{"@context":"https:\/\/schema.org\/","@type":"Blog","@id":"https:\/\/www.protondata.com\/blog\/#Blog","headline":"BLOG","description":"Brilliant Data Security Solutions","url":"https:\/\/www.protondata.com\/blog\/","hasPart":[{"@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/degaussing-equipment\/ces-2017-t-4-degausser-something-common\/","headline":"CES 2017 and T-4 degausser have something in common","url":"https:\/\/www.protondata.com\/blog\/degaussing-equipment\/ces-2017-t-4-degausser-something-common\/","datePublished":"2017-01-06","dateModified":"2020-05-13","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/degaussing-equipment\/ces-2017-t-4-degausser-something-common\/","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/#Person","name":"Proton Data Security","url":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2017\/01\/With-CES-in-mind-one-cant-help-but-see-that-in-a-world-striving-for-faster-technological-adaption-the-Proton-T4-degausser-will-likely-remain-on-top-of_2410_40149398_0_14131714_500.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2017\/01\/With-CES-in-mind-one-cant-help-but-see-that-in-a-world-striving-for-faster-technological-adaption-the-Proton-T4-degausser-will-likely-remain-on-top-of_2410_40149398_0_14131714_500.jpg","height":333,"width":500},"wordCount":974,"keywords":null},{"@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/degaussing-equipment\/startups-arent-immune-data-breaches\/","headline":"Startups aren&#8217;t immune from data breaches","url":"https:\/\/www.protondata.com\/blog\/degaussing-equipment\/startups-arent-immune-data-breaches\/","datePublished":"2016-12-28","dateModified":"2020-05-13","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/degaussing-equipment\/startups-arent-immune-data-breaches\/","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/#Person","name":"Proton Data Security","url":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2016\/12\/Being-a-small-rather-unknown-entity-in-the-large-world-of-business-doesnt-protect-startups-and-small-businesses-from-data-breaches_2410_40148615_0_14133801_500.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2016\/12\/Being-a-small-rather-unknown-entity-in-the-large-world-of-business-doesnt-protect-startups-and-small-businesses-from-data-breaches_2410_40148615_0_14133801_500.jpg","height":333,"width":500},"wordCount":950,"keywords":null},{"@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/degaussing-equipment\/poison-tap-makes-hacking-easier-heres-stop\/","headline":"Poison Tap makes hacking easier; here&#8217;s how to stop it","url":"https:\/\/www.protondata.com\/blog\/degaussing-equipment\/poison-tap-makes-hacking-easier-heres-stop\/","datePublished":"2016-12-15","dateModified":"2018-01-04","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/degaussing-equipment\/poison-tap-makes-hacking-easier-heres-stop\/","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/#Person","name":"Proton Data Security","url":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2016\/12\/Poison-Tap-poses-a-threat-to-every-company-that-doesnt-have-a-plan-of-action-for-physical-cybersecurity_2410_40147744_0_14119076_500.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2016\/12\/Poison-Tap-poses-a-threat-to-every-company-that-doesnt-have-a-plan-of-action-for-physical-cybersecurity_2410_40147744_0_14119076_500.jpg","height":348,"width":500},"wordCount":818,"keywords":null},{"@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/degaussing-equipment\/shop-till-drop-dont-forget-degauss\/","headline":"Shop &#8217;till you drop, but don&#8217;t forget to degauss","url":"https:\/\/www.protondata.com\/blog\/degaussing-equipment\/shop-till-drop-dont-forget-degauss\/","datePublished":"2016-12-08","dateModified":"2020-05-13","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/degaussing-equipment\/shop-till-drop-dont-forget-degauss\/","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/#Person","name":"Proton Data Security","url":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2016\/10\/Shopping-season-is-upon-us-which-means-many-people-will-be-trading-in-their-old-electronics-for-new-ones_2410_40139481_0_14069006_500.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2016\/10\/Shopping-season-is-upon-us-which-means-many-people-will-be-trading-in-their-old-electronics-for-new-ones_2410_40139481_0_14069006_500.jpg","height":474,"width":499},"wordCount":738,"keywords":null},{"@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/physical-destruction\/protect-mobile-data-shredding-cellphone\/","headline":"Protect mobile data by shredding your cellphone","url":"https:\/\/www.protondata.com\/blog\/physical-destruction\/protect-mobile-data-shredding-cellphone\/","datePublished":"2016-12-05","dateModified":"2020-05-13","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/physical-destruction\/protect-mobile-data-shredding-cellphone\/","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/#Person","name":"Proton Data Security","url":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2016\/11\/We-do-everything-from-accessing-our-bank-account-to-sending-private-information-to-friends-and-family-and-theres-even-an-application-that-saves-all-of_2410_40145890_0_14133286_500.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2016\/11\/We-do-everything-from-accessing-our-bank-account-to-sending-private-information-to-friends-and-family-and-theres-even-an-application-that-saves-all-of_2410_40145890_0_14133286_500.jpg","height":342,"width":500},"wordCount":675,"keywords":null},{"@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/degaussing-equipment\/recycling-data-just-doesnt-cut\/","headline":"Why recycling data just doesn&#8217;t cut it","url":"https:\/\/www.protondata.com\/blog\/degaussing-equipment\/recycling-data-just-doesnt-cut\/","datePublished":"2016-11-11","dateModified":"2020-05-13","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/degaussing-equipment\/recycling-data-just-doesnt-cut\/","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/#Person","name":"Proton Data Security","url":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2016\/11\/You-click-a-file-drag-it-to-the-recycling-bin-at-the-bottom-right-hand-corner-of-your-screen-andpoofits-gone-right_2410_40144070_0_14094188_500.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2016\/11\/You-click-a-file-drag-it-to-the-recycling-bin-at-the-bottom-right-hand-corner-of-your-screen-andpoofits-gone-right_2410_40144070_0_14094188_500.jpg","height":332,"width":500},"wordCount":774,"keywords":null},{"@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/degaussing-equipment\/cybersecurity-nations-mind-ahead-presidential-elections\/","headline":"Cybersecurity on the nation&#8217;s mind ahead of presidential elections","url":"https:\/\/www.protondata.com\/blog\/degaussing-equipment\/cybersecurity-nations-mind-ahead-presidential-elections\/","datePublished":"2016-11-03","dateModified":"2020-05-13","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/degaussing-equipment\/cybersecurity-nations-mind-ahead-presidential-elections\/","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/#Person","name":"Proton Data Security","url":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2016\/10\/As-the-nation-counts-down-the-days-until-voting-begins-for-the-next-president-of-the-United-States-some-are-concerned-about-looming-cybersecurity-thre_2410_40143355_0_14123870_500.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2016\/10\/As-the-nation-counts-down-the-days-until-voting-begins-for-the-next-president-of-the-United-States-some-are-concerned-about-looming-cybersecurity-thre_2410_40143355_0_14123870_500.jpg","height":334,"width":500},"wordCount":838,"keywords":null},{"@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/data-security\/data-breach-cost-business\/","headline":"What does a data breach cost your business?","url":"https:\/\/www.protondata.com\/blog\/data-security\/data-breach-cost-business\/","datePublished":"2016-10-11","dateModified":"2020-05-13","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/data-security\/data-breach-cost-business\/","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/#Person","name":"Proton Data Security","url":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2016\/10\/New-research-is-revealing-that-studies-aimed-at-identifying-the-true-cost-of-an-information-security-breach-are-missing-the-mark-by-a-lotheres-how_2410_40137509_0_14131122_500.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2016\/10\/New-research-is-revealing-that-studies-aimed-at-identifying-the-true-cost-of-an-information-security-breach-are-missing-the-mark-by-a-lotheres-how_2410_40137509_0_14131122_500.jpg","height":332,"width":500},"wordCount":845,"keywords":null},{"@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/regulations-compliance\/financial-consequences-non-compliance\/","headline":"The financial consequences of non-compliance","url":"https:\/\/www.protondata.com\/blog\/regulations-compliance\/financial-consequences-non-compliance\/","datePublished":"2016-10-03","dateModified":"2020-05-13","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/regulations-compliance\/financial-consequences-non-compliance\/","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/#Person","name":"Proton Data Security","url":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2016\/10\/Every-industry-has-its-own-regulatory-policy-regarding-data-protection-but-what-happens-when-you-dont-follow-these-mandates_2410_40139825_0_14123526_500.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2016\/10\/Every-industry-has-its-own-regulatory-policy-regarding-data-protection-but-what-happens-when-you-dont-follow-these-mandates_2410_40139825_0_14123526_500.jpg","height":332,"width":499},"wordCount":985,"keywords":null},{"@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/data-security\/companys-biggest-data-security-threat\/","headline":"Who is your company&#8217;s biggest data security threat?","url":"https:\/\/www.protondata.com\/blog\/data-security\/companys-biggest-data-security-threat\/","datePublished":"2016-09-29","dateModified":"2017-08-30","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/data-security\/companys-biggest-data-security-threat\/","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/#Person","name":"Proton Data Security","url":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2016\/09\/Ransomware-viruses-and-hackersoh-my-There-are-so-many-threats-to-an-organizations-data-security-nowadays-that-IT-experts-heads-are-constantly-on-a-swi_2410_40140520_0_14125162_500.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2016\/09\/Ransomware-viruses-and-hackersoh-my-There-are-so-many-threats-to-an-organizations-data-security-nowadays-that-IT-experts-heads-are-constantly-on-a-swi_2410_40140520_0_14125162_500.jpg","height":344,"width":499},"wordCount":522,"keywords":null}]}