Poison Tap poses a threat to every company that doesn’t have a plan of action for physical cybersecurity.
Read MoreCall us at (888) 881-9000
Proton Data Security Blog
Poison Tap poses a threat to every company that doesn’t have a plan of action for physical cybersecurity.
Read MoreShopping season is upon us which means many people will be trading in their old electronics for new ones.
Read MoreYou click a file, drag it to the recycling bin at the bottom right hand corner of your screen and—poof—it’s gone, right?
Read MoreAs the nation counts down the days until voting begins for the next president of the United States, some are concerned about looming cybersecurity threats and what it could mean for their votes.
Read MoreAmerica’s age-old process – democracy – requires nothing more than one vote of confidence from each citizen. Unfortunately, the systems tracking this participation are too old to handle the dangers associated with the digital era.
Read MoreEvery hard disk drive reaches a point where it must be safely and securely put out of commission. But how can you be sure someone doesn’t find it, plug it in and read all your data?
Read MoreA number of different degaussing devices can be used to erase the media and important data on it, but it’s important to know which one will serve you best.
Read MoreThe frequency in which hacking news comes to light is showing just how easy it is to get inside a computer system.
Read MoreInformation on employees, customers and private operations are all housed on internal computer systems. But, just because the data is locked away doesn’t mean somebody else can’t access it.
Read More