
Poison Tap poses a threat to every company that doesn’t have a plan of action for physical cybersecurity.
Read MoreCall us at (888) 881-9000
Proton Data Security Blog

Poison Tap poses a threat to every company that doesn’t have a plan of action for physical cybersecurity.
Read More
Shopping season is upon us which means many people will be trading in their old electronics for new ones.
Read More
You click a file, drag it to the recycling bin at the bottom right hand corner of your screen and—poof—it’s gone, right?
Read More
As the nation counts down the days until voting begins for the next president of the United States, some are concerned about looming cybersecurity threats and what it could mean for their votes.
Read More
America’s age-old process – democracy – requires nothing more than one vote of confidence from each citizen. Unfortunately, the systems tracking this participation are too old to handle the dangers associated with the digital era.
Read More
Every hard disk drive reaches a point where it must be safely and securely put out of commission. But how can you be sure someone doesn’t find it, plug it in and read all your data?
Read More
A number of different degaussing devices can be used to erase the media and important data on it, but it’s important to know which one will serve you best.
Read More
The frequency in which hacking news comes to light is showing just how easy it is to get inside a computer system.
Read More
Information on employees, customers and private operations are all housed on internal computer systems. But, just because the data is locked away doesn’t mean somebody else can’t access it.
Read More