt;



&lt;p&gt;It was important for me to bring everything together in &lt;a href=&quot;https://proton.me/business/blog/proton-workspace&quot; type=&quot;link&quot; id=&quot;https://proton.me/business/blog/proton-workspace&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;one ecosystem&lt;/a&gt; that aligns with the values I talk about professionally.&lt;/p&gt;



&lt;p&gt;But I know this well: Moving your entire IT infrastructure at once is very difficult. Most companies have built their systems over many years.&lt;/p&gt;



&lt;p&gt;Sovereignty has to happen &lt;a href=&quot;https://proton.me/business/blog/cybersecurity-for-startups&quot; type=&quot;link&quot; id=&quot;https://proton.me/business/blog/cybersecurity-for-startups&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;step by step&lt;/a&gt;. Some of the easiest places to start are communication tools — email, meetings, and collaboration platforms. These are areas where companies can &lt;a href=&quot;https://proton.me/business/blog/tech-investment-not-cost&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;adopt more sovereign solutions&lt;/a&gt; without rebuilding their entire IT architecture.&lt;/p&gt;



&lt;p&gt;Over time, those decisions add up to a more independent and resilient digital infrastructure.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;&lt;strong&gt;Why are tools like private email, VPNs, and secure meetings important for businesses today?&lt;/strong&gt;&lt;/h3&gt;



&lt;p&gt;Businesses shouldn’t have to choose between usability and privacy.&lt;/p&gt;



&lt;p&gt;A lot of work today happens outside the office — on trains, in cafés, or while traveling. In those situations, you’re often connecting through public networks, so using a VPN is a simple way to protect your connection.&lt;/p&gt;



&lt;p&gt;But communication tools are just as important. Email and video meetings are where a lot of sensitive information is exchanged.&lt;/p&gt;



&lt;p&gt;When you look at the common meeting tools, each one comes with a trade-off. Zoom has limitations on free calls. Microsoft Teams can be difficult to use. Google Meet works well, but then your data sits inside Google’s ecosystem.&lt;/p&gt;



&lt;p&gt;So in many cases you’re choosing between different disadvantages.&lt;/p&gt;



&lt;p&gt;What I liked about Proton Meet is that it removes that trade-off. It’s simple to use, and at the same time it respects privacy. For me, that combination is very important.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;&lt;strong&gt;What made Proton stand out compared to the tools you were using before?&lt;/strong&gt;&lt;/h3&gt;



&lt;p&gt;What stood out to me was that Proton offers a complete ecosystem.&lt;/p&gt;



&lt;p&gt;With many services, you get only one piece — maybe email, or maybe storage — and everything else comes from another provider. Over time you end up with a fragmented setup.&lt;/p&gt;



&lt;p&gt;Proton offered email, Drive, VPN, password management, and other tools within the same privacy-focused system. For a small business, that combination is very powerful.&lt;/p&gt;



&lt;p&gt;It allowed me to move away from a patchwork of different services and consolidate everything under a provider that prioritizes privacy.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;&lt;strong&gt;How do clients or partners react when they see that you’re using Proton?&lt;/strong&gt;&lt;/h3&gt;



&lt;p&gt;Often people notice the Proton email address and ask about it.&lt;/p&gt;



&lt;p&gt;They say something like, “Oh, you really take this seriously.”&lt;/p&gt;



&lt;p&gt;For me, it’s not about selling Proton or convincing people to switch. But it shows that I try to live by the principles I talk about — especially around data sovereignty.&amp;nbsp;When people see my Proton email, they realize I take sovereignty seriously.&lt;/p&gt;



&lt;p&gt;It becomes a signal that these values are not just theoretical.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;&lt;strong&gt;What advice would you give to European businesses that want to take more control over their data?&lt;/strong&gt;&lt;/h3&gt;



&lt;p&gt;Moving your entire IT infrastructure at once is very difficult. Most companies have built their systems over many years.&lt;/p&gt;



&lt;p&gt;But sovereignty can happen step by step.&lt;/p&gt;



&lt;p&gt;Many European businesses are curious about AI, but at the same time they are cautious about how their data is used. &lt;/p&gt;



&lt;p&gt;When data goes into &lt;a href=&quot;https://proton.me/business/europe-tech-watch&quot; type=&quot;link&quot; id=&quot;https://proton.me/business/europe-tech-watch&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;large platforms outside Europe&lt;/a&gt;, companies often feel that they lose control over it. They worry that the data could be used to train models, generate value somewhere else, or even benefit competitors.&lt;/p&gt;



&lt;p&gt;One practical approach is to start building a more sovereign stack over time. For example, I combine regional providers with European privacy-focused tools. My website is hosted with an Austrian provider that I can reach and trust locally, while Proton provides the communication infrastructure — email, storage, meetings, and VPN.&lt;/p&gt;



&lt;p&gt;This kind of setup allows companies to keep more control over their data while still using modern digital tools.&lt;/p&gt;



&lt;p&gt;You don’t have to change everything overnight. But each step toward more trusted infrastructure helps build a more independent and resilient digital environment.&lt;/p&gt;
</content:encoded><category>For business</category><category>Opinion</category><author>Alanna Alexander</author></item><item><title>How to build a security awareness training program for your organization</title><link>https://proton.me/business/blog/security-awareness-training</link><guid isPermaLink="true">https://proton.me/business/blog/security-awareness-training</guid><description>Build a security awareness training program that reduces human risk through role-specific guidance, and stronger credential practices.</description><pubDate>Fri, 15 May 2026 15:16:02 GMT</pubDate><content:encoded>
&lt;p&gt;Most organizations understand that people play a major role in cyber risk. Far fewer have built a security awareness training program or adopted a &lt;a href=&quot;https://proton.me/business/pass&quot;&gt;business password manager&lt;/a&gt;, which can genuinely change behavior.&lt;/p&gt;



&lt;p&gt;Human-related security risk is rarely one dramatic incident. Realistically, it appears in ordinary moments: an employee clicks a convincing &lt;a href=&quot;https://proton.me/blog/what-is-phishing&quot;&gt;phishing&lt;/a&gt; email, reuses a password across business tools, shares a login in a chat, or ignores a &lt;a href=&quot;https://proton.me/blog/what-is-two-factor-authentication-2fa&quot;&gt;two-factor authentication&lt;/a&gt; (2FA) request because it feels like an interruption rather than a protective step.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Over time, those everyday decisions determine the organization’s exposure. In the UK, the broader threat picture makes that impossible to treat as a minor issue. The UK government’s report &lt;em&gt;&lt;a href=&quot;https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2025/cyber-security-breaches-survey-2025&quot;&gt;Cyber Security Breaches Survey 2025&lt;/a&gt;&lt;/em&gt; found that half of businesses suffered a cyber security incident or breach in the previous 12 months, and phishing remained the most common type of cyber crime among affected businesses. &lt;/p&gt;



&lt;p&gt;For HR leaders, CISOs, COOs, IT managers and security teams, that makes security awareness training much more than just a compliance exercise. It’s how businesses reduce preventable risk. The challenge is that many programs are still built around just completing exercises rather than actually changing behavior. Team members watch an annual video, tick a box, and return to the same habits that created the risk in the first place.&lt;/p&gt;



&lt;p&gt;A more effective approach treats awareness as part of workplace culture. It’s reinforced over time, shaped by role, backed by usable policies, and supported by tools that make the secure choice easier to follow.&lt;/p&gt;



&lt;p&gt;We’ll explain what an effective security awareness program actually looks like, why so many organizations get it wrong, and how to build one that improves day-to-day behavior rather than simply documenting that training happened.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Why security awareness training fails in most organizations&lt;/h2&gt;



&lt;p&gt;Security awareness training often fails because it is treated as an &lt;strong&gt;event&lt;/strong&gt;, instead of as a &lt;strong&gt;system&lt;/strong&gt;. In many organizations, the program consists of an annual compliance module, a short quiz, and little else. Staff are expected to absorb generic advice once a year and then apply it consistently across hundreds of real world workflows, tools, and decisions. This just isn’t enough to change behavior in a lasting way.&lt;/p&gt;



&lt;p&gt;The problem is not that awareness training lacks value. It is that many programs are outdated or too detached from how people actually work. They rely on abstract reminders, while the real risks appear in inboxes, shared drives, password resets, urgent requests from managers, and day-to-day access decisions. If the training does emulate what people actually see or do every day, they’re unlikely to retain or apply it.&lt;/p&gt;



&lt;p&gt;Training programs should include induction and refresher training for all staff on data protection and information governance, while awareness raising should use regular communication methods to keep information governance, data protection, and information security visible over time.&amp;nbsp; That points to a continuous model rather than a single annual intervention.&lt;/p&gt;



&lt;p&gt;Another reason programs fail is that they focus too narrowly on what employees should not do, while ignoring the root cause of bad habits. Telling staff not to reuse passwords helps in theory, but it does little if the business has not given them a secure, practical way to create, store, and share credentials. Telling them how to spot phishing is useful, but less effective if reporting suspicious messages is unclear or cumbersome.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What a real security awareness program looks like&lt;/h2&gt;



&lt;p&gt;A real security awareness program is not something employees complete once and forget. It is an ongoing set of habits, expectations, and safeguards that helps people make better security decisions over time.&lt;/p&gt;



&lt;p&gt;This begins with continuity. Use training resources designed to complement existing policies and procedures. They should cover practical areas such as &lt;a href=&quot;https://proton.me/blog/create-remember-strong-passwords&quot;&gt;strong passwords&lt;/a&gt;, &lt;a href=&quot;https://proton.me/business/blog/byod-policy&quot;&gt;BYOD best practices&lt;/a&gt;, &lt;a href=&quot;https://proton.me/business/blog/phishing-awareness-training&quot;&gt;phishing&lt;/a&gt;, and &lt;a href=&quot;https://proton.me/business/blog/incident-response&quot;&gt;incident reporting&lt;/a&gt;. That mix is useful because effective awareness does not stop at one topic. It should reflect the full set of routine actions that shape security in real workplaces.&lt;/p&gt;



&lt;p&gt;But continuity alone is not enough. The program also needs to reflect the real differences in how teams encounter risk.&lt;/p&gt;



&lt;p&gt;An effective program also needs to be role-specific. A finance team member handling payment requests does not face the same day-to-day risk as a marketing manager sharing social accounts, or an HR lead managing employee records. Generic advice has its place, but it works better when followed by training relevant to the systems, data, and attack patterns most relevant to each group.&lt;/p&gt;



&lt;p&gt;The next component is practice. Employees do not develop better judgement only by reading rules. They improve through repeated exposure to realistic scenarios: phishing simulations, reporting exercises, access reviews, and short reminders tied to actual tools or workflows. Simulated attacks are particularly useful because they test whether the program is affecting behavior in the moments that matter, rather than only in a quiz environment.&lt;/p&gt;



&lt;p&gt;Clear security and password policies are just as important. Staff need to know how credentials should be created, stored, shared, and removed when no longer needed, how suspicious messages should be reported, when 2FA is required, and what to do if they think they have made a mistake.&lt;/p&gt;



&lt;p&gt;Finally, a real program treats security as a shared workplace norm rather than a specialized IT concern. That means managers reinforce it, leaders model it, and teams talk about it as part of how the organization operates day to day. Building that kind of culture takes more than a policy document, but it is one of the strongest ways to reduce repeated human error over time.&lt;/p&gt;



&lt;p&gt;Proton’s guide on &lt;a href=&quot;https://proton.me/blog/small-business-cyber-security-culture-workplace&quot;&gt;small business cyber security culture in the workplace&lt;/a&gt; is helpful here because it frames awareness not as a fear-based campaign, but as part of how a business works every day.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Why phishing and credential abuse belong at the center of the program&lt;/h2&gt;



&lt;p&gt;If a security awareness program tries to cover everything equally, it can lose focus. Most organizations are better served by starting with the risks most likely to produce real damage.&lt;/p&gt;



&lt;p&gt;Phishing belongs near the top of that list. The UK government’s report &lt;em&gt;Cyber Security Breaches Survey 2025&lt;/em&gt; found that phishing remained the most prevalent type of attack vector among businesses that experienced cyber crime, affecting 93% of those businesses. That reflects a wider reality across UK businesses, where phishing remains one of the most common attack methods.&lt;/p&gt;



&lt;p&gt;Phishing rarely ends with the message itself. In many organizations, the real damage begins once stolen credentials are used to access accounts, exploit password reuse, move into other systems, or take advantage of shared logins that were never tightly controlled.&lt;/p&gt;



&lt;p&gt;Businesses need to use a layered approach. It needs to be harder for attackers to reach users and easier for users to identify and report suspected phishing messages. This protects organizations from the effects of undetected phishing emails and helps them respond quickly to incidents.&lt;/p&gt;



&lt;p&gt;A strong security awareness program should reflect that same logic. Employees need to be able to recognize suspicious behavior, but they also need the surrounding controls that reduce the impact of one mistake.&lt;/p&gt;



&lt;p&gt;That is where credential hygiene becomes central. Training staff to avoid weak or reused passwords is useful, but it becomes much more effective when supported by tools that reduce reliance on memory and make secure credential use easier in practice. We also cover this broader preventive mindset in our guide to &lt;a href=&quot;https://proton.me/blog/data-breach-prevention-for-businesses&quot;&gt;data breach prevention for businesses&lt;/a&gt;, which emphasizes the role of practical controls in reducing avoidable exposure.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;The role of tooling in reducing human risk&lt;/h2&gt;



&lt;p&gt;Security awareness is only part of the picture. People are far more likely to follow secure practices when those practices fit naturally into the way they work. If the safest option is also the easiest one to use, adoption is much more consistent. If it feels slow, awkward, or hard to use, even well-intentioned employees will start looking for shortcuts.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/blog/how-do-password-managers-work&quot;&gt;Password management&lt;/a&gt; is one of the clearest examples. Organizations often tell staff to create strong, unique passwords, use 2FA, and avoid sharing. But unless employees are given a practical way to do that, the instruction remains aspirational. They fall back on memorable, easy passwords, browser storage, spreadsheets, notes apps, or messaging tools because those options feel faster in the moment.&lt;/p&gt;



&lt;p&gt;A &lt;a href=&quot;https://proton.me/business/pass&quot;&gt;business password manager&lt;/a&gt; helps close that gap. Proton Pass for Business is designed to make secure password creation, storage, and sharing easier across teams, while also giving organizations stronger control over credential practices. These capabilities help employees create and autofill strong, unique passwords, use 2FA across accounts, and protect stored credentials with &lt;a href=&quot;https://proton.me/security/end-to-end-encryption&quot;&gt;end-to-end encryption&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;That does not replace security awareness training. It reinforces it by making secure behavior easier to follow. Instead of asking staff to remember dozens of complex password rules, you give them a system that supports the behavior you want. That makes good security practice easier to sustain and policy enforcement more achievable.&lt;/p&gt;



&lt;p&gt;The same applies to incident reporting, access control, and onboarding. In these areas, tools are often necessary to give employees a clear process to follow and to give the organization consistent oversight and control. Tooling cannot replace judgement, but it can make secure actions easier, faster, and more consistent in everyday work.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;A practical 6 step framework for launching or improving your security awareness program&lt;/h2&gt;



&lt;p&gt;A security awareness program works best when it is designed as an operating rhythm rather than a single campaign. The framework below can help you get started.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Step 1: Define the specific behaviors you want to change&lt;/h3&gt;



&lt;p&gt;Begin with risk. Identify the behaviors most likely to expose your organization. That may include clicking suspicious links, reusing passwords, sharing credentials informally, failing to report incidents, weak offboarding workflows, or mishandling personal data such as customer or employee information.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Step 2: Prioritize the highest-risk scenarios&lt;/h3&gt;



&lt;p&gt;Not all training topics need equal weight. Focus first on the scenarios most relevant to your organization’s threat profile and operating model.&lt;/p&gt;



&lt;p&gt;For many businesses, that means phishing, credential handling, access control, and incident reporting. The aim at this stage is to focus staff training on the behaviors and scenarios most likely to reduce day-to-day risk.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Step 3: Segment training by role&lt;/h3&gt;



&lt;p&gt;Security awareness is much more likely to change behavior when employees can recognize their own working reality in the training. Different roles create different types of exposure, whether that means handling sensitive records, approving high-risk requests, managing privileged access, or sharing information with external contacts.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;A more effective program reflects those differences instead of giving everyone the same abstract advice. The closer the training is to the decisions people actually face, the easier it becomes to apply in practice.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Step 4: Build a rhythm of reinforcement&lt;/h3&gt;



&lt;p&gt;A one-off annual training session is not enough to change behavior. Use induction, refresher training, short reminders, simulation exercises, and regular communications to keep key messages active. Reinforcement can be lightweight, but it needs to be ongoing.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Step 5: Support training with policy and tooling&lt;/h3&gt;



&lt;p&gt;Training becomes far more credible when employees can see how to apply it in practice. So, make sure policies are clear, easy to find, and written in language employees can actually use. Then support them with features that make secure behavior easier to follow in practice.&lt;/p&gt;



&lt;p&gt;If your policy says staff must use strong, unique passwords and avoid informal sharing, give them a &lt;a href=&quot;https://proton.me/pass/security&quot;&gt;secure password manager&lt;/a&gt; that makes this easier. If your policy says suspicious emails should be reported immediately, make the reporting path obvious and low-friction.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Step 6: Review, measure, and improve&lt;/h3&gt;



&lt;p&gt;A security awareness program should evolve with your business. New tools, role changes, incidents, and types of attack all create new pressure points.&lt;/p&gt;



&lt;p&gt;Review outcomes regularly, update training based on incidents and near misses, and adjust the program when you find recurring weak spots. The goal is not to finish the program, but to make it more effective over time.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;How to measure impact&lt;/h2&gt;



&lt;p&gt;One of the easiest mistakes to make with security awareness training is to measure what is convenient instead of what is meaningful. Completion rates may tell you who watched the training or clicked through the module, but they say very little about whether the program is influencing behavior in the moments that actually carry risk.&lt;/p&gt;



&lt;p&gt;A more useful approach is to look for changes in how people respond to real situations over time. Phishing simulation results can help you understand whether employees are becoming more cautious, more observant, and more likely to question and report suspicious messages.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Credential-related incidents can show whether risky habits such as password reuse, insecure sharing, or poor account handling are becoming less common. Policy adherence can also reveal whether employees are actually applying the expectations set by the program, rather than simply being exposed to them.&lt;/p&gt;



&lt;p&gt;It is equally important to watch for operational signals. How quickly are suspicious emails or unusual requests being reported? Is MFA being enabled consistently where it should be? Are access rights being revoked promptly during offboarding? Are teams with greater exposure showing stronger judgement in realistic scenarios as the program develops?&amp;nbsp;&lt;/p&gt;



&lt;p&gt;These are often the indicators that show whether awareness is becoming part of how the organization works, rather than remaining confined to a training environment.&lt;/p&gt;



&lt;p&gt;Ultimately, the real test is not whether employees completed the program. It is whether your organization sees fewer avoidable mistakes, better reporting habits, and stronger day-to-day security behavior as a result.&lt;/p&gt;



&lt;p&gt;Proton Pass can help you enforce your organization&amp;#8217;s security policies and monitor the results. Try it for free or &lt;a href=&quot;https://proton.me/business/contact?pd=pass&quot;&gt;get in touch with our team&lt;/a&gt;. &lt;/p&gt;
</content:encoded><category>For business</category><author>Kate Menzies</author></item><item><title>How to prevent and recover from ransomware attacks on small businesses</title><link>https://proton.me/business/blog/ransomware-small-business</link><guid isPermaLink="true">https://proton.me/business/blog/ransomware-small-business</guid><description>Learn how ransomware affects small businesses, the most common attack paths, and the practical steps to prevent incidents and recover safely.</description><pubDate>Thu, 14 May 2026 14:25:44 GMT</pubDate><content:encoded>
&lt;p&gt;Many small business owners still think &lt;a href=&quot;https://proton.me/blog/ransomware-attack&quot;&gt;ransomware attacks&lt;/a&gt; only happen to hospitals, global brands, or public infrastructure. In reality, ransomware small business risk is one of the clearest examples of how attackers are consistently targeting organizations with valuable data, limited time, and weaker defenses.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Recent findings from Proton’s &lt;a href=&quot;https://proton.me/blog/data-breach-observatory-2026&quot;&gt;Data Breach Observatory&lt;/a&gt; show that SMBs are frequently the victims of breaches. They’re also disproportionately represented in the most damaging incidents, including breaches involving high-risk data and large record exposures.&lt;/p&gt;



&lt;p&gt;Ransomware is a &lt;a href=&quot;https://proton.me/business/blog/business-continuity-strategies&quot;&gt;business continuity&lt;/a&gt;, credential security, and data protection problem. The UK government’s Cyber Security Breaches Survey found that 1% of UK businesses identified ransomware incidents in the previous 12 months, up from less than 0.5% in 2024. At national scale, that equates to an estimated 19,000 businesses.&lt;/p&gt;



&lt;p&gt;Despite the rise of ransomware, &lt;a href=&quot;https://proton.me/blog/what-is-phishing&quot;&gt;phishing&lt;/a&gt; is still the most common type of cyberattack. Attackers most frequently get access to business networks through people, credentials, and routine workflows rather than through large-scale cyberattacks. They can essentially use a phishing attack to then launch a larger ransomware attack if they sense a greater payday.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;For a small business, the damage from ransomware can cause significant disruptions to business continuity. Team members lose access to files and can’t continue their work, operations slow or stop, and customers or clients don’t get adequate services. If personal data is compromised, reporting obligations will follow. A practical ransomware strategy for SMBs has to cover both aspects of an attack: prevention and recovery.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;How does ransomware work?&lt;/h2&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/blog/what-is-ransomware&quot;&gt;Ransomware&lt;/a&gt; is a type of malware that prevents you from accessing devices or data, usually by encrypting files, and then demands a payment in exchange for decryption. In many cases, attackers now do more than lock files. They also steal data and threaten to leak it if the ransom is not paid, which turns the incident into both an availability crisis and a potential data breach.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Victims are often instructed to communicate through anonymous email or web pages and to pay in cryptocurrency. For small businesses, that distinction is important because cryptocurrency is anonymous, decentralized, and unregulated by traditional financial institutions: it’s almost impossible to trace payments.&amp;nbsp;&amp;nbsp;&lt;/p&gt;



&lt;p&gt;A ransomware event is not always limited to losing access to files. It may also mean that customer information, employee data, financial records, contracts, or login credentials have already been exfiltrated. Ransomware can lead to loss of timely access to personal data and, where backups are not appropriate or available, even permanent loss.&lt;/p&gt;



&lt;p&gt;The attack chain is usually more ordinary than you might expect. The easy-to-miss incidents that can lead to a ransomware attack include:&amp;nbsp;&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Phishing links being followed.&lt;/li&gt;



&lt;li&gt;Reused passwords being exposed in a data breach.&lt;/li&gt;



&lt;li&gt;Remote access service left exposed. &lt;/li&gt;



&lt;li&gt;Known vulnerabilities being left unpatched&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Once an attacker gets access to a business network, they move laterally, escalate privileges, disable recovery paths where possible, and deploy encryption or extortion where it will hurt most. No single tool or solution can prevent ransomware attacks. Instead, organizations must focus on reducing the number of easy paths into their network.&amp;nbsp;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Why small businesses are disproportionately targeted&lt;/h2&gt;



&lt;p&gt;Small businesses are attractive &lt;a href=&quot;https://proton.me/business/blog/ransomware-threats-smbs&quot;&gt;ransomware targets&lt;/a&gt; for a simple reason: they hold valuable data that isn’t as well-protected as it should be. Proton’s latest observatory findings show that SMBs account for 63% of breaches tracked since January 2025 and more than 352 million leaked records.&lt;/p&gt;



&lt;p&gt;They also account for 61% of breaches involving high-risk data, with small businesses alone representing 48% of those critical incidents. Among breaches exposing more than 100,000 records, SMBs account for 60%, and small businesses represent 42%.&lt;/p&gt;



&lt;p&gt;Small businesses aren’t careless. In fact, Proton’s &lt;a href=&quot;https://proton.me/business/smb-cybersecurity-report&quot;&gt;SMB Cybersecurity Report 2026&lt;/a&gt; proves that small businesses are trying to improve their cybersecurity. The problem is that their defenses are breaking in real-world conditions. Inconsistent enforcement, human error, shared access habits, and limited internal security capacity are what make small businesses tempting targets. &lt;/p&gt;



&lt;p&gt;In Proton’s survey of 3,000 leaders at companies under 250 employees, 39% said incidents stemmed from human error, and 48% said they did not have a password manager in place.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Larger companies may have dedicated response teams, segmented environments, tested backup plans, and external incident support already in place. Smaller ones often have one lean IT function, outsourced support, or no dedicated security expert. When the attack hits, the business is forced to make high-stakes decisions while under operational pressure. That pressure is exactly what ransomware operators count on.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;The most common entry points for ransomware in SMBs&lt;/h2&gt;



&lt;p&gt;After examining the studies carried out in the UK, we know that phishing remains the dominant cybercrime vector for businesses. But why? It’s because phishing is often the first step toward credential theft, account compromise, malware delivery, or remote access abuse.&lt;/p&gt;



&lt;p&gt;Weak or reused credentials are another major problem. Small businesses often have shared logins, passwords reused across multiple services, or old accounts that stay active after someone changes roles or leaves. Once attackers obtain one working login, they don’t need to hack into accounts. They can simply sign in.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;From there, a poorly protected admin account, an exposed cloud console, or a remote access point without &lt;a href=&quot;https://proton.me/blog/what-is-two-factor-authentication-2fa&quot;&gt;two-factor authentication&lt;/a&gt; (2FA) can become the bridge into a broader ransomware incident. Realistically, organizations need to deploy 2FA, least privilege access, and regular permission reviews to reduce how easily stolen credentials can be reused and how far malware can spread.&lt;/p&gt;



&lt;p&gt;Unpatched software is another recurring entry point. The NCSC notes that ransomware is increasingly deployed via exposed services such as RDP or unpatched remote access devices, and recommends patching vulnerabilities in remote access and internet-facing systems as soon as they become available. For SMBs, this is where a missed incident quietly becomes an attack surface.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;How to protect against ransomware: a layered approach&lt;/h2&gt;



&lt;p&gt;There is no single control that can prevent ransomware. The most effective approach is layered and practical.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Start with identity management&lt;/h3&gt;



&lt;p&gt;The data in team members’ accounts needs thorough protection to repel ransomware attacks. Make two-factor authentication mandatory where possible across business-critical accounts, especially email, admin tools, cloud storage, finance platforms, remote access points, and any systems that store customer personal data or other sensitive &lt;a href=&quot;https://proton.me/business/blog/pii&quot;&gt;personally identifiable information&lt;/a&gt; (PII).&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Improve password hygiene&lt;/h3&gt;



&lt;p&gt;Attackers don’t always break into accounts. Often, they log in with stolen or reused credentials. Every business account must have a unique, strong password, and shared access should be replaced with managed, secure credential sharing through a business password manager rather than through spreadsheets, chats, or email.&lt;/p&gt;



&lt;p&gt;Proton’s own SMB report highlights that even businesses with tools in place still often fall back on insecure password-sharing habits. This is exactly where a secure &lt;a href=&quot;https://proton.me/business/pass&quot;&gt;business password manager&lt;/a&gt; like Proton Pass for Business can reduce risk: it helps teams create strong and unique credentials, store them securely, and share access in a controlled, secure way.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Patch management has to be disciplined&lt;/h3&gt;



&lt;p&gt;Security updates for operating systems, apps, VPNs, remote access tools, and boundary devices should be treated as operational essentials, not optional maintenance. Install security updates as soon as possible and enable automatic updates where feasible.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Robust mail and web protection&lt;/h3&gt;



&lt;p&gt;Mail filtering, attachment controls, blocking known malicious sites, and safe browsing protections all reduce the likelihood that ransomware is delivered in the first place. Because phishing is so common, these controls are essential.&amp;nbsp;&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Address human error&lt;/h3&gt;



&lt;p&gt;Even when you’ve implemented security measures and a &lt;a href=&quot;https://proton.me/business/blog/password-policy-template&quot;&gt;password policy&lt;/a&gt;, Security awareness training is still necessary. Training helps staff spot suspicious emails and social engineering attempts, but people will still make mistakes.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Stronger tools or features and access controls should assume that. The NCSC explicitly recommends awareness training, but Proton’s research also points out that training alone does not catch every slip. Good security design reduces the damage when someone does click by making one mistake less likely to become a full-scale incident, whether through 2FA, least-privilege access, stronger email protections, segmented access, or tested backups that support recovery.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Protect recovery before you need it&lt;/h3&gt;



&lt;p&gt;Backups need to be regular, isolated, and tested. The ICO recommends taking the 3-2-1 approach: three copies, on two different devices, with one stored off-site. The NCSC adds an important operational warning: ransomware may have infiltrated your environment before discovery, so backups should be scanned before restoration, and backup systems themselves should be protected.&amp;nbsp;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;The credential connection: why passwords still matter in ransomware defense&lt;/h2&gt;



&lt;p&gt;It is easy to think of ransomware as malware and forget that passwords play a part in a successful attack. But many ransomware incidents begin with the theft, reuse, or abuse of logins.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;That might mean a staff member reusing a password from another service, a former contractor account remaining active, an admin credential being shared among several people, or an exposed remote access point being protected only by a password. Each of those shortcuts expands the attack surface.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;This is one reason strong credential management belongs inside any ransomware recovery plan and prevention framework. Unique passwords per service reduce the blast radius of one stolen login. MFA makes that stolen password less useful on its own, while centralized credential storage removes the need for insecure workarounds.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Secure sharing means employees get the access they need through controlled, trackable methods rather than through informal password sharing. Regular review of who has access to what also supports least privilege, which the NCSC recommends as part of limiting lateral movement and spread.&lt;/p&gt;



&lt;p&gt;We’ve written extensively about the &lt;a href=&quot;https://proton.me/blog/ransomware-threats-smbs&quot;&gt;ransomware threats&lt;/a&gt; that SMBs face. Over and over, we see the same thing: attackers are increasingly looking for the businesses that are easier to break, not just the businesses with the biggest names.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What to do if your small business gets hit&lt;/h2&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;1. Contain the incident&lt;/h3&gt;



&lt;p&gt;If your business is hit, your first priority is containment. Disconnect infected devices from the network, disable compromised accounts if you can identify them, isolate remote access pathways, preserve evidence and avoid wiping systems too quickly if you may need forensic support later.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;2. Report the incident&lt;/h3&gt;



&lt;p&gt;The NCSC advises UK organizations to report incidents and provides dedicated ransomware guidance for response and recovery. Proton’s guide to&lt;a href=&quot;https://proton.me/blog/incident-response&quot;&gt; incident response&lt;/a&gt; is also a useful reference for structuring the broader decision-making process around containment, investigation, communications, and recovery.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;3. Don’t pay the ransom&lt;/h3&gt;



&lt;p&gt;The NCSC and UK law enforcement do not encourage, endorse, or condone paying ransom demands. They note there is no guarantee you will regain access, your systems may still be infected, you will be funding criminal groups, and you may be more likely to be targeted again.&lt;/p&gt;



&lt;p&gt;The ICO is similarly clear that paying a ransom does not reduce the risk to people and does not safeguard the information. Even if a decryption key is offered, there is no guarantee it will work or that stolen data will not still be leaked.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;4. Start recovery &lt;/h3&gt;



&lt;p&gt;Recovery should focus on slow and secure restoration. That means rebuilding from clean backups, validating that the attack path has been closed, rotating affected credentials, re-enabling access carefully, and documenting what happened. If backups are connected to live systems or have not been tested, this is often where businesses discover a second failure after the first one. A good ransomware recovery plan really starts long before an incident even occurs.&amp;nbsp;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;UK reporting obligations: when the ICO may need to be involved&lt;/h2&gt;



&lt;p&gt;If a ransomware incident affects personal data, this may be a personal &lt;a href=&quot;https://proton.me/business/blog/data-breach-prevention-uk&quot;&gt;data breach under the UK GDPR&lt;/a&gt;. The ICO explains that loss of access to personal data can itself be a breach where it creates risk to individuals, and that you must notify the ICO without undue delay and, where feasible, within 72 hours if the breach is likely to result in a risk to people’s rights and freedoms. If the risk is high, affected individuals may also need to be informed without undue delay.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Some organizations still assume that if they restore systems quickly or there is no obvious public leak, reporting is unnecessary. That is not a safe assumption. The ICO’s ransomware guidance explicitly addresses breach notification scenarios and makes clear that the assessment turns on risk to individuals, not just whether stolen files have already surfaced online.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Ransomware is a SMB problem now&lt;/h2&gt;



&lt;p&gt;Small businesses are being hit by ransom attacks more and more frequently, and when they are hit, the impact can be severe because attackers exploit their weaknesses. Proton’s latest breach data makes that visible: the threat is measurable, growing, and operationally disruptive.&lt;/p&gt;



&lt;p&gt;The good news is that the fundamentals can do much of the heavy lifting for any SMB. Measures such as using a &lt;a href=&quot;https://proton.me/business/pass&quot;&gt;business password manager&lt;/a&gt; to deploy 2FA and create unique credentials, patching, mail filtering, staff awareness, permission review, tested backups, and incident response planning may not seem flashy on their own, but together they make a meaningful difference. They reduce the chances that a single stolen password, one phishing email, or one exposed remote service escalates into a business-wide outage.&lt;/p&gt;
</content:encoded><category>For business</category><author>Kate Menzies</author></item><item><title>How to change email password on Gmail, Outlook, and Proton</title><link>https://proton.me/blog/how-to-change-email-password</link><guid isPermaLink="true">https://proton.me/blog/how-to-change-email-password</guid><description>Find out how to change your email password and improve email security on Gmail, Outlook, and Proton Mail, including on iPhone and Android.</description><pubDate>Wed, 13 May 2026 17:27:44 GMT</pubDate><content:encoded>
&lt;p&gt;Whether you&amp;#8217;ve noticed suspicious activity in your &lt;a href=&quot;https://proton.me/mail&quot;&gt;email&lt;/a&gt; account or just want to improve your security, this guide shows you how to change your email &lt;a href=&quot;https://proton.me/pass&quot;&gt;password&lt;/a&gt; on some of the most popular services: &lt;a href=&quot;https://proton.me/blog/is-gmail-secure&quot;&gt;Gmail&lt;/a&gt;, &lt;a href=&quot;https://proton.me/blog/outlook-is-microsofts-new-data-collection-service&quot;&gt;Outlook&lt;/a&gt;, and Proton Mail.&lt;/p&gt;



&lt;p&gt;Your email is the master key to your online life. Anyone with access to it can reset the password on every other account tied to that address, such as your bank, social media, or shopping accounts. That’s why a leaked email password is far more dangerous than a leaked Netflix password, and why you should treat &lt;a href=&quot;https://proton.me/mail/security&quot;&gt;email security&lt;/a&gt; as the foundation everyone else sits on.&lt;/p&gt;



&lt;p&gt;You should change your email password if:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;You’ve noticed suspicious sign-in activity, especially if no one else has access to your email account.&lt;/li&gt;



&lt;li&gt;A service you use has been involved in a &lt;a href=&quot;https://proton.me/business/pass/breach-observatory&quot;&gt;data breach&lt;/a&gt;.&lt;/li&gt;



&lt;li&gt;You’ve been reusing the same password on multiple websites, which can expose you to &lt;a href=&quot;https://proton.me/blog/what-is-credential-stuffing-attack&quot;&gt;credential stuffing attacks&lt;/a&gt;.&lt;/li&gt;



&lt;li&gt;You clicked a suspicious link or entered your email credentials on a website you later realized might be fake (&lt;a href=&quot;https://proton.me/business/blog/phishing-attacks&quot;&gt;phishing&lt;/a&gt;).&lt;/li&gt;



&lt;li&gt;Your account provider &lt;a href=&quot;https://proton.me/blog/dark-web-monitoring&quot;&gt;warned you that your password appeared in a known leak&lt;/a&gt;.&lt;/li&gt;



&lt;li&gt;You received &lt;a href=&quot;https://proton.me/blog/instagram-leak&quot;&gt;password-reset emails&lt;/a&gt; or security alerts you did not request.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Changing your email password takes only a few minutes and can be done from your provider’s account settings, not from your mail app.&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;a href=&quot;#gmail&quot;&gt;How to change your email password on Gmail&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#outlook&quot;&gt;How to change your email password on Outlook, Hotmail, or Live&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#proton-mail&quot;&gt;How to change your email password on Proton Mail&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#iphone&quot;&gt;How to change email passwords on iPhone&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#android&quot;&gt;How to change email passwords on Android&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#tips&quot;&gt;Tips for creating a strong email password&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#best-practices&quot;&gt;Best practices for email password security&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#forgot-password&quot;&gt;What to do if you forgot your email password&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#safe&quot;&gt;Keep your email accounts safe&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;gmail&quot;&gt;How to change your email password on Gmail&lt;/h2&gt;



&lt;p&gt;To change your Gmail password, update it through your Google Account:&lt;/p&gt;



&lt;ol class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Log in to your Google Account at &lt;a href=&quot;http://myaccount.google.com&quot;&gt;myaccount.google.com&lt;/a&gt;.&lt;/li&gt;



&lt;li&gt;Click &lt;strong&gt;Security and sign-in&lt;/strong&gt; from the left menu.&lt;/li&gt;
&lt;/ol&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full is-resized&quot;&gt;&lt;img width=&quot;406&quot; height=&quot;963&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_406,h_963,c_scale/f_auto,q_auto/v1778683718/wp-pme/change-google-password-1/change-google-password-1.png?_i=AA&quot; alt=&quot;How to change your Google password&quot; class=&quot;wp-post-137156 wp-image-137310&quot; style=&quot;width:350px&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;80 KB&quot; data-optsize=&quot;16 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;79.5&quot; data-version=&quot;1778683718&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1778683718/wp-pme/change-google-password-1/change-google-password-1.png?_i=AA 406w, https://res.cloudinary.com/dbulfrlrz/images/w_126,h_300,c_scale/f_auto,q_auto/v1778683718/wp-pme/change-google-password-1/change-google-password-1.png?_i=AA 126w&quot; sizes=&quot;auto, (max-width: 406px) 100vw, 406px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;ol start=&quot;3&quot; class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Under &lt;strong&gt;How you sign in to Google&lt;/strong&gt;, click &lt;strong&gt;Password&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full is-resized&quot;&gt;&lt;img width=&quot;982&quot; height=&quot;1231&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_982,h_1231,c_scale/f_auto,q_auto/v1778683847/wp-pme/change-google-password-2/change-google-password-2.png?_i=AA&quot; alt=&quot;How to change your Google password&quot; class=&quot;wp-post-137156 wp-image-137352&quot; style=&quot;width:500px&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;145 KB&quot; data-optsize=&quot;31 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;78.7&quot; data-version=&quot;1778683847&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1778683847/wp-pme/change-google-password-2/change-google-password-2.png?_i=AA 982w, https://res.cloudinary.com/dbulfrlrz/images/w_239,h_300,c_scale/f_auto,q_auto/v1778683847/wp-pme/change-google-password-2/change-google-password-2.png?_i=AA 239w, https://res.cloudinary.com/dbulfrlrz/images/w_817,h_1024,c_scale/f_auto,q_auto/v1778683847/wp-pme/change-google-password-2/change-google-password-2.png?_i=AA 817w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_963,c_scale/f_auto,q_auto/v1778683847/wp-pme/change-google-password-2/change-google-password-2.png?_i=AA 768w&quot; sizes=&quot;auto, (max-width: 982px) 100vw, 982px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;ol start=&quot;4&quot; class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Enter your current password to verify your identity.&lt;/li&gt;



&lt;li&gt;Type your &lt;strong&gt;New password&lt;/strong&gt;, confirm it, and click &lt;strong&gt;Change Password&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;



&lt;p&gt;Google will keep you signed in on the device you&amp;#8217;re using. To sign out everywhere else, go to &lt;strong&gt;Security&lt;/strong&gt; → &lt;strong&gt;Your devices&lt;/strong&gt; and remove any sessions you don&amp;#8217;t recognize.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;outlook&quot;&gt;How to change your email password on Outlook, Hotmail, or Live&lt;/h2&gt;



&lt;p&gt;If you use a Microsoft account for Outlook, Hotmail, or Live, you can change your password through the Microsoft security portal:&amp;nbsp;&lt;/p&gt;



&lt;ol class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Go to &lt;a href=&quot;http://account.microsoft.com&quot;&gt;account.microsoft.com&lt;/a&gt; and &lt;strong&gt;Sign in&lt;/strong&gt;.&lt;/li&gt;



&lt;li&gt;Open the &lt;strong&gt;Security&lt;/strong&gt; accordion and click &lt;strong&gt;Change password&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;1717&quot; height=&quot;984&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1717,h_984,c_scale/f_auto,q_auto/v1778684117/wp-pme/change-outlook-password/change-outlook-password.png?_i=AA&quot; alt=&quot;How to change your Outlook password&quot; class=&quot;wp-post-137156 wp-image-137457&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;144 KB&quot; data-optsize=&quot;27 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;81.3&quot; data-version=&quot;1778684117&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1778684117/wp-pme/change-outlook-password/change-outlook-password.png?_i=AA 1717w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_172,c_scale/f_auto,q_auto/v1778684117/wp-pme/change-outlook-password/change-outlook-password.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_587,c_scale/f_auto,q_auto/v1778684117/wp-pme/change-outlook-password/change-outlook-password.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_440,c_scale/f_auto,q_auto/v1778684117/wp-pme/change-outlook-password/change-outlook-password.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_880,c_scale/f_auto,q_auto/v1778684117/wp-pme/change-outlook-password/change-outlook-password.png?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_899,c_scale/f_auto,q_auto/v1778684117/wp-pme/change-outlook-password/change-outlook-password.png?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1717px) 100vw, 1717px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;ol start=&quot;3&quot; class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Enter your &lt;strong&gt;New password&lt;/strong&gt;, then click &lt;strong&gt;Save&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;



&lt;p&gt;To sign out of every other session, go to &lt;strong&gt;Security&lt;/strong&gt; → &lt;strong&gt;Sign-in activity&lt;/strong&gt; and click &lt;strong&gt;Sign out everywhere&lt;/strong&gt;.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;proton-mail&quot;&gt;How to change your email password on Proton Mail&lt;/h2&gt;



&lt;p&gt;You can &lt;a href=&quot;https://proton.me/support/how-to-change-your-password&quot;&gt;change your Proton Mail password&lt;/a&gt; directly in your account settings:&lt;/p&gt;



&lt;ol class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Open Proton Mail and go to &lt;strong&gt;Settings → All settings&lt;/strong&gt;.&lt;/li&gt;



&lt;li&gt;In the sidebar, click &lt;strong&gt;Account and password&lt;/strong&gt;.&lt;/li&gt;



&lt;li&gt;Click &lt;strong&gt;Change password&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;1102&quot; height=&quot;591&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1102,h_591,c_scale/f_auto,q_auto/v1778684323/wp-pme/change-proton-mail-password/change-proton-mail-password.png?_i=AA&quot; alt=&quot;How to change your Proton Mail password&quot; class=&quot;wp-post-137156 wp-image-137562&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;89 KB&quot; data-optsize=&quot;19 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;78.6&quot; data-version=&quot;1778684323&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1778684323/wp-pme/change-proton-mail-password/change-proton-mail-password.png?_i=AA 1102w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_161,c_scale/f_auto,q_auto/v1778684323/wp-pme/change-proton-mail-password/change-proton-mail-password.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_549,c_scale/f_auto,q_auto/v1778684323/wp-pme/change-proton-mail-password/change-proton-mail-password.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_412,c_scale/f_auto,q_auto/v1778684323/wp-pme/change-proton-mail-password/change-proton-mail-password.png?_i=AA 768w&quot; sizes=&quot;auto, (max-width: 1102px) 100vw, 1102px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;ol start=&quot;4&quot; class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Enter your &lt;strong&gt;Current password&lt;/strong&gt;.&lt;/li&gt;



&lt;li&gt;Enter and confirm your &lt;strong&gt;New password&lt;/strong&gt;, then click &lt;strong&gt;Save&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;



&lt;p&gt;Proton Mail uses &lt;a href=&quot;https://proton.me/learn/encryption/types-of-encryption/what-is-end-to-end&quot;&gt;end-to-end encryption&lt;/a&gt;, so changing your password also re-encrypts your data. Make sure you have your &lt;a href=&quot;https://proton.me/support/set-account-recovery-methods&quot;&gt;recovery method&lt;/a&gt; set up before you change it. Without one, you can lose access to old encrypted messages.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;iphone&quot;&gt;How to change email passwords on iPhone&lt;/h2&gt;



&lt;ol class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Open &lt;strong&gt;Settings&lt;/strong&gt;.&lt;/li&gt;



&lt;li&gt;Select your account.&lt;/li&gt;



&lt;li&gt;Go to &lt;strong&gt;Sign-In &amp;amp; Security&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full is-resized&quot;&gt;&lt;img width=&quot;1170&quot; height=&quot;2413&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1170,h_2413,c_scale/f_auto,q_auto/v1778685974/wp-pme/change-iphone-password-1/change-iphone-password-1.jpg?_i=AA&quot; alt=&quot;How to change your iPhone password&quot; class=&quot;wp-post-137156 wp-image-137923&quot; style=&quot;width:450px&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;232 KB&quot; data-optsize=&quot;67 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;71.1&quot; data-version=&quot;1778685974&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1778685974/wp-pme/change-iphone-password-1/change-iphone-password-1.jpg?_i=AA 1170w, https://res.cloudinary.com/dbulfrlrz/images/w_145,h_300,c_scale/f_auto,q_auto/v1778685974/wp-pme/change-iphone-password-1/change-iphone-password-1.jpg?_i=AA 145w, https://res.cloudinary.com/dbulfrlrz/images/w_497,h_1024,c_scale/f_auto,q_auto/v1778685974/wp-pme/change-iphone-password-1/change-iphone-password-1.jpg?_i=AA 497w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_1584,c_scale/f_auto,q_auto/v1778685974/wp-pme/change-iphone-password-1/change-iphone-password-1.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_745,h_1536,c_scale/f_auto,q_auto/v1778685974/wp-pme/change-iphone-password-1/change-iphone-password-1.jpg?_i=AA 745w, https://res.cloudinary.com/dbulfrlrz/images/w_993,h_2048,c_scale/f_auto,q_auto/v1778685974/wp-pme/change-iphone-password-1/change-iphone-password-1.jpg?_i=AA 993w&quot; sizes=&quot;auto, (max-width: 1170px) 100vw, 1170px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;ol start=&quot;4&quot; class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Tap &lt;strong&gt;Change Password&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full is-resized&quot;&gt;&lt;img width=&quot;1170&quot; height=&quot;2366&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1170,h_2366,c_scale/f_auto,q_auto/v1778685981/wp-pme/change-iphone-password-2/change-iphone-password-2.jpg?_i=AA&quot; alt=&quot;How to change your iPhone password&quot; class=&quot;wp-post-137156 wp-image-137944&quot; style=&quot;width:450px&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;345 KB&quot; data-optsize=&quot;123 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;64.5&quot; data-version=&quot;1778685981&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1778685981/wp-pme/change-iphone-password-2/change-iphone-password-2.jpg?_i=AA 1170w, https://res.cloudinary.com/dbulfrlrz/images/w_148,h_300,c_scale/f_auto,q_auto/v1778685981/wp-pme/change-iphone-password-2/change-iphone-password-2.jpg?_i=AA 148w, https://res.cloudinary.com/dbulfrlrz/images/w_506,h_1024,c_scale/f_auto,q_auto/v1778685981/wp-pme/change-iphone-password-2/change-iphone-password-2.jpg?_i=AA 506w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_1553,c_scale/f_auto,q_auto/v1778685981/wp-pme/change-iphone-password-2/change-iphone-password-2.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_760,h_1536,c_scale/f_auto,q_auto/v1778685981/wp-pme/change-iphone-password-2/change-iphone-password-2.jpg?_i=AA 760w, https://res.cloudinary.com/dbulfrlrz/images/w_1013,h_2048,c_scale/f_auto,q_auto/v1778685981/wp-pme/change-iphone-password-2/change-iphone-password-2.jpg?_i=AA 1013w&quot; sizes=&quot;auto, (max-width: 1170px) 100vw, 1170px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;ol start=&quot;4&quot; class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Authenticate with your current password or Face ID.&lt;/li&gt;



&lt;li&gt;Enter the new password and confirm it.&lt;/li&gt;
&lt;/ol&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full is-resized&quot;&gt;&lt;img width=&quot;1170&quot; height=&quot;1321&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1170,h_1321,c_scale/f_auto,q_auto/v1778685987/wp-pme/change-iphone-password-3/change-iphone-password-3.jpg?_i=AA&quot; alt=&quot;How to change your iPhone password&quot; class=&quot;wp-post-137156 wp-image-137965&quot; style=&quot;width:450px&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;136 KB&quot; data-optsize=&quot;43 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;68.2&quot; data-version=&quot;1778685987&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1778685987/wp-pme/change-iphone-password-3/change-iphone-password-3.jpg?_i=AA 1170w, https://res.cloudinary.com/dbulfrlrz/images/w_266,h_300,c_scale/f_auto,q_auto/v1778685987/wp-pme/change-iphone-password-3/change-iphone-password-3.jpg?_i=AA 266w, https://res.cloudinary.com/dbulfrlrz/images/w_907,h_1024,c_scale/f_auto,q_auto/v1778685987/wp-pme/change-iphone-password-3/change-iphone-password-3.jpg?_i=AA 907w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_867,c_scale/f_auto,q_auto/v1778685987/wp-pme/change-iphone-password-3/change-iphone-password-3.jpg?_i=AA 768w&quot; sizes=&quot;auto, (max-width: 1170px) 100vw, 1170px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;android&quot;&gt;How to change email passwords on Android&lt;/h2&gt;



&lt;p&gt;If you’re using Gmail, you can change your password in your Google Account settings. The exact steps may vary slightly depending on your device.&lt;/p&gt;



&lt;ol class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Open &lt;strong&gt;Settings.&lt;/strong&gt;&lt;/li&gt;



&lt;li&gt;Tap &lt;strong&gt;Passwords, passkeys and accounts&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full is-resized&quot;&gt;&lt;img width=&quot;906&quot; height=&quot;1848&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_906,h_1848,c_scale/f_auto,q_auto/v1778684502/wp-pme/change-android-password-1_1376253fa5d/change-android-password-1_1376253fa5d.png?_i=AA&quot; alt=&quot;How to change your Android password&quot; class=&quot;wp-post-137156 wp-image-137625&quot; style=&quot;width:350px&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;298 KB&quot; data-optsize=&quot;59 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;80.1&quot; data-version=&quot;1778684502&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1778684502/wp-pme/change-android-password-1_1376253fa5d/change-android-password-1_1376253fa5d.png?_i=AA 906w, https://res.cloudinary.com/dbulfrlrz/images/w_147,h_300,c_scale/f_auto,q_auto/v1778684502/wp-pme/change-android-password-1_1376253fa5d/change-android-password-1_1376253fa5d.png?_i=AA 147w, https://res.cloudinary.com/dbulfrlrz/images/w_502,h_1024,c_scale/f_auto,q_auto/v1778684502/wp-pme/change-android-password-1_1376253fa5d/change-android-password-1_1376253fa5d.png?_i=AA 502w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_1567,c_scale/f_auto,q_auto/v1778684502/wp-pme/change-android-password-1_1376253fa5d/change-android-password-1_1376253fa5d.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_753,h_1536,c_scale/f_auto,q_auto/v1778684502/wp-pme/change-android-password-1_1376253fa5d/change-android-password-1_1376253fa5d.png?_i=AA 753w&quot; sizes=&quot;auto, (max-width: 906px) 100vw, 906px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;ol start=&quot;3&quot; class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Select your account.&lt;/li&gt;



&lt;li&gt;Tap &lt;strong&gt;Google Account&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;



&lt;figure class=&quot;wp-block-image size-full is-resized&quot;&gt;&lt;img width=&quot;912&quot; height=&quot;991&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_912,h_991,c_scale/f_auto,q_auto/v1778684657/wp-pme/change-android-password-2/change-android-password-2.png?_i=AA&quot; alt=&quot;How to change your Android password&quot; class=&quot;wp-post-137156 wp-image-137667&quot; style=&quot;width:350px&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;113 KB&quot; data-optsize=&quot;20 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;82.6&quot; data-version=&quot;1778684657&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1778684657/wp-pme/change-android-password-2/change-android-password-2.png?_i=AA 912w, https://res.cloudinary.com/dbulfrlrz/images/w_276,h_300,c_scale/f_auto,q_auto/v1778684657/wp-pme/change-android-password-2/change-android-password-2.png?_i=AA 276w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_835,c_scale/f_auto,q_auto/v1778684657/wp-pme/change-android-password-2/change-android-password-2.png?_i=AA 768w&quot; sizes=&quot;auto, (max-width: 912px) 100vw, 912px&quot; /&gt;&lt;/figure&gt;



&lt;ol start=&quot;5&quot; class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Go to the &lt;strong&gt;Security or Sign-in&lt;/strong&gt; tab.&lt;/li&gt;
&lt;/ol&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full is-resized&quot;&gt;&lt;img width=&quot;909&quot; height=&quot;1618&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_909,h_1618,c_scale/f_auto,q_auto/v1778684818/wp-pme/change-android-password-3/change-android-password-3.png?_i=AA&quot; alt=&quot;How to change your Android password&quot; class=&quot;wp-post-137156 wp-image-137730&quot; style=&quot;width:350px&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;298 KB&quot; data-optsize=&quot;65 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;78.3&quot; data-version=&quot;1778684818&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1778684818/wp-pme/change-android-password-3/change-android-password-3.png?_i=AA 909w, https://res.cloudinary.com/dbulfrlrz/images/w_169,h_300,c_scale/f_auto,q_auto/v1778684818/wp-pme/change-android-password-3/change-android-password-3.png?_i=AA 169w, https://res.cloudinary.com/dbulfrlrz/images/w_575,h_1024,c_scale/f_auto,q_auto/v1778684818/wp-pme/change-android-password-3/change-android-password-3.png?_i=AA 575w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_1367,c_scale/f_auto,q_auto/v1778684818/wp-pme/change-android-password-3/change-android-password-3.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_863,h_1536,c_scale/f_auto,q_auto/v1778684818/wp-pme/change-android-password-3/change-android-password-3.png?_i=AA 863w&quot; sizes=&quot;auto, (max-width: 909px) 100vw, 909px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;ol start=&quot;6&quot; class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Under &lt;strong&gt;How you sign in to Google&lt;/strong&gt;, tap &lt;strong&gt;Password&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full is-resized&quot;&gt;&lt;img width=&quot;912&quot; height=&quot;1743&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_912,h_1743,c_scale/f_auto,q_auto/v1778684972/wp-pme/change-android-password-4/change-android-password-4.png?_i=AA&quot; alt=&quot;How to change your Android password&quot; class=&quot;wp-post-137156 wp-image-137793&quot; style=&quot;width:350px&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;267 KB&quot; data-optsize=&quot;50 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;81.1&quot; data-version=&quot;1778684972&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1778684972/wp-pme/change-android-password-4/change-android-password-4.png?_i=AA 912w, https://res.cloudinary.com/dbulfrlrz/images/w_157,h_300,c_scale/f_auto,q_auto/v1778684972/wp-pme/change-android-password-4/change-android-password-4.png?_i=AA 157w, https://res.cloudinary.com/dbulfrlrz/images/w_536,h_1024,c_scale/f_auto,q_auto/v1778684972/wp-pme/change-android-password-4/change-android-password-4.png?_i=AA 536w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_1468,c_scale/f_auto,q_auto/v1778684972/wp-pme/change-android-password-4/change-android-password-4.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_804,h_1536,c_scale/f_auto,q_auto/v1778684972/wp-pme/change-android-password-4/change-android-password-4.png?_i=AA 804w&quot; sizes=&quot;auto, (max-width: 912px) 100vw, 912px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;ol start=&quot;7&quot; class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Enter your new password and tap &lt;strong&gt;Change password&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;



&lt;p&gt;Once you’ve updated your password, your device will usually ask you to sign in again. You may also see a message like “Account action required” if your email stops syncing. Enter your new password when prompted.&lt;/p&gt;



&lt;p&gt;If you don’t see a prompt, remove the account and add it again:&lt;/p&gt;



&lt;ol class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Open &lt;strong&gt;Settings.&lt;/strong&gt;&lt;/li&gt;



&lt;li&gt;Tap &lt;strong&gt;Passwords, passkeys and accounts&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full is-resized&quot;&gt;&lt;img width=&quot;912&quot; height=&quot;1848&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_912,h_1848,c_scale/f_auto,q_auto/v1778685128/wp-pme/change-android-password-5_137835cd4fa/change-android-password-5_137835cd4fa.png?_i=AA&quot; alt=&quot;How to change your Android password&quot; class=&quot;wp-post-137156 wp-image-137835&quot; style=&quot;width:350px&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;299 KB&quot; data-optsize=&quot;58 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;80.6&quot; data-version=&quot;1778685128&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1778685128/wp-pme/change-android-password-5_137835cd4fa/change-android-password-5_137835cd4fa.png?_i=AA 912w, https://res.cloudinary.com/dbulfrlrz/images/w_148,h_300,c_scale/f_auto,q_auto/v1778685128/wp-pme/change-android-password-5_137835cd4fa/change-android-password-5_137835cd4fa.png?_i=AA 148w, https://res.cloudinary.com/dbulfrlrz/images/w_505,h_1024,c_scale/f_auto,q_auto/v1778685128/wp-pme/change-android-password-5_137835cd4fa/change-android-password-5_137835cd4fa.png?_i=AA 505w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_1556,c_scale/f_auto,q_auto/v1778685128/wp-pme/change-android-password-5_137835cd4fa/change-android-password-5_137835cd4fa.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_758,h_1536,c_scale/f_auto,q_auto/v1778685128/wp-pme/change-android-password-5_137835cd4fa/change-android-password-5_137835cd4fa.png?_i=AA 758w&quot; sizes=&quot;auto, (max-width: 912px) 100vw, 912px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;ol start=&quot;3&quot; class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Select the account you want to update.&lt;/li&gt;



&lt;li&gt;Tap &lt;strong&gt;Remove account&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full is-resized&quot;&gt;&lt;img width=&quot;1071&quot; height=&quot;633&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1071,h_633,c_scale/f_auto,q_auto/v1778685214/wp-pme/change-android-password-6/change-android-password-6.png?_i=AA&quot; alt=&quot;How to change your Android password&quot; class=&quot;wp-post-137156 wp-image-137899&quot; style=&quot;width:350px&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;61 KB&quot; data-optsize=&quot;9 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;85.1&quot; data-version=&quot;1778685214&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1778685214/wp-pme/change-android-password-6/change-android-password-6.png?_i=AA 1071w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_177,c_scale/f_auto,q_auto/v1778685214/wp-pme/change-android-password-6/change-android-password-6.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_605,c_scale/f_auto,q_auto/v1778685214/wp-pme/change-android-password-6/change-android-password-6.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_454,c_scale/f_auto,q_auto/v1778685214/wp-pme/change-android-password-6/change-android-password-6.png?_i=AA 768w&quot; sizes=&quot;auto, (max-width: 1071px) 100vw, 1071px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;ol start=&quot;5&quot; class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Add the account again and sign in using your new password.&lt;/li&gt;
&lt;/ol&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;tips&quot;&gt;Tips for creating a strong email password&lt;/h2&gt;



&lt;p&gt;A password should be hard for a stranger or a computer to guess, but easy for you to manage.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Make it long:&lt;/strong&gt; Aim for at least 12 characters. Longer passwords are harder to crack.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Make it unique:&lt;/strong&gt; Don’t reuse passwords across different accounts.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Avoid personal information:&lt;/strong&gt; Don’t use names, birthdays, or common words.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Make it random or memorable:&lt;/strong&gt; A random password is more secure than a predictable one.&lt;/p&gt;



&lt;p&gt;A &lt;a href=&quot;https://proton.me/pass/password-generator&quot;&gt;password generator&lt;/a&gt; makes all of this easier to manage.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;best-practices&quot;&gt;Best practices for email password security&lt;/h2&gt;



&lt;p&gt;Changing your password is a great start, but security is about more than just a secret word or phrase. You can make your inbox a much more difficult target by using tools that do the heavy lifting for you:&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Use a &lt;/strong&gt;&lt;a href=&quot;https://proton.me/pass&quot;&gt;&lt;strong&gt;password manager&lt;/strong&gt;&lt;/a&gt;: Proton Pass can safely create, store, and autofill your passwords across your devices. It has a built-in password generator to help you create unique passwords for all your accounts.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Enable &lt;/strong&gt;&lt;a href=&quot;https://proton.me/blog/what-is-two-factor-authentication-2fa&quot;&gt;&lt;strong&gt;two-factor authentication (2FA)&lt;/strong&gt;&lt;/a&gt;: This adds a second layer of security, such as a one-time code sent to your &lt;a href=&quot;https://proton.me/authenticator&quot;&gt;authenticator app&lt;/a&gt;, so a password alone isn’t enough to access your account. &lt;a href=&quot;https://proton.me/support/pass-2fa&quot;&gt;Proton Pass provides 2FA&lt;/a&gt; for every account that supports it, along with a &lt;a href=&quot;https://proton.me/pass/pass-monitor&quot;&gt;Pass Monitor&lt;/a&gt; feature that alerts you to repeated passwords and inactive 2FA.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Review active sessions regularly&lt;/strong&gt;: Check where your account is signed in and revoke access from devices or locations you don’t recognize. All Proton Accounts come with a free &lt;a href=&quot;https://proton.me/support/account-monitor-individual-accounts&quot;&gt;account monitor&lt;/a&gt; to help you track active sessions.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Keep recovery options up to date&lt;/strong&gt;: Make sure your recovery email address and phone number are current, secure, and belong only to you.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Be careful with third-party app access&lt;/strong&gt;: Remove connected apps, browser extensions, or email clients you no longer use or don’t recognize.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Watch for phishing&lt;/strong&gt;: Always check the sender, domain, and URL before entering your login details. Avoid signing in from links in unexpected emails. Proton Mail has built-in phishing protection that keeps you safe from known offenders.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Keep your devices updated&lt;/strong&gt;: Install security updates for your operating system, browser, email app, and password manager.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Use account alerts&lt;/strong&gt;: Turn on notifications for new sign-ins, password changes, recovery changes, and suspicious activity. On Proton paid plans, you can enable &lt;a href=&quot;https://proton.me/support/proton-sentinel&quot;&gt;Proton Sentinel&lt;/a&gt; to prevent account takeovers.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Secure your password manager account&lt;/strong&gt;: Use a strong master password and enable 2FA for the password manager itself. You can use &lt;a href=&quot;https://proton.me/authenticator&quot;&gt;Proton Authenticator&lt;/a&gt; to enable 2FA for your Proton Account.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;forgot-password&quot;&gt;What to do if you forgot your email password&lt;/h2&gt;



&lt;p&gt;If you can’t log in, look for the &lt;strong&gt;Forgot password&lt;/strong&gt; link. Most websites place this link directly under the sign-in box on their login page. Clicking it will usually let you verify your identity using a backup email address or phone number.&lt;/p&gt;



&lt;p&gt;For &lt;a href=&quot;https://proton.me/mail&quot;&gt;Proton Mail&lt;/a&gt;, you may also need your recovery phrase or recovery file to regain access to your encrypted messages.&amp;nbsp;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;safe&quot;&gt;Keep your email accounts safe&lt;/h2&gt;



&lt;p&gt;A weak or exposed email password can quickly turn into a much bigger security problem. If you’ve received security alerts, reused passwords across websites, or suspect your account may have been &lt;a href=&quot;https://proton.me/blog/check-if-email-leaked&quot;&gt;exposed in a breach&lt;/a&gt;, you should change the affected passwords as soon as possible.&lt;/p&gt;



&lt;p&gt;Changing your password is one of the fastest ways to reduce the risk of someone else accessing your information. Using a password manager like Proton Pass and an end-to-end encrypted email like Proton Mail can help you keep your inbox safe.&lt;/p&gt;
</content:encoded><category>Privacy guides</category><author>Elena Constantinescu</author></item><item><title>Password security: Why breaches still happen</title><link>https://proton.me/business/blog/password-security</link><guid isPermaLink="true">https://proton.me/business/blog/password-security</guid><description>Even with strong passwords and MFA, breaches still happen. See the hidden gaps, common risks, and how to close them effectively.</description><pubDate>Tue, 12 May 2026 13:31:42 GMT</pubDate><content:encoded>
&lt;p&gt;Most people use passwords every day, so it’s easy to forget that they can cause an extraordinary amount of damage if not managed properly. Most teams know they should use strong passwords, avoid reuse, enable &lt;a href=&quot;https://proton.me/blog/what-is-two-factor-authentication-2fa&quot;&gt;two-factor authentication&lt;/a&gt; (2FA), and store credentials securely. But password-related breaches happen every day, not only in large enterprises but also in small teams managing a growing mix of SaaS tools, shared accounts, and fast-moving workflows.&lt;/p&gt;



&lt;p&gt;The problem isn’t a lack of awareness. Many companies know about cybersecurity risks but believe they aren’t valuable targets for &lt;a href=&quot;https://proton.me/blog/what-is-phishing&quot;&gt;phishing attacks&lt;/a&gt; or &lt;a href=&quot;https://proton.me/business/blog/ransomware-threats-smbs&quot;&gt;ransomware&lt;/a&gt;, especially SMBs. Hence, they don’t look for solutions until it’s too late.&lt;/p&gt;



&lt;p&gt;The gap between knowing the rules and having the right systems of&lt;strong&gt; &lt;/strong&gt;password security in place to follow them is another common issue. When teams are expected to remember too much, move too quickly, and work across too many tools without secure ways to create, store, share, and review credentials, bad habits proliferate.&lt;/p&gt;



&lt;p&gt;This is why breaches still happen. This article explains why passwords remain a common entry point for data breaches, which risks affect small teams most often, which tools and practices help reduce them, and where passkeys and biometric authentication fit into a stronger password security strategy.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Why are passwords still a leading cause of data breaches?&lt;/h2&gt;



&lt;p&gt;Compromised passwords are one of the easiest ways for attackers to gain access to accounts because they guard so many network entry points. In many modern organizations, employees log in to dozens of systems across email, storage, collaboration, finance, HR, development, and client-facing tools, all of them being a potential entry point for breaches.&lt;/p&gt;



&lt;p&gt;Weak credentials create a wide attack surface, and the more passwords that team members have to manually manage, the more likely they are to use simple and weak passwords, reuse or store password insecurely, or fall for phishing scams.&lt;/p&gt;



&lt;p&gt;There’s data that proves this: &lt;a href=&quot;https://proton.me/business/smb-cybersecurity-report&quot;&gt;Proton’s 2026 SMB cybersecurity report&lt;/a&gt; found that nearly one in four SMBs experienced a cyberattack in the previous 12 months, despite many already investing in tools, policies, and training. In addition, Proton’s &lt;a href=&quot;https://proton.me/business/pass/breach-observatory&quot;&gt;Data Breach Observatory&lt;/a&gt; shows that passwords are exposed in nearly half of reported data breaches, underscoring the scale of credential-related risk.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;How one password becomes a broader security risk&lt;/h3&gt;



&lt;p&gt;Passwords are still an enormous vulnerability because&lt;strong&gt; &lt;/strong&gt;they can be compromised in multiple ways&lt;strong&gt;. &lt;/strong&gt;A password can be easily guessed using a &lt;a href=&quot;https://proton.me/blog/what-is-dictionary-attack&quot;&gt;dictionary attack&lt;/a&gt; if it is weak. Reused passwords can compromise multiple accounts across different services. Passwords are also easily exposed if stored in insecure locations such as &lt;a href=&quot;https://proton.me/blog/spreadsheet-security-business-survey&quot;&gt;spreadsheets&lt;/a&gt; or message threads. Once an attacker has one valid credential, they often don’t need to “hack” anything; they just log in.&lt;/p&gt;



&lt;p&gt;With so many underlying risks, a compromised password is not only an access problem: it’s a visibility issue, a response problem, and often a governance matter. Teams need to know which systems are affected, who had access, whether 2FA was enabled, whether the credential was shared, and whether any secrets/credentials need to be rotated or reviewed.&lt;/p&gt;



&lt;p&gt;Modern guidance reflects that reality. The 2025 &lt;a href=&quot;https://proton.me/blog/nist-password-guidelines&quot;&gt;NIST password guidelines&lt;/a&gt; explicitly note that passwords alone are not phishing-resistant, even though they are still widely used. The document also recommends stronger controls around password length, blocklists, and secure handling, rather than relying on outdated complexity composition rules alone.&lt;/p&gt;



&lt;p&gt;So when we discuss password security, it’s not merely a hygiene issue: it’s one of the most common ways everyday work leads to a real breach.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What common risks do small teams face with passwords?&lt;/h2&gt;



&lt;p&gt;Usually, small teams experience difficulty with password security because they need to move fast with limited time, scarce IT resources, and a growing set of tools that do not naturally create secure habits.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Password reuse&lt;/h3&gt;



&lt;p&gt;One of the biggest security threats to organizations is password reuse. A team member might use the same or similar password across multiple work accounts simply because it feels memorable and manageable. But if one of those credentials is exposed in a third-party breach, attackers can try it elsewhere. It’s incredibly easy for one leaked password to turn into multiple compromised systems.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Insecure credential storage&lt;/h3&gt;



&lt;p&gt;Another common issue is insecure credential storage. Even teams that are more conscious about security can fall back on familiar habits: passwords saved in browsers, copied into notes, kept in spreadsheets, or dropped into message threads, all increasing the risk of unauthorized access.&lt;/p&gt;



&lt;p&gt;Over time, poor credential storage leads to a&lt;strong&gt; &lt;/strong&gt;loss of control and poor access management throughout an organization. When credentials are stored in scattered places, offboarding becomes inconsistent, audits get harder, and incident response slows down because nobody knows exactly where credentials live.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Lack of visibility&lt;/h3&gt;



&lt;p&gt;Without clear visibility into credential management, many teams don’t have a clear way to answer basic questions like:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Who still has access to this account?&lt;/li&gt;



&lt;li&gt;Has this password been reused anywhere else?&lt;/li&gt;



&lt;li&gt;Was 2FA enabled?&lt;/li&gt;



&lt;li&gt;Has this credential appeared in a breach?&lt;/li&gt;



&lt;li&gt;How quickly can we identify and change it if something goes wrong?&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Without these answers, password security can only be reactive. Teams only discover weaknesses after a phishing incident, a suspicious login, or even a breach.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Phishing&lt;/h3&gt;



&lt;p&gt;Strong awareness helps, but &lt;a href=&quot;https://proton.me/blog/whaling-spear-phishing&quot;&gt;phishing &lt;/a&gt;remains one of the most common attack vectors. Passwords can still be entered into malicious sites, especially when attackers use convincing login pages or urgency-driven tactics. This is why passwords alone are not enough. Additional security layers like 2FA, passkeys, and secure credential workflows are essential.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Gaps in password and access policies&amp;nbsp;&lt;/h3&gt;



&lt;p&gt;Many small teams rely on informal practices rather than defined policies. People may know they should use strong passwords, but there are often no clear requirements for password length, reuse, rotation, or how credentials should be stored, shared, monitored, and revoked.&lt;/p&gt;



&lt;p&gt;Without a defined&amp;nbsp; &lt;a href=&quot;https://proton.me/business/blog/password-policy-template&quot;&gt;password policy&lt;/a&gt;, credential management becomes inconsistent. Over time, this leads to gaps in security, especially as teams grow and workflows become more complex.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Poor tooling and controls&lt;/h3&gt;



&lt;p&gt;Finally, controls around credential management and security are often inconsistent or nonexistent. As a result:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;2FA is enabled in some systems but missing in others.&lt;/li&gt;



&lt;li&gt;Passwords are handled in an ad-hoc way instead of using approved business tools. &lt;/li&gt;



&lt;li&gt;Lack of centralized monitoring for weak, reused, or compromised credentials&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;The result is an ineffective security approach that appears reassuring on the surface but leaves common real-world threats unaddressed. Password security follows the same pattern&lt;strong&gt;:&lt;/strong&gt; awareness exists, but the approach is ineffective.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Which tools and best practices help prevent password-related breaches?&lt;/h2&gt;



&lt;p&gt;A single control is rarely effective to protect against password-related breaches. Risk is&amp;nbsp; reduced by combining practical measures that prevent weak habits and make secure practices easier to adopt.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Strong, unique passwords&lt;/h3&gt;



&lt;p&gt;Weak passwords are rarely chosen because people think they are ideal. They are used because they are easy to remember and quick to type in across multiple systems.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Using long, random, and unique passwords for every account helps reduce the risk and impact of password-related breaches.&lt;/p&gt;



&lt;p&gt;Free tools like &lt;a href=&quot;https://proton.me/pass/password-generator&quot;&gt;password generators&lt;/a&gt; and &lt;a href=&quot;https://proton.me/pass/password-strength-tester&quot;&gt;password strength testers&lt;/a&gt; can help to create strong passwords and identify weak credentials. However, strength alone is not enough if passwords are reused across services.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Two-factor authentication (2FA)&lt;/h3&gt;



&lt;p&gt;2FA remains one of the most effective ways to prevent account compromise from stolen passwords, especially in phishing and credential stuffing scenarios, because it adds a second layer of protection in case a password is leaked, guessed, or reused.&lt;/p&gt;



&lt;p&gt;The best password security programs enforce 2FA where possible, especially for email, admin accounts, finance tools, identity systems, and remote access.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Password manager&lt;/h3&gt;



&lt;p&gt;A &lt;a href=&quot;https://proton.me/business/pass&quot;&gt;business password manager&lt;/a&gt; like Proton Pass for Business addresses the core causes of password-related breaches: the need for people to create, remember, and manually type passwords across too many systems.&lt;/p&gt;



&lt;p&gt;Instead of relying on memory, teams can generate strong, unique passwords for every account, store them in encrypted vaults, and autofill them when needed, removing much of the reason to create weak passwords or reuse credentials.&lt;/p&gt;



&lt;p&gt;A business password manager&lt;strong&gt; &lt;/strong&gt;also provides greater access control, an operational need for businesses. Teams will always need secure &lt;a href=&quot;https://proton.me/pass/password-sharing&quot;&gt;password sharing&lt;/a&gt;; the difference is whether that happens within governed, secure workflows or through chat, email, spreadsheets, and copied plain text. When access is managed through a secure system, it can be granted and revoked more reliably.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Strong and enforceable password policies&lt;/h3&gt;



&lt;p&gt;Teams need clear, documented standards that are consistently applied and enforced, including:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Minimum password length&lt;/li&gt;



&lt;li&gt;Unique passwords for every account, with no reuse across systems&lt;/li&gt;



&lt;li&gt;Approved storage methods&lt;/li&gt;



&lt;li&gt;Secure sharing rules&lt;/li&gt;



&lt;li&gt;Event-based reset policies&lt;/li&gt;



&lt;li&gt;Clear MFA requirements&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;A strong &lt;a href=&quot;https://proton.me/business/blog/password-policy-template&quot;&gt;password policy&lt;/a&gt; backed by efficient and user-friendly tools helps turn password security from a personal preference into an organizational standard everyone can adhere to with ease. With a password manager, these policies can be enforced in practice and applied consistently across teams.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Monitoring for compromised passwords&lt;/h3&gt;



&lt;p&gt;Following best credential security practices is only the starting point. Teams also need the ability to know if credentials have been exposed in a breach, or when weak and reused passwords are creating preventable risk across the organization.&lt;/p&gt;



&lt;p&gt;Monitoring provides early visibility. Instead of reacting only after suspicious activity or account compromise happens, teams can quickly identify vulnerable credentials and rotate them before attackers have a chance to gain unauthorized access.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Access control and review&lt;/h3&gt;



&lt;p&gt;Secure access is not only about how strong credentials are. It also depends on who can access, which accounts are shared, whether access remains appropriate, and whether former employees or contractors retain credentials they no longer need.&lt;/p&gt;



&lt;p&gt;That is why effective access control improves security in two ways: by strengthening credentials, and by establishing clear processes for how access is granted, reviewed, and revoked over time.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Ongoing security awareness and training&amp;nbsp;&lt;/h3&gt;



&lt;p&gt;Employees must understand how to identify phishing attempts, why password reuse creates risk, where credentials can and cannot be stored, what tools are approved to use, and how to report suspected activity quickly.&lt;/p&gt;



&lt;p&gt;The key is to treat training and awareness as part of normal operations, not as a checkbox exercise. Password security is stronger when secure habits are built into everyday workflows and reinforced consistently over time.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Passkeys and biometric authentication&lt;/h3&gt;



&lt;p&gt;Alternative methods such as &lt;a href=&quot;https://proton.me/pass/passkeys&quot;&gt;passkeys&lt;/a&gt; and &lt;a href=&quot;https://proton.me/blog/biometric-authentication&quot;&gt;biometric authentication&lt;/a&gt; are becoming increasingly important as part of a modern authentication strategy.&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Passkeys rely on device-bound authentication rather than shared secrets, addressing key weaknesses of passwords, such as phishing and reuse risks. &lt;/li&gt;



&lt;li&gt;Biometric authentication can also improve usability, especially on devices, but is typically used locally to unlock an authentication secret or device rather than being transmitted as the primary secret itself. That makes them useful, but not a direct replacement for all password and access management needs. NIST’s guidance makes this distinction as well when discussing activation secrets and authenticators.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;For most teams today, the question is not whether to use passwords, passkeys, or biometrics. In practice, a layered approach is the answer: 2FA should be used when possible, passkeys should be adopted where supported, and secure password management remains critical, as passwords are still widely used across many systems and are unlikely to disappear anytime soon.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;How does effective password management improve security and compliance?&lt;/h2&gt;



&lt;p&gt;Password security is typically framed in terms of breach prevention, but that is only part of the picture. Effective password management also strengthens governance, improves audit readiness, and makes day-to-day operations more efficient by ensuring access can be reviewed, updated, and revoked as needed.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Stronger day-to-day security&lt;/h3&gt;



&lt;p&gt;Security benefits are immediate. Unique passwords limit lateral movement from reuse, encrypted vaults prevent accidental exposure, and easy, secure sharing eliminates the need to send secrets through unsafe channels. Monitoring helps identify exposed credentials early, while MFA makes it less likely that a stolen password leads to account takeover.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Better operational control&lt;/h3&gt;



&lt;p&gt;Effective credential management provides greater control across onboarding, offboarding, role changes, contractor access, and incident response. When teams know where credentials are stored, who can access them, and how to quickly rotate them, they can respond faster and more precisely when something goes wrong.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Improved support for compliance&lt;/h3&gt;



&lt;p&gt;Most frameworks and customer security reviews go beyond asking whether a company uses strong passwords. They require evidence that:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Credentials are managed securely&lt;/li&gt;



&lt;li&gt;Access is consistently reviewed&lt;/li&gt;



&lt;li&gt;Sharing is secure and controlled&lt;/li&gt;



&lt;li&gt;Access can be revoked&lt;/li&gt;



&lt;li&gt;Risky behaviors can be addressed&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;A business password manager helps establish the repeatable controls that auditors and customers require, strengthening organizational &lt;a href=&quot;https://proton.me/blog/cybersecurity-compliance&quot;&gt;compliance&lt;/a&gt;.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;How does Proton Pass for Business help reduce password-related breach risk?&lt;/h2&gt;



&lt;p&gt;Password-related breaches usually happen when teams need to manage too many credentials without a secure, centralized system. This leads to the same familiar issues: password reuse, insecure storage, informal sharing, limited traceability, and inconsistent access control.&lt;/p&gt;



&lt;p&gt;Proton Pass for Business reduces this risk by giving teams a secure way to create, store, and manage credentials. Instead of relying on browsers, spreadsheets, notes, or chat threads, teams can generate strong, unique passwords, store them in encrypted vaults, and share access using secure and controllable workflows.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Stronger passwords, used consistently&lt;/h3&gt;



&lt;p&gt;One of the most immediate benefits is reducing password reuse. When unique credentials are easy to generate and retrieve, teams are much less likely to fall back on repeated or slightly modified passwords across accounts.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Better visibility and control over access&lt;/h3&gt;



&lt;p&gt;Proton Pass for Business centralizes credentials in a managed environment, making access easier to review and control. Teams gain visibility into who has access, which credentials are shared, and what needs to be updated or revoked after a role change or suspected compromise.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Safer sharing for collaborative teams&lt;/h3&gt;



&lt;p&gt;Small teams often need to hand over access quickly, especially across operations, vendors, and shared tools. However, when this sharing occurs through insecure channels, risk arises. With secure and controlled sharing workflows, businesses can reduce that exposure while making access changes easier to manage and control.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Stronger support for policy enforcement&lt;/h3&gt;



&lt;p&gt;A password policy is much easier to implement when tools enforce the behavior they require. Proton Pass for Business helps teams put rules around password strength, sharing, 2FA adoption, and credential review into practice, rather than relying on memory or informal habits.&lt;/p&gt;



&lt;p&gt;This is one of the benefits of a business password manager. It can’t eliminate all authentication risks, but it directly addresses many of the causes that lead to&amp;nbsp; password-related breaches.&lt;/p&gt;
</content:encoded><category>For business</category><author>Ben Wolford</author></item></channel></rss>