CINXE.COM
The Proton Blog
<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>The Proton Blog</title><description>News from the front lines of privacy and security</description><link>https://proton.me/blog/</link><language>en</language><feed_url>https://proton.me/blog/feed</feed_url><item><title>Easily manage synced folders with Optimize Storage in Proton Drive for Windows</title><link>https://proton.me/blog/proton-drive-windows-optimize-storage</link><guid isPermaLink="true">https://proton.me/blog/proton-drive-windows-optimize-storage</guid><description>We've added a new Optimize Storage feature in Proton Drive for Windows to manage synced folders easily. See more updates you may have missed.</description><pubDate>Wed, 02 Apr 2025 08:00:43 GMT</pubDate><content:encoded> <p>Managing <a href="https://proton.me/drive">encrypted cloud storage</a> just got easier for <a href="https://proton.me/drive/download">Windows</a> users. The new Optimize Storage feature gives you more control over how your synced folders behave and shows exactly what&#8217;s happening in File Explorer. It’s a simpler, smarter way to stay organized while keeping your files encrypted and <a href="https://proton.me/drive/download">easy to access on all your devices</a>.</p> <p>Let’s take a closer look at how it works and what other important updates have recently landed in Proton Drive for Windows.</p> <div class="text-center"><a class="btn inline-block rounded-full font-bold btn-small btn-solid-purple" href="https://proton.me/drive/download">Get Proton Drive for Windows</a></div> <h2 class="wp-block-heading">What&#8217;s changing with the Optimize Storage feature?</h2> <div class="wp-block-image"> <figure class="aligncenter size-large"><img width="1024" height="512" data-public-id="wp-pme/image_83233d3142/image_83233d3142.jpeg" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1743537298/wp-pme/image_83233d3142/image_83233d3142.jpeg?_i=AA" alt="The latest Proton Drive app for Windows introduces the new Optimize Storage feature" class="wp-post-83232 wp-image-83233" data-format="jpeg" data-transformations="f_auto,q_auto" data-filesize="57 KB" data-optsize="23 KB" data-optformat="image/webp" data-percent="59.5" data-permalink="https://pme.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=83233&amp;lang=en" data-version="1743537298" data-seo="1" srcset="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1743537298/wp-pme/image_83233d3142/image_83233d3142.jpeg?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_150,c_scale/f_auto,q_auto/v1743537298/wp-pme/image_83233d3142/image_83233d3142.jpeg?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_384,c_scale/f_auto,q_auto/v1743537298/wp-pme/image_83233d3142/image_83233d3142.jpeg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1743537298/wp-pme/image_83233d3142/image_83233d3142.jpeg?_i=AA 1200w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure></div> <p>The Optimize Storage setting gives you better visibility and control over your <a href="https://proton.me/support/proton-drive-windows-sync-folder">local folders synced to Proton Drive</a>:</p> <ul class="wp-block-list"> <li>When you enable it, File Explorer clearly labels the folders you&#8217;ve synced using the desktop app, making it easier to work in more folders scattered across your computer.</li> </ul> <div class="wp-block-image"> <figure class="aligncenter size-large"><img width="1024" height="480" data-public-id="wp-pme/image_8323834512/image_8323834512.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_480,c_scale/f_auto,q_auto/v1743537292/wp-pme/image_8323834512/image_8323834512.png?_i=AA" alt="The Proton Drive file sync status in Windows" class="wp-post-83232 wp-image-83238" data-format="png" data-transformations="f_auto,q_auto" data-filesize="489 KB" data-optsize="35 KB" data-optformat="image/webp" data-percent="92.9" data-permalink="https://pme.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=83238&amp;lang=en" data-version="1743537292" data-seo="1" srcset="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_480,c_scale/f_auto,q_auto/v1743537292/wp-pme/image_8323834512/image_8323834512.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_141,c_scale/f_auto,q_auto/v1743537292/wp-pme/image_8323834512/image_8323834512.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_360,c_scale/f_auto,q_auto/v1743537292/wp-pme/image_8323834512/image_8323834512.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1743537292/wp-pme/image_8323834512/image_8323834512.png?_i=AA 1200w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure></div> <ul class="wp-block-list"> <li>You can decide whether folder contents are always available locally or offloaded automatically by Windows when storage is low — all while staying safely synced to Proton Drive.</li> <li>Just like before, if your synced folders contain large files (such as videos), you can right-click them in File Explorer to <a href="https://proton.me/support/proton-drive-windows-on-demand-sync">make them cloud-only</a> and free up space.</li> </ul> <div class="text-center"><a class="btn inline-block rounded-full font-bold btn-small btn-solid-purple" href="https://proton.me/drive/download">Get Proton Drive for Windows</a></div> <h2 class="wp-block-heading">What else is new in Proton Drive for Windows?</h2> <p>Here are a couple of recent updates you might have missed on the Windows app:</p> <h3 class="wp-block-heading">Available for Windows on ARM</h3> <p>If you’re using a Windows laptop or tablet with an ARM chip, you can enjoy the full Proton Drive experience optimized for your device:</p> <ul class="wp-block-list"> <li>Securely access your files across all devices</li> <li>Keep your files safely stored in the cloud, protected by <a href="https://proton.me/drive/security">Proton Drive’s end-to-end encryption</a>.</li> <li>Free up space on your device by making large, unused files cloud-only or by turning on Optimize Storage.</li> </ul> <h3 class="wp-block-heading">Translated into 10 languages</h3> <p>The Windows app is now available in 10 languages: English, German, Spanish, French, Dutch, Italian, Portuguese, Polish, Russian, and Turkish. More people around the world can use Proton Drive in the language they&#8217;re most comfortable with, while still getting the same strong privacy and security.</p> <h2 class="wp-block-heading">Get Proton Drive now</h2> <p><a href="https://proton.me/support/proton-drive-windows-app">Proton Drive for Windows</a> now gives you more control over your storage, better folder visibility in File Explorer, native ARM support, and more languages — all while keeping your files private and secure.</p> <p><a href="https://proton.me/drive/download">Update now</a> to start using these new features! If you’re new to Proton, you’ll be joining a <a href="https://proton.me/community">community-driven company</a> that puts your privacy and needs first.</p> <p>Got ideas for what we should build next? Share your feedback with us on <a href="https://www.reddit.com/r/ProtonDrive/">Reddit</a>, <a href="https://protonmail.uservoice.com/forums/932839-proton-drive">User Voice</a>, or <a href="https://x.com/ProtonDrive">X</a>.</p> <figure class="wp-block-embed aligncenter is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper"> <iframe loading="lazy" title="Proton Drive Basics &amp; Key Features" width="750" height="422" src="https://www.youtube-nocookie.com/embed/r0sA9Duj5q4?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe> </div></figure> </content:encoded><category>Product updates</category><category>Proton Drive</category><author>Anant Vijay</author></item><item><title>Better than ever: the new Proton Drive 2.0 for macOS</title><link>https://proton.me/blog/proton-drive-macos-app-update</link><guid isPermaLink="true">https://proton.me/blog/proton-drive-macos-app-update</guid><description>Rebuilt from the ground up, the new Proton Drive for macOS app offers enhanced performance, improved reliability, and a refreshed design</description><pubDate>Wed, 02 Apr 2025 07:59:47 GMT</pubDate><content:encoded> <p>Cloud storage lets you keep all your most important and cherished files — from bank records to family photos — within reach. This means your <a href="https://proton.me/drive">cloud storage</a> must be fast, work seamlessly across devices, and protect your privacy. <strong>That’s why we’ve rebuilt </strong><a href="https://proton.me/drive/download"><strong>Proton Drive for macOS</strong></a><strong> from the ground up</strong> — offering a refreshed design, enhanced performance, and up to double the speed, all while protecting all your files with <a href="https://proton.me/security/end-to-end-encryption">end-to-end encryption</a>. </p> <div class="text-center"><a class="btn inline-block rounded-full font-bold btn-small btn-solid-purple" href="https://proton.me/drive/download">Try Proton Drive 2.0 for macOS</a></div> <h2 class="wp-block-heading">What’s new in Proton Drive 2.0 for macOS?</h2> <p>The launch of the <a href="https://proton.me/blog/proton-drive-mac-app">first Proton Drive for macOS app</a> in 2023 was a significant milestone in our journey to make our <a href="https://proton.me/drive">end-to-end encrypted cloud storage</a> available to everyone — whether you’re using a Mac, Windows, Android, or iOS device, you should be able to seamlessly back up your files and access them across platforms without sacrificing functionality, privacy, or security.&nbsp;</p> <p>Following the app’s launch, you shared feedback on how we could make your experience better — from performance improvements to new features or tools. Your insights are at the heart of everything we do and, today, we’re excited to unveil <strong>Proton Drive 2.0 for macOS </strong>as a direct result of that.</p> <h3 class="wp-block-heading">Access files in a few clicks</h3> <figure class="wp-block-image size-large"><img width="1024" height="512" data-public-id="wp-pme/01access_and_upload_files2x/01access_and_upload_files2x.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1742995268/wp-pme/01access_and_upload_files2x/01access_and_upload_files2x.png?_i=AA" alt="" class="wp-post-83022 wp-image-83035" data-format="png" data-transformations="f_auto,q_auto" data-filesize="2 MB" data-optsize="106 KB" data-optformat="image/webp" data-percent="93.9" data-permalink="https://pme.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=83035&amp;lang=en" data-version="1742995268" data-seo="1" srcset="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1742995268/wp-pme/01access_and_upload_files2x/01access_and_upload_files2x.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_150,c_scale/f_auto,q_auto/v1742995268/wp-pme/01access_and_upload_files2x/01access_and_upload_files2x.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_384,c_scale/f_auto,q_auto/v1742995268/wp-pme/01access_and_upload_files2x/01access_and_upload_files2x.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_768,c_scale/f_auto,q_auto/v1742995268/wp-pme/01access_and_upload_files2x/01access_and_upload_files2x.png?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1024,c_scale/f_auto,q_auto/v1742995268/wp-pme/01access_and_upload_files2x/01access_and_upload_files2x.png?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_784,c_scale/f_auto,q_auto/v1742995268/wp-pme/01access_and_upload_files2x/01access_and_upload_files2x.png?_i=AA 1568w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure> <p>Now, when you open Proton Drive from your desktop menu bar, you’ll immediately see recently edited, uploaded, and synced files —<strong> </strong>letting you pick up where you left off without digging through any folders.</p> <h3 class="wp-block-heading">Experience faster uploads and downloads</h3> <figure class="wp-block-image size-large"><img width="1024" height="512" data-public-id="wp-pme/02improved_speed2x/02improved_speed2x.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1742995295/wp-pme/02improved_speed2x/02improved_speed2x.png?_i=AA" alt="" class="wp-post-83022 wp-image-83027" data-format="png" data-transformations="f_auto,q_auto" data-filesize="2 MB" data-optsize="92 KB" data-optformat="image/webp" data-percent="94.6" data-permalink="https://pme.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=83027&amp;lang=en" data-version="1742995295" data-seo="1" srcset="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1742995295/wp-pme/02improved_speed2x/02improved_speed2x.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_150,c_scale/f_auto,q_auto/v1742995295/wp-pme/02improved_speed2x/02improved_speed2x.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_384,c_scale/f_auto,q_auto/v1742995295/wp-pme/02improved_speed2x/02improved_speed2x.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_768,c_scale/f_auto,q_auto/v1742995295/wp-pme/02improved_speed2x/02improved_speed2x.png?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1024,c_scale/f_auto,q_auto/v1742995295/wp-pme/02improved_speed2x/02improved_speed2x.png?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_784,c_scale/f_auto,q_auto/v1742995295/wp-pme/02improved_speed2x/02improved_speed2x.png?_i=AA 1568w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure> <p>Proton Drive 2.0 for macOS lets you upload and download files at up to double the speed.<strong> </strong>Collaborate with teammates, tackle urgent projects, and stay ahead of deadlines without delays.</p> <h3 class="wp-block-heading">Monitor the status of your files</h3> <figure class="wp-block-image size-large"><img width="1024" height="512" data-public-id="wp-pme/03monitor_the_status_of_upload2x/03monitor_the_status_of_upload2x.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1742995281/wp-pme/03monitor_the_status_of_upload2x/03monitor_the_status_of_upload2x.png?_i=AA" alt="" class="wp-post-83022 wp-image-83031" data-format="png" data-transformations="f_auto,q_auto" data-filesize="2 MB" data-optsize="95 KB" data-optformat="image/webp" data-percent="94.6" data-permalink="https://pme.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=83031&amp;lang=en" data-version="1742995281" data-seo="1" srcset="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1742995281/wp-pme/03monitor_the_status_of_upload2x/03monitor_the_status_of_upload2x.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_150,c_scale/f_auto,q_auto/v1742995281/wp-pme/03monitor_the_status_of_upload2x/03monitor_the_status_of_upload2x.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_384,c_scale/f_auto,q_auto/v1742995281/wp-pme/03monitor_the_status_of_upload2x/03monitor_the_status_of_upload2x.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_768,c_scale/f_auto,q_auto/v1742995281/wp-pme/03monitor_the_status_of_upload2x/03monitor_the_status_of_upload2x.png?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1024,c_scale/f_auto,q_auto/v1742995281/wp-pme/03monitor_the_status_of_upload2x/03monitor_the_status_of_upload2x.png?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_784,c_scale/f_auto,q_auto/v1742995281/wp-pme/03monitor_the_status_of_upload2x/03monitor_the_status_of_upload2x.png?_i=AA 1568w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure> <p>Keep track of your files’ sync status from your desktop menu bar. Whether you’re backing up&nbsp;a folder or uploading a large file, Proton Drive’s improved status tracker keeps you informed and lets you address errors without interrupting your workflow.</p> <div class="text-center"><a class="btn inline-block rounded-full font-bold btn-small btn-solid-purple" href="https://proton.me/drive/download">Upgrade to Proton Drive 2.0 for macOS</a></div> <h2 class="wp-block-heading">The power of Proton, from your desktop</h2> <p>With these upgrades, Proton Drive 2.0 for macOS continues to offer its core features for privacy-first, secure cloud storage that puts you in control of your data.</p> <h3 class="wp-block-heading">Protect your data</h3> <p>When you use Proton Drive, your files are end-to-end encrypted on your device before being uploaded to our secure cloud, meaning no one — not even Proton — can access your files, photos, or documents. </p> <h3 class="wp-block-heading">Sync files seamlessly</h3> <p>Save or edit files in the Proton Drive folder on your Mac, and they’ll automatically be mirrored across devices, so you can always access the latest version — even if your device is lost or damaged.&nbsp;</p> <h3 class="wp-block-heading">Access files offline</h3> <p>Proton Drive for macOS lets you download cloud-stored files or folders to access them even without an internet connection. You can edit and save your work while offline, and Proton Drive will sync the changes when you reconnect.</p> <div class="text-center"><a class="btn inline-block rounded-full font-bold btn-small btn-solid-purple" href="https://proton.me/drive/download">Download Proton Drive 2.0 for macOS</a></div> <h2 class="wp-block-heading">The future of Proton Drive&nbsp;</h2> <p>With the launch of the new macOS app, Proton Drive offers a secure, high-performance, and trustworthy alternative to traditional cloud storage providers — protecting your data from being accessed or exploited by algorithms, advertisers, governments, or malicious actors.</p> <p>Over the next few months, we’ll enhance the app further by adding more new features and releasing the Software Development Kit (SDK) that the new macOS app is based on, which we anticipate will serve as the basis for a highly requested Linux app.</p> <p>If you haven&#8217;t already introduced the power of Proton Drive to your desktop, g<a href="https://account.proton.me/drive/signup">et started</a> and <a href="https://proton.me/drive/download">download Proton Drive 2.0 for macOS </a>today. As always, your feedback is invaluable in guiding our future product development.</p> </content:encoded><category>Product updates</category><category>Proton Drive</category><author>Anant Vijay</author></item><item><title>World Backup Day: 8 data loss stories — and how to protect yours</title><link>https://proton.me/blog/world-backup-day</link><guid isPermaLink="true">https://proton.me/blog/world-backup-day</guid><description>Celebrate World Backup Day by learning from data loss stories, from family heirlooms to $500,000 in Bitcoin, and how to avoid a similar fate.</description><pubDate>Mon, 31 Mar 2025 10:40:51 GMT</pubDate><content:encoded> <p><a href="https://proton.me/blog/how-to-back-up-files">Data loss</a> can happen to anyone, whether it&#8217;s a failed hard drive, accidental deletion, or a <a href="https://proton.me/blog/ransomware-attack">ransomware attack</a>. And when it does, the consequences can range from inconvenient to devastating.</p> <p>A 2025 global survey by <a href="https://www.westerndigital.com/company/newsroom/press-releases/2025/2025-03-25-western-digital-world-backup-day" target="_blank" rel="noreferrer noopener">Western Digital</a> found that while 87% of people say they back up their data, 63% have already experienced data loss. The takeaway is clear: Backing up your data is essential — and it must be done right.</p> <p>In recognition of <a href="https://www.worldbackupday.com/" target="_blank" rel="noreferrer noopener">World Backup Day</a>, celebrated on March 31, we’re highlighting some real-world data loss stories that happened to individuals and organizations. We&#8217;re also showing you some tips for how to protect your backups using <a href="https://proton.me/drive">Proton Drive</a> so you can avoid a similar fate.</p> <h2 class="wp-block-heading">The personal costs of losing data</h2> <p>Here are a few stories that show just how personal data loss can be, even when some form of backup was in place:</p> <h3 class="wp-block-heading">Lost over $500,000 in Bitcoin</h3> <p>A user <a href="https://www.reddit.com/r/DataHoarder/comments/iqcl36/comment/g4rddee/" target="_blank" rel="noreferrer noopener">lost access to their Bitcoin wallet</a> holding 27 BTC after a RAID failure destroyed the encrypted hardware ID used as the access key. RAID (Redundant Array of Independent Disks) is a way of combining multiple hard drives for speed or backup, but not all setups protect against total failure. Recovery attempts, including generous bounties, failed. When Bitcoin later soared, they realized they had lost over $500,000 of digital assets. If there had been a separate copy of the encryption key stored safely somewhere else, like a <a href="https://proton.me/wallet">Bitcoin wallet</a> or <a href="https://proton.me/drive/file-storage">encrypted cloud storage</a>, this wouldn&#8217;t have probably happened.</p> <h3 class="wp-block-heading">Researcher’s manuscript lost on a USB stick</h3> <p>A researcher spent years <a href="https://www.reddit.com/r/DataHoarder/comments/apyzxi/a_horror_story_reminder_always_back_up_your/" target="_blank" rel="noreferrer noopener">writing a book manuscript</a> and kept the only copy on a USB stick. When they asked IT to help retrieve it from the lab&#8217;s backup system, they realized that external drives weren’t included. The stick was lost, likely in the parking garage, and despite a building-wide search, it was never found. The data was just a few megabytes, but the impact was crushing.</p> <h3 class="wp-block-heading">Moving truck fire destroyed all backups</h3> <p>One individual lost years of documents and training materials when a moving truck — carrying both their computer and all physical backups — <a href="https://www.reddit.com/r/sysadmin/comments/v8viyn/what_is_your_worst_data_loss_nightmare/" target="_blank" rel="noreferrer noopener">burned to the ground</a>. Despite having multiple backup formats, everything was stored together.</p> <h3 class="wp-block-heading">Lightning strike wiped out family photos</h3> <p>A power surge likely caused by a lightning strike <a href="https://www.reddit.com/r/sysadmin/comments/v8viyn/comment/ibtrvy5/" target="_blank" rel="noreferrer noopener">wiped out someone&#8217;s computer</a> and the backup drive connected to it, taking nearly every digital family photo they ever took. With no cloud backup in place, only a few old film prints and some recent phone photos were left.</p> <h2 class="wp-block-heading">When organizations lose data</h2> <p>Data loss at scale can have a bigger impact, and it’s not always just financial. Check out these stories about losing data at an organizational level:</p> <h3 class="wp-block-heading">Ransomware deleted backups, and the ransom didn’t work</h3> <p>In the early 2010s, an employee at a mid-sized company clicked a phishing link inside an email that <a href="https://www.reddit.com/r/storage/comments/iqc72f/comment/g4seqno/" target="_blank" rel="noreferrer noopener">triggered the CryptoLocker ransomware</a>. It encrypted over 150,000 files, including billing records and customer contracts, and deleted the backups. The company paid the ransom but never received the decryption key since the hacker was arrested the next day. Recovery took three months and cost the company over $50,000.</p> <h3 class="wp-block-heading">Toy Story 2 nearly deleted</h3> <p>In 1998, <a href="https://thenextweb.com/news/how-pixars-toy-story-2-was-deleted-twice-once-by-technology-and-again-for-its-own-good" target="_blank" rel="noreferrer noopener">Pixar almost lost Toy Story 2</a> when an animator unintentionally ran a command that deleted 90% of the film’s production files. They hadn’t made a backup in months, and years of work were nearly gone. Luckily, a technical director working from home had a personal copy — and saved the entire project.</p> <h3 class="wp-block-heading">NASA erased the original Moon landing footage</h3> <p>In the 1980s, <a href="https://en.wikipedia.org/wiki/Apollo_11_missing_tapes" target="_blank" rel="noreferrer noopener">NASA erased</a> the original high-quality footage of the Apollo 11 moon landing. The decision made sense at the time since digital preservation wasn’t a priority, tape storage was expensive, and the real-time broadcast had been archived in lower quality. Still, it’s a sobering reminder that even priceless history can disappear if you don&#8217;t actively preserve it.</p> <h3 class="wp-block-heading">Kyoto University lost 77 TB from a backup script</h3> <p>In 2021, <a href="https://www.bleepingcomputer.com/news/security/university-loses-77tb-of-research-data-due-to-backup-error/" target="_blank" rel="noreferrer noopener">Kyoto University lost 34 million research files</a> worth 77 <a href="https://proton.me/blog/how-many-gb-in-a-tb-storage-capacity">terabytes</a> after a backup script on its supercomputer system went wrong. Four research groups lost all their work, and it wasn’t due to hardware failure or ransomware — the backup system, meant to safeguard data, was ultimately the cause of loss. It’s a tough reminder that even backups need backups — especially offsite or in the cloud.</p> <h2 class="wp-block-heading">How to protect your backups</h2> <p>Data loss isn’t always dramatic. Often, it happens quietly, through human error, failed backups, or a misplaced drive. But regardless of the cause, prevention follows the same core principles:</p> <h3 class="wp-block-heading">Follow the 3-2-1 backup rule</h3> <p>The rule is as follows:</p> <ul class="wp-block-list"> <li>Keep <a href="https://proton.me/blog/3-2-1-backup"><strong>three </strong>copies of your data</a></li> <li>Keep these copies on <strong>two </strong>different types of storage media</li> <li>Make sure <strong>one </strong>copy is offsite</li> </ul> <p>This way, if one copy gets corrupted, lost, or stolen, you still have a fallback. And by keeping one copy offsite — preferably in encrypted cloud storage — you’re protected against physical disasters like fire, theft, or power surges that could wipe out everything in one place.</p> <p>With Proton Drive, you can securely back up your data in end-to-end encrypted cloud storage. Start with 5 GB free, or upgrade to our Plus plan for 200 GB of space.</p> <div class="text-center"><a class="btn inline-block rounded-full font-bold btn-small btn-solid-purple" href="https://account.proton.me/drive/signup?plan=drive2022&#038;billing=12&#038;coupon=PREMIUM_DRIVE_DEAL&#038;ref=drsignp&#038;currency=USD">Get 60% off Proton Drive</a></div> <h3 class="wp-block-heading">Automate your backups</h3> <p>Relying only on manual backups is risky since they&#8217;re easy to forget, delay, or skip. Automating the process means your files are backed up regularly and consistently.</p> <p>Proton Drive syncs your files to ensure you always have the latest version in the cloud. On mobile devices, you can allow <a href="https://proton.me/support/enable-photo-backup">automatic photo and video backups</a>. On desktops, you can <a href="https://proton.me/support/proton-drive-windows-sync-folder">choose specific folders to sync</a>, so any new or changed file will be backed up by default.</p> <h3 class="wp-block-heading">Protect your data with strong encryption</h3> <p>Your backups should stay secure and private, no matter where they are stored. <a href="https://proton.me/blog/what-is-end-to-end-encryption">End-to-end encryption</a> means your files are encrypted before they leave your device and can only be decrypted by you. Even your cloud provider can’t see their contents. This helps protect your data from hackers, leaks, or unauthorized access.</p> <p><a href="https://proton.me/security/end-to-end-encryption">Proton Drive uses end-to-end encryption by design</a>, so only you can access your files — not even we can read them.</p> <h3 class="wp-block-heading">Double check your backups regularly</h3> <p>A file might look like it’s saved, but corrupted data, misconfigured systems, or failed syncs could make it unusable. That’s why it’s important to periodically verify that your backup actually works — not just that it exists.</p> <p>The <a href="https://proton.me/support/proton-drive-windows-track-synced-folders">Proton Drive desktop app shows real-time sync status</a>, so you can catch any issues early. Plus, the <a href="https://proton.me/support/version-history">version history</a> feature lets you roll back to earlier versions of your files if something goes wrong, whether it&#8217;s a bad edit or accidental overwrite. For example, if you work in Proton Docs, you can access document history and easily restore an earlier copy.</p> <h3 class="wp-block-heading">Be mindful when sharing and collaborating on data</h3> <p>If you’re backing up files with family members or teammates — like shared photo libraries or project folders — you might give them access to update or add content. While convenient, it increases the chance of accidental edits or deletions.</p> <p>With Proton Drive, you can <a href="https://proton.me/drive/file-sharing">securely share folders</a> with edit access via email or public links, protect these links with passwords and expiration dates, or turn them off to revoke access. For extra safety, you can keep your core backups private and create separate shared folders just for collaboration.</p> <h2 class="wp-block-heading">Keep your data safe with Proton Drive</h2> <p>What these data loss stories have in common is the lesson they leave behind: having good backup habits can often save the day. <a href="https://proton.me/drive">Proton Drive</a> makes it easy to build those habits with <a href="https://proton.me/drive/security">end-to-end encrypted cloud storage</a>, automatic syncing, and secure file access on all your devices.</p> <p>Like all Proton apps, Drive is <a href="https://proton.me/community/open-source">open source</a> and independently audited, so anyone can review your codebase and verify our claims. Plus, we never show ads or sell the little data we do have on you.</p> <p>Celebrate World Backup Day with <a href="https://account.proton.me/drive/signup?plan=drive2022&amp;billing=12&amp;coupon=PREMIUM_DRIVE_DEAL&amp;ref=drsignp&amp;currency=USD">60% off 200 GB of encrypted cloud storage</a>.</p> </content:encoded><category>Privacy guides</category><author>Elena Constantinescu</author></item><item><title>Spring clean your digital life with Proton</title><link>https://proton.me/blog/spring-clean-digital-life</link><guid isPermaLink="true">https://proton.me/blog/spring-clean-digital-life</guid><description>Take control of your digital life by spring cleaning your inbox, passwords, and cloud storage using Proton's suite of privacy-first tools.</description><pubDate>Fri, 28 Mar 2025 16:28:07 GMT</pubDate><content:encoded> <p>Physical spring cleaning gets all the attention, but your digital life might also need a dusting. Whether you&#8217;re trying to <a href="https://proton.me/blog/how-to-free-up-disk-space">free up disk space</a> on your devices or you just feel <a href="https://proton.me/blog/clean-email">overwhelmed by your overstuffed inbox</a> and nearly full <a href="https://proton.me/drive">cloud storage</a>, it doesn’t take long before digital clutter gets out of control.</p> <p>According to a <a href="https://explodingtopics.com/blog/data-generated-per-day" target="_blank" rel="noreferrer noopener">study</a>, the world creates over 400 million <a href="https://proton.me/blog/how-many-gb-in-a-tb-storage-capacity">terabytes</a> of data daily — from emails and social posts to photos, videos, and shared documents. In fact, 90% of the world’s data was created in just the last two years, and data generation is only accelerating.</p> <h2 class="wp-block-heading">How to free up space and stay organized online</h2> <p>This year, take a few minutes to reset. Here are nine Proton features that can help you clear out space, declutter your devices, and put a fresh polish on your internet life.</p> <h3 class="wp-block-heading">1. Auto-delete junk mail and save space</h3> <figure class="wp-block-image size-large"><img width="1024" height="512" data-public-id="wp-pme/image-41_8306865151/image-41_8306865151.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1743081764/wp-pme/image-41_8306865151/image-41_8306865151.png?_i=AA" alt="The Proton Mail settings highlight the &quot;Auto-delete unwanted messages&quot; option" class="wp-post-83049 wp-image-83068" data-format="png" data-transformations="f_auto,q_auto" data-filesize="242 KB" data-optsize="76 KB" data-optformat="image/webp" data-percent="68.6" data-permalink="https://pme.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=83068&amp;lang=en" data-version="1743081764" data-seo="1" srcset="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1743081764/wp-pme/image-41_8306865151/image-41_8306865151.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_150,c_scale/f_auto,q_auto/v1743081764/wp-pme/image-41_8306865151/image-41_8306865151.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_384,c_scale/f_auto,q_auto/v1743081764/wp-pme/image-41_8306865151/image-41_8306865151.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_768,c_scale/f_auto,q_auto/v1743081764/wp-pme/image-41_8306865151/image-41_8306865151.png?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_784,c_scale/f_auto,q_auto/v1743081764/wp-pme/image-41_8306865151/image-41_8306865151.png?_i=AA 1568w, https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1743081764/wp-pme/image-41_8306865151/image-41_8306865151.png?_i=AA 1800w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure> <p><img decoding="async" src="blob:https://pme.protonblog.tech/288a1402-aec0-4683-ba58-b468914bf348" alt="" width="inherit" height="inherit">Spam and trash folders can quietly stack up, taking up storage and creating inbox clutter. Manually deleting a few emails is manageable — but when it turns into hundreds, it quickly becomes a chore.</p> <p><a href="https://proton.me/mail">Proton Mail</a>, however, can <a href="https://proton.me/support/auto-delete-unwanted-messages">automatically delete unwanted messages</a> older than 30 days, and you can enable it on the Plus plan, allowing you to avoid inbox build-up from the start.</p> <div class="text-center"><a class="btn inline-block rounded-full font-bold btn-small btn-solid-purple" href="https://account.proton.me/signup?plan=mail2022&#038;billing=1&#038;coupon=TRYMAILPLUS0724&#038;product=mail&#038;ref=spring">Auto-delete spam for $1</a></div> <h3 class="wp-block-heading">2. Reduce inbox noise with Unsubscribe</h3> <figure class="wp-block-image size-large"><img width="1024" height="512" data-public-id="wp-pme/image-42_830726955d/image-42_830726955d.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1743081748/wp-pme/image-42_830726955d/image-42_830726955d.png?_i=AA" alt="The Proton Mail &quot;Unsubscribe&quot; button" class="wp-post-83049 wp-image-83072" data-format="png" data-transformations="f_auto,q_auto" data-filesize="226 KB" data-optsize="81 KB" data-optformat="image/webp" data-percent="64.1" data-permalink="https://pme.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=83072&amp;lang=en" data-version="1743081748" data-seo="1" srcset="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1743081748/wp-pme/image-42_830726955d/image-42_830726955d.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_150,c_scale/f_auto,q_auto/v1743081748/wp-pme/image-42_830726955d/image-42_830726955d.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_384,c_scale/f_auto,q_auto/v1743081748/wp-pme/image-42_830726955d/image-42_830726955d.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_768,c_scale/f_auto,q_auto/v1743081748/wp-pme/image-42_830726955d/image-42_830726955d.png?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_784,c_scale/f_auto,q_auto/v1743081748/wp-pme/image-42_830726955d/image-42_830726955d.png?_i=AA 1568w, https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1743081748/wp-pme/image-42_830726955d/image-42_830726955d.png?_i=AA 1800w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure> <p><img decoding="async" src="blob:https://pme.protonblog.tech/7c2aca08-e82e-4d9d-b382-86e9a7ca0592" alt="" width="inherit" height="inherit">Not every cluttered inbox is full of spam — sometimes it’s just newsletters you no longer read.</p> <p><a href="https://proton.me/mail">Proton Mail</a> makes it easy to <a href="https://proton.me/support/auto-unsubscribe">unsubscribe with one click</a>, right from the top of the email — no need to scroll through fine print or search for opt-out links. And if you manually mark an email as spam, Proton will try to unsubscribe you automatically. These features are available to all Proton Mail users.</p> <div class="text-center"><a class="btn inline-block rounded-full font-bold btn-small btn-solid-purple" href="https://proton.me/mail/download">Get Proton Mail</a></div> <h3 class="wp-block-heading">3. Keep your inbox tidy with custom filters</h3> <figure class="wp-block-image size-large"><img width="1024" height="512" data-public-id="wp-pme/image-43_830769a36d/image-43_830769a36d.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1743081731/wp-pme/image-43_830769a36d/image-43_830769a36d.png?_i=AA" alt="Proton Mail shows how to move emails to other folders" class="wp-post-83049 wp-image-83076" data-format="png" data-transformations="f_auto,q_auto" data-filesize="235 KB" data-optsize="81 KB" data-optformat="image/webp" data-percent="65.7" data-permalink="https://pme.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=83076&amp;lang=en" data-version="1743081731" data-seo="1" srcset="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1743081731/wp-pme/image-43_830769a36d/image-43_830769a36d.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_150,c_scale/f_auto,q_auto/v1743081731/wp-pme/image-43_830769a36d/image-43_830769a36d.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_384,c_scale/f_auto,q_auto/v1743081731/wp-pme/image-43_830769a36d/image-43_830769a36d.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_768,c_scale/f_auto,q_auto/v1743081731/wp-pme/image-43_830769a36d/image-43_830769a36d.png?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_784,c_scale/f_auto,q_auto/v1743081731/wp-pme/image-43_830769a36d/image-43_830769a36d.png?_i=AA 1568w, https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1743081731/wp-pme/image-43_830769a36d/image-43_830769a36d.png?_i=AA 1800w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure> <p><img decoding="async" src="blob:https://pme.protonblog.tech/5c651012-7963-45eb-bb7f-45d5f8f4b55c" alt="" width="inherit" height="inherit">Your inbox may look clean, but without a sorting system, it fills up fast — and staying on top of every message becomes a daily task.</p> <p><a href="https://proton.me/mail">Proton Mail</a> provides <a href="https://proton.me/support/email-inbox-filters">filters</a>, folders, and <a href="https://proton.me/support/using-folders-labels">color-coded labels</a> that allow you to set rules for organizing your email automatically, so you don’t have to keep dragging things around or risk missing something important. You can get started with one filter on the Free plan or switch to the Plus plan for as many filters as you need.</p> <div class="text-center"><a class="btn inline-block rounded-full font-bold btn-small btn-solid-purple" href="https://account.proton.me/signup?plan=mail2022&#038;billing=1&#038;coupon=TRYMAILPLUS0724&#038;product=mail&#038;ref=spring">Get unlimited email filters for $1</a></div> <h3 class="wp-block-heading">4. Avoid future inbox clutter with email aliases</h3> <figure class="wp-block-image size-large"><img width="1024" height="512" data-public-id="wp-pme/image-44_8308009c2d/image-44_8308009c2d.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1743081714/wp-pme/image-44_8308009c2d/image-44_8308009c2d.png?_i=AA" alt="Proton Pass offers to hide your email with an alias when signing up for online services" class="wp-post-83049 wp-image-83080" data-format="png" data-transformations="f_auto,q_auto" data-version="1743081714" data-seo="1" data-filesize="215 KB" data-optsize="80 KB" data-optformat="image/webp" data-percent="62.8" data-permalink="https://pme.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=83080&amp;lang=en" srcset="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1743081714/wp-pme/image-44_8308009c2d/image-44_8308009c2d.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_150,c_scale/f_auto,q_auto/v1743081714/wp-pme/image-44_8308009c2d/image-44_8308009c2d.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_384,c_scale/f_auto,q_auto/v1743081714/wp-pme/image-44_8308009c2d/image-44_8308009c2d.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_768,c_scale/f_auto,q_auto/v1743081714/wp-pme/image-44_8308009c2d/image-44_8308009c2d.png?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_784,c_scale/f_auto,q_auto/v1743081714/wp-pme/image-44_8308009c2d/image-44_8308009c2d.png?_i=AA 1568w, https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1743081714/wp-pme/image-44_8308009c2d/image-44_8308009c2d.png?_i=AA 1800w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure> <p><img decoding="async" src="blob:https://pme.protonblog.tech/c0ff0b66-65c7-442d-958c-c9b5cb00fb5e" alt="" width="inherit" height="inherit">Every time you hand over your email address — like for a free download, account sign-up, or flash sale — you risk inviting a steady stream of unwanted messages. Even if you unsubscribe later, some senders don’t take the hint.</p> <p><a href="https://proton.me/pass">Proton Pass</a> helps prevent the mess before it starts. With <a href="https://proton.me/pass/aliases">email aliases</a>, you can generate a new, unique address for every sign-up, keeping your main inbox private and clean. The Free plan includes 10 aliases, while premium users don&#8217;t have a limit.</p> <div class="text-center"><a class="btn inline-block rounded-full font-bold btn-small btn-solid-purple" href="https://account.proton.me/signup?plan=pass2023&#038;billing=1&#038;coupon=PASSPLUSINTRO2024&#038;product=pass&#038;ref=spring">Use unlimited aliases for $1</a></div> <h3 class="wp-block-heading">5. Back up your photos and videos automatically</h3> <figure class="wp-block-image size-large"><img width="1024" height="512" data-public-id="wp-pme/image-45_830844ed8c/image-45_830844ed8c.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1743081698/wp-pme/image-45_830844ed8c/image-45_830844ed8c.png?_i=AA" alt="Proton Drive shows backed up photos" class="wp-post-83049 wp-image-83084" data-format="png" data-transformations="f_auto,q_auto" data-version="1743081698" data-seo="1" data-filesize="427 KB" data-optsize="138 KB" data-optformat="image/webp" data-percent="67.8" data-permalink="https://pme.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=83084&amp;lang=en" srcset="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1743081698/wp-pme/image-45_830844ed8c/image-45_830844ed8c.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_150,c_scale/f_auto,q_auto/v1743081698/wp-pme/image-45_830844ed8c/image-45_830844ed8c.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_384,c_scale/f_auto,q_auto/v1743081698/wp-pme/image-45_830844ed8c/image-45_830844ed8c.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_768,c_scale/f_auto,q_auto/v1743081698/wp-pme/image-45_830844ed8c/image-45_830844ed8c.png?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_784,c_scale/f_auto,q_auto/v1743081698/wp-pme/image-45_830844ed8c/image-45_830844ed8c.png?_i=AA 1568w, https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1743081698/wp-pme/image-45_830844ed8c/image-45_830844ed8c.png?_i=AA 1800w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure> <p><img decoding="async" src="blob:https://pme.protonblog.tech/4ef99e7a-5c5c-4c92-be80-43baaeddf7ad" alt="" width="inherit" height="inherit">Your phone fills up fast with screenshots, shared memes, and years of photos and videos you want to keep. But without a <a href="https://proton.me/blog/3-2-1-backup">proper backup system</a>, those files sit unorganized and vulnerable to loss or device failure.</p> <p>You can <a href="https://proton.me/support/enable-photo-backup">enable automatic photos and video backups</a> using <a href="https://proton.me/drive/download">Proton Drive for Android and iOS</a>. All your memories will be securely synced in the background, easy to access on any device (including Windows and macOS), and ready to share with friends and family.</p> <p>The Free plan includes 5GB of cloud storage, and the Plus plan gives you 200GB — enough room for at least 50,000 photos.</p> <div class="text-center"><a class="btn inline-block rounded-full font-bold btn-small btn-solid-purple" href="https://account.proton.me/signup?plan=drive2022&#038;billing=1&#038;coupon=DRIVEPLUSINTRO2024&#038;product=drive&#038;ref=spring">Get 200GB of cloud storage for $1</a></div> <h3 class="wp-block-heading">6. Sync files across devices and access them anywhere</h3> <figure class="wp-block-image size-large"><img width="1024" height="512" data-public-id="wp-pme/image-37_830518f6d6/image-37_830518f6d6.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1743079671/wp-pme/image-37_830518f6d6/image-37_830518f6d6.png?_i=AA" alt="The Proton Drive &quot;My computer&quot; tab shows syncing folders and the &quot;Optimize storage&quot; option" class="wp-post-83049 wp-image-83051" data-format="png" data-transformations="f_auto,q_auto" data-version="1743079671" data-seo="1" data-filesize="563 KB" data-optsize="62 KB" data-optformat="image/webp" data-percent="88.9" data-permalink="https://pme.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=83051&amp;lang=en" srcset="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1743079671/wp-pme/image-37_830518f6d6/image-37_830518f6d6.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_150,c_scale/f_auto,q_auto/v1743079671/wp-pme/image-37_830518f6d6/image-37_830518f6d6.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_384,c_scale/f_auto,q_auto/v1743079671/wp-pme/image-37_830518f6d6/image-37_830518f6d6.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_768,c_scale/f_auto,q_auto/v1743079671/wp-pme/image-37_830518f6d6/image-37_830518f6d6.png?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_784,c_scale/f_auto,q_auto/v1743079671/wp-pme/image-37_830518f6d6/image-37_830518f6d6.png?_i=AA 1568w, https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1743079671/wp-pme/image-37_830518f6d6/image-37_830518f6d6.png?_i=AA 1800w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure> <p>Manually moving files between your devices can create duplicates. With the <a href="https://proton.me/drive/download">Proton Drive app for Windows</a>, you can sync folders from your desktop and access them from other devices — including iOS and Android phones — through the <strong>My computer</strong> tab.</p> <p>Plus, the Optimize Storage feature helps keep your computer clutter-free by ensuring your files stay safely stored in encrypted cloud storage, even when local disk space is limited.</p> <div class="text-center"><a class="btn inline-block rounded-full font-bold btn-small btn-solid-purple" href="https://account.proton.me/signup?plan=drive2022&#038;billing=1&#038;coupon=DRIVEPLUSINTRO2024&#038;product=drive&#038;ref=spring">Sync your files with 200GB for $1</a></div> <h3 class="wp-block-heading">7. Clean up shared files and manage access easily</h3> <figure class="wp-block-image size-large"><img width="1024" height="512" data-public-id="wp-pme/image-38_83056b4bd1/image-38_83056b4bd1.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1743081809/wp-pme/image-38_83056b4bd1/image-38_83056b4bd1.png?_i=AA" alt="Proton Drive shows settings to set an expiration date, set a link password, and stop sharing" class="wp-post-83049 wp-image-83056" data-format="png" data-transformations="f_auto,q_auto" data-version="1743081809" data-seo="1" data-filesize="201 KB" data-optsize="79 KB" data-optformat="image/webp" data-percent="60.9" data-permalink="https://pme.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=83056&amp;lang=en" srcset="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1743081809/wp-pme/image-38_83056b4bd1/image-38_83056b4bd1.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_150,c_scale/f_auto,q_auto/v1743081809/wp-pme/image-38_83056b4bd1/image-38_83056b4bd1.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_384,c_scale/f_auto,q_auto/v1743081809/wp-pme/image-38_83056b4bd1/image-38_83056b4bd1.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_768,c_scale/f_auto,q_auto/v1743081809/wp-pme/image-38_83056b4bd1/image-38_83056b4bd1.png?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_784,c_scale/f_auto,q_auto/v1743081809/wp-pme/image-38_83056b4bd1/image-38_83056b4bd1.png?_i=AA 1568w, https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1743081809/wp-pme/image-38_83056b4bd1/image-38_83056b4bd1.png?_i=AA 1800w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure> <p><img decoding="async" src="blob:https://pme.protonblog.tech/bdd5ceb3-6b98-4ff9-b0fa-04285898f559" alt="" width="inherit" height="inherit"><a href="https://proton.me/drive/file-sharing">Shared files</a> can easily pile up, whether you’re sending work documents, receiving vacation photos, or collaborating on a project. Over time, it’s easy to lose track of what’s still accessible and who has access to it.</p> <p>In the <a href="https://proton.me/drive">Proton Drive</a> <strong>Shared</strong> tab, you can review all active shared links, see how many times a file was downloaded, and <a href="https://proton.me/support/drive-manage-access-shared-files">revoke outdated access</a> anytime. You can also switch to the <a href="https://proton.me/support/shared-with-me-windows"><strong>Shared with me</strong> tab</a> to reduce visual clutter by removing files others have shared with you that you no longer need — it makes it easier to access the files you do still use.</p> <p class="has-text-align-center">Already using Proton Drive?</p> <div class="text-center"><a class="btn inline-block rounded-full font-bold btn-small btn-solid-purple" href="https://drive.proton.me/shared-urls">Clean up your shared files</a></div> <h3 class="wp-block-heading">8. Update your account security</h3> <figure class="wp-block-image size-large"><img width="1024" height="512" data-public-id="wp-pme/image-39_830605767a/image-39_830605767a.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1743081791/wp-pme/image-39_830605767a/image-39_830605767a.png?_i=AA" alt="Proton Pass shows Dark Web Monitoring and Password Health settings" class="wp-post-83049 wp-image-83060" data-format="png" data-transformations="f_auto,q_auto" data-version="1743081791" data-seo="1" data-filesize="203 KB" data-optsize="79 KB" data-optformat="image/webp" data-percent="61.1" data-permalink="https://pme.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=83060&amp;lang=en" srcset="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1743081791/wp-pme/image-39_830605767a/image-39_830605767a.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_150,c_scale/f_auto,q_auto/v1743081791/wp-pme/image-39_830605767a/image-39_830605767a.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_384,c_scale/f_auto,q_auto/v1743081791/wp-pme/image-39_830605767a/image-39_830605767a.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_768,c_scale/f_auto,q_auto/v1743081791/wp-pme/image-39_830605767a/image-39_830605767a.png?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_784,c_scale/f_auto,q_auto/v1743081791/wp-pme/image-39_830605767a/image-39_830605767a.png?_i=AA 1568w, https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1743081791/wp-pme/image-39_830605767a/image-39_830605767a.png?_i=AA 1800w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure> <p><img decoding="async" src="blob:https://pme.protonblog.tech/113b9e63-059c-4e42-bee7-a90b8855c9e0" alt="" width="inherit" height="inherit">Using weak or repeated passwords — or skipping <a href="https://proton.me/support/two-factor-authentication-2fa">two-factor authentication (2FA)</a> — leaves your accounts vulnerable to attacks. Good security hygiene means regularly checking and updating them, but doing this manually can be time-consuming.</p> <p><a href="https://proton.me/pass/pass-monitor">Proton Pass Monitor</a> makes the process easier by flagging insecure passwords and accounts without 2FA, helping you quickly <a href="https://proton.me/pass/password-generator">generate strong credentials</a> and <a href="https://proton.me/support/pass-2fa">turn on extra protection</a> where it’s needed. You can also <a href="https://proton.me/support/two-factor-authentication-2fa">enable 2FA for your Proton Account</a>.</p> <p>These features are available to all Pass users. If you upgrade to the Plus plan, you&#8217;ll also get Dark Web Monitoring, which alerts you if your credentials appear in a data breach.</p> <div class="text-center"><a class="btn inline-block rounded-full font-bold btn-small btn-solid-purple" href="https://proton.me/pass/download">Get Proton Pass</a></div> <h3 class="wp-block-heading">9. Fully control the passwords you share</h3> <figure class="wp-block-image size-large"><img width="1024" height="512" data-public-id="wp-pme/image-40_8306424170/image-40_8306424170.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1743081778/wp-pme/image-40_8306424170/image-40_8306424170.png?_i=AA" alt="Proton Pass shows the option to share a secure link" class="wp-post-83049 wp-image-83064" data-format="png" data-transformations="f_auto,q_auto" data-version="1743081778" data-seo="1" data-filesize="270 KB" data-optsize="65 KB" data-optformat="image/webp" data-percent="76" data-permalink="https://pme.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=83064&amp;lang=en" srcset="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1743081778/wp-pme/image-40_8306424170/image-40_8306424170.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_150,c_scale/f_auto,q_auto/v1743081778/wp-pme/image-40_8306424170/image-40_8306424170.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_384,c_scale/f_auto,q_auto/v1743081778/wp-pme/image-40_8306424170/image-40_8306424170.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_768,c_scale/f_auto,q_auto/v1743081778/wp-pme/image-40_8306424170/image-40_8306424170.png?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_784,c_scale/f_auto,q_auto/v1743081778/wp-pme/image-40_8306424170/image-40_8306424170.png?_i=AA 1568w, https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1743081778/wp-pme/image-40_8306424170/image-40_8306424170.png?_i=AA 1800w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure> <p><img decoding="async" src="blob:https://pme.protonblog.tech/e733721c-a7e3-4465-986c-9b4ec80ff53c" alt="" width="inherit" height="inherit">Temporarily sharing an account — like someone borrowing your subscription account when traveling — often means sharing your password indefinitely or resetting it after they’re done. Neither option is secure. And if you’ve shared multiple passwords over time, it’s hard to keep track of who has access to what.</p> <p>With <a href="https://proton.me/pass">Proton Pass</a>, you can <a href="https://proton.me/pass/password-sharing">share logins</a>, payment info, identity details, or encrypted notes via secure links, set expiry dates or restrict the number or views, and revoke access anytime. Pass Plus users can share unlimited individual items this way, even with external contacts.</p> <div class="text-center"><a class="btn inline-block rounded-full font-bold btn-small btn-solid-purple" href="https://account.proton.me/signup?plan=pass2023&#038;billing=1&#038;coupon=PASSPLUSINTRO2024&#038;product=pass&#038;ref=spring">Securely share logins for $1</a></div> <h2 class="wp-block-heading">A lighter, cleaner, and more private digital life</h2> <p>Spring cleaning your digital world is a great opportunity to reset, but what really makes it sustainable is using tools you trust.</p> <p>With Proton, every cleanup task you tackle — whether organizing your inbox, managing your shared files, or securing your passwords — happens within a secure, end-to-end encrypted ecosystem.</p> <p>We&#8217;re <a href="https://proton.me/community/open-source">open source</a>, independently audited, and <a href="https://proton.me/community">powered by a community</a> that believes privacy is a fundamental right.</p> <p><a href="https://proton.me/mail">Proton Mail</a>, <a href="https://proton.me/drive">Drive</a>, and <a href="https://proton.me/pass">Pass</a> work together seamlessly to protect your data without getting in your way. We never show ads, track you, or sell your data — because your digital life should belong to you, and you alone.</p> </content:encoded><category>Privacy guides</category><author>Elena Constantinescu</author></item><item><title>What is ePHI? The difference between PHI and ePHI explained</title><link>https://proton.me/blog/ephi-vs-phi-what-is-the-difference</link><guid isPermaLink="true">https://proton.me/blog/ephi-vs-phi-what-is-the-difference</guid><description>What is the difference between ePHI and PHI, and how can healthcare data can optimally be kept safe as it’s passed from one party to another?</description><pubDate>Fri, 28 Mar 2025 14:26:47 GMT</pubDate><content:encoded> <p>At a time when privacy has never been more fundamental to freedom, <a href="https://proton.me/mail">secure email</a> is a concern no matter the content. When that content is <a href="https://proton.me/blog/securely-send-sensitive-information-via-email">sensitive health information</a> that could identify individuals and be used against them, the stakes are especially high.</p> <p>Fear of being compromised in this way is widespread, growing, and based in grim reality, as bad actors take advantage of unprecedented degrees of health information sharing at the national level. That interoperability is crucial to the system’s costs and complexities coming down, but many patients worry about how their data is being used and stored.</p> <p>In its 2023 <a href="https://www.healthgorilla.com/home/privacyreport">State of Patient Privacy report</a>, health information network and interoperability provider <a href="https://www.healthgorilla.com">Health Gorilla</a> surveyed more than 1,200 patients and found 95 percent were concerned about data breaches and leaks. When it came to Big Tech companies like <a href="https://proton.me/blog/is-outlook-hipaa-compliant">Microsoft</a>, <a href="https://proton.me/blog/is-google-workspace-hipaa-compliant">Google</a>, and Apple storing their records, 65 percent of respondents expressed distrust.</p> <p>“The majority of patients don’t believe that vendors are doing enough to protect their health data and have serious concerns about a potential breach of their medical records,” Health Gorilla co-founder and CEO Steve Yaskin said in a <a href="https://www.healthgorilla.com/blog/health-gorillas-patient-privacy-report-reveals-distrust-of-health-data-sharing-in-light-of-data-breaches-and-expanded-access#:~:text=95%25%20of%20patients%20expressed%20concern,that%20handle%20their%20health%20data.">news release</a> on the report. Yaskin further reflected: “As we make progress in setting a universal floor for interoperability, patients must have confidence in the system for healthcare interoperability to work.”</p> <p>Building confidence begins with patients understanding exactly what health information is, and what parts of it are federally protected and when. This article explains what constitutes and differentiates PHI (protected health information) and ePHI (electronic protected health information), and how data can optimally be kept safe as it travels through an increasingly vast and vulnerable system.</p> <h2 class="wp-block-heading">What is protected health information (PHI)?</h2> <p>In 1996, the <a href="https://proton.me/blog/hipaa-compliance">Health Insurance Portability and Accountability Act (HIPAA)</a> passed. This set of laws reformed the insurance industry and laid out privacy and security standards for <a href="https://proton.me/blog/hipaa-compliance">proper handling of patient data</a> by health plans and providers.&nbsp;</p> <p>That is why every time you see a doctor, you’re required to sign a form notifying you of HIPAA privacy practices around your PHI.&nbsp;</p> <p>According to the Department of Health and Human Services (HHS), which administers and enforces HIPAA through its Office for Civil Rights (OCR), PHI is any individually identifiable information tied to records of health conditions, care provided, and payment for services. Your personal details by themselves aren’t protected—it’s the pairing with health information that constitutes PHI.</p> <p>That could be anything from a medical bill to the results of genetic testing, and the <a href="https://www.hhs.gov/hipaa/for-professionals/privacy/laws-regulations/index.html">HIPAA Privacy Rule</a> covers such PHI in any medium, spoken, handwritten, electronic or otherwise.&nbsp;</p> <h2 class="wp-block-heading">What is electronic protected health information (ePHI)?</h2> <p>PHI becomes ePHI under HIPAA when it is generated, sent/received, or stored electronically by a “<a href="https://www.hhs.gov/hipaa/for-professionals/covered-entities/index.html">covered entity</a>” (providers, insurance plans, clearinghouses that process health data) or a “<a href="https://www.hhs.gov/hipaa/for-professionals/privacy/guidance/business-associates/index.html">business associate</a>” (individuals or organizations that help carry out healthcare functions, like email providers, finance companies, benefit managers, and lawyers).</p> <p>That could be email content, an electronic health record, or data maintained in a cloud. The Privacy Rule’s protections apply here, but ePHI is also subject to the <a href="https://www.hhs.gov/hipaa/for-professionals/security/laws-regulations/index.html">HIPAA Security Rule</a>, which demands covered entities and business associates:</p> <ul class="wp-block-list"> <li>Ensure ePHI remains confidential and available to permitted parties</li> <li>Guard against impermissible uses/disclosures and threats to ePHI integrity </li> <li>Ensure workforce compliance around all of the above</li> </ul> <h2 class="wp-block-heading">What health information isn’t protected under HIPAA?</h2> <p>These basic definitions of PHI and ePHI are reasonably straightforward, but <a href="https://www.hipaajournal.com/what-is-considered-protected-health-information-under-hipaa/">confusion</a> persists. Partly because some people assume blanket protection of personal identifiers (everything from your name and email to fingerprints), and partly because qualifying for protection depends on <a href="https://www.hipaajournal.com/ephi/">particular combinations of factors</a> (like whether the PHI has been <a href="https://www.hhs.gov/hipaa/for-professionals/special-topics/de-identification/index.html#protected">de-identified</a> or is held by an entity not covered under HIPAA, such as public schools or employers keeping employee health records on file).</p> <p>The Assistant Secretary for Technology Policy <a href="https://www.healthit.gov/topic/information-blocking/understanding-electronic-health-information-ehi">lists additional types of health information to which HIPAA doesn’t apply</a>. These include psychotherapy notes; information gathered for use in civil, criminal, and administrative actions and proceedings; and the data of anyone who has been dead more than 50 years.&nbsp;&nbsp;</p> <p>Naturally, within a system of HIPAA’s scope and <a href="https://www.hhs.gov/hipaa/for-professionals/security/hipaa-security-rule-nprm/factsheet/index.html">ever-evolving nature</a> as technology and policy advance, nuances and exceptions abound.&nbsp;</p> <p>“In a perfect world, an <a href="https://www.hipaajournal.com/considered-phi-hipaa/">explanation</a> of what HIPAA Protected Health Information is would be covered in the Notice of Privacy Practices,” independent compliance advocate <a href="https://www.hipaajournal.com">The HIPAA Journal</a> says of the fine print on forms patients sign when receiving care. “However, most Notices of Privacy Practices already contain more information than most patients are prepared to read; and… explaining what is covered under HIPAA—and what is not—will likely raise more questions than answers for patients wishing to exercise their Privacy Rule rights.”</p> <p>Common misconceptions about what constitutes PHI/ePHI are evidenced by the volume of <a href="https://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/data/enforcement-highlights/index.html">complaints about HIPAA privacy violations</a>. Nearly 375,000 have been submitted to the federal government since 2003, when the Privacy Rule went into effect. OCR’s running tally/breakdown indicates that 72 percent of those cases were dismissed. Some because investigators found no evidence of violation (15,561 cases, as of October 2024), and the rest (255,953 cases) because complaints didn’t present a case eligible for enforcement.</p> <p>The top reason OCR gives for the latter is that the organization being complained about wasn’t covered by HIPAA. Organizations that are covered have a heavy responsibility to meet the highest standard of <a href="https://proton.me/blog/hipaa-compliance">compliance</a>.</p> <h2 class="wp-block-heading">Ensuring the best protections for ePHI&nbsp;</h2> <p>Those charged with keeping PHI safe are <a href="https://www.hhs.gov/hipaa/for-professionals/covered-entities/index.html">legion</a>. In the provider column, there are doctors, dentists, and psychologists, clinics, nursing homes, and pharmacies. Under health plans, there are insurance companies, HMOs, company health plans, and government programs like Medicare and Medicaid. The middlemen known as healthcare clearinghouses are in there too, checking provider claims for accuracy before shuttling them on to health plans.&nbsp;</p> <p>All of these entities depend on HIPAA-covered business associates to provide a secure platform for electronically exchanging patient data. If they can’t trust the tools they’re using, they risk violating patient privacy and suffering the consequences, from corrective action to civil and criminal penalties.</p> <p>They are charged with securing ePHI on their servers and guaranteeing that it stays safe in transit anywhere else. Various platforms offer email services that&nbsp; meet these requirements. <a href="https://proton.me/business">Proton for Business</a> exceeds them.</p> <p>As the world’s largest provider of open-source and end-to-end encrypted email, <a href="https://proton.me">Proton</a> serves over 50,000 organizations, including HIPAA covered entities. The maintenance and transmission of ePHI goes beyond compliance with formidable Proton security features, including:</p> <ul class="wp-block-list"> <li>Advanced Encryption Standard (AES) encryption to protect emails stored on servers, and Transport Layer Security (TLS) encryption to protect that content on its way to other recipients</li> <li>Open PGP <a href="https://proton.me/blog/what-is-end-to-end-encryption">end-to-end-encryption</a>, so data is only accessible to intended recipients—even if the receiving email platform is an unsecure third party</li> <li>Comprehensive <a href="https://res.cloudinary.com/dbulfrlrz/images/v1714645074/wp-pme/PROTONMAIL_BUSINESS_ASSOCIATE_AGREEMENT-not-signed-2_31106b30cd/PROTONMAIL_BUSINESS_ASSOCIATE_AGREEMENT-not-signed-2_31106b30cd.pdf?_i=AA">Business Associate Agreement</a> (BAA) coverage, meaning all email features (including calendar and storage) comply with HIPAA </li> <li>Robust physical security in terms of control over server integrity </li> </ul> <p>Even on the scale of an organization, switching to Proton from other providers (Google Workspace, Microsoft 365, etc.) is seamless with the <a href="https://proton.me/easyswitch">Easy Switch tool</a>. Data is migrated, support is provided throughout the process, and workforces need no training to engage with the user-friendly interface.</p> <p>Patients who are sending or receiving PHI can take steps to protect their own information. Like knowing <a href="https://proton.me/blog/check-if-email-leaked#protect">how to check if their email is compromised</a>, and how to use <a href="https://proton.me/blog/how-passwords-become-compromised">password best practices</a> and <a href="https://proton.me/blog/what-is-two-factor-authentication-2fa">two-factor authentication</a>. They can learn all the features of email and the <a href="https://proton.me/blog/bcc-email">hazards of improper use</a>. They can <a href="https://proton.me/mail">switch to Proton</a>.&nbsp;&nbsp;</p> <p>Still, the great burden of protecting health information falls to the big cogs in the machine. Working with Proton means sharing that commitment to security, as well as building a better internet where privacy is the default.</p> </content:encoded><category>Privacy guides</category><author>Edward Komenda</author></item><item><title>If you used 23andMe, your DNA could soon be for sale</title><link>https://proton.me/blog/delete-your-23andme-data</link><guid isPermaLink="true">https://proton.me/blog/delete-your-23andme-data</guid><description>If you used 23andMe, your data could soon be for sale. Here's how to delete your data from 23andMe — and why you might want to do so sooner than later.</description><pubDate>Thu, 27 Mar 2025 14:18:31 GMT</pubDate><content:encoded> <p>On March 23, the home DNA testing service <a href="https://www.reuters.com/business/healthcare-pharmaceuticals/dna-testing-firm-23andme-files-chapter-11-bankruptcy-sell-itself-2025-03-24/" target="_blank" rel="noreferrer noopener">23andMe filed for bankruptcy</a> due to weakening demand for its service and a lack of trust in the brand after a <a href="https://techcrunch.com/2023/12/04/23andme-confirms-hackers-stole-ancestry-data-on-6-9-million-users/" target="_blank" rel="noreferrer noopener">major data breach in 2023</a>.</p> <p>To cover its debts, 23andMe is exploring the possibility of selling the DNA data it collected from more than 15 million people. While the company’s <a href="https://www.telegraph.co.uk/business/2025/03/24/millions-of-peoples-dna-up-for-sale-as-23andme-goes-bankrup/" target="_blank" rel="noreferrer noopener">chairman, Mark Jensen, has said</a>, “We are committed to continuing to safeguard customer data and being transparent about the management of user data going forward, and data privacy will be an important consideration in any potential transaction,” the company is seeking to maximize the value of its assets, including this data.</p> <p><strong>That is why we advise anyone who used 23andMe to delete their information.</strong></p> <h2 class="wp-block-heading">Why you should delete data from 23andMe</h2> <p>Unlike other health information, which is protected by <a href="https://proton.me/blog/hipaa-compliance">HIPAA</a>, there are almost no legal guardrails protecting genetic data collected by companies like 23andMe. If a company buys the data 23andMe has collected, it will likely be able to use it however it wants — despite assurances from 23andMe representatives.</p> <p>This data is also incredibly sensitive. You can&#8217;t change your DNA, so once an organization collects this data and links it to you, your only recourse is to hope you can get them to delete it. And since DNA is passed from parent to child, 23andMe&#8217;s dataset could be used to identify you if a relative sent it a sample. This is not a hypothetical concern — in 2018, a famous serial killer from the 1970s and 80s was <a href="https://www.forbes.com/sites/jvchamary/2020/06/30/genetic-genealogy-golden-state-killer/" target="_blank" rel="noreferrer noopener">identified and arrested</a> using this type of DNA information.</p> <h2 class="wp-block-heading">How to delete your data from 23andMe</h2> <p>Deleting your account is the best way to secure your data, even if doing so doesn&#8217;t necessarily mean 23andMe will delete your genetic information (see <a href="#your-rights">What are your rights?</a>).</p> <p>To delete (most of) your personal information from 23andMe’s databases, you must:</p> <ol class="wp-block-list"> <li>Sign in to your account at <a href="https://you.23andme.com/" target="_blank" rel="noreferrer noopener">https://you.23andme.com/</a>.</li> <li>Go to <strong>Settings </strong>in your profile, then find <strong>23andMe Data </strong>and select <strong>View.</strong></li> <li>If you want to keep a copy of your genetic information or reports, you must download them now. You will not be able to do so after you delete your data.</li> <li>To delete your data, scroll to <strong>Delete Data</strong> and select <strong>Permanently Delete Data</strong>.</li> <li>23andMe will send an email to the address it has on file. You must follow the link in the email to complete the deletion. Once you tap or click this link, the deletion process begins automatically, and you will lose access to your account. You cannot reverse, cancel, or undo this step.</li> </ol> <p>According to 23andMe’s support articles on <a href="https://customercare.23andme.com/hc/en-us/articles/360004944654-What-s-In-Your-Account-Settings" target="_blank" rel="noreferrer noopener">account settings</a> and <a href="https://customercare.23andme.com/hc/en-us/articles/212170688-Requesting-23andMe-Account-Closure" target="_blank" rel="noreferrer noopener">closing your account</a>, once you’ve submitted this request, the company will delete data associated with all your accounts and discard any biological samples you gave it permission to hold. If you participated in 23andMe Research, your genetic and self-reported information will no longer be used in any future projects.</p> <h2 class="wp-block-heading">Who already has your data?</h2> <p>Unfortunately, if 23andMe has your genetic data, it has likely already been shared with numerous parties. Reporting by <a href="https://www.reuters.com/business/healthcare-pharmaceuticals/dna-testing-firm-23andme-files-chapter-11-bankruptcy-sell-itself-2025-03-24/" target="_blank" rel="noreferrer noopener">Reuters</a> revealed that 23andMe had given access to its database to at least 30 pharmaceutical and biotech companies — and many of these agreements have not been disclosed.</p> <p>The good news is that this genetic data is probably not linked to your name or other identifying information. The bad news is that even if your DNA is separated from your name and other identifiers, it’s almost impossible to completely anonymize. Studies have shown it’s simple to <a href="https://www.science.org/doi/10.1126/science.1229566" target="_blank" rel="noreferrer noopener">re-identify genetic information</a> using free, publicly accessible internet resources.</p> <h2 class="wp-block-heading" id="your-rights">What are your rights?</h2> <p>It is hard to know if 23andMe will delete user&#8217;s genetic information when they delete their account.</p> <p>Its main <a href="https://www.23andme.com/legal/privacy/full-version/" target="_blank" rel="noreferrer noopener">privacy statement</a> says:</p> <blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"> <p>23andMe and/or our contracted genotyping laboratory will retain your Genetic Information, date of birth, and sex as required for compliance with applicable legal obligations &#8230; even if you chose to delete your account.</p> </blockquote> <p>Meanwhile, its privacy statements for the&nbsp;<a href="https://www.23andme.com/legal/eu-privacy-notice/" target="_blank" rel="noreferrer noopener">European Economic Area, the UK, and Switzerland</a> and&nbsp;<a href="https://www.23andme.com/legal/us-privacy/" target="_blank" rel="noreferrer noopener">US states with strong privacy laws</a>&nbsp;(California, Colorado, Connecticut, Utah, Virginia, and Washington) say explicitly that you have the right to delete your &#8220;personal information&#8221;. If you go back to the main privacy statement, genetic information is included as a type of personal information 23andMe collects.</p> <p>Our understanding suggests the company will retain your genetic information unless you live in the&nbsp;European Economic Area, the UK, Switzerland, California, Colorado, Connecticut, Utah, Virginia, or Washington and have requested its deletion by exercising your privacy rights by sending an email to&nbsp;<a href="mailto:privacy@23andMe.com" target="_blank" rel="noreferrer noopener">privacy@23andMe.com</a>.</p> <p>If you live elsewhere, it seems the company will retain your genetic information along with your birthdate and sex even if you delete your account.</p> <p>We have written to 23andMe for clarification. We will update this article with their response.</p> <p>The US’s legal patchwork makes it equally difficult to speak briefly about who has what rights, but according to the <a href="https://www.eff.org/deeplinks/2024/10/sale-23andmes-data-would-be-bad-privacy-heres-what-customers-can-do" target="_blank" rel="noreferrer noopener">Electronic Frontier Foundation</a>, roughly a dozen states have laws that would probably require 23andMe to obtain user consent before transferring their data in an acquisition. If you live in one of those states, you could simply refuse to allow 23andMe to transfer your data.</p> <h2 class="wp-block-heading">The US needs a national privacy law</h2> <p>The inconsistent privacy laws across the US enable the mass collection and sharing of personal information on the internet. And no federal laws completely cover or protect users of online DNA testing by services like 23andMe and its competitors.</p> <p>Policymakers must pass stronger laws that protect our data, especially sensitive genetic information. Our DNA can reveal all sorts of information, including our relatives, physical characteristics, and genetically determined diseases. This type of information deserves the same strong protection health information receives in other contexts.</p> <h2 class="wp-block-heading">Once data is shared, it can’t be called back</h2> <p>The situation surrounding 23andMe encapsulates the problem of the modern internet — once you share your information with a company (in many cases, you “share” your information simply by using a company’s app or visiting its website), it can share that information with countless third parties without you ever knowing (unless you closely read the privacy policy). DNA information is especially sensitive, and it’s very hard to prevent re-identification.</p> <p>This is also why Proton uses end-to-end and zero-access encryption wherever possible. We encrypt your information so we cannot access it, allowing you to remain in control of your information, confident that it cannot be shared with anyone else.</p> </content:encoded><category>Privacy guides</category><author>Richie Koch</author></item><item><title>Wary of US surveillance? Try these European alternatives to Big Tech</title><link>https://proton.me/blog/european-tech-alternatives</link><guid isPermaLink="true">https://proton.me/blog/european-tech-alternatives</guid><description>Take back control of your digital life with privacy-focused European alternatives to US Big Tech apps and services.</description><pubDate>Thu, 27 Mar 2025 10:00:47 GMT</pubDate><content:encoded> <p>How we use the internet is largely shaped by a handful of <a href="https://proton.me/blog/big-tech-pays-fines-under-3-weeks">US-based tech giants</a> — Google, Apple, Microsoft, Amazon, and Meta in particular. While they may make life more convenient, that convenience comes at a cost: your privacy. Their apps collect vast amounts of personal data, using it to refine algorithms, target ads, and — when required — even <a href="https://proton.me/blog/big-tech-data-requests-surge">share that data with governments and law enforcement</a>.</p> <p>Laws like <a href="https://proton.me/blog/us-warrantless-surveillance">Section 702 of the Foreign Intelligence Surveillance Act (FISA)</a> allow the US government to demand access to your private data without your knowledge and without a warrant — whether or not you live in the US. Every message, search, and stored file on a US-based platform exists in <a href="https://proton.me/blog/us-warrantless-surveillance#section-702-loophole">a system designed to watch, categorize, and</a> sometimes <a href="https://proton.me/blog/us-warrantless-surveillance#section-702-loophole">hand over your information</a> with ease to authorities. And because mass surveillance isn’t up for debate, the question is no longer <em>whether</em> your data is being collected, but who controls it.</p> <p>There are tools, however, that let you take back that control. If you want to use the internet without giving up your most sensitive, valuable data, many European services offer a privacy-forward alternative.</p> <p>Let&#8217;s start with some of our own. We founded Proton in Switzerland in 2014 specifically to resist mass surveillance and abuse of personal data by US tech companies. Our solution was to place <a href="https://proton.me/blog/what-is-end-to-end-encryption">end-to-end encryption</a> at the core of everything we do —&nbsp;by encrypting your data using keys you control, nobody but you and the people you communicate with ever have access to your private information.</p> <ul class="wp-block-list"> <li><a href="https://proton.me/mail"><strong>Proton Mail</strong></a> (Gmail alternative)</li> <li><a href="https://proton.me/drive"><strong>Proton Drive</strong></a> (Google Drive alternative)</li> <li><a href="https://proton.me/drive/docs"><strong>Proton Docs</strong></a> (Google Docs alternative)</li> <li><a href="https://proton.me/pass"><strong>Proton Pass</strong></a> (Google Password Manager alternative)</li> <li><a href="https://proton.me/calendar"><strong>Proton Calendar</strong></a> (Google Calendar alternative)</li> <li><a href="https://protonvpn.com/"><strong>Proton VPN</strong></a> (VPN alternative to US-based services)</li> </ul> <p>However, the reach of Big Tech extends into every aspect of life online. If you want to fully escape the US surveillance web, here are some privacy-friendly European alternatives across various categories.</p> <h2 class="wp-block-heading">Privacy-focused European alternatives</h2> <h3 class="wp-block-heading">Search engines</h3> <p>Google tracks your searches and builds an extensive profile on you. Try these European services instead:</p> <ul class="wp-block-list"> <li><a href="https://www.qwant.com/?l=en" target="_blank" rel="noreferrer noopener"><strong>Qwant</strong></a> (France): A privacy-first search engine that doesn’t track users; currently based on Bing, <a href="https://blog.ecosia.org/eusp/">Qwant and Ecosia</a> have teamed up to build a European search index</li> <li><a href="https://www.ecosia.org/" target="_blank" rel="noreferrer noopener"><strong>Ecosia</strong></a><strong> </strong>(Germany): Privacy-focused search engine that funds tree planting with ad revenue</li> <li><a href="https://www.mojeek.com/" target="_blank" rel="noreferrer noopener"><strong>Mojeek</strong></a> (UK): Independent search index with strict privacy policies</li> </ul> <h3 class="wp-block-heading">Web browsers</h3> <p>Chrome is notorious for <a href="https://protonvpn.com/blog/google-ip-protection">tracking browsing behavior</a>. Switch to these alternatives:</p> <ul class="wp-block-list"> <li><a href="https://vivaldi.com/" target="_blank" rel="noreferrer noopener"><strong>Vivaldi</strong></a> (Norway): Customizable browser with strong privacy features</li> <li><a href="https://librewolf.net/"><strong>LibreWolf</strong></a> (EU): Firefox-based browser focused on security and privacy</li> <li><a href="https://www.waterfox.net/"><strong>Waterfox</strong></a> (UK): Strips out Firefox’s telemetry and tracking</li> </ul> <h3 class="wp-block-heading">Messaging apps</h3> <p>WhatsApp (owned by Meta) collects metadata on every message you send. Consider:</p> <ul class="wp-block-list"> <li><a href="https://threema.ch/en" target="_blank" rel="noreferrer noopener"><strong>Threema</strong></a> (Switzerland): End-to-end encrypted, metadata-minimizing chat</li> <li><a href="https://olvid.io/en/" target="_blank" rel="noreferrer noopener"><strong>Olvid</strong></a> (France): No phone number required, highly secure</li> <li><a href="https://getsession.org/" target="_blank" rel="noreferrer noopener"><strong>Session</strong></a> (EU): Decentralized, anonymous chat</li> <li><a href="https://delta.chat/en/"><strong>Delta</strong></a><strong> </strong><a href="https://delta.chat/en/" target="_blank" rel="noreferrer noopener"><strong>Chat</strong></a> (EU): Uses standard email for encrypted messaging</li> <li><a href="https://element.io/" target="_blank" rel="noreferrer noopener"><strong>Element (Matrix)</strong></a> (EU): Open-source, federated messaging</li> <li><a href="https://wire.com/en/" target="_blank" rel="noreferrer noopener"><strong>Wire</strong></a><strong> </strong>(Switzerland): Secure, end-to-end encrypted messaging for personal and business use</li> </ul> <h3 class="wp-block-heading">Navigation and maps</h3> <p>Google Maps collects massive amounts of location data. You can try instead:</p> <ul class="wp-block-list"> <li><a href="https://osmand.net/" target="_blank" rel="noreferrer noopener"><strong>OsmAnd</strong></a> (EU): Open-source maps with offline navigation</li> <li><a href="https://organicmaps.app/" target="_blank" rel="noreferrer noopener"><strong>Organic Maps</strong></a> (EU): No tracking, minimal battery usage</li> <li><a href="https://www.magicearth.com/" target="_blank" rel="noreferrer noopener"><strong>Magic Earth</strong></a> (Netherlands): AI-powered maps without data harvesting</li> <li><a href="https://wego.here.com/" target="_blank" rel="noreferrer noopener"><strong>HERE WeGo</strong></a> (Germany): Major competitor to Google Maps</li> </ul> <h3 class="wp-block-heading">Web hosting</h3> <p>Move your website or server to a privacy-friendly host:</p> <ul class="wp-block-list"> <li><a href="https://www.ovhcloud.com/fr/" target="_blank" rel="noreferrer noopener"><strong>OVHcloud</strong></a><strong> </strong>(France): Large EU host with a range of cloud and server options</li> <li><a href="https://www.infomaniak.com/en" target="_blank" rel="noreferrer noopener"><strong>Infomaniak</strong></a><strong> </strong>(Switzerland): Swiss-based hosting with strong privacy protections</li> <li><a href="https://www.hetzner.com/" target="_blank" rel="noreferrer noopener"><strong>Hetzner</strong></a><strong> </strong>(Germany): Affordable, high-performance hosting based in the EU</li> </ul> <h3 class="wp-block-heading">More European alternatives to US tech giants</h3> <p>For those looking to completely cut reliance on American tech, here are additional European alternatives across different categories:</p> <h3 class="wp-block-heading">Streaming and media</h3> <ul class="wp-block-list"> <li><a href="https://www.deezer.com/en/offers" target="_blank" rel="noreferrer noopener"><strong>Deezer</strong></a> (France): Alternative to Apple Music</li> <li><a href="https://www.qobuz.com/ch-fr/discover" target="_blank" rel="noreferrer noopener"><strong>Qobuz</strong></a> (France): High-resolution music streaming</li> <li><a href="https://soundcloud.com/" target="_blank" rel="noreferrer noopener"><strong>SoundCloud</strong></a> (Germany): Independent artist platform</li> <li><a href="https://open.spotify.com/" target="_blank" rel="noreferrer noopener"><strong>Spotify</strong></a><strong> </strong>(Sweden): Popular music streaming platform with a massive global catalog</li> <li><a href="https://joinpeertube.org/" target="_blank" rel="noreferrer noopener"><strong>PeerTube</strong></a> (EU): Decentralized YouTube alternative</li> <li><a href="https://www.dailymotion.com/" target="_blank" rel="noreferrer noopener"><strong>DailyMotion</strong></a> (France): YouTube competitor with privacy focus</li> </ul> <h3 class="wp-block-heading">Note-taking</h3> <ul class="wp-block-list"> <li><a href="https://standardnotes.com/" target="_blank" rel="noreferrer noopener"><strong>Standard Notes</strong></a> (Switzerland): Encrypted note-taking alternative to Google Docs</li> <li><a href="https://cryptpad.fr/" target="_blank" rel="noreferrer noopener"><strong>CryptPad</strong></a> (France): Secure, collaborative Google Docs alternative</li> </ul> <h3 class="wp-block-heading">Social media</h3> <ul class="wp-block-list"> <li><a href="https://joinmastodon.org/" target="_blank" rel="noreferrer noopener"><strong>Mastodon</strong></a> (Germany): Decentralized alternative to Twitter/X</li> <li><a href="https://join-lemmy.org/" target="_blank" rel="noreferrer noopener"><strong>Lemmy</strong></a> (EU): Federated Reddit-style platform</li> <li><a href="https://friendi.ca/" target="_blank" rel="noreferrer noopener"><strong>Friendica</strong></a> (EU): Alternative to Facebook</li> </ul> <h3 class="wp-block-heading">Translation services</h3> <ul class="wp-block-list"> <li><a href="https://www.deepl.com/en/translator" target="_blank" rel="noreferrer noopener"><strong>DeepL</strong></a> (Germany): High-quality translation alternative to Google Translate</li> <li><a href="https://www.reverso.net/text-translation" target="_blank" rel="noreferrer noopener"><strong>Reverso</strong></a> (France): AI-powered translation tool</li> <li><a href="https://www.modernmt.com/" target="_blank" rel="noreferrer noopener"><strong>ModernMT</strong></a> (Italy): Business-grade translation service</li> </ul> <h3 class="wp-block-heading">Video calling and conferencing</h3> <ul class="wp-block-list"> <li><a href="https://jitsi.org/" target="_blank" rel="noreferrer noopener"><strong>Jitsi</strong></a> (EU): Open-source Google Meet alternative</li> <li><a href="https://whereby.com/" target="_blank" rel="noreferrer noopener"><strong>Whereby</strong></a> (Norway): Privacy-focused video conferencing</li> </ul> <h3 class="wp-block-heading">Operating systems</h3> <ul class="wp-block-list"> <li><a href="https://e.foundation/e-os/" target="_blank" rel="noreferrer noopener"><strong>/e/ OS</strong></a> (France): DeGoogled Android alternative</li> <li><a href="https://sailfishos.org/" target="_blank" rel="noreferrer noopener"><strong>SailfishOS</strong></a> (Finland): Secure mobile OS</li> <li><a href="https://ubuntu.com/" target="_blank" rel="noreferrer noopener"><strong>Ubuntu</strong></a> (UK): Popular Linux-based desktop OS</li> <li><a href="https://linuxmint.com/" target="_blank" rel="noreferrer noopener"><strong>Linux Mint</strong></a> (EU): Windows/Mac alternative</li> </ul> <h3 class="wp-block-heading">Developer tools</h3> <ul class="wp-block-list"> <li><a href="https://codeberg.org/" target="_blank" rel="noreferrer noopener"><strong>Codeberg</strong></a> (EU): Alternative to GitHub</li> <li><a href="https://www.jetbrains.com/" target="_blank" rel="noreferrer noopener"><strong>JetBrains</strong></a> (Czech Republic): IDE competitor to Visual Studio</li> <li><a href="https://www.sonarsource.com/products/sonarqube/" target="_blank" rel="noreferrer noopener"><strong>SonarQube</strong></a> (Switzerland): Code analysis tools</li> </ul> <h3 class="wp-block-heading">Design tools</h3> <ul class="wp-block-list"> <li><a href="https://www.blender.org/" target="_blank" rel="noreferrer noopener"><strong>Blender</strong></a> (Netherlands): Free, open-source 3D animation tool used to create <a href="https://proton.me/blog/open-source-flow-oscar"><em>Flow</em>, the Latvian film that beat Disney at the Oscars</a></li> <li><a href="https://affinity.serif.com/en-us/" target="_blank" rel="noreferrer noopener"><strong>Affinity</strong></a> (UK): Alternative to Adobe tools</li> <li><a href="https://www.sketch.com/" target="_blank" rel="noreferrer noopener"><strong>Sketch</strong></a> (Netherlands): Alternative to Figma</li> </ul> <h2 class="wp-block-heading">Take back control</h2> <p>As governments expand their reach, often with the help of Big Tech, control over our lives online is at risk of slipping away. But you are not powerless. You can still choose services that put privacy first — where your messages, files, and personal details aren’t collected, stored, or shared.</p> <p>Proton is <a href="https://proton.me/blog/swiss-privacy-honest-competition">based in Switzerland</a>, where strong privacy laws keep your information beyond the reach of mass surveillance. You remain in control, always. And because our services use <a href="https://proton.me/blog/what-is-end-to-end-encryption">end-to-end encryption</a>, not even we can access your emails, files, passwords, or calendar — only you can.</p> <p>But protecting your privacy goes beyond email and storage. From search engines to messaging apps, browsers to cloud storage, other European alternatives can give you the tools to take back control.</p> <p>Reclaiming your privacy doesn’t mean disconnecting or going into hiding. It means <a href="https://proton.me/blog/how-to-de-google">using technology on <em>your</em> terms</a>, and yours alone. It means choosing services that respect you. And it starts with stepping outside the system that profits from watching you and into one that’s <a href="https://proton.me/degoogle">built<em> </em>with <em>you</em> as the top priority</a>.</p> </content:encoded><category>Privacy guides</category><author>Edward Komenda</author></item><item><title>How to secure files for ISO 27001 compliance</title><link>https://proton.me/blog/iso-27001-secure-file-collaboration</link><guid isPermaLink="true">https://proton.me/blog/iso-27001-secure-file-collaboration</guid><description>What is ISO 27001 secure file collaboration? Learn about ISO 27001 certification and how to maintain ISO 27001 compliance for your business.</description><pubDate>Tue, 25 Mar 2025 22:52:55 GMT</pubDate><content:encoded> <p><a href="https://proton.me/drive/file-sharing">Sharing files</a> internally or externally with clients and partners is fundamental to business operations. But without the right safeguards, a single mishandled document can result in <a href="https://proton.me/blog/breach-recommendations">data breaches</a>, compliance violations, and damage to your company&#8217;s reputation. That’s why <a href="https://proton.me/drive/file-sharing">encrypted file sharing</a> is a key aspect of ISO 27001 certification.</p> <p>There are <a href="https://www.iso.org/the-iso-survey.html" target="_blank" rel="noreferrer noopener">over 47,000 valid ISO 27001 certificates</a> worldwide — and while some organizations hold more than one certificate (for different websites or branches), this still represents tens of thousands of companies that are investing in better security practices.</p> <p>Although IT remains the leading sector, ISO 27001 is rapidly expanding across industries, from finance and healthcare to nonprofits. It’s not just for large enterprises, as small businesses are increasingly adopting ISO 27001 to protect themselves from cyber threats, build trust, and win new clients.</p> <p>This guide breaks down practical steps businesses can take to secure file sharing under ISO 27001. It also explores how using an ISO 27001-aligned service like <a href="https://proton.me/business/drive">Proton Drive</a> can simplify compliance and protect <a href="https://proton.me/blog/digital-data">digital data</a>.</p> <ul class="wp-block-list"> <li><a href="#What-is-ISO-27001">What is ISO 27001 and why does it matter?</a></li> <li><a href="#Benefits-of-ISO-27001">What are the benefits of secure file sharing under this certificate?</a></li> <li><a href="#How-to-protect-file-sharing-for-ISO-27001">8 ways to protect file sharing and collaboration for ISO 27001</a> <ul class="wp-block-list"> <li><a href="#Keep-encrypted">1. Keep shared files and conversations encrypted</a></li> <li><a href="#Collaborate-securely">2. Collaborate securely on shared files</a></li> <li><a href="#Monitor-access">3. Control and monitor access to sensitive data</a></li> <li><a href="#Prevent-data-loss">4. Prevent data loss and keep files secure</a></li> <li><a href="#Train-employees">5. Train employees to avoid costly mistakes</a></li> <li><a href="#Access-shared-files-securely">6. Access shared files securely on any device</a></li> <li><a href="#Be-cautious-when-sharing">7. Be cautious when sharing files with third parties</a></li> <li><a href="#Monitor-for-threats">8. Monitor for security threats</a></li> </ul> </li> <li><a href="#Securely-collaborate-with-Proton-Drive">Securely share and collaborate on files with Proton Drive</a></li> </ul> <h2 class="wp-block-heading" id="What-is-ISO-27001">What is ISO 27001 and why does it matter?</h2> <p>ISO 27001, officially known as ISO/IEC 27001, is an international standard for information security management systems (ISMS). Think of it as a high-security rulebook designed to keep hackers out, prevent accidental leaks, and ensure your data remains safe even if something goes wrong. <a href="https://proton.me/blog/iso-27001-certification">Organizations that follow ISO/IEC 27001</a> systematically identify security risks and put controls in place to reduce them.</p> <p>At its core, ISO 27001 ensures three key principles of data protection:</p> <ul class="wp-block-list"> <li><strong>Confidentiality</strong>: Only authorized people can access sensitive files. Example: a financial firm encrypts client records to prevent cybercriminals from stealing and selling them on the dark web.</li> <li><strong>Integrity</strong>: Data remains accurate and unchanged unless modified by approved users. Example: a hospital ensures that only doctors can update patient medical records.</li> <li><strong>Availability</strong>: Data is accessible when needed, without downtime or disruption. Example: a cloud service provider maintains backups to prevent data loss in case of a system failure.</li> </ul> <h2 class="wp-block-heading" id="Benefits-of-ISO-27001">What are the benefits of secure file sharing under ISO 27001?</h2> <p>Here&#8217;s how ISO 27001 ensures your shared files are protected from unauthorized access, remain unchanged unless approved, and are available when needed:</p> <h3 class="wp-block-heading">Protect sensitive information</h3> <p>This includes <a href="https://proton.me/blog/personal-data">personally identifiable information (PII)</a>, protected health information (PHI), financial data, customer records, intellectual property, and other confidential assets.</p> <h3 class="wp-block-heading">Reduce security risks</h3> <p>Without file sharing safeguards, it&#8217;s only a matter of time before a cyber attack happens, such as data leaks, <a href="https://proton.me/blog/what-is-ransomware">ransomware</a>, or insider threats.</p> <h3 class="wp-block-heading">Ensure compliance</h3> <p>Many regulations, like <a href="https://proton.me/business/gdpr">GDPR</a>, <a href="https://proton.me/business/healthcare">HIPAA</a>, and <a href="https://proton.me/blog/california-privacy-for-all-act">CCPA</a>, require strict security for shared data. ISO 27001 provides a clear framework to meet these rules and prove compliance to auditors.</p> <h3 class="wp-block-heading">Save costs</h3> <p>A file sharing incident, like an employee that <a href="https://www.statista.com/statistics/1387393/loss-sensitive-information-organizations-cause-worldwide/" target="_blank" rel="noreferrer noopener">mistakenly sends a private file</a> to the wrong recipient or an attacker that intercepts unencrypted data, can lead to fines, lawsuits, and damage to the company&#8217;s reputation, which is invaluable.</p> <h3 class="wp-block-heading">Build trust</h3> <p>Customers and partners need assurance that their shared data won&#8217;t be exposed or misused.</p> <h3 class="wp-block-heading">Maintain a competitive advantage</h3> <p>Many organizations require ISO 27001 compliance before sharing sensitive data with vendors. It&#8217;s also a trust signal that sets you apart from competitors lacking this certification.</p> <h3 class="wp-block-heading">Improve operational efficiency</h3> <p>With clear roles and streamlined workflows, teams can share data efficiently without bottlenecks. Plus, continuity and disaster recovery plans keep your business running, even during unexpected disruptions.</p> <h3 class="wp-block-heading">Scale with your business</h3> <p>ISO 27001 provides a structured, adaptable framework that protects the security of your business, no matter how big or complex it becomes.</p> <h2 class="wp-block-heading" id="How-to-protect-file-sharing-for-ISO-27001">8 ways to protect file sharing and collaboration for ISO 27001</h2> <p>To strengthen file sharing security in line with ISO 27001, your organization should implement key safeguards like encryption, access management, and continuous monitoring. Here are some best practices:</p> <h3 class="wp-block-heading" id="Keep-encrypted">1. Keep shared files and conversations encrypted</h3> <p>Without encryption, the files you share can be intercepted or exposed. With <a href="https://proton.me/business/drive">Proton Drive</a>, you can securely share files with anyone using email or public links. Your data is protected with <a href="https://proton.me/security/end-to-end-encryption">end-to-end encryption (E2EE)</a>, so no one can access it besides you and the recipient — not even us. Metadata, such as file names, folder names, and thumbnails, is also fully encrypted.</p> <p>Even if your files are encrypted, discussing them over unencrypted emails or chat platforms can expose sensitive details. You can use <a href="https://proton.me/business/mail">Proton Mail</a> to safely send attachments and have private conversations using E2EE and <a href="https://proton.me/support/password-protected-emails">password protection</a>.</p> <h3 class="wp-block-heading" id="Collaborate-securely">2. Collaborate securely on shared files</h3> <p>Teams, partners, and clients often need to work directly on shared files instead of constantly sending updates back and forth via email or chat. With <a href="https://proton.me/drive/docs">Proton Docs</a>, you can safely collaborate in real time while ensuring that every edit, comment, and suggestion remains end-to-end encrypted. Unlike traditional cloud services, where <a href="https://proton.me/blog/is-google-docs-secure">providers can access your documents</a>, Proton Docs ensures only you and your collaborators can see your content.</p> <h3 class="wp-block-heading" id="Monitor-access">3. Control and monitor access to sensitive data</h3> <p>Not everyone in your organization needs access to every file. File sharing tools with role-based access control ensure that only the right people can view or edit sensitive files. For extra protection, you should regularly review user permissions to remove unnecessary access.</p> <p>Proton Drive gives you <a href="https://proton.me/support/drive-manage-access-shared-files">control over who can access your shared files</a> with viewer and editor permissions, so you decide who can make changes. You can <a href="https://proton.me/drive/file-sharing/password-protection">set passwords</a> and expiration dates on shared links, track how many times files have been downloaded, and revoke access anytime to ensure your data stays protected and accessible only when needed. Plus, <a href="https://proton.me/support/drive-signature-management">digital signatures</a> help verify that shared files haven’t been tampered with.</p> <h3 class="wp-block-heading" id="Prevent-data-loss">4. Prevent data loss and keep files secure</h3> <p>Losing or accidentally exposing sensitive shared files can create security risks and compliance issues. A good way to protect against data loss is by following the <a href="https://proton.me/blog/3-2-1-backup">3-2-1 backup rule</a>: keep at least three copies of your data, store them on two different types of storage, and keep one copy offsite.</p> <p>With Proton Drive, you can securely store and back up important files with end-to-end encryption, keeping them safe from unauthorized access. If a file is accidentally modified or deleted, <a href="https://proton.me/support/version-history">file version history</a> lets you restore previous versions anytime, even if the files were overwritten — you can also see who made changes.</p> <h3 class="wp-block-heading" id="Train-employees">5. Train employees to avoid costly mistakes</h3> <p>Even with the best security tools, human error is a major risk. You should provide regular training on secure file sharing, including how to <a href="https://proton.me/blog/what-is-phishing">recognize phishing attempts</a>, securely collaborate with external partners, and handle confidential information. Simple steps can prevent serious security issues, like using strong passwords, enabling two-factor authentication (2FA), and avoiding suspicious links.</p> <p>To reduce phishing risks, Proton Mail includes <a href="https://protonvpn.com/support/phishing/">anti-phishing</a> and <a href="https://proton.me/support/avoid-spam">anti-spam features</a> that block malicious emails.</p> <h3 class="wp-block-heading" id="Access-shared-files-securely">6. Access shared files securely on any device</h3> <p>Security shouldn’t come at the cost of convenience. Whether you&#8217;re in the office, working remotely, or on the go, you need a secure way to access and share files without compromising privacy.</p> <p>All Proton apps, including Drive, provide <a href="https://proton.me/drive/download">easy-to-use apps</a> for Windows, macOS, Android, iOS, and a web app, so your team can securely manage files from any device.</p> <h3 class="wp-block-heading" id="Be-cautious-when-sharing">7. Be cautious when sharing files with third parties</h3> <p>Your security is only as strong as the weakest link. Before sharing files with vendors, contractors, or partners, make sure they use secure, encrypted platforms and follow security best practices. Limit external file sharing to approved services and require security agreements to protect sensitive information.</p> <p>With Proton Drive, you stay in control by <a href="https://proton.me/support/password-protect-files-proton-drive">sharing files through password-protected links</a> with expiration dates and adjustable permissions. You can also share directly via email, encouraging recipients to create a Proton account to access and collaborate on files — keeping everything in a secure, end-to-end encrypted environment.</p> <h3 class="wp-block-heading" id="Monitor-for-threats">8. Monitor for security threats</h3> <p>Even with strong security, your team should monitor for breaches in case login credentials or sensitive files get leaked. <a href="https://proton.me/support/proton-sentinel">Proton Sentinel</a> actively monitors for suspicious login attempts, unauthorized access patterns, and potential breaches using a combination of AI and human oversight. It blocks threats before they result in an account takeover.</p> <p>Additionally, if you have a suspicion of an account takeover, you can monitor the <a href="https://proton.me/support/account/passwords-authentication/user-sessions">session manager</a> in your Proton Account settings to track active logins and quickly revoke access if an unauthorized connection is detected.</p> <h2 class="wp-block-heading" id="Securely-collaborate-with-Proton-Drive">Securely share and collaborate on files with Proton Drive</h2> <p>While companies can implement internal security measures, using an ISO 27001-aligned secure file sharing service like <a href="https://proton.me/drive">Proton Drive</a> simplifies compliance. We use end-to-end encryption and <a href="https://proton.me/blog/switzerland">Swiss protection</a> to ensure that no one can access files except you and approved users.</p> <p>With <a href="https://proton.me/business">Proton for Business</a>, you gain access to our entire <a href="https://proton.me/business/trust">end-to-end encrypted ecosystem</a> designed to protect your digital data, including <a href="https://proton.me/business/drive">cloud storage</a>, <a href="https://proton.me/business/mail">email</a>, <a href="https://proton.me/business/pass">passwords</a>, and <a href="https://proton.me/business/vpn">internet connections</a>. All our apps are <a href="https://proton.me/blog/iso-27001-certification">ISO 27001 certified</a>, independently audited, and <a href="https://proton.me/community/open-source">open source</a>, so anyone can check our <a href="https://proton.me/drive/security">security model</a>.</p> </content:encoded><category>For business</category><author>Elena Constantinescu</author></item><item><title>What your business needs to know about pretexting scams</title><link>https://proton.me/blog/what-is-pretexting</link><guid isPermaLink="true">https://proton.me/blog/what-is-pretexting</guid><description>Pretexting scams can be fatal for small businesses: Find out how to protect yourself with Proton Pass for Business</description><pubDate>Tue, 25 Mar 2025 17:32:32 GMT</pubDate><content:encoded> <p>You&#8217;ve probably heard of <a href="https://proton.me/blog/what-is-phishing">phishing</a>. It&#8217;s a form of <a href="https://proton.me/blog/what-is-social-engineering">social engineering</a> that relies on exploiting people&#8217;s natural inclination to trust others. Much like phishing, a pretexting scam is designed to fool you into thinking you need to take immediate action and share <a href="https://proton.me/blog/sensitive-information">sensitive information</a> with a scammer.</p> <p>People are more likely to fall for convincing and thorough scams. Pretexting scams involve researching your business and tailoring communications to you and your employees, so they&#8217;re more risky than generic phishing attempts. Verizon estimates that in the last two years, around 25% of financially motivated scams involved <a href="https://www.verizon.com/business/resources/reports/dbir/" target="_blank" rel="noreferrer noopener">pretexting</a>.</p> <p>In this article, we&#8217;ll explore how pretexting works, how this kind of <a href="https://proton.me/blog/cybersecurity-threats">cybercrime affects businesses,</a> and how to avoid falling prey to it.</p> <h2 class="wp-block-heading">What is pretexting?</h2> <p>Phishing and pretexting both rely on bypassing your network by tricking people into letting them in, instead of attempting to penetrate your business network by attacking your cybersecurity. Where phishing casts a wide net with generic communications, pretexting involves researching a specific target.</p> <p>This type of scam relies on a scammer creating a <strong>pretext </strong>to ask you to do something for them. Usually the request will be urgent and demand immediate action. The scammer will pose as someone you know, such as a coworker or manager, or someone from a government agency or a business whose services you use. They&#8217;ll ask you to quickly take action to make a payment or share information, hoping you won&#8217;t check if the request is legitimate.</p> <p>The urgency of the requests is designed to make recipients act quickly before they can think the action through. Some examples of pretexting scams include:</p> <ul class="wp-block-list"> <li>An invoice asking you to pay a bill you don&#8217;t recognize.</li> <li>An email asking you to update your personal details on your company&#8217;s HR database.</li> <li>A tech support request from a worker asking to gain access to a business service.</li> <li>An email or text message that appears to be from someone at your company urgently asking for money.</li> <li>A text letting you know your package will be returned if you don&#8217;t pay an import fee.</li> </ul> <figure class="wp-block-image size-large"><img width="1024" height="421" data-public-id="wp-pme/pretexting_scum_blog_inline_image/pretexting_scum_blog_inline_image.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_421,c_scale/f_auto,q_auto/v1742924022/wp-pme/pretexting_scum_blog_inline_image/pretexting_scum_blog_inline_image.png?_i=AA" alt="An image showing an example of a pretexting scam, with an email claiming that the recipient&#039;s parcel will be returned if a fee isn&#039;t paid" class="wp-post-82997 wp-image-82998" data-format="png" data-transformations="f_auto,q_auto" data-filesize="290 KB" data-optsize="39 KB" data-optformat="image/webp" data-percent="86.7" data-permalink="https://pme.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=82998&amp;lang=en" data-version="1742924022" data-seo="1" srcset="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_421,c_scale/f_auto,q_auto/v1742924022/wp-pme/pretexting_scum_blog_inline_image/pretexting_scum_blog_inline_image.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_123,c_scale/f_auto,q_auto/v1742924022/wp-pme/pretexting_scum_blog_inline_image/pretexting_scum_blog_inline_image.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_316,c_scale/f_auto,q_auto/v1742924022/wp-pme/pretexting_scum_blog_inline_image/pretexting_scum_blog_inline_image.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1742924022/wp-pme/pretexting_scum_blog_inline_image/pretexting_scum_blog_inline_image.png?_i=AA 1200w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure> <h2 class="wp-block-heading">How does pretexting work?</h2> <p>Pretexting is particularly dangerous because it can occur in many different forms. To make a pretexting scam work, a scammer will generally take the following steps:</p> <ol class="wp-block-list"> <li><strong>Create a character to impersonate. </strong>They may decide to pose as an employee using <a href="https://proton.me/blog/what-is-email-spoofing">email spoofing</a>, or they may impersonate a business you&#8217;ve been connected to. Researching your business helps them create a believable story, and they&#8217;ll try to learn as many details as possible to be convincing.</li> <li><strong>Decide on a pretext that will make their request seem natural.</strong> For example, at the end of a tax year, a scammer may contact your business posing as a tax accountant looking for detailed financial information.</li> <li>Once they&#8217;ve researched your business and established a trustworthy cover, <strong>the scammer will contact you with an urgent request</strong>. For example, they may ask you for sensitive business data while posing as a government agent or a coworker. They may also ask for payment for outstanding services or ask you to download software that&#8217;s actually <a href="https://protonvpn.com/blog/what-is-malware/">malware</a>.</li> <li>After they&#8217;ve extracted information such as business logins or financial information,<strong> the scammer can infiltrate your network, commit identity fraud, or make financial transactions</strong>.</li> </ol> <h2 class="wp-block-heading">What are the consequences of pretexting scams?</h2> <p>Cybercriminals use pretexting scams to gain access to sensitive data, steal money, and commit <a href="https://proton.me/blog/identity-theft-protection">identity fraud</a>. If businesses fall victim to scams like this, it can be catastrophic.</p> <h3 class="wp-block-heading">Data breaches</h3> <p>If a scammer gains access to your business network, they can exploit sensitive data. This can lead to governmental fines due to non-compliance with data regulation laws. It can also lead to loss of reputation and trust, which many smaller businesses will find difficult to recover from.</p> <h3 class="wp-block-heading">Identity theft and further scams</h3> <p>Once a scammer has gained personal information, they&#8217;re able to impersonate your employees. This opens individuals up to having false accounts created in their names, as well as being financially affected. Scammers will keep using the stolen data to exploit as many services, systems, and people as possible.</p> <h3 class="wp-block-heading">Financial losses</h3> <p>One of the greatest threats to a business posed by pretexting scams is the potential financial losses. Between scammers infiltrating bank accounts and draining them and fines for allowing data breaches, a pretexting scam could end a small business. In 2023 alone, the FBI&#8217;s Internet <a href="https://www.ic3.gov/" target="_blank" rel="noreferrer noopener">Crime Complaint Center (IC3)</a> received 21,489 business email compromise (BEC) complaints with adjusted losses <a href="https://www.ic3.gov/AnnualReport/Reports/2023_IC3Report.pdf" target="_blank" rel="noreferrer noopener">over $2.9 billion</a>.</p> <h2 class="wp-block-heading">How to avoid pretexting scams as a business</h2> <p>The best way to prevent pretexting scams is to <strong>avoid rushing into action. </strong><strong>Always verify the source of a request.</strong><strong> </strong>If you&#8217;ve received an urgent request from a government agency, verify it by contacting the phone number or email address on their official website. If you&#8217;ve received a request from a coworker, ask them on the phone or in person if this was them.<strong> </strong>This type of scam relies on you acting quickly, so always take time to ensure that a request is legitimate. No reasonable person will push you to act if you aren&#8217;t comfortable.</p> <p>Beyond taking extra care to verify requests, here are actions your business can take to avoid being scammed.</p> <h3 class="wp-block-heading">Create an incident response plan</h3> <p>We&#8217;ve written before about how important a <a href="https://proton.me/blog/incident-response">cybersecurity incident response plan</a> is. It doesn&#8217;t just help you in the aftermath of an incident, it helps you prevent one occurring in the first place. It will also help you map out all threat vectors within your business network, helping you understand where you&#8217;re vulnerable and how your data could be accessed.</p> <h3 class="wp-block-heading">Employ two-factor authentication (2FA)</h3> <p><a href="https://proton.me/blog/what-is-two-factor-authentication-2fa">2FA</a> makes it harder for unauthorized individuals to breach your business network. Encouraging employees to use not just a password but also a <a href="https://proton.me/blog/security-keys">physical security </a><a href="https://proton.me/blog/security-keys">key</a> or <a href="https://proton.me/blog/what-is-a-passkey">passkey</a> creates an extra layer of protection against cybercriminals. Educating employees about online safety and empowering them with the right tools is one of the most critical parts of the battle against pretexting scams.</p> <h3 class="wp-block-heading">Store business data safely with Proton Pass for Business</h3> <p>Passwords and email addresses are sensitive data that require robust protection. <a href="https://proton.me/business/pass">Proton Pass for Business</a> is a <a href="https://proton.me/pass">password manager</a> that&#8217;s an ideal, easy-to-use tool when it comes to cybersecurity. It helps employees work more efficiently and more securely. Using a dedicated business password manager makes it easy to <a href="https://proton.me/support/pass-business-policies">set up team policies to prevent data sharing</a>, <a href="https://proton.me/support/pass-business-activity-logs">monitor activity logs for unusual login attempts</a>, and <a href="https://proton.me/blog/dark-web-monitoring">monitor the dark web</a> for any sensitive information. Creating strong cybersecurity measures and ensuring your employees are using secure tools is your best defense against pretexting scams and social engineering.</p> <div class="text-center"><a class="btn inline-block rounded-full font-bold btn-small bg-purple-500 text-white hover:text-white focus:text-white" href="https://proton.me/business/contact">Contact our business sales team</a></div> </content:encoded><category>For business</category><author>Kate Menzies</author></item><item><title>Proton Drive and Docs now support collaboration with users without Proton accounts</title><link>https://proton.me/blog/improve-productivity-collaboration-proton-drive</link><guid isPermaLink="true">https://proton.me/blog/improve-productivity-collaboration-proton-drive</guid><description>Discover the latest Proton Drive updates designed to help you collaborate and enhance your workflow without compromising security.</description><pubDate>Tue, 25 Mar 2025 10:14:23 GMT</pubDate><content:encoded> <p>Whether you’re a lawyer building a case with a client or a researcher working on a report with your team, finding solutions that balance collaboration with security is essential for success.&nbsp;</p> <p><a href="https://proton.me/drive">Proton Drive</a>’s latest updates offer new ways to empower your work without compromising your data or productivity. You can now: Collaborate on files, folders, and documents with anyone — even if they don’t have a Proton Account and receive email notifications so you never miss an update in Docs in Proton Drive.</p> <p>Here’s a closer look at these new additions.&nbsp;</p> <h2 class="wp-block-heading">Invite people without a Proton account to work on files, folders, and documents</h2> <figure class="wp-block-image size-large"><img width="1024" height="512" data-public-id="wp-pme/b2b_releases_inline_blog022x-2/b2b_releases_inline_blog022x-2.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1742894364/wp-pme/b2b_releases_inline_blog022x-2/b2b_releases_inline_blog022x-2.png?_i=AA" alt="" class="wp-post-82769 wp-image-82981" data-format="png" data-transformations="f_auto,q_auto" data-filesize="1 MB" data-optsize="106 KB" data-optformat="image/webp" data-percent="91" data-permalink="https://pme.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=82981&amp;lang=en" data-version="1742894364" data-seo="1" srcset="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1742894364/wp-pme/b2b_releases_inline_blog022x-2/b2b_releases_inline_blog022x-2.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_150,c_scale/f_auto,q_auto/v1742894364/wp-pme/b2b_releases_inline_blog022x-2/b2b_releases_inline_blog022x-2.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_384,c_scale/f_auto,q_auto/v1742894364/wp-pme/b2b_releases_inline_blog022x-2/b2b_releases_inline_blog022x-2.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_768,c_scale/f_auto,q_auto/v1742894364/wp-pme/b2b_releases_inline_blog022x-2/b2b_releases_inline_blog022x-2.png?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1024,c_scale/f_auto,q_auto/v1742894364/wp-pme/b2b_releases_inline_blog022x-2/b2b_releases_inline_blog022x-2.png?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_784,c_scale/f_auto,q_auto/v1742894364/wp-pme/b2b_releases_inline_blog022x-2/b2b_releases_inline_blog022x-2.png?_i=AA 1568w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure> <p>If you&#8217;ve ever felt worried about exchanging confidential files over email or been frustrated by the endless cycle of sending the same document back and forth to gather edits, the new <strong>Editor access</strong> option for public sharing links<strong> </strong>is here to change the way you collaborate. Now, you can invite anyone to contribute to encrypted documents, files, and folders — even if they don’t have a Proton Account, while still preserving end-to-end encryption.</p> <h3 class="wp-block-heading">Collect files from anyone with collaborative folders</h3> <p>Whether you’re gathering important documents from clients or exchanging confidential briefs and deliverables with freelancers, you can do it all with the peace of mind that every file remains private and protected. You can create a folder and generate a sharing link with editor access to allow others to upload their files directly. Share and receive sensitive files or folders without requiring collaborators to sign up to Proton Drive — making collaboration seamless and hassle-free.&nbsp;</p> <h3 class="wp-block-heading">Co-create documents and gather feedback</h3> <p>Stay productive and remove the friction of working with a distributed team. Generate a sharing link with editor access for documents created with <a href="https://proton.me/drive/docs">Docs in Proton Drive</a> to collect contract amendments from external partners, ask new clients to complete forms, or invite collaborators to contribute to meeting notes, product briefs, or reports. Work with others in real time, track their changes, and make suggestions — all within a secure, encrypted environment.&nbsp;<br></p> <p>To create a public sharing link for a file or folder stored in Proton Drive — or a document created with <a href="https://proton.me/drive/docs">Docs</a> — locate the item, click <strong>Share</strong>, and toggle on <strong>Create public link</strong>. Then, choose whether those with the link should have <strong>Editor</strong> or <strong>Viewer</strong> access.</p> <div class="text-center"><a class="btn inline-block rounded-full font-bold btn-small btn-solid-purple" href="https://proton.me/business/drive">Get Proton Drive for Business</a></div> <h2 class="wp-block-heading">Stay in sync with email notifications and on-the-go editing in Docs in Proton Drive</h2> <figure class="wp-block-image size-large"><img width="1024" height="512" data-public-id="wp-pme/b2b_releases_inline02_v3_blog2x/b2b_releases_inline02_v3_blog2x.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1742367402/wp-pme/b2b_releases_inline02_v3_blog2x/b2b_releases_inline02_v3_blog2x.png?_i=AA" alt="" class="wp-post-82769 wp-image-82782" data-format="png" data-transformations="f_auto,q_auto" data-filesize="1 MB" data-optsize="147 KB" data-optformat="image/webp" data-percent="89.1" data-permalink="https://pme.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=82782&amp;lang=en" data-version="1742367402" data-seo="1" srcset="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1742367402/wp-pme/b2b_releases_inline02_v3_blog2x/b2b_releases_inline02_v3_blog2x.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_150,c_scale/f_auto,q_auto/v1742367402/wp-pme/b2b_releases_inline02_v3_blog2x/b2b_releases_inline02_v3_blog2x.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_384,c_scale/f_auto,q_auto/v1742367402/wp-pme/b2b_releases_inline02_v3_blog2x/b2b_releases_inline02_v3_blog2x.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_768,c_scale/f_auto,q_auto/v1742367402/wp-pme/b2b_releases_inline02_v3_blog2x/b2b_releases_inline02_v3_blog2x.png?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1024,c_scale/f_auto,q_auto/v1742367402/wp-pme/b2b_releases_inline02_v3_blog2x/b2b_releases_inline02_v3_blog2x.png?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_784,c_scale/f_auto,q_auto/v1742367402/wp-pme/b2b_releases_inline02_v3_blog2x/b2b_releases_inline02_v3_blog2x.png?_i=AA 1568w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure> <p>With recent updates to <a href="https://proton.me/drive/docs">Docs in Proton Drive</a>, you’ll now receive email notifications whenever someone adds comments or suggests edits to your document. Ideal for team projects or client collaborations, this new feature helps you stay on top of feedback and never miss a crucial detail.&nbsp;<br></p> <p>And with <strong>Docs now available in Proton Drive’s mobile app for iOS and Android</strong>, you can easily respond to comments and make edits no matter where you are — experience smoother collaboration and more efficient workflows, whether you’re in the office or on the move.</p> <div class="text-center"><a class="btn inline-block rounded-full font-bold btn-small btn-solid-purple" href="https://docs.proton.me">Try Docs in Proton Drive</a></div> <h2 class="wp-block-heading">Sync and safeguard your work with Proton Drive for Business</h2> <p>The above features are available for all Proton Drive users, but if you are using Proton Drive professionally, our <a href="https://proton.me/business/drive#pricing">Business plans</a> offer the convenience of seamless collaboration paired with peace of mind for fine-grained user management. </p> <p>Built on a foundation of <a href="https://proton.me/security/end-to-end-encryption">end-to-end encryption</a>, Proton’s suite of services keeps your organization’s <a href="https://proton.me/business/drive">files</a>, <a href="https://proton.me/drive/docs">documents</a>, <a href="https://proton.me/business/mail">emails</a>, <a href="https://proton.me/calendar">calendars</a>, and <a href="https://proton.me/business/vpn">internet activity</a> private by default. This means that only you and the people you choose can see your organization’s activity — not even Proton can gain access.</p> <p>Proton is based in Switzerland, home to some of the world’s strictest privacy laws, adding a layer of security most other services can’t provide. With Proton, you’re not just streamlining your workflow, you’re ensuring your personal and professional information is handled with the privacy and security it deserves.</p> <div class="text-center"><a class="btn inline-block rounded-full font-bold btn-small btn-solid-purple" href="https://proton.me/business/drive">Get Proton Drive for Business</a></div> </content:encoded><category>For business</category><category>Product updates</category><category>Proton Drive</category><author>Anant Vijay</author></item></channel></rss>