<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>The Proton Blog</title><description>News from the front lines of privacy and security</description><link>https://proton.me/</link><language>en</language><feed_url>https://proton.me/feed</feed_url><item><title>In rush for age checks, we’re putting kids’ security at risk</title><link>https://proton.me/blog/is-age-verification-safe</link><guid isPermaLink="true">https://proton.me/blog/is-age-verification-safe</guid><description>Is age verification safe? Learn how age checks can expose children to privacy risks, scams, and data breaches.</description><pubDate>Fri, 10 Apr 2026 19:30:52 GMT</pubDate><content:encoded>
&lt;p&gt;As governments across the world charge ahead with &lt;a href=&quot;https://proton.me/blog/age-verification&quot;&gt;age-verification laws&lt;/a&gt;, a well-intentioned rush to protect children is actually putting them at risk. &lt;/p&gt;



&lt;p&gt;The goal is to shield children from harmful materials, but these laws lack sufficient safeguards to protect privacy. All it takes is a single data breach, and a law intended to protect children could end up exposing their sensitive personal information to the world.&lt;/p&gt;



&lt;p&gt;To be sure, children deserve an internet that they can navigate safely. But explicit content and predatory social media are not the only dangers online. Privacy violations, especially for the young, can also do serious harm. Especially since, as the old warning goes, “The internet is forever.”&amp;nbsp;&lt;/p&gt;



&lt;p&gt;We should not accept simply trading one risk for another.&amp;nbsp;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;How the risks could affect kids&lt;/h2&gt;



&lt;p&gt;To verify their ages online, users are often asked to submit government IDs, credit card numbers, selfies, or unique biometric information. When breaches happen — and they do, with depressing regularity — that sensitive data is exposed.&lt;/p&gt;



&lt;p&gt;What’s more, many companies outsource their age-verification services to a handful of third-party vendors. Those suppliers, as storehouses of the data, become all-too-tempting targets for hackers and criminals. Without sufficient policies on data minimization, usage, storage, and privacy, user data remains deeply vulnerable.&lt;/p&gt;



&lt;p&gt;In September, &lt;a href=&quot;https://www.theguardian.com/games/2025/oct/07/discord-data-breach-proof-of-age-id-leaked&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;a cyberattack compromised a third-party vendor&lt;/a&gt; for Discord, a video game chat platform, granting the attacker access to at least &lt;a href=&quot;https://discord.com/press-releases/update-on-security-incident-involving-third-party-customer-service&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;70,000 images of government-issued IDs&lt;/a&gt;, including passports and licenses.&lt;/p&gt;



&lt;p&gt;Discord had been collecting photos of IDs in compliance with the UK’s age-verification law, which took effect in July.&lt;/p&gt;



&lt;p&gt;Since the implementation of the law, the UK’s Office of Communications &lt;a href=&quot;https://www.ofcom.org.uk/siteassets/resources/documents/online-safety/research-statistics-and-data/os-standards/online-safety-in-2025-summary-of-the-technology-sectors-response-to-our-rules.pdf?v=408836&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;reported&lt;/a&gt; that “many records were not consistent” with record-keeping and review guidance. Many companies also failed to show how they were taking responsibility for online safety risks.&lt;/p&gt;



&lt;p&gt;This breach highlights the real-life consequences of online attacks. As age-verification laws gain traction on a larger scale, an emphasis should be placed on privacy. Protecting sensitive personal information makes the internet a safer place for everyone, including children.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;The need for balance&lt;/h2&gt;



&lt;p&gt;The rush to prioritize age checks for minors without prioritizing secure methods of verification create additional cybersecurity risks that can put children in harm’s way. As governments make premature decisions about these technologies, they are opening a Pandora&amp;#8217;s box for hackers and cybercriminals to mine at their leisure.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Moving forward, governments and legislatures must be thoughtful about the technologies they employ and the risks they come with. Policymakers should prioritize decentralized solutions that protect minors against the real threat of cyberattacks, without compromising users’ anonymity and right to privacy. &lt;/p&gt;
</content:encoded><category>Privacy news</category><author>Edward Komenda</author></item><item><title>What are the alternatives to age verification?</title><link>https://proton.me/blog/age-verification-alternatives</link><guid isPermaLink="true">https://proton.me/blog/age-verification-alternatives</guid><description>Explore alternatives to online age verification, from parental controls to zero-knowledge proofs, and how they can protect children without exposing personal data.</description><pubDate>Fri, 10 Apr 2026 19:19:39 GMT</pubDate><content:encoded>
&lt;p&gt;With age-check systems, there isn’t a one-size-fits-all solution.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://www.cnil.fr/en/online-age-verification-balancing-privacy-and-protection-minors#:~:text=The%20CNIL%20has%20analysed%20several,satisfactorily%20meets%20these%20three%20requirements.&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Research suggests&lt;/a&gt; that no single method effectively protects children while also balancing concerns about privacy and access to information, but there is a way forward. Applying a broad array of common-sense measures, including parental controls and digital literacy education, can go a long way in helping guard children against potentially harmful content while remaining mindful of privacy rights and the nuanced ways young people use the internet.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Attribute-based verification&lt;/h2&gt;



&lt;p&gt;It’s not exactly an alternative to age verification, but proponents of attribute-based verification argue that it provides a more secure and private method of verifying a user’s age. That’s because it verifies only what’s necessary, such as requiring a self-declared age range rather than a government ID. But it has its limitations. Notably, any method that relies on self-declaration can be easily circumvented. It also fails to address the issue of &lt;a href=&quot;https://www.eff.org/pages/zero-knowledge-proofs-are-not-solution-age-gating-mandates&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;personal data privacy&lt;/a&gt;, as it does not prevent websites from collecting additional information, such as users’ IP addresses.&lt;/p&gt;



&lt;p&gt;Attribute-based age checks, however, store data on the user’s device. This limits the number of people with access to a user’s private data and reduces the cyberattack risks posed by other age-check methods.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Zero Knowledge Proofs&lt;/h2&gt;



&lt;p&gt;Like attribute-based verification, a zero knowledge proof (ZKP) provides a way for websites and apps to verify a user’s age without the user having to explicitly share personal data about their identity. But &lt;a href=&quot;https://www.circularise.com/blogs/zero-knowledge-proofs-explained-in-3-examples&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;ZKP isn’t an alternative to age verification&lt;/a&gt;, rather, it’s a cryptographic tool that allows websites and apps to verify information about the user in question without gaining any additional information about the user. &lt;/p&gt;



&lt;p&gt;In 2025, &lt;a href=&quot;https://blog.google/products-and-platforms/platforms/google-pay/google-wallet-age-identity-verifications/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Google announced ZKP integration&lt;/a&gt; within Google Wallet to provide age verification across multiple apps. The tech company said it would continue to use ZKP with existing partners, like Bumble, to verify users&amp;#8217; ages without revealing their identities. &lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Age-Appropriate Design Code&lt;/h2&gt;



&lt;p&gt;The Electronic Privacy Information Center’s model bill for Age-Appropriate Design Code (AACD) was designed as an alternative to the rise in age verification legislation. &lt;a href=&quot;https://epic.org/epic-model-aadc/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;The AACD gives children agency over their online experiences&lt;/a&gt; while requiring tech companies to evaluate their programs for features that put children at risk for compulsive use. &lt;/p&gt;



&lt;p&gt;Additionally, the AACD would prohibit these companies from implementing programs with high-risk features, and would provide transparency into addictive design practices. &lt;/p&gt;



&lt;p&gt;Unlike age verification legislation, the AACD places responsibility on the manufacturers of these technological platforms, rather than the users they exploit, circumventing issues around privacy and personal security.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Device- and OS-level parental controls&lt;/h2&gt;



&lt;p&gt;Parents and children can work together on a solution that best meets their needs. Device- and OS-level parental controls offer a more personalized approach to gatekeeping what kids see online.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Parents can set up their children’s devices to restrict or limit certain content. OS-level controls can be set up to limit daily screen time, require approval to install apps, and use web content filters, but the internet’s ever-changing nature means web filters can’t always keep up.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Used in conjunction with other protective measures, however, these restrictions can act as guardrails that reduce children’s exposure to harmful content without universal age verification.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://fosi.org/parental-controls-for-online-safety-are-underutilized-new-study-finds/#:~:text=Screen%20time%20is%20inversely%20correlated%20with%20parental%20controls.&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Research suggests&lt;/a&gt; children who report less screen time are also the most likely to have parental controls on their devices. Yet parental controls are underutilized, according to the nonprofit &lt;a href=&quot;https://fosi.org/parental-controls-for-online-safety-are-underutilized-new-study-finds/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Family Online Safety Institute&lt;/a&gt;. &lt;/p&gt;



&lt;p&gt;Use of parental controls varies widely across device types, and they are hardly a perfect solution. Children may have access to more than one device, making time limits and content filters harder to enforce.&amp;nbsp;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Education and digital literacy&amp;nbsp;&lt;/h2&gt;



&lt;p&gt;Talking with kids about online safety can make parental controls more effective.&lt;/p&gt;



&lt;p&gt;In households that reported six or more conversations about online safety annually, both parents and children were more likely to say that parental controls effectively keep children safe online, &lt;a href=&quot;https://fosi.org/parental-controls-for-online-safety-are-underutilized-new-study-finds/#:~:text=research%20shows%20that%20open%20communication%20remains%20one%20of%20the%20most%20powerful%20tools%20parents%20have%20to%20support%20their%20children%E2%80%99s%20digital%20wellbeing.%E2%80%9D&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;research found&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;And those offline lessons can be valuable tools in protecting children when they are online.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://iris.who.int/server/api/core/bitstreams/0ce56bbf-4535-405e-9bd6-e143f64ae2ba/content&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Research&lt;/a&gt; from the World Health Organization suggests educational programs and cyberbullying prevention can work to reduce violence against children online. Programs that discuss online dangers and offline violence prevention, as well as healthy relationship skills, can help address children’s vulnerabilities to sexual abuse, harassment, and bullying, a &lt;a href=&quot;https://iris.who.int/server/api/core/bitstreams/0ce56bbf-4535-405e-9bd6-e143f64ae2ba/content&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;WHO study&lt;/a&gt; found.&lt;/p&gt;



&lt;p&gt;Parental guidance, support, and the ability to engage critically with online content all affect how a child might feel about what they see on the internet, &lt;a href=&quot;https://www.unicef.org/innocenti/media/7006/file/GKO-Summary-Report-2019.pdf&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;research suggests&lt;/a&gt;.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;The way forward&lt;/h2&gt;



&lt;p&gt;Protecting children doesn’t require turning the entire internet into an ID checkpoint. The widespread deployment of online age checks struggles to balance legitimate child protection concerns against users’ data privacy rights. Until that balance is struck, existing measures can help kids navigate the internet confidently without surrendering sensitive personal information at every turn.&lt;/p&gt;
</content:encoded><category>Privacy guides</category><author>Edward Komenda</author></item><item><title>What small businesses still get wrong about password managers</title><link>https://proton.me/business/blog/smb-cybersecurity-report-passwords</link><guid isPermaLink="true">https://proton.me/business/blog/smb-cybersecurity-report-passwords</guid><description>Over half of SMBs use a business password manager, but they&apos;re still not reaping the full benefits. Our research suggests solutions.</description><pubDate>Fri, 10 Apr 2026 10:57:18 GMT</pubDate><content:encoded>
&lt;p&gt;The way small and medium businesses work has changed for good — but so has the way they get attacked. Teams are distributed, SaaS tools handle everything from payroll to project management, and contractors and vendors rotate in and out of systems regularly. With each new tool or employee with access, the number of potential entry points increases.&lt;/p&gt;



&lt;p&gt;That expanding attack surface matters because credential-based attacks, including phishing, account takeovers, and password theft, have become one of the most common ways businesses get breached. They work precisely because &lt;strong&gt;access has sprawled, which makes it difficult to track&lt;/strong&gt;. All an attacker has to do now is find one valid set of credentials to bypass your business’s defenses.&lt;/p&gt;



&lt;p&gt;In this context, it &lt;em&gt;should&lt;/em&gt; be encouraging that over half of small businesses now use a &lt;a href=&quot;https://proton.me/business/pass&quot;&gt;business password manager&lt;/a&gt;. But Proton&amp;#8217;s &lt;a href=&quot;https://proton.me/business/smb-cybersecurity-report&quot;&gt;SMB Cybersecurity Report 2026&lt;/a&gt; — a global study of 3,000 SMB decision makers — found that one in four still experienced a breach last year.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;All this points to a gap between how tools are adopted and how they&amp;#8217;re actually used.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;How SMBs use password managers today&lt;/h2&gt;



&lt;p&gt;Most password managers are designed to do one thing well: help you remember your password. In practice, that means creating complex and unique passwords and managing them in an encrypted vault. That&amp;#8217;s meaningfully better than the norm of reusing the same credentials across accounts and platforms.&lt;/p&gt;



&lt;p&gt;But with passwords being an attacker&amp;#8217;s easiest point of entry, SMBs need password managers to do much more than just solve memory and convenience problems. They need it to secure access.&lt;/p&gt;



&lt;p&gt;Access is a far broader question. &lt;strong&gt;Do the right people have the right credentials — and would you know what they unlock or if they fell into the wrong hands?&lt;/strong&gt; And as teams grow, subscriptions stack up, and contractors cycle in and out, your organization&amp;#8217;s considerations need to shift from merely strengthening passwords to accounting for real-world security threats.&lt;/p&gt;



&lt;p&gt;That&amp;#8217;s the change most businesses don&amp;#8217;t make until something goes wrong.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Where password manager implementations go wrong&lt;/h2&gt;



&lt;p&gt;The key insight of our report was that businesses adopting password managers don&amp;#8217;t consistently use them.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Unsafe credential sharing still persists at surprisingly high rates:&lt;/strong&gt;&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;33% share them in shared documents or spreadsheets&lt;/li&gt;



&lt;li&gt;30% share credentials via email&lt;/li&gt;



&lt;li&gt;27% share them via messaging apps&lt;/li&gt;



&lt;li&gt;25% write them down&lt;/li&gt;



&lt;li&gt;24% share them verbally&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;That&amp;#8217;s a picture of busy people taking the fastest route available at that moment. Instead of toggling over to the password manager app and sharing a new credential in its proper vault, they might paste it into Slack or an email.&lt;/p&gt;



&lt;p&gt;Workarounds feel harmless in isolation. But over time, credentials end up scattered across inboxes, chat histories, and shared documents in ways that are hard to untangle. When an employee leaves, you can&amp;#8217;t later revoke access. And updating passwords on a moment&amp;#8217;s notice after a data breach becomes impossible unless it&amp;#8217;s stored in a centralized secure location.&lt;/p&gt;



&lt;p&gt;Training to enforce security policies can help, but our research revealed even that isn&amp;#8217;t quite enough&amp;#8230;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Why security awareness training isn’t enough&lt;/h2&gt;



&lt;p&gt;Our report found that 39% of SMBs have experienced a security incident caused by human error. That statistic is easy to misread; the natural response is to assume that more careful employees means fewer incidents.&lt;/p&gt;



&lt;p&gt;But this framing misses something important: &lt;strong&gt;Security systems that depend on perfect behavior under everyday pressure will always be let down by reality.&lt;/strong&gt; Mistakes happen not because people don&amp;#8217;t care — they happen because the secure option often demands more effort and time than the typical SMB can afford. Even well-intentioned teams will find workarounds when they&amp;#8217;re resource-stretched.&lt;/p&gt;



&lt;p&gt;The lasting fix isn&amp;#8217;t more training. &lt;strong&gt;It&amp;#8217;s designing systems where the secure option is also the easy one.&lt;/strong&gt;&lt;/p&gt;



&lt;p&gt;&lt;em&gt;When sharing access safely takes no more effort than dropping a password into a chat message, people will use it.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;When the access problem gets out of control&lt;/h2&gt;



&lt;p&gt;The credential problem compounds as teams grow.&lt;/p&gt;



&lt;p&gt;Eighty-six percent of SMBs now rely on cloud-based services for day-to-day operations. That typically means credentials sprawl across project management tools, finance platforms, marketing software, file storage, and customer systems, each with its own permissions and access history.&lt;/p&gt;



&lt;p&gt;Access doesn’t just scatter across systems; it spreads across the organization, flowing between teams, external partners, contractors, and former employees who may still retain a way in.&lt;/p&gt;



&lt;p&gt;This means that in reality, credentials accumulate, old access continues to linger, and the number of people who have — or have had — the keys to your most sensitive systems scales beyond easy tracking.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Having tools isn&amp;#8217;t the same as being protected&lt;/h2&gt;



&lt;p&gt;The SMBs that experienced breaches last year weren&amp;#8217;t cutting corners: 92% were actively investing in security tools. They had password managers, encrypted email, training programs, and written policies in place. In other words, their setups looked solid on paper.&lt;/p&gt;



&lt;p&gt;What many lacked was consistent enforcement. &lt;a href=&quot;https://proton.me/authenticator&quot;&gt;Multi-factor authentication&lt;/a&gt; (MFA) was switched on but not required, password managers were deployed but not embedded into daily habits, and onboarding and offboarding processes were handled informally rather than systematically. &lt;strong&gt;We suspect, given the popularity of browser password managers, that many were not even using a centralized team platform at all — instead relying on a patchwork of less-safe options on an individual basis.&lt;/strong&gt;&lt;/p&gt;



&lt;p&gt;Each of these is a small gap that stays invisible right up until it isn&amp;#8217;t.&lt;/p&gt;



&lt;p&gt;The real measure of a security setup isn&amp;#8217;t what tools are on the list, but whether those tools hold up under the everyday pressure of how people actually work.&lt;/p&gt;



&lt;p&gt;Here are some practices to help bring this reality closer for your business:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Use a password manager built for teams. &lt;/strong&gt;&lt;a href=&quot;https://proton.me/blog/chrome-password-manager&quot;&gt;Browser password managers&lt;/a&gt; are not only less secure, they don&amp;#8217;t have the admin tools managers need to maintain full control of your accounts. Unless you have an &lt;a href=&quot;https://proton.me/business/pass/enterprise-password-manager&quot;&gt;enterprise password manager&lt;/a&gt; that&amp;#8217;s easy to use, it&amp;#8217;s not going to cut it.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Audit who currently has access to what. &lt;/strong&gt;Check the user lists on your most sensitive tools and if any names on there come as a surprise.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Replace shared logins with individual accounts.&lt;/strong&gt; While it&amp;#8217;s easy to share logins in a password manager, it&amp;#8217;s not a best practice: Shared logins reduce visibility at the account level, making it harder to identify and react to a breach.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Make multi-factor authentication a requirement.&lt;/strong&gt; MFA is one of the most effective protections available — but only when it&amp;#8217;s enforced by default, not left as an optional setting.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Make offboarding systematic.&lt;/strong&gt; Every departure, whether it’s an employee, contractor, or vendor, should trigger an access review immediately rather than as an afterthought.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Want to know what else you could learn from our survey of 3,000 business leaders across six key markets? Read more in our SMB Cybersecurity Report 2026. You&amp;#8217;ll learn what causes breaches and what they actually cost, where human error shows up most often, how cloud and AI adoption are creating new blind spots. It also includes practical steps for beefing up protection that hold up in real-world conditions.&lt;/p&gt;



&lt;div class=&quot;text-center&quot;&gt;&lt;a class=&quot;btn inline-block rounded-full font-bold btn-small btn-solid-purple&quot; href=&quot;https://proton.me/business/smb-cybersecurity-report&quot;&gt;Get the full report&lt;/a&gt;&lt;/div&gt;
</content:encoded><category>For business</category><author>Risa Tang</author></item><item><title>Proton Calendar now includes secure appointment scheduling</title><link>https://proton.me/business/blog/appointment-scheduling</link><guid isPermaLink="true">https://proton.me/business/blog/appointment-scheduling</guid><description>Share a public booking page where your colleagues, clients, or friends can schedule meetings based on your availability.</description><pubDate>Thu, 09 Apr 2026 11:53:31 GMT</pubDate><content:encoded>
&lt;p&gt;In the 12 years since Proton began, millions of people have joined our mission to make the internet safer and more private, including over 100,000 businesses and nonprofits. They rely on Proton&amp;#8217;s encrypted suite to protect their customers and teams, and we&amp;#8217;ve continued to add more services and plans to support them — most recently with the launch of &lt;a href=&quot;https://proton.me/business/blog/proton-workspace&quot;&gt;Proton Workspace&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;Today we&amp;#8217;re excited to announce the next addition to Proton Workspace with our secure &lt;a href=&quot;https://proton.me/business/mail/appointment-scheduling&quot;&gt;appointment scheduling tool&lt;/a&gt; in Proton Calendar.&lt;/p&gt;



&lt;p&gt;Whether you work with teams, run a side hustle, or take appointments from customers, you can now easily create public booking pages that show when you&amp;#8217;re available, and your clients and colleagues can book an appointment in seconds. It automatically creates a new event on your calendar and generates a private &lt;a href=&quot;https://proton.me/business/meet&quot;&gt;Proton Meet&lt;/a&gt; link where you can have a secure video call. New events are zero-access encrypted, so all the details stay between you and your contact. Not even we have access.&lt;/p&gt;



&lt;p&gt;For people dependent on platforms like Calendly, this means you no longer have to pay an extra subscription or give away calendar data to third-party services where it can be leaked or spied on. It&amp;#8217;s a perfect tool if your business is based on appointments or if you want to save time finding an available slot to meet with colleagues or friends.&lt;/p&gt;



&lt;p&gt;And it&amp;#8217;s available in our new &lt;a href=&quot;https://proton.me/business/blog/proton-workspace&quot;&gt;Proton Workspace&lt;/a&gt; plan, which combines all our business productivity tools into a single plan for complete data protection.&lt;/p&gt;



&lt;div class=&quot;text-center&quot;&gt;&lt;a class=&quot;btn inline-block rounded-full font-bold btn-small btn-solid-purple&quot; href=&quot;https://proton.me/business/mail/pricing&quot;&gt;Try scheduling for teams&lt;/a&gt;&lt;/div&gt;



&lt;p class=&quot;has-text-align-center&quot;&gt;&lt;a href=&quot;https://proton.me/mail/pricing&quot;&gt;Explore plans for individuals&lt;/a&gt;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Part of a seamless encrypted workspace&lt;/h2&gt;



&lt;p&gt;The new appointment scheduling tool is fully integrated with Proton Calendar and Proton Meet to protect your business data end to end.&lt;/p&gt;



&lt;p&gt;That&amp;#8217;s important because your team calendar contains a trove of information about you and your business activities: your location, your priorities, and your contacts. It&amp;#8217;s critical to keep that information protected from Big Tech platforms that could monetize or leak it, and from hackers who could use it against you for fraud or phishing attacks. Using a third-party booking platform spreads your information across the internet and increases your risk of a data breach, especially when those tools don&amp;#8217;t use strong encryption.&lt;/p&gt;



&lt;p&gt;Appointment scheduling bridges two fundamental business tools: Proton Calendar and the all-new Proton Meet for encrypted video calls. It&amp;#8217;s not enough for a business to be able to plan and host a secure video conference — they also need to be able to schedule it. Our appointment scheduling tool fills this gap.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;How appointment scheduling works&lt;/h2&gt;



&lt;p&gt;Appointment scheduling is simple to set up, and it&amp;#8217;s available on all paid Proton Mail plans, Proton bundles, Meet Professional, and Proton Workspace. Teams with Workspace can create up to 25 booking pages to support multiple meeting purposes and durations.&lt;/p&gt;



&lt;figure class=&quot;wp-block-image size-large&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;538&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_538,c_scale/f_auto,q_auto/v1775743341/wp-pme/20260408-calendar-update-inline-1/20260408-calendar-update-inline-1.png?_i=AA&quot; alt=&quot;Depiction of the user interface that shows the booking page and how it looks to schedule an appointment&quot; class=&quot;wp-post-116956 wp-image-117006&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;424 KB&quot; data-optsize=&quot;84 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;80.1&quot; data-version=&quot;1775743341&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_538,c_scale/f_auto,q_auto/v1775743341/wp-pme/20260408-calendar-update-inline-1/20260408-calendar-update-inline-1.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_158,c_scale/f_auto,q_auto/v1775743341/wp-pme/20260408-calendar-update-inline-1/20260408-calendar-update-inline-1.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_403,c_scale/f_auto,q_auto/v1775743341/wp-pme/20260408-calendar-update-inline-1/20260408-calendar-update-inline-1.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_806,c_scale/f_auto,q_auto/v1775743341/wp-pme/20260408-calendar-update-inline-1/20260408-calendar-update-inline-1.png?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1075,c_scale/f_auto,q_auto/v1775743341/wp-pme/20260408-calendar-update-inline-1/20260408-calendar-update-inline-1.png?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_823,c_scale/f_auto,q_auto/v1775743341/wp-pme/20260408-calendar-update-inline-1/20260408-calendar-update-inline-1.png?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;



&lt;p&gt;In your Proton Calendar, just add a new booking page, give it a name, and specify the times you&amp;#8217;re available. Your booking page will have a link that you can share publicly, such as on your website, email signature, or social media profile.&lt;/p&gt;



&lt;p&gt;Whenever someone books a meeting with you, the event will instantly sync directly to your calendar (so it&amp;#8217;s not possible to double book). And your contact will receive a confirmation email. If you&amp;#8217;ve selected Proton Meet as the location for the meeting, the confirmation will include a secure meeting link.&lt;/p&gt;



&lt;p&gt;The time, description, and participants on every event are &lt;a href=&quot;https://proton.me/security/zero-access-encryption&quot;&gt;zero-access encrypted&lt;/a&gt;, meaning it&amp;#8217;s locked with your private &lt;a href=&quot;https://proton.me/learn/encryption&quot;&gt;encryption key&lt;/a&gt; and can&amp;#8217;t be accessed by Proton or anyone else.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/support/calendar-appointment-scheduling&quot;&gt;&lt;em&gt;Learn more about how to use appointment scheduling&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Power your growth with Proton Calendar&lt;/h2&gt;



&lt;p&gt;With appointment scheduling, Proton Calendar becomes more than just a way to track your schedule — it&amp;#8217;s a way to grow your business or side project. If you&amp;#8217;re a professional service provider, letting clients book meetings is a core part of your business model. But even if your business doesn&amp;#8217;t run on external meetings, the appointment scheduling tool can help you save time or be more available to your team.&lt;/p&gt;



&lt;p&gt;Appointment scheduling is perfect for:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Privacy-first providers like therapists, health clinics, law firms, and financial advisers&lt;/li&gt;



&lt;li&gt;Managers or executives looking to save time when setting up meetings&lt;/li&gt;



&lt;li&gt;Tutors scheduling time with students or professors hosting office hours&lt;/li&gt;



&lt;li&gt;People who work for themselves, like content creators, indie hackers, or marketplace sellers &lt;/li&gt;



&lt;li&gt;Anyone with a side project&lt;/li&gt;



&lt;li&gt;And many more business professionals&amp;#8230;&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Securing your meetings isn&amp;#8217;t just about protecting your own business, it&amp;#8217;s also about protecting the people you do business with. When it comes to fields like healthcare, data protection is even an ethical and legal obligation. Appointment scheduling in Proton Calendar helps you meet those obligations while signaling to your customers that your business takes security seriously.&lt;/p&gt;



&lt;div class=&quot;text-center&quot;&gt;&lt;a class=&quot;btn inline-block rounded-full font-bold btn-small btn-solid-purple&quot; href=&quot;https://proton.me/business&quot;&gt;Explore Proton Workspace&lt;/a&gt;&lt;/div&gt;
</content:encoded><category>For business</category><category>Proton Calendar</category><author>Anant Vijay Singh</author></item><item><title>Age checks and child safety: Online age verification systems fail to protect
children </title><link>https://proton.me/blog/online-age-verification-child-safety</link><guid isPermaLink="true">https://proton.me/blog/online-age-verification-child-safety</guid><description>Do online age verification systems improve child safety? See how age restrictions and age checks fall short, and what that means for privacy and protection.</description><pubDate>Wed, 08 Apr 2026 21:03:03 GMT</pubDate><content:encoded>
&lt;p&gt;Online age checks are intended to keep violent, sexually explicit or other age-inappropriate content away from children. But do they?&lt;/p&gt;



&lt;p&gt;Under-age social media users are often able to circumvent age restrictions, especially at the account-creation stage, &lt;a href=&quot;https://www.scitepress.org/Papers/2025/132483/132483.pdf&quot;&gt;research shows&lt;/a&gt;. In other cases, age checks have blocked children from accessing content that was later determined to pose no risk.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;When faced with obvious harms, the desire to “do something” is understandable. But we need a higher standard. When it comes to children, we need to do something &lt;em&gt;that works&lt;/em&gt;. And age verification as it is currently practiced often falls short of that basic goal.&amp;nbsp;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Age checks are rooted in real concerns&lt;/h2&gt;



&lt;p&gt;Most parents of adolescents in the United States worry about social media’s effects on mental health, among other issues, according to the US &lt;a href=&quot;https://www.hhs.gov/sites/default/files/sg-youth-mental-health-social-media-advisory.pdf&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;surgeon general&lt;/a&gt;. At the same time, parents are concerned about the scope of age checks. In a &lt;a href=&quot;https://cdt.org/wp-content/uploads/2025/08/2025-08-22-CDT-Research-Brief-on-Age-Verification-1.pdf&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;study&lt;/a&gt; by the nonpartisan Center for Democracy &amp;amp; Technology, parents and teenagers voiced concerns about the checks’ effectiveness, data privacy, and user agency. &lt;/p&gt;



&lt;p&gt;At their core, age-verification systems aim to prevent young people from accessing harmful or adult-geared content, but many critics have warned that even well-intentioned policies could create risks to free speech and data privacy for all internet users, not just children.&lt;/p&gt;



&lt;p&gt;What’s considered harmful depends on whom you ask. Industry regulations, state laws, and national policies can all dictate which content is deemed harmful to young people, but some language is more vague than others.&lt;/p&gt;



&lt;p&gt;The United Kingdom’s Online Safety Act, for example, lays out categories of content that children must be shielded from online. They include: &lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Pornography&lt;/li&gt;



&lt;li&gt;Content that encourages, promotes, or provides instructions for:
&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Self-harm,&lt;/li&gt;



&lt;li&gt;Eating disorders, or&lt;/li&gt;



&lt;li&gt;Suicide&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;



&lt;li&gt;Bullying&lt;/li&gt;



&lt;li&gt;Abusive or hateful content&lt;/li&gt;



&lt;li&gt;Content which depicts or encourages serious violence or injury&lt;/li&gt;



&lt;li&gt;Content which encourages dangerous stunts and challenges&lt;/li&gt;



&lt;li&gt;Content which encourages the ingestion, inhalation or exposure to harmful substances&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;In Australia, the move to ban social media accounts belonging to people younger than 16 more broadly cites concerns about screen time and mental health.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Whether these measures effectively shield young people from harm is debated.&amp;nbsp;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Content restrictions don’t always get it right&amp;nbsp;&lt;/h2&gt;



&lt;p&gt;Some researchers have warned that age checks could impede access to medically accurate sexual information and other educational content.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;After the U.K. Online Safety Act took effect, &lt;a href=&quot;https://www.ofcom.org.uk/siteassets/resources/documents/online-safety/research-statistics-and-data/os-standards/online-safety-in-2025-summary-of-the-technology-sectors-response-to-our-rules.pdf?v=408836&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;the government noted&lt;/a&gt; “instances of over-moderation” in which children were blocked from viewing content that didn’t pose a risk. &lt;/p&gt;



&lt;p&gt;Even with age-check systems in place, ​​potentially harmful and age-inappropriate content remains accessible to kids. In some cases, childhood deaths have been linked to suicide- and self-harm-related content and risk-taking social media challenges, according to the surgeon general’s advisory.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;The same advisory, however, noted that social media can be a source of positive community, connection, self-expression, and important information.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Age-gating access to those corners of the internet stands to disproportionately affect young people who rely on online communities for support and information.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Measures put in place to label content and guard children from age-inappropriate material have also been flawed.&lt;/p&gt;



&lt;p&gt;In September, &lt;a href=&quot;https://proton.me/blog/disney-coppa-fine&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Disney agreed to pay $10 million to settle allegations&lt;/a&gt; by the Federal Trade Commission, which accused the company of failing to label its children’s videos on YouTube as “Made for Kids.” &lt;/p&gt;



&lt;p&gt;Failing to correctly label the videos meant Disney collected children’s personal information when they watched the unlabeled content and autoplayed “Not Made for Kids” videos when they finished. Children also became targets of online advertisements geared toward older viewers.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Disney didn’t admit any wrongdoing as part of the settlement.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Are age verification systems effective? More research is needed&lt;/h2&gt;



&lt;p&gt;The effectiveness of age checks remains to be seen.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;In the weeks after Australia’s policy took effect, social media companies &lt;a href=&quot;https://www.pbs.org/newshour/world/social-media-platforms-removed-4-7-million-accounts-after-australia-banned-them-for-children-younger-than-16&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;revoked access to about 4.7 million accounts&lt;/a&gt; belonging to children. &lt;/p&gt;



&lt;p&gt;Findings from a &lt;a href=&quot;https://pmc.ncbi.nlm.nih.gov/articles/PMC11429505/#sec7-children-11-01068:~:text=However%2C%20with%20regards%20to%20the%20deployment%20of%20these%20new%2Dage%20verification%20controls%2C%20there%20remains%20a%20question%20on%20how%20effective%20the%20legislation%20will%20be%20when%20responsibility%20for%20how%20to%20satisfy%20legislation%20is%20assigned%20without%20the%20adequate%20guidance%20and%20support.&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;2024 study&lt;/a&gt; suggest that the widespread global deployment of age verification has resulted in privacy-invasive or ineffective methods. &lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://www.ofcom.org.uk/siteassets/resources/documents/online-safety/research-statistics-and-data/os-standards/online-safety-in-2025-summary-of-the-technology-sectors-response-to-our-rules.pdf?v=408836&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Research&lt;/a&gt; from the U.K.’s independent online safety regulator, the Office of Communications, pointed to some measurable changes in internet behavior, but it’s still too soon to evaluate effectiveness. &lt;/p&gt;



&lt;p&gt;The number of visitors to pornography sites in the U.K. declined by one-third since the Online Safety Act took effect in July, the office noted in a December &lt;a href=&quot;https://www.ofcom.org.uk/siteassets/resources/documents/online-safety/research-statistics-and-data/os-standards/online-safety-in-2025-summary-of-the-technology-sectors-response-to-our-rules.pdf?v=408836&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;online safety report&lt;/a&gt;. The office is assessing how much the decline may have reduced children’s exposure to pornography. &lt;/p&gt;



&lt;p&gt;“While it is too soon to assess the long-term impact of these changes, the widespread adoption of age checks means that children of all ages are now less likely to encounter pornography accidentally, which research has shown to be the way most children encounter porn,” the report said.&lt;/p&gt;



&lt;p&gt;The office is expected to publish its initial data and analysis on children’s online experiences by May.&amp;nbsp;&lt;/p&gt;
</content:encoded><category>Privacy news</category><author>Edward Komenda</author></item><item><title>What happens after age-verification laws take effect: The chilling effect of
online age and ID checks</title><link>https://proton.me/blog/age-verification-laws-chilling-effect</link><guid isPermaLink="true">https://proton.me/blog/age-verification-laws-chilling-effect</guid><description>Age verification laws are reshaping the internet. See how ID checks, age filters, and platform rules create chilling effects on speech, access, and privacy.</description><pubDate>Wed, 08 Apr 2026 16:42:31 GMT</pubDate><content:encoded>
&lt;p&gt;Governments around the world are adopting laws intended to protect young people online. Age verification has emerged as a shared policy response, but in practice it produces &lt;a href=&quot;https://www.oecd.org/content/dam/oecd/en/publications/reports/2025/06/the-legal-and-policy-landscape-of-age-assurance-online-for-child-safety-and-well-being_cdf49a15/4a1878aa-en.pdf&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;very different internets&lt;/a&gt; shaped by unique legal, technical, and social conditions.&lt;/p&gt;



&lt;p&gt;These case studies show what happens after age-verification laws take effect, focusing on three distinct models: decentralized legal experimentation, direct regulatory enforcement, and platform duty-of-care obligations. Together, they demonstrate how a single policy idea evolves when it moves into the real world.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;United States&lt;/h2&gt;



&lt;p&gt;The U.S. exemplifies how age verification can spread without a national law. State legislation, court challenges, and platform responses have collectively reshaped online access, creating diverse outcomes across the country.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;What was proposed&lt;/h3&gt;



&lt;p&gt;Federal lawmakers tried long ago to age-gate adult content on the internet. The Child Online Protection Act, passed by Congress in 1998, required commercial websites hosting material deemed harmful to minors to restrict access, often through age-verification mechanisms. Courts blocked the law repeatedly on First Amendment grounds, and it was ultimately struck down after years of litigation. The rulings reinforced protections for lawful online speech, including concerns about overbroad restrictions and the impact on anonymous access, shaping how later policymakers approached age-verification proposals.&lt;/p&gt;



&lt;p&gt;Beginning in 2022, states began introducing legislation requiring adult-content sites to verify age, with early efforts in &lt;a href=&quot;https://www.legis.la.gov/Legis/ViewDocument.aspx?d=1287238&amp;amp;&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Louisiana&lt;/a&gt; and &lt;a href=&quot;https://le.utah.gov/~2023/bills/static/SB0287.html&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Utah&lt;/a&gt; helping establish a template that other jurisdictions soon followed. Lawmakers framed these measures as &lt;a href=&quot;https://www.congress.gov/crs-product/R47884&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;child-protection policies&lt;/a&gt; inspired by international proposals.&lt;/p&gt;



&lt;p&gt;In lieu of a centralized system, these laws typically made platforms responsible for preventing underage access. Sites could face civil penalties—including fines, private lawsuits, or court-ordered restrictions—if minors accessed restricted content without “reasonable” safeguards in place.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;What was implemented&lt;/h3&gt;



&lt;p&gt;States &lt;a href=&quot;https://apnews.com/article/porn-age-verification-utah-8f8f4960ad1ec4afc5d59fd7d34c3b9d&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;rolled out age-verification requirements&lt;/a&gt; aimed primarily at porn sites and other explicit content.&lt;/p&gt;



&lt;p&gt;Texas quickly became the bellwether legal test case. Challenges to &lt;a href=&quot;https://capitol.texas.gov/tlodocs/88R/billtext/html/HB01181H.htm&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Texas HB 1181&lt;/a&gt; moved through federal courts and ultimately reached the U.S. Supreme Court, where justices &lt;a href=&quot;https://www.scotusblog.com/2025/06/court-allows-texas-law-on-age-verification-for-pornography-sites/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;allowed the law to take effect&lt;/a&gt; in the midst of legal challenges. The decision signaled that state-level mandates could proceed without definitive resolution.&lt;/p&gt;



&lt;p&gt;That opened the door for other states to advance similar laws alongside &lt;a href=&quot;https://apnews.com/article/porn-age-verification-utah-lawsuit-db5649d2030cb75d652cd55c51513d38&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;ongoing litigation&lt;/a&gt;. Because each state set different standards and timelines—and because legal language left a lot of room for interpretation—there was no uniform technical solution, leaving platforms to navigate a rapidly expanding patchwork of regulatory demands.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;What changed&lt;/h3&gt;



&lt;p&gt;Rather than uniformly changing how age is treated and proven online, policy pressure changed the internet itself.&lt;/p&gt;



&lt;p&gt;Compliance became a risk calculation for platforms, as they weighed verification costs, liability, and privacy issues. Some—ranging from &lt;a href=&quot;https://www.pcmag.com/news/pornhub-blocked-23-us-states-france-uk-how-to-watch-anyway-free-vpn&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;adult-content sites&lt;/a&gt; to &lt;a href=&quot;https://www.wired.com/story/bluesky-goes-dark-in-mississippi-age-verification/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;social media&lt;/a&gt;—chose to restrict or withdraw services in affected states. Access began to depend on geographic location, producing a fragmented online experience.&lt;/p&gt;



&lt;p&gt;Proposals and laws have increasingly targeted &lt;a href=&quot;https://utahnewsdispatch.com/2026/02/05/tech-companies-lawsuit-utah-age-verification-law-for-app-stores/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;app stores&lt;/a&gt; and other digital intermediaries, shifting responsibility from individual sites to infrastructure providers. This lets policymakers gauge whether age gating can work at the ecosystem level.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Public reaction&lt;/h3&gt;



&lt;p&gt;Americans are sharply divided. Supporters argue that state laws finally imposed accountability on large platforms after years of failed federal legislation, reflecting a &lt;a href=&quot;https://www.politico.com/news/2026/02/21/online-age-newsom-social-media-00791870&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;growing view&lt;/a&gt; among policymakers that voluntary safeguards are not enough to protect minors online. Critics, including &lt;a href=&quot;https://www.aclupa.org/app/uploads/2024/04/aclu_national_age_verification_and_restricting_online_content_2023-12-07.pdf&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;civil-liberties organizations&lt;/a&gt; and &lt;a href=&quot;https://www.eff.org/issues/age-verification&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;digital-rights advocates&lt;/a&gt;, warn that mandatory age verification chills lawful speech and weakens protections for anonymous expression.&lt;/p&gt;



&lt;p&gt;Litigation is the central arena for resolving these tensions, and state attorneys general are the front-line enforcers. As challenges move through the courts, judges continue to grapple with whether mandates constitute permissible regulation or unconstitutional restriction.&lt;/p&gt;



&lt;p&gt;As a result, America&amp;#8217;s internet is an experiment moving further from legal clarity, even as age verification spreads.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Age verification in the U.S. – litigation model&lt;/h3&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;States enact age-verification laws&lt;/li&gt;



&lt;li&gt;Courts determine what survives legal challenge&lt;/li&gt;



&lt;li&gt;Platforms adapt to evolving rulings&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;&lt;strong&gt;Focus:&lt;/strong&gt; Legal viability&lt;br&gt;&lt;strong&gt;Outcome:&lt;/strong&gt; Policy is shaped by litigation outcomes&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;United Kingdom&lt;/h2&gt;



&lt;p&gt;After decades of global debate over online safety for minors, the UK became the first country to enforce modern age assurance on a national scale.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;What was proposed&lt;/h3&gt;



&lt;p&gt;Early UK media regulation, particularly the &lt;a href=&quot;https://www.legislation.gov.uk/ukpga/2003/21/contents&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Communications Act 2003&lt;/a&gt;, established content protections for minors in broadcast and on-demand services, but it didn&amp;#8217;t address open internet access to pornography.&lt;/p&gt;



&lt;p&gt;Under the &lt;a href=&quot;https://www.legislation.gov.uk/ukpga/2017/30/contents&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Digital Economy Act 2017&lt;/a&gt;, the original plan was to mandate age checks for access to adult content, requiring age-verification technology specifically. That plan was repeatedly delayed and finally &lt;a href=&quot;https://arstechnica.com/tech-policy/2019/10/uk-government-abandons-planned-porn-age-verification-scheme/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;abandoned in 2019&lt;/a&gt; amid privacy concerns and the practical challenges of enforcing rules against services operating outside the UK.&lt;/p&gt;



&lt;p&gt;Instead of prescribing how content is gated, the &lt;a href=&quot;https://www.legislation.gov.uk/ukpga/2023/50&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Online Safety Act 2023&lt;/a&gt; regulates outcomes, requiring services to deploy “highly effective” age-assurance measures and demonstrate how effectively they protect minors.&lt;/p&gt;



&lt;p&gt;This created a broader safety framework, enforcing platform responsibility through performance standards that extend beyond sites offering adult content.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;What was implemented&lt;/h3&gt;



&lt;p&gt;Implementation fell to UK communications regulator Ofcom. It &lt;a href=&quot;https://www.ofcom.org.uk/online-safety/illegal-and-harmful-content/online-safety-regulatory-documents&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;outlined expectations&lt;/a&gt; for platforms, requiring age-assurance systems capable of reliably distinguishing adults from minors, with enforcement backed by investigation and financial penalties.&lt;/p&gt;



&lt;p&gt;Ofcom didn’t specify a method. Companies could use identity-document checks, biometric estimation, third-party verification vendors, or alternative approaches—provided they met Ofcom&amp;#8217;s effectiveness thresholds. This flexibility led to a rapid, albeit uneven, rollout of age verification.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;What changed&lt;/h3&gt;



&lt;p&gt;The UK&amp;#8217;s internet transitioned from an open-access model moderated after the fact to one requiring proof of eligibility to enter certain spaces.&lt;/p&gt;



&lt;p&gt;When &lt;a href=&quot;https://www.theguardian.com/technology/2025/jul/24/what-are-the-new-uk-online-safety-rules-and-how-will-they-be-enforced&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;enforcement&lt;/a&gt; timelines arrived in 2025, major platforms began modifying access flows, and users began encountering checkpoints where none had existed before. These age checks were embedded in account creation, browsing activity, and content discovery, and that affected anonymity, friction, and participation online.&lt;/p&gt;



&lt;p&gt;For platforms, age assurance became a continuous compliance obligation subject to interpretation, audit, and penalty; and it proved hard to define. Ofcom opened &lt;a href=&quot;https://www.reuters.com/world/uk/uk-probes-34-porn-sites-under-new-age-check-rules-2025-07-31/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;investigations into dozens of porn sites&lt;/a&gt; and issued penalties against operators whose age-assurance measures didn&amp;#8217;t meet the standard. In this way, acceptable gates evolved through strict enforcement actions.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Public reaction&lt;/h3&gt;



&lt;p&gt;Public response has been mixed as to whether the system represents overdue protection or&lt;a href=&quot;https://www.theguardian.com/commentisfree/2025/aug/09/uk-online-safety-act-internet-censorship-world-following-suit&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt; risky overreach&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;Among the &lt;a href=&quot;https://www.eff.org/pages/uk-online-safety-bill-massive-threat-online-privacy-security-and-speech&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;concerns raised by privacy advocates&lt;/a&gt; are assertions that mandatory age-assurance normalizes identity checks for lawful activity, expands collection of sensitive data, and threatens anonymity for users who rely on it for freedom to explore and express themselves.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://www.wired.com/story/vpn-use-spike-age-verification-laws-uk/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Spikes in VPN use&lt;/a&gt; have been reported, suggesting that some UK users prefer workarounds to participation in verification systems. Others question the effectiveness of age gates, including some young users who&amp;#8217;ve argued that they limit access without resolving &lt;a href=&quot;https://www.lbc.co.uk/article/im-a-teenager-online-safety-act-government-5HjdChs_2/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;underlying harms&lt;/a&gt;. Still others say critics should give these protections &lt;a href=&quot;https://blogs.lse.ac.uk/politicsandpolicy/criticism-of-the-online-safety-act-is-premature/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;time to prove out&lt;/a&gt;, framing the law as a necessary adaptation to a changed digital environment.&lt;/p&gt;



&lt;p&gt;The UK&amp;#8217;s experience shows how age-verification policy alters the internet through cumulative shifts in access, accountability, and user behavior—changes that remain &lt;a href=&quot;https://hansard.parliament.uk/commons/2025-12-15/debates/DA0F7CFE-CCED-4864-BCCF-160E0AF56F92/OnlineSafetyAct2023Repeal&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;contested&lt;/a&gt;.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Age verification in the UK – enforcement model&lt;/h3&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Parliament sets safety outcomes&lt;/li&gt;



&lt;li&gt;Regulator enforces platform compliance&lt;/li&gt;



&lt;li&gt;Age verification operates as an access gate&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;&lt;strong&gt;Focus:&lt;/strong&gt; Access control&lt;br&gt;&lt;strong&gt;Outcome:&lt;/strong&gt; Users must demonstrate eligibility to enter restricted spaces&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Australia&lt;/h2&gt;



&lt;p&gt;Australia has drawn international attention for its &lt;a href=&quot;https://www.esafety.gov.au/research/youth-engagement-and-online-safety&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;online youth-safety agenda&lt;/a&gt;, where age checks emerge from platform duty-of-care obligations instead of a standalone age-verification law.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;What was proposed&lt;/h3&gt;



&lt;p&gt;Australia’s &lt;a href=&quot;https://www.aph.gov.au/Parliamentary_Business/Bills_LEGislation/Bills_Search_Results/Result?bId=r6680&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Online Safety Act 2021&lt;/a&gt; built on earlier regulatory frameworks (&lt;a href=&quot;https://www.legislation.gov.au/C2004A04401/2020-12-18/text&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;1992&lt;/a&gt;, &lt;a href=&quot;https://www.legislation.gov.au/C2015A00024/latest/versions&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;2015&lt;/a&gt;, and &lt;a href=&quot;https://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/Bills_Search_Results/Result?bId=s1113&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;2018&lt;/a&gt;) that relied largely on complaint-based takedowns of harmful content. Policymakers concluded that reactive removals were insufficient and shifted toward requiring large platforms to &lt;a href=&quot;https://www.infrastructure.gov.au/media-technology-communications/internet/online-safety/current-legislation&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;reduce risks up front&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;The Act significantly expanded the authority of the &lt;a href=&quot;https://www.infrastructure.gov.au/media-technology-communications/internet/online-safety/esafety-commissioner&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;e Safety Commissioner&lt;/a&gt;, turning the regulator from a complaint handler into a proactive supervisor of online safety. Rather than prescribing specific verification methods, the law made platforms responsible for preventing foreseeable harms to minors.&lt;/p&gt;



&lt;p&gt;This shift laid the groundwork for age assurance by binding platform compliance to the ability to distinguish between adult and underage users.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;What was implemented&lt;/h3&gt;



&lt;p&gt;Implementation centered on &lt;a href=&quot;https://www.esafety.gov.au/industry/regulatory-guidance&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;regulatory guidance&lt;/a&gt; and &lt;a href=&quot;https://www.esafety.gov.au/sites/default/files/2024-10/Compliance-and-Enforcement-Policy-Oct2024.pdf&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;enforcement powers&lt;/a&gt; exercised by the eSafety Commissioner. Platforms were required to show how their services reduced risks to underage users, guided by regulator-approved safety standards and ongoing oversight.&lt;/p&gt;



&lt;p&gt;In practice, this meant strengthening moderation systems, activating parental controls, restricting features for younger users and developing mechanisms capable of identifying them. So platforms deployed age-assurance measures such as age estimation, behavioral-detection systems, and layered verification approaches combining multiple signals to assess a user’s age, often trialed through government-supported &lt;a href=&quot;https://ageassurance.com.au/wp-content/uploads/2025/08/AATT_Part_D_DIGITAL.pdf&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;technology testing programs&lt;/a&gt;. Age assurance therefore functioned less as a single checkpoint and more as an ongoing compliance capability embedded in everyday service operation.&lt;/p&gt;



&lt;p&gt;In December 2025, Australia extended this duty-of-care strategy through a &lt;a href=&quot;https://www.reuters.com/legal/litigation/australia-social-media-ban-takes-effect-world-first-2025-12-09/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;world-first social media ban&lt;/a&gt; for users under 16, explicitly conditioning access to major platforms on the ability to determine a user’s age.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;What changed&lt;/h3&gt;



&lt;p&gt;For platforms, safety obligations became continuous and adaptive. Meeting regulatory expectations increasingly required systems capable of reliably distinguishing minors from adults, turning age assurance from an optional safeguard into a prerequisite for enforcing youth-access restrictions.&lt;/p&gt;



&lt;p&gt;For users, changes ranged from stricter defaults and safety features to &lt;a href=&quot;https://www.reuters.com/world/asia-pacific/australia-social-media-ban-hits-47-million-teen-accounts-first-month-2026-01-15/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;large-scale deactivation of accounts&lt;/a&gt; identified as belonging to underage users.&lt;/p&gt;



&lt;p&gt;The result was deeper regulatory influence without universal identity-based age verification, reflecting a &lt;a href=&quot;https://www.esafety.gov.au/research&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;research-driven model&lt;/a&gt; that evaluates safety outcomes and emerging age-assurance tools instead of defaulting to biometric or document-based checks.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Public reaction&lt;/h3&gt;



&lt;p&gt;Australia’s approach has generated praise and concern, both inside and outside the country.&lt;/p&gt;



&lt;p&gt;Proponents argue that &lt;a href=&quot;https://www.unsw.edu.au/newsroom/news/2025/04/australians-want-action-to-protect-children-online-new-poll&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;platform design shapes online risk&lt;/a&gt; more than individual behavior alone, and that regulating platforms offers governments a more practical point of intervention. Critics believe that expanding safety mandates fails to adequately protect children and offers a &lt;a href=&quot;https://efa.org.au/efa-joins-opposition-to-australias-porn-passport/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;quick fix&lt;/a&gt; to complex social and political problems.&lt;/p&gt;



&lt;p&gt;As debate intensifies over whether enforcement will ultimately require more invasive age checks, this case shows that when governments regulate platform responsibility first, age verification can be a practical consequence.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Age verification in Australia – governance model&lt;/h3&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Platforms continuously manage risks to minors&lt;/li&gt;



&lt;li&gt;Regulator supervises platform safety systems&lt;/li&gt;



&lt;li&gt;Age verification operates as one of many embedded compliance tools&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;&lt;strong&gt;Focus:&lt;/strong&gt; System design and ongoing oversight&lt;br&gt;&lt;strong&gt;Outcome:&lt;/strong&gt; Platforms must demonstrate their environments are safe for minors&lt;/p&gt;
</content:encoded><category>Privacy news</category><author>Edward Komenda</author></item><item><title>What age verification actually means (and why the term is misleading)</title><link>https://proton.me/blog/age-verification</link><guid isPermaLink="true">https://proton.me/blog/age-verification</guid><description>What is age verification? Learn how age verification systems, software, and age checks work, including age estimation, age filters, and privacy risks.</description><pubDate>Wed, 08 Apr 2026 16:05:22 GMT</pubDate><content:encoded>
&lt;p&gt;The days of the checkbox honor system are ending as efforts to age-gate the internet spread worldwide. The goal of protecting children is widely embraced: Age should be checked for access to certain content or sometimes &lt;a href=&quot;https://proton.me/blog/australia-social-media-ban-privacy&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;entire platforms&lt;/a&gt;, as young people are exposed to legitimate risks when left to explore and engage without guardrails.        &lt;/p&gt;



&lt;p&gt;But the methods of checking age—both the existing ways and those forming under intense regulatory pressure—&lt;a href=&quot;https://cetas.turing.ac.uk/publications/age-assurance-technologies-and-online-safety&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;vary significantly&lt;/a&gt; in effectiveness and intrusiveness. From one approach to the next, there are stark differences in how much data is collected and who controls it. Regardless of the method, the most consequential moment is the point where age is actually checked. The mechanics of that interaction, and how its outcomes are handled, drive real-world implications for &lt;a href=&quot;https://www.techpolicy.press/when-age-gating-puts-user-privacy-at-risk/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;privacy&lt;/a&gt;, &lt;a href=&quot;https://iacis.org/iis/2025/4_iis_2025_332-347.pdf&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;security&lt;/a&gt;, and &lt;a href=&quot;https://archive.org/details/effecting-change-the-human-cost-of-online-age-verification&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;free expression&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;Yet the distinctions are often blurred, stemming from the &lt;a href=&quot;https://www.eff.org/deeplinks/2025/10/age-verification-estimation-assurance-oh-my-guide-terminology&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;terminology&lt;/a&gt; around age checks. Age gating, age assurance, age estimation, and age verification can get collapsed into a single idea. Understanding why that matters starts with breaking down the language.   &lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Standards versus methods&lt;/h2&gt;



&lt;p&gt;&lt;strong&gt;Age gating&lt;/strong&gt; and &lt;strong&gt;age assurance&lt;/strong&gt; are standards—&lt;strong&gt;policy goals that describe intent and confidence&lt;/strong&gt;, not mechanism. Age gating tells you that an age-based restriction exists. Age assurance signals that some effort is being made to enforce that restriction. These terms don’t specify how, or how effectively, age is determined.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Age estimation&lt;/strong&gt; and &lt;strong&gt;age verification&lt;/strong&gt; are methods — &lt;strong&gt;technical categories for how age is checked&lt;/strong&gt;. And the contrast is central to the debate over how age checks should happen online.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Age estimation versus age verification&lt;/h2&gt;



&lt;p&gt;As lawmakers, courts, tech companies, and advocacy groups address both the &lt;a href=&quot;https://builtin.com/articles/age-verification-laws-us-internet-debate&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;complexities and conflicts&lt;/a&gt; of age gating, the terms “age estimation” and “age verification” are sometimes treated as interchangeable. That shorthand obscures meaningful differences in accuracy, accountability, and data exposure.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Age estimation &lt;/h3&gt;



&lt;p&gt;Age estimation, also known as age assurance, is exactly what it sounds like—an inference, not a confirmation. These systems draw on data already available within a platform, such as profile photos, videos, audio, declared information (like a birth date), and account metadata (like how long an account has existed). Using biometric techniques like voice or &lt;a href=&quot;https://www.eff.org/deeplinks/2025/01/face-scans-estimate-our-age-creepy-af-and-harmful&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;facial analysis&lt;/a&gt;, combined with account history and behavioral patterns, the system generates a &lt;strong&gt;probability that someone falls within a given age range&lt;/strong&gt;. &lt;/p&gt;



&lt;p&gt;Because this doesn’t require identity documents, age estimation is often framed as “privacy-preserving.” But data exposure depends on the individual system: Is age estimated once or continually? What signals are used? &lt;a href=&quot;https://www.eff.org/deeplinks/2024/06/hack-age-verification-company-shows-privacy-danger-social-media-laws&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;How secure is the system itself&lt;/a&gt;? And if age is misread, what happens?&lt;/p&gt;



&lt;p&gt;Inference-based systems are inexact and can be fooled, such that a user’s age may be misclassified in either direction, with access allowed or denied where it shouldn’t be. On the gaming platform Roblox, which rolled out mandatory age checks for access to certain features, young users &lt;a href=&quot;https://regulaforensics.com/blog/roblox-age-verification/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;tricked the system&lt;/a&gt; with fake mustaches and other disguises, underscoring the risk of relying on inference alone.&lt;/p&gt;



&lt;p&gt;Other concerns have been raised about &lt;a href=&quot;https://nvlpubs.nist.gov/nistpubs/ir/2024/NIST.IR.8525.pdf&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;accuracy and bias&lt;/a&gt;, as results depend heavily on image quality, vary from algorithm to algorithm, and are affected by unique intersections of personal attributes, with disproportionate misreads on &lt;a href=&quot;https://www.preprints.org/manuscript/202403.1497/v1&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;under-represented groups&lt;/a&gt;. Data from Australia&amp;#8217;s age-assurance technology trial—tied to a nationwide ban on social media for teenagers—showed that age estimation produced higher error rates for people with darker skin tones and for some demographic groups, including those from Indigenous and Southeast Asian backgrounds.&lt;/p&gt;



&lt;p&gt;If eligible users are denied, &lt;a href=&quot;https://www.pcmag.com/explainers/give-us-your-face-or-lose-your-account-ai-age-verification-is-here-and?test_uuid=04IpBmWGZleS0I0J3epvMrC&amp;amp;test_variant=B&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;recourse is limited&lt;/a&gt;. They generally aren’t told why, and the default solution is to upload identity documents—the exact thing age estimation is &lt;a href=&quot;https://cdt.org/insights/age-estimation-requires-verification-for-many-users/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;meant to avoid&lt;/a&gt;.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Age verification &lt;/h3&gt;



&lt;p&gt;Age verification aims to confirm age as a fact, using &lt;strong&gt;proof from a trusted source&lt;/strong&gt;. Today, that usually means a government-issued ID like a driver’s license or passport, either uploaded directly to a platform or filtered through a third-party service that verifies age and sends back a yes-or-no result.&lt;/p&gt;



&lt;p&gt;The &lt;a href=&quot;https://proton.me/blog/discord-age-verfication-breach&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;risk of document uploads&lt;/a&gt; is intuitive: Scans can be stolen or misused, particularly as age checks spread across more services. What’s easier to miss is that even when documents are deleted from a platform, the outcome of the age check often persists—stored alongside an account or session and linking back to an identifiable user.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Identity-linked systems versus anonymous or token-based claims&lt;/h2&gt;



&lt;p&gt;Age-verification systems fall into two categories: those that bind age checks to identity and those that try not to.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Identity-linked systems&lt;/h3&gt;



&lt;p&gt;Identity-linked systems are the dominant model today, employing &lt;strong&gt;the familiar ID upload flow&lt;/strong&gt;. Platforms may not retain copies of documents, but the verification outcome is almost always stored, linking lawful content access to a real person who may not want that association recorded.&lt;/p&gt;



&lt;p&gt;Adult-content sites illustrate the conflict. In &lt;a href=&quot;https://action.freespeechcoalition.com/age-verification-resources/state-avs-laws/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;states where age-verification laws have been enacted&lt;/a&gt;, compliance has largely meant identity-linked checks, requiring users to upload IDs through third-party vendors. As a result, industry giant Pornhub &lt;a href=&quot;https://www.pornhub.com/blog/age-verification-in-the-news&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;pulled out of 23 states&lt;/a&gt;, pointing to privacy risks. The company has said it supports age verification “when it is done right,” advocating for &lt;a href=&quot;https://arstechnica.com/tech-policy/2025/11/pornhub-is-urging-tech-giants-to-enact-device-based-age-verification/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;device-level age checks&lt;/a&gt; rather than site-based age checks. &lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://www.rstreet.org/commentary/no-conscripting-the-app-stores-doesnt-solve-the-problems-with-age-verification/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Similar dynamics&lt;/a&gt; appear in app-store ecosystems, with age verification prompted at download, signup, or the account level. When the outcome of that check is tied to an account, it stops being a one-time gate and becomes an attribute, shaping how the platform understands and manages the user. That can include:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Reuse across time and contexts (future logins, enforcement actions, compliance audits)&lt;/strong&gt;&lt;strong&gt;&lt;br&gt;&lt;/strong&gt;A reusable verification result can be used long after the original check for enforcement, monitoring, or regulatory review, often without the user’s awareness or renewed consent.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Integration with other account data (access logs, platform activity, moderation records)&lt;/strong&gt;&lt;strong&gt;&lt;br&gt;&lt;/strong&gt;When age status is combined with behavioral or moderation data, it becomes part of a broader profile that can influence account treatment and content access in ways unrelated to age alone.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Users typically aren&amp;#8217;t told how long their verification status persists, where it is stored, or how it may be reused, leaving them with little ability to contest errors, revoke consent, or gauge long-term implications.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Anonymous or token-based claims&lt;/h3&gt;



&lt;p&gt;Other age-verification systems attempt to avoid or reduce identity linkage. These approaches rely on credentialed or token-based claims, both of which perform an age check once and then reuse the result to grant access later.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Credentialed claims:&lt;/strong&gt; &lt;a href=&quot;https://www.nist.gov/blogs/cybersecurity-insights/digital-identities-getting-know-verifiable-digital-credential-ecosystem&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Verifiable digital credentials&lt;/a&gt; (VDCs) rely on identity checks already performed by trusted institutions (think DMVs and banks), allowing users to confirm age online with a &lt;strong&gt;digitally signed cryptographic proof&lt;/strong&gt;—aka the issuer vouching for the age claim. Most VDCs employ &lt;a href=&quot;https://spruceid.com/learn/selective-disclosure&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;selective disclosure&lt;/a&gt;, revealing only what’s necessary to meet an age threshold (e.g., confirming that someone is “over 18”), though more advanced &lt;a href=&quot;https://spruceid.com/learn/zkp&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;zero-knowledge proofs&lt;/a&gt; aim to verify eligibility without sharing any personal data at all.&lt;/p&gt;



&lt;p&gt;Both reduce exposure at the point of access. But the privacy and security benefits depend on who issues the credential and &lt;a href=&quot;https://www.identity.org/what-is-blockchain-identity-management/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;how it&amp;#8217;s stored&lt;/a&gt;, as well as which platforms accept it inside the &lt;a href=&quot;https://regulaforensics.com/blog/worldwide-digital-id-overview/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;emerging digital-ID model&lt;/a&gt; (which carries its own impacts to privacy and &lt;a href=&quot;https://www.govtech.com/gov-experience/how-digital-ids-could-help-and-harm-people-with-disabilities&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;access&lt;/a&gt;).&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://www.experian.com/blogs/insights/what-is-token-based-authentication/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;&lt;strong&gt;Token-based claims&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;: &lt;/strong&gt;Tokens are like hand stamps at a concert; &lt;strong&gt;short-lived, site-specific proofs&lt;/strong&gt; that allow repeat access without rechecking age every time.They are typically issued after an initial verification and used internally by a platform to streamline access.While that reduces repeated data exposure within a single service, tokens don’t eliminate identity linkage at the point of issuance and offer users scant visibility into how access is remembered or reused. Users typically can’t examine, limit, or revoke these claims, which turn a one-time access decision into an ongoing state. Tokens are a platform optimization, not a rights-protecting feature.&lt;/p&gt;



&lt;p&gt;Whatever the verification pathway, the highest risk sits at the point where age is checked—and system design and implementation make all the difference.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Government-mandated versus platform-run systems&lt;/h2&gt;



&lt;p&gt;Laws define the obligation to keep young people safe online, but they are carried out by regulators, platforms, vendors, app stores, and OS providers that must &lt;a href=&quot;https://news.bloomberglaw.com/privacy-and-data-security/companies-face-influx-of-conflicting-age-verification-laws&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;interpret vague requirements&lt;/a&gt; under real operational pressure.&lt;/p&gt;



&lt;p&gt;Whether a law calls for “effective age assurance” or “privacy-preserving age verification,” it &lt;a href=&quot;https://www.thecgo.org/research/keeping-kids-safe-online-how-should-policymakers-approach-age-verification/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;rarely specifies&lt;/a&gt; exactly how the requirement should be met in terms of:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;What data must (or must not) be collected&lt;/li&gt;



&lt;li&gt;Whether a government-issued ID is required&lt;/li&gt;



&lt;li&gt;Whether age can be inferred or must be verified&lt;/li&gt;



&lt;li&gt;Whether identity must be linked to an account&lt;/li&gt;



&lt;li&gt;Whether checks happen once or continually&lt;/li&gt;



&lt;li&gt;Who stores the data and for how long&lt;/li&gt;



&lt;li&gt;Whether third-party verification is allowed&lt;/li&gt;



&lt;li&gt;What counts as “effective” or “privacy-preserving”&lt;/li&gt;



&lt;li&gt;What recourse users have when systems fail&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Such decisions are left to downstream authorities, which is why the same legal language can produce &lt;a href=&quot;https://www.brookings.edu/articles/patchwork-protection-of-minors/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;&lt;strong&gt;radically different outcomes&lt;/strong&gt;&lt;/a&gt;. These authorities are simply optimizing for different things: Regulators are optimizing for governance, platforms for liability, vendors for marketability, and infrastructure providers for uniformity. Beyond these institutional priorities, the primary concern is not democratic legitimacy or proportionality, but defensibility to show that sufficient steps were taken to prevent underage access. In that environment, ambiguity is seen as risk, and &lt;strong&gt;risk is minimized through standardization and overcompliance&lt;/strong&gt;—or through platforms pulling out of states where compliance raises both ideological and financial concerns.&lt;/p&gt;



&lt;p&gt;Social network Bluesky chose to &lt;a href=&quot;https://www.wired.com/story/bluesky-goes-dark-in-mississippi-age-verification/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;block access entirely in Mississippi&lt;/a&gt; rather than comply with a state law that would have forced it to verify age for all users and collect sensitive personal data. The platform said the requirements went beyond child safety goals and would &amp;#8220;limit free speech and disproportionately harm smaller platforms.”&lt;/p&gt;



&lt;p&gt;The most restrictive option becomes the baseline not because of public input or legislative intent, but because of operational risk management. The consequence is an abstraction of policy that narrows the practical scope of all users’ rights online.&amp;nbsp;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What is ultimately at stake&lt;/h2&gt;



&lt;p&gt;Advocacy groups &lt;a href=&quot;https://www.eff.org/issues/age-verification&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;warn&lt;/a&gt; that age gating threatens a &lt;a href=&quot;https://documents.un.org/doc/undoc/ltd/g21/173/56/pdf/g2117356.pdf&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;free and open internet&lt;/a&gt;. They argue that adults misclassified as minors can be blocked from lawful information. That users unwilling or unable to submit identity documents can be excluded entirely. That communities relying on anonymity for reasons of &lt;a href=&quot;https://www.techpolicy.press/age-verification-and-lgbtq-youth/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;safety, stigma, or self-exploration&lt;/a&gt; may find that essential information and connection now come with conditions they can&amp;#8217;t meet. And that exclusion of children from the internet that isn&amp;#8217;t &amp;#8220;necessary and proportionate&amp;#8221; &lt;a href=&quot;https://edri.org/our-work/why-age-verification-misses-the-mark-and-puts-everyone-at-risk/&quot;&gt;violates their fundamental rights&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;While the spirit of these laws is child safety, &lt;a href=&quot;https://www.pcmag.com/opinions/is-age-verification-really-keeping-kids-safe-or-just-risking-your-privacy?test_uuid=04IpBmWGZleS0I0J3epvMrC&amp;amp;test_variant=B&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;industry analysts worry&lt;/a&gt; that the legal language could be applied to any site offering content with &amp;#8220;adult themes,&amp;#8221; whether that means information about sexual health, creative image boards, or social forums.&lt;/p&gt;



&lt;p&gt;These &lt;a href=&quot;https://iapp.org/news/a/are-new-global-age-verification-requirements-creating-a-children-s-online-safety-legal-patchwork-&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;concerns&lt;/a&gt; have crystallized into &lt;a href=&quot;https://www.politico.com/news/2026/01/05/big-tech-won-in-texas-but-the-age-verification-fight-is-just-getting-started-00709160&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;ongoing legal opposition&lt;/a&gt; to age gating at both state and federal levels, despite widespread agreement that the internet should be &lt;a href=&quot;https://proton.me/blog/adolescence-internet-kids&quot;&gt;safer for young users&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;Understanding what “age verification” actually means helps clarify the challenges of finding that &lt;a href=&quot;https://www.cato.org/briefing-paper/improving-youth-online-safety-without-sacrificing-privacy-speech&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;balance&lt;/a&gt;.&lt;/p&gt;
</content:encoded><category>Privacy guides</category><author>Edward Komenda</author></item><item><title>From vulnerability to resilience: an incident response framework for SMBs</title><link>https://proton.me/business/blog/vulnerability</link><guid isPermaLink="true">https://proton.me/business/blog/vulnerability</guid><description>Learn how SMBs can reduce vulnerabilities with a clear incident response plan to detect, contain, and recover from cyber threats.</description><pubDate>Thu, 02 Apr 2026 16:31:48 GMT</pubDate><content:encoded>
&lt;p&gt;Cybersecurity incidents are a huge risk to SMBs, with 1 in 4 small businesses hacked despite cybersecurity measures, according to Proton’s 2026 &lt;a href=&quot;https://proton.me/business/smb-cybersecurity-report&quot;&gt;SMB Security Report&lt;/a&gt;. Damages of a security breach are not limited to data and financial losses: legal and IT costs, impact on customer trust, operational disruption, and time spent on recovery are some concerns of SMBs hit by cyberattacks. A single incident can affect all areas of a business and disrupt its continuity.&lt;/p&gt;



&lt;p&gt;In such a delicate and risky scenario, every small business needs to implement concrete measures to avoid weak spots and exposure to cybercriminals, as well as a concrete incident response framework, aligned with the business’s reality.&lt;/p&gt;



&lt;p&gt;This guide will help small and medium-sized businesses to identify exposure to cyberthreats and elaborate a comprehensive response plan in case a cyberattack occurs.&lt;br&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#vulnerability&quot;&gt;What does vulnerability mean in SMB environments?&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#smbs-frequent&quot;&gt;What are SMBs’ most frequent vulnerabilities?&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#build-incident&quot;&gt;How to build an incident response framework as an SMB&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#role-clarity&quot;&gt;The importance of role clarity: who owns what?&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#common-mistakes&quot;&gt;Which common mistakes can increase risk?&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#smb-characteristics&quot;&gt;What are the characteristics of a low-vulnerability SMB?&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#checklist&quot;&gt;Checklist: The actions to take during an incident&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#reduce-weaknesses&quot;&gt;How to reduce weaknesses before the next incident&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#improve-security&quot;&gt;What can you do today to improve your security?&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#FAQs&quot;&gt;Frequently asked questions&lt;/a&gt;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;vulnerability&quot;&gt;What does vulnerability mean in SMB environments?&lt;/h2&gt;



&lt;p&gt;According to our 2026 &lt;a href=&quot;https://proton.me/business/smb-cybersecurity-report&quot;&gt;SMB Cybersecurity Report&lt;/a&gt;, 39% of SMBs say that they’ve faced a cyber incident due to human error at some point, highlighting that behavioral issues drive vulnerability. Security tools and technology are still at the center of business security, but behavior also matters.&lt;/p&gt;



&lt;p&gt;Lack of preparation, everyday habits, and small oversights, like insecure sharing of credentials or skipping operational routines, are all potential triggers to a hacking or other cybersecurity incident.&lt;/p&gt;



&lt;p&gt;A solid &lt;a href=&quot;https://proton.me/business/blog/data-breach-prevention-for-businesses&quot;&gt;data breach prevention strategy&lt;/a&gt; requires banning common high-risk practices such as:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Team members using the same login for multiple sites.&lt;/li&gt;



&lt;li&gt;Accounts staying active even after someone leaves (for more details, see our &lt;a href=&quot;https://proton.me/business/drive/templates/offboarding-checklist&quot;&gt;offboarding checklists&lt;/a&gt;).&lt;/li&gt;



&lt;li&gt;Sharing sensitive information in &lt;a href=&quot;https://proton.me/blog/spreadsheet-security-business-survey&quot;&gt;spreadsheets&lt;/a&gt;, chats, plain text documents, and other insecure channels.&lt;/li&gt;



&lt;li&gt;Employees following outdated security instructions.&lt;br&gt;&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Weakness in security isn’t just about hackers bypassing firewalls. More often, it’s about being unprepared, communicating ineffectively, or reacting too slowly when the unexpected strikes.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;smbs-frequent&quot;&gt;What are SMBs’ most frequent vulnerabilities?&lt;/h2&gt;



&lt;p&gt;There are several types of weak point that can be observed in businesses across all industries:&amp;nbsp;&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Weak credential security practices&lt;/h3&gt;



&lt;p&gt;Repeated use of easy-to-guess passwords, sharing them over chat, or writing them on insecure notes or spreadsheets are bad habits that create a massive risk. Passwords are often the first (and last) defense for critical accounts, but poor practices leave doors wide open for intruders.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Lack of least-privilege and role-based access&lt;/h3&gt;



&lt;p&gt;Many SMBs struggle when it comes to establishing a strong and role-based access policy with a least-privilege approach to ensure unnecessary permissions are avoided. Access and credentials must be limited to current employees and granted according to the requirements of their roles.&amp;nbsp;&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;No incident response plan&lt;/h3&gt;



&lt;p&gt;Many teams assume that they’ll handle an incident if and when one occurs. But when a crisis hits, confusion reigns, with nobody knowing who’s responsible for what. A simple contact sheet and &lt;a href=&quot;https://proton.me/business/blog/incident-response&quot;&gt;incident response plan&lt;/a&gt; can make the difference between a quick recovery and days of interruption.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Poor staff security awareness&lt;/h3&gt;



&lt;p&gt;Attackers know the most common weak link isn’t technology; it’s people. &lt;a href=&quot;https://proton.me/blog/phishing-attacks&quot;&gt;Phishing&lt;/a&gt;, fake invoices, and “urgent” messages from management all prey on distracted or untrained staff. It’s essential to conduct regular security training for all team members, not just a one-time onboarding event.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Shadow IT and unsanctioned cloud tools&lt;/h3&gt;



&lt;p&gt;With so many new SaaS platforms, it’s easy for employees to sign up for tools without approval. Since these &lt;a href=&quot;https://proton.me/business/blog/shadow-it&quot;&gt;shadow IT&lt;/a&gt; systems aren’t managed or monitored, &lt;a href=&quot;https://proton.me/blog/data-protection-best-practices&quot;&gt;critical data&lt;/a&gt; often ends up scattered in vulnerable locations outside the central business network. When these weak spots overlap, the impact multiplies.&lt;/p&gt;



&lt;p&gt;The formula is simple: one password leak + poor communication + no plan = trouble that spreads quickly.&lt;/p&gt;



&lt;p&gt;The Proton guide to &lt;a href=&quot;https://proton.me/business/security-guide&quot;&gt;security for growing businesses&lt;/a&gt; expands on these important themes with hands-on checklists and further reading.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;build-incident&quot;&gt;How to build an incident response framework as an SMB&lt;/h2&gt;



&lt;p&gt;A clear plan, showing who does what, in what order, with which resources, is key for addressing a cybersecurity incident. Here are the steps you need to build a comprehensive and precise framework.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;1. Preparation and security readiness&lt;/h3&gt;



&lt;p&gt;Initially, SMBs need a minimum level of structure in place in order to prevent incidents and be prepared in case a response plan is needed.&lt;/p&gt;



&lt;p&gt;Start with the basics:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Maintain an up-to-date inventory of systems, devices, and SaaS tools.&lt;/li&gt;



&lt;li&gt;Define who owns each system and who has administrative access.&lt;/li&gt;



&lt;li&gt;Ensure backups are automated, tested, and stored securely.&lt;/li&gt;



&lt;li&gt;Enable logging on critical systems (logins, file access, admin actions).&lt;/li&gt;



&lt;li&gt;Centralize credentials using a &lt;a href=&quot;https://proton.me/business/pass&quot;&gt;business password manager&lt;/a&gt;.&lt;/li&gt;



&lt;li&gt;Document an incident response checklist and key contacts.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Preparation also includes running simple “what if” scenarios with your team. Even informal tabletop exercises help identify confusion before a real crisis.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;2. Early detection and reporting&lt;/h3&gt;



&lt;p&gt;You can’t respond to what you don’t see. Then, encourage a culture where employees report anything unusual without hesitation.&lt;/p&gt;



&lt;p&gt;Common signals of cyber vulnerabilities include:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Unusual login attempts (unknown locations or devices).&lt;/li&gt;



&lt;li&gt;Sudden password reset requests.&lt;/li&gt;



&lt;li&gt;Unexpected system slowdowns or shutdowns.&lt;/li&gt;



&lt;li&gt;Alerts from security tools or cloud platforms.&lt;/li&gt;



&lt;li&gt;Employees reporting suspicious emails or messages.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Automated detection and strong employee awareness are key to spotting a possible cyber security breach early.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;3. Initial containment and damage control&lt;/h3&gt;



&lt;p&gt;Once a threat has been detected, you need to act immediately.&lt;/p&gt;



&lt;p&gt;Your first goal is to stop the spread:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Isolate affected devices from the network.&lt;/li&gt;



&lt;li&gt;Disable or freeze compromised accounts.&lt;/li&gt;



&lt;li&gt;Revoke active sessions in cloud tools.&lt;/li&gt;



&lt;li&gt;Block suspicious IP addresses if possible.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;If ransomware or active data exfiltration is suspected, shutting down affected systems may prevent further spread. Delays at this stage can turn a small issue into a business-wide incident.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;4. Internal communication and assigning roles&lt;/h3&gt;



&lt;p&gt;Confusion destroys confidence during a crisis. Clear communication ensures coordinated and effective action.&lt;/p&gt;



&lt;p&gt;Quickly inform inform everyone who needs to know about the incident:&amp;nbsp;&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;IT administrators (internal or outsourced).&lt;/li&gt;



&lt;li&gt;Team leaders and managers.&lt;/li&gt;



&lt;li&gt;Senior decision-makers.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Assign clear roles:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Who will update staff and leadership on progress?&lt;/li&gt;



&lt;li&gt;Who handles external communication (customers, vendors, regulators)?&lt;/li&gt;



&lt;li&gt;Who documents every step taken?&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Make sure nobody is left in the dark. Roles overlap in many SMBs, but clarity helps everyone move in the same direction towards the same goal.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;5. Lock down credentials and system access&lt;/h3&gt;



&lt;p&gt;Compromised credentials are one of the most common entry points for attackers, and securing access is critical to regaining control.&lt;/p&gt;



&lt;p&gt;For a better chance of preserving credentials and system access:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Change all passwords and credentials related to the affected systems and enforce &lt;a href=&quot;https://proton.me/authenticator&quot;&gt;two-factor authentication (2FA)&lt;/a&gt;.&lt;/li&gt;



&lt;li&gt;Remove or suspend any suspicious accounts and check for active accounts belonging to ex-employees.&lt;/li&gt;



&lt;li&gt;If you use a &lt;a href=&quot;https://proton.me/business/pass&quot;&gt;business password manager&lt;/a&gt;, revoke and reset all shared credentials centrally.&lt;/li&gt;
&lt;/ul&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;6.  Investigation and root cause analysis&lt;/h3&gt;



&lt;p&gt;Investigation is key for adequate incident reporting and building a stronger cybersecurity culture.&lt;/p&gt;



&lt;p&gt;Key actions include:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Build a timeline of the incident (what happened and when).&lt;/li&gt;



&lt;li&gt;Review system logs, login history, and access reports.&lt;/li&gt;



&lt;li&gt;Identify the initial entry point (&lt;a href=&quot;https://proton.me/blog/what-is-phishing&quot;&gt;phishing&lt;/a&gt;, stolen credentials, vulnerable software, unauthorized file access, &lt;a href=&quot;https://protonvpn.com/blog/what-is-malware&quot;&gt;malware&lt;/a&gt; activity, use of dormant or legacy accounts).&lt;/li&gt;



&lt;li&gt;Conduct interviews with affected employees if necessary.&lt;/li&gt;
&lt;/ul&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;7.  Recovery and resuming operations&lt;/h3&gt;



&lt;p&gt;Once the threat is contained and you’ve gained some insight as to how it started, the focus shifts to re-establishing normal operations:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Restore systems and data from clean backups.&lt;/li&gt;



&lt;li&gt;Re-enable services gradually, prioritizing critical operations.&lt;/li&gt;



&lt;li&gt;Monitor systems closely for any recurring suspicious activity.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Communication and transparency help rebuild trust and reduce uncertainty. Then:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Inform employees about safe system usage post-incident.&lt;/li&gt;



&lt;li&gt;Notify customers or partners according to your local data regulatory body’s requirements.&lt;/li&gt;



&lt;li&gt;Comply with any legal or regulatory reporting obligations.&lt;/li&gt;
&lt;/ul&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;8. Post-incident review and continuous improvement&lt;/h3&gt;



&lt;p&gt;To prevent the same error from happening again after recovery, your next steps are to:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Identify what worked and what failed.&lt;/li&gt;



&lt;li&gt;Update your incident response plan accordingly.&lt;/li&gt;



&lt;li&gt;Fix gaps in tools, processes, or training.&lt;/li&gt;



&lt;li&gt;Schedule follow-up security awareness sessions.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;This analysis helps transform reactive firefighting into long-term resilience.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;9.  Classifying and keeping record of incidents&lt;/h3&gt;



&lt;p&gt;Every incident is a learning opportunity, so keeping a running list of observations about any and all incidents makes planning for the future easier.&lt;/p&gt;



&lt;p&gt;To keep complete records, include the following information:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Date and type of incident.&lt;/li&gt;



&lt;li&gt;Systems affected.&lt;/li&gt;



&lt;li&gt;Root cause.&lt;/li&gt;



&lt;li&gt;Actions taken.&lt;/li&gt;



&lt;li&gt;Impact level.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Classifying the attempt according to its severity is also a key factor to prioritize response and resource allocation.&lt;/p&gt;



&lt;p&gt;A clear classification, in a simple language, will make it. For example:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Critical:&lt;/strong&gt; Could stop operations or expose sensitive information quickly.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;High:&lt;/strong&gt; May allow outside access to important data or systems.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Medium:&lt;/strong&gt; Could be used as a “stepping stone” or cause confusion.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Low:&lt;/strong&gt; Unlikely to have a serious impact alone, but worth fixing.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;You can also use ready-to-use scoring systems, such as the NIST’s vulnerability severity frameworks (&lt;a href=&quot;https://nvd.nist.gov/vuln-metrics/cvss&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;NIST CVSS&lt;/a&gt;), as a reference.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;role-clarity&quot;&gt;The importance of role clarity: who owns what?&lt;/h2&gt;



&lt;p&gt;SMBs rarely have a dedicated security team. But that doesn’t mean nobody owns these tasks, and assigning roles is essential to boost confidence and speed up response.&lt;/p&gt;



&lt;p&gt;In fact, clearly assigning responsibilities is one of the fastest ways to improve response time and reduce confusion during an incident. There are six key roles you need to define in an incident response plan.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Incident coordinator&lt;/h3&gt;



&lt;p&gt;As the main contact, the incident coordinator is responsible for keeping the response organized and on track.&lt;/p&gt;



&lt;p&gt;&lt;br&gt;Typical tasks include:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Declaring when an incident is officially being handled.&lt;/li&gt;



&lt;li&gt;Activating the response plan and notifying key stakeholders.&lt;/li&gt;



&lt;li&gt;Prioritizing actions and ensuring deadlines are met.&lt;/li&gt;



&lt;li&gt;Acting as the bridge between technical and non-technical teams.&lt;/li&gt;
&lt;/ul&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Technical responder&lt;/h3&gt;



&lt;p&gt;This team member will be responsible for investigating and containing the incident from a systems perspective.&lt;/p&gt;



&lt;p&gt;&lt;br&gt;Their main tasks are:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Isolating affected devices or accounts.&lt;/li&gt;



&lt;li&gt;Resetting passwords and enforcing access controls.&lt;/li&gt;



&lt;li&gt;Reviewing logs and identifying the source of the issue.&lt;/li&gt;



&lt;li&gt;Coordinating with external IT providers or security vendors if needed.&lt;/li&gt;
&lt;/ul&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Communications lead&lt;/h3&gt;



&lt;p&gt;This role involves managing how information is shared internally and externally.&lt;br&gt;&lt;br&gt;The communications lead is in charge of:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Informing employees about what happened and what actions to take.&lt;/li&gt;



&lt;li&gt;Preparing messages for customers, partners, or vendors.&lt;/li&gt;



&lt;li&gt;Handling sensitive communication to avoid panic or misinformation.&lt;/li&gt;



&lt;li&gt;Supporting compliance with notification requirements when applicable.&lt;br&gt;&lt;/li&gt;
&lt;/ul&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Documentation lead&lt;/h3&gt;



&lt;p&gt;The documentation lead ensures that every step of the incident is properly recorded.&lt;br&gt;&lt;br&gt;Their key tasks are:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Keeping a timeline of events and actions taken.&lt;/li&gt;



&lt;li&gt;Collecting evidence such as logs, screenshots, or email traces.&lt;/li&gt;



&lt;li&gt;Documenting decisions and their rationale.&lt;/li&gt;



&lt;li&gt;Preparing reports for internal review, legal, or insurance purposes.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Clearly defined roles reduce overlap and hesitation. They also discourage finger-pointing in stressful situations.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;common-mistakes&quot;&gt;Which common mistakes can increase risk?&lt;/h2&gt;



&lt;p&gt;Some errors, such as waiting too long or underestimating the severity of a threat, are likely to increase the damage of a security incident.&lt;/p&gt;



&lt;p&gt;So, make sure to keep away from the following common mistakes:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Delaying containment:&lt;/strong&gt; doubting yourself after the first red flag wastes precious response time.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Failing to rotate credentials promptly:&lt;/strong&gt; attackers often sit inside breached accounts, waiting for the chance to return.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Ignoring communications:&lt;/strong&gt; staff left in the dark will make independent decisions, multiplying the risk.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Not writing down actions:&lt;/strong&gt; lack of documentation disrupts insurance claims, regulatory notifications, and learning from incidents.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Underestimating the power of reputation:&lt;/strong&gt; even &lt;a href=&quot;https://proton.me/blog/data-breach-prevention-for-businesses&quot;&gt;small breaches&lt;/a&gt;, if poorly handled, erode customer confidence&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;When dealing with a cybersecurity incident, speed, transparency, and humility are key factors that can make a huge difference in outcomes.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;smb-characteristics&quot;&gt;What are the characteristics of a low-vulnerability SMB?&lt;/h2&gt;



&lt;p&gt;Having strong security doesn’t require a large team or a dedicated IT department. Successful companies treat weak spots like any other business process, with regular attention and honest conversation:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;A clear owner for security, even if it’s not their full-time job.&lt;/li&gt;



&lt;li&gt;Step-by-step response playbooks, reviewed regularly.&lt;/li&gt;



&lt;li&gt;Well-defined access rights, updated every time roles change&lt;/li&gt;



&lt;li&gt;Security woven into business planning, not just IT.&lt;/li&gt;



&lt;li&gt;Regular audits to keep the response plan sharp.&lt;/li&gt;



&lt;li&gt;Transparency about mistakes, driving long-term trust.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Above all, low-exposure companies nurture a culture where no one is punished for reporting mistakes or questioning habits. Psychological safety is just as important as technical security in these environments.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;checklist&quot;&gt;Checklist: The actions to take during an incident&lt;/h2&gt;



&lt;p&gt;Here’s a list of tasks that you can adapt to build a checklist for your own organization:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Confirm the incident: write down what triggered your suspicion.&lt;/li&gt;



&lt;li&gt;Isolate infected or breached devices/accounts.&lt;/li&gt;



&lt;li&gt;Change all relevant passwords immediately.&lt;/li&gt;



&lt;li&gt;Inform key staff and assign documentation responsibility.&lt;/li&gt;



&lt;li&gt;Identify breached systems and shut down or disconnect as needed.&lt;/li&gt;



&lt;li&gt;Begin an internal communication loop to update about concluded actions and next steps.&lt;/li&gt;



&lt;li&gt;Contact legal, IT, or external advisors as required.&lt;/li&gt;



&lt;li&gt;Collect error logs, email traces, and other evidence.&lt;/li&gt;



&lt;li&gt;Begin restoring lost or encrypted data only after systems are clean.&lt;/li&gt;



&lt;li&gt;Notify customers or authorities only after understanding what happened.&lt;/li&gt;



&lt;li&gt;Debrief, update your plan, and schedule new awareness training.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Assign these tasks in your security documentation, and revisit after every incident or test to improve your resilience and ensure business continuity.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;reduce-weaknesses&quot;&gt;How to reduce weaknesses before the next incident&lt;/h2&gt;



&lt;p&gt;Fortunately, you don’t need a giant budget or a formal security office to prepare for disaster. Most of the best defenses are common sense, documentation, and regular follow-up.&lt;/p&gt;



&lt;p&gt;Let’s examine the most important principles that will prevent incidents within any business.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Strong credential policies&lt;/h3&gt;



&lt;p&gt;Your organization should require unique, hard-to-guess passwords, and 2FA for every account. Use a &lt;a href=&quot;https://proton.me/business/pass&quot;&gt;business password manager&lt;/a&gt; to avoid sticky notes or email-based sharing.&amp;nbsp;&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Least-privilege and role-based access&lt;/h3&gt;



&lt;p&gt;Regularly review permissions for every team member in your organization. Does everyone who can access billing, client lists, or cloud dashboards actually need daily access? Limit rights to just what’s required to get the job done.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Regular staff training&lt;/h3&gt;



&lt;p&gt;This doesn’t need to take hours. Even a 20-minute quarterly session on how to recognize suspicious emails, avoid odd pop-ups, or handle password resets can cut incidents dramatically.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Periodic risk reviews&lt;/h3&gt;



&lt;p&gt;On a regular basis, step back and scan your business as if you were looking for exposures, just like an attacker would. Review lost laptops, cloud accounts, old employees, and forgotten SaaS platforms. Honestly acknowledging gaps is the best investment you can make in your own resilience.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Incident response checklist&lt;/h3&gt;



&lt;p&gt;This checklist doesn’t have to be extensive immediately. Start with a one-page summary, including who to call, what to do first, and where records will be kept. Refine it every six months, or after an incident.&amp;nbsp;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;improve-security&quot;&gt;What can you do today to improve your security?&lt;/h2&gt;



&lt;p&gt;It can be difficult to know where to start with your own cybersecurity measures. Here are practical, immediate actions you can take this week:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Print or bookmark your own incident response checklist and cybersecurity &lt;a href=&quot;https://proton.me/business/drive/templates/incident-report-templates&quot;&gt;incident report template&lt;/a&gt;.&lt;/li&gt;



&lt;li&gt;Review who holds admin credentials and update them using a centralized password manager like Proton Pass for Business.&lt;/li&gt;



&lt;li&gt;Schedule a team meeting to clarify roles during a digital crisis.&lt;/li&gt;



&lt;li&gt;Send out a short “how to recognize &lt;a href=&quot;https://proton.me/blog/what-is-phishing&quot;&gt;phishing&lt;/a&gt;” guide to your entire team.&lt;/li&gt;



&lt;li&gt;Update your access list and close out dormant user accounts or SaaS tools.&lt;/li&gt;



&lt;li&gt;Read the latest research from the enterprise tools category for tips on useful security add-ons.&lt;/li&gt;



&lt;li&gt;Commit to reviewing your policy and process after every event, large or small.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;For those seeking hands-on templates, learning resources, or technology that truly empowers teams instead of trapping them in complexity, we recommend using Proton’s &lt;a href=&quot;https://proton.me/business/security-guide&quot;&gt;Practical Guide to Security for Growing Businesses&lt;/a&gt;. The guide matches many best practices discussed here and arms you with complete information, checklists, and important steps.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;FAQs&quot;&gt;Frequently asked questions about cybersecurity vulnerabilities&lt;/h2&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;What is a vulnerability in cybersecurity?&lt;/h3&gt;



&lt;p&gt;A vulnerability in cybersecurity is any flaw, gap, or oversight that allows attackers to gain unauthorized access to systems, data, or infrastructure. These gaps can exist in technology (like unpatched software), processes (like granting excessive permissions), or human behavior (like falling for phishing emails). For SMBs, weaknesses often overlap across all three categories, so reviewing and updating exposure points is ongoing work.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;How can SMBs detect vulnerabilities?&lt;/h3&gt;



&lt;p&gt;SMBs can spot weaknesses by conducting regular cybersecurity assessments, reviewing permissions, scanning for outdated software, and checking for unused accounts or unsanctioned tools. Monitoring alerts from firewalls or login services, encouraging staff to report odd activity, and running phishing simulations are other practical steps. Periodic “tabletop tests,” where the team walks through a mock breach, often expose where processes need improvement. References like&lt;a href=&quot;https://nvd.nist.gov/vuln-metrics/cvss&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt; NIST CVSS&lt;/a&gt; and guidelines from &lt;a href=&quot;https://proton.me/business/security-guide&quot;&gt;Proton’s Security Guide for Growing Businesses&lt;/a&gt; help review ideas following a structured path.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;What steps help reduce cybersecurity vulnerabilities?&lt;/h3&gt;



&lt;p&gt;The main steps are to use a password manager, enforce unique logins, review and minimize permissions, create an incident response checklist, and train staff regularly on security basics. Do not overlook simple fixes like keeping software updated, logging off unused devices, and deleting any dormant cloud or SaaS accounts. Make security a recurring agenda item in leadership meetings, and record lessons learned from any incidents as part of ongoing improvement.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Why is incident response planning important?&lt;/h3&gt;



&lt;p&gt;Incident response planning provides structure, clarity, and speed during a crisis, reducing confusion and business disruption. With an agreed plan, everyone knows their role, main contacts, and recovery steps. Even basic planning helps minimize the impact of any breach on customers, finances, and company reputation. The &lt;a href=&quot;https://www.staysafeonline.org/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;National Cybersecurity Alliance&lt;/a&gt; and the &lt;a href=&quot;https://www.sba.gov/business-guide/manage-your-business/strengthen-your-cybersecurity&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;US Small Business Administration (SBA)&lt;/a&gt; both request small businesses to develop, document, and rehearse their own response frameworks.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;How to build a resilient security framework?&lt;/h3&gt;



&lt;p&gt;A resilient security framework is built by assigning clear roles, documenting every process, enforcing strict &lt;a href=&quot;https://proton.me/business/pass&quot;&gt;business password management&lt;/a&gt;, and making security training regular for every team member. Test your response plan in “fire drills,” and refine it every time something changes in your business. Integrate your incident response with overall business continuity to keep everyone on the same page.&lt;/p&gt;
</content:encoded><category>For business</category><author>Ben Wolford</author></item><item><title>How a password manager supports GDPR compliance for businesses</title><link>https://proton.me/business/blog/gdpr-password-management</link><guid isPermaLink="true">https://proton.me/business/blog/gdpr-password-management</guid><description>Discover how password management simplifies GDPR compliance, enhances access control, and supports security and accountability.</description><pubDate>Thu, 02 Apr 2026 15:53:50 GMT</pubDate><content:encoded>
&lt;p&gt;Organizations handling personal data in countries where the General Data Protection Regulation (GDPR) applies must maintain strict security controls in order to comply. Whether you’re a technology company, financial services provider, healthcare organization, or SaaS platform, access to personal data within your business network needs to be governed by authentication systems. This means that weak credential practices are one of the most common sources of regulatory risk.&lt;/p&gt;



&lt;p&gt;Regulators increasingly expect companies to demonstrate that they’ve implemented appropriate technical and organizational safeguards to protect personal data. In practice, many incidents that lead to investigations or breach notifications originate from a simple but critical vulnerability: compromised credentials.&lt;/p&gt;



&lt;p&gt;Password management has become an important component of enterprise &lt;a href=&quot;https://proton.me/business/blog/data-protection-best-practices&quot;&gt;data protection strategies&lt;/a&gt;. When implemented correctly, a &lt;a href=&quot;https://proton.me/business/pass&quot;&gt;business password manager&lt;/a&gt; such as Proton Pass for Business can support several key &lt;a href=&quot;https://proton.me/business/gdpr&quot;&gt;GDPR&lt;/a&gt; principles, including secure processing, controlled access to personal data, and accountability.&lt;/p&gt;



&lt;p&gt;Although a business password manager alone does not guarantee GDPR compliance, structured credential management significantly reduces exposure to some of the most common operational risks that lead to data breaches and regulatory scrutiny.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#gdpr-authentication&quot;&gt;GDPR authentication, access control, and data protection requirements&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#role-authentication&quot;&gt;The role of authentication and authorization in GDPR compliance&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#credential-mismanagement&quot;&gt;How credential mismanagement increases data breach and GDPR compliance risk&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#password-management-gdpr&quot;&gt;How password management supports GDPR obligations&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#support-gdpr-compliance&quot;&gt;How can password management support GDPR compliance?&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#beyond-password&quot;&gt;GDPR compliance goes beyond password managers&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#structured-approach&quot;&gt;Structuring your approach: Step-by-step guidance for businesses&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#real-tips&quot;&gt;Real-world tips for better access control and password security&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#proton-pass&quot;&gt;How Proton Pass for Business supports secure access governance&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;#FAQs&quot;&gt;Frequently asked questions about GDPR and password management&lt;/a&gt;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;gdpr-authentication&quot;&gt;GDPR authentication, access control, and data protection requirements&lt;/h2&gt;



&lt;p&gt;At their core, GDPR compliance requirements are designed to make sure that personal data is handled responsibly and protected from unauthorized access, loss, or misuse. While the regulation covers many aspects of data governance, security and access control play a central role.&lt;/p&gt;



&lt;p&gt;Several provisions of the regulation directly relate to authentication and access governance:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Article 5 — Principles of processing:&lt;/strong&gt; Requires integrity and confidentiality safeguards when processing personal data.&lt;br&gt;&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Article 25 — Data protection by design and by default:&lt;/strong&gt; Organizations must implement systems that limit access to personal data to only those who require it.&lt;br&gt;&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Article 32 — Security of processing:&lt;/strong&gt; Requires technical and organizational measures such as encryption, resilience of systems, and mechanisms ensuring ongoing confidentiality and integrity.&lt;br&gt;&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;From an operational perspective, organizations are expected to implement measures such as:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Strong access controls for internal systems and databases.&lt;/li&gt;



&lt;li&gt;Unique user accounts that provide traceability for actions taken within systems.&lt;/li&gt;



&lt;li&gt;Secure credential storage practices.&lt;/li&gt;



&lt;li&gt;Periodic reviews of who has access to personal data.&lt;/li&gt;



&lt;li&gt;Technical safeguards that prevent unauthorized access or credential compromise.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Regulators also increasingly expect companies to demonstrate evidence of these measures, particularly when responding to data subject complaints, regulatory inquiries, or breach investigations. Strong credential governance is a security concern as well as a documentation and accountability issue.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;role-authentication&quot;&gt;The role of authentication and authorization in GDPR compliance&lt;/h2&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/business/blog/authentication-vs-authorization&quot;&gt;Authentication and authorization&lt;/a&gt; are foundational mechanisms for enforcing GDPR security principles.&lt;/p&gt;



&lt;p&gt;Authentication verifies the identity of a user accessing a system, while authorization determines the scope of data and systems that user is permitted to access. When these controls fail, personal data can be exposed to unauthorized parties, creating both security risks and compliance liabilities.&lt;/p&gt;



&lt;p&gt;Standard safeguards expected in modern business environments include:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Unique user identities tied to individual employees.&lt;/li&gt;



&lt;li&gt;Strong password requirements and password reuse restrictions.&lt;/li&gt;



&lt;li&gt;Secure credential storage and transmission practices.&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;https://proton.me/authenticator&quot;&gt;Two-factor authentication (2FA)&lt;/a&gt; for core systems.&lt;/li&gt;



&lt;li&gt;Logging and monitoring of authentication events.&lt;/li&gt;



&lt;li&gt;Automated session expiration and inactivity controls.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Despite these established best practices, many organizations still struggle to enforce consistent credential policies across dozens or even hundreds of internal applications and third-party services.&lt;/p&gt;



&lt;p&gt;In distributed work environments where employees rely heavily on cloud tools and SaaS platforms, centralized credential management becomes essential for maintaining consistent security controls.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;credential-mismanagement&quot;&gt;How credential mismanagement increases data breach and GDPR compliance risk&lt;/h2&gt;



&lt;p&gt;Credential compromise remains one of the most common causes of data breaches. According to the Verizon 2025 Data Breach Investigations Report, the primary hacking variety for both SMBs and large organizations is the use of stolen credentials, at 32% in large organizations and 33% in SMBs. Leveraging stolen credentials has been one of the common ways into an organization for the last several years.&lt;/p&gt;



&lt;p&gt;Human behavior plays a major role in this risk. Employees frequently reuse passwords across multiple systems, share credentials informally with colleagues, or store sensitive login details in unsecured documents.&lt;/p&gt;



&lt;p&gt;Typical examples include:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Passwords stored in spreadsheets or internal documents&lt;/li&gt;



&lt;li&gt;Sharing credentials for shared platforms insecurely, with no oversight or control&lt;/li&gt;



&lt;li&gt;Password reuse across corporate and personal accounts&lt;/li&gt;



&lt;li&gt;Orphaned accounts that remain active after employee departures&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;These practices significantly increase the attack surface for organizations. If a single credential is compromised through phishing, credential stuffing, or malware, attackers may gain access to systems containing personal data.&lt;/p&gt;



&lt;p&gt;As outlined in &lt;a href=&quot;https://proton.me/blog/cybersecurity-threats&quot;&gt;our analysis&lt;/a&gt; of the biggest cybersecurity threats businesses face today, &lt;a href=&quot;https://proton.me/blog/what-is-phishing&quot;&gt;phishing attacks&lt;/a&gt; and credential theft remain among the most effective methods used by attackers to gain unauthorized access to corporate systems.&lt;/p&gt;



&lt;p&gt;For organizations subject to GDPR, these types of breaches can trigger regulatory reporting obligations, financial penalties, and reputational damage.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;The link between access control and data minimization&lt;/h3&gt;



&lt;p&gt;One of the core principles of GDPR is data minimization, which requires organizations to limit both the amount of personal data collected and the number of individuals who can access it.&lt;/p&gt;



&lt;p&gt;In practice, this principle requires companies to implement strict access governance policies that ensure personal data is only accessible to personnel whose job responsibilities require it.&lt;/p&gt;



&lt;p&gt;Poor credential management undermines this objective. When access credentials are widely shared or poorly tracked, organizations lose visibility into who actually has access to sensitive systems.&lt;/p&gt;



&lt;p&gt;This creates several compliance risks:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Employees may retain access to systems long after their roles change.&lt;/li&gt;



&lt;li&gt;Contractors or vendors may continue to access systems after projects end.&lt;/li&gt;



&lt;li&gt;Sharing credentials (without using a password manager with activity logs enabled), which makes it impossible to attribute actions to specific users.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Effective password management improves visibility into credential ownership and simplifies the process of granting, reviewing, and revoking access rights.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;password-management-gdpr&quot;&gt;How password management supports GDPR obligations&lt;/h2&gt;



&lt;p&gt;Password managers have evolved from simple credential storage tools into comprehensive access management platforms. For organizations managing large volumes of accounts across cloud services, internal systems, and third-party applications, they can serve as an important layer of security and access governance.&lt;/p&gt;



&lt;p&gt;Modern &lt;a href=&quot;https://proton.me/business/pass&quot;&gt;business password managers&lt;/a&gt; such as Proton Pass for Business combine secure credential storage with features like &lt;a href=&quot;https://proton.me/security/end-to-end-encryption&quot;&gt;end-to-end encryption&lt;/a&gt;, centralized access control, and &lt;a href=&quot;https://proton.me/blog/password-sharing&quot;&gt;secure credential sharing&lt;/a&gt;, helping organizations manage authentication risks more effectively.&lt;/p&gt;



&lt;p&gt;When implemented as part of a broader security strategy, these capabilities can directly support several GDPR obligations related to secure processing, controlled access to personal data, and operational accountability.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Security of processing&amp;nbsp;&lt;/h3&gt;



&lt;p&gt;Article 32 requires organizations to implement appropriate technical measures to ensure the security of personal data.&lt;/p&gt;



&lt;p&gt;Password managers strengthen authentication security by automatically generating strong, unique passwords for each service or system. This eliminates password reuse and reduces the risk of &lt;a href=&quot;https://proton.me/blog/what-is-brute-force-attack&quot;&gt;brute-force attacks&lt;/a&gt; or &lt;a href=&quot;https://proton.me/blog/what-is-credential-stuffing-attack&quot;&gt;credential stuffing&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/business/pass&quot;&gt;Business password managers&lt;/a&gt; such as Proton Pass for Business also apply end-to-end encryption to stored credentials and metadata, ensuring that login information remains protected even if infrastructure is compromised.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Access control &lt;/h3&gt;



&lt;p&gt;Password managers help organizations enforce structured access control and apply the principle of least privilege across their systems. Rather than relying on informal sharing or static credentials, access to sensitive accounts can be managed centrally and adjusted as business needs change.&lt;/p&gt;



&lt;p&gt;Administrators can:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Grant access to credentials on an as-needed basis.&lt;/li&gt;



&lt;li&gt;Share credentials securely without exposing the underlying password.&lt;/li&gt;



&lt;li&gt;Revoke access instantly when employees leave or responsibilities change.&lt;/li&gt;



&lt;li&gt;Update or rotate credentials to maintain security over time.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;These capabilities make it easier to maintain accurate access records, reduce unauthorized exposure, and ensure that personal data is only accessible to authorized personnel.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Auditability and accountability&lt;/h3&gt;



&lt;p&gt;GDPR places significant emphasis on accountability. Organizations must be able to demonstrate that appropriate safeguards are in place and that access to personal data is monitored.&lt;/p&gt;



&lt;p&gt;Password managers provide detailed activity logs that record when credentials are accessed, modified, or shared. These logs can help security teams investigate incidents, demonstrate compliance during audits, and respond to regulatory inquiries.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Breach risk reduction&lt;/h3&gt;



&lt;p&gt;Credential reuse and weak passwords are major contributors to &lt;a href=&quot;https://proton.me/business/pass/breach-observatory&quot;&gt;data breaches&lt;/a&gt;. Password managers address these risks through automated password generation, breach detection alerts, and secure credential sharing mechanisms. They will also perform password health checks, notifying the user of weak or reused passwords with the option to change them instantly for optimal security.&lt;/p&gt;



&lt;p&gt;Reducing the likelihood of credential compromise directly supports GDPR’s objective of minimizing both the likelihood and impact of personal data breaches.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;support-gdpr-compliance&quot;&gt;How can password management support GDPR compliance?&lt;/h2&gt;



&lt;p&gt;Structured credential management plays a central role in this approach. By standardizing how passwords are generated, stored, and shared, organizations can enforce best practices consistently rather than relying on individual user behavior. With Proton Pass for Business, teams can enforce strong password requirements, support two-factor authentication (2FA), and establish secure data sharing practices that reduce the risk of exposure.&lt;/p&gt;



&lt;p&gt;Password managers can support GDPR compliance in several operational scenarios:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;a href=&quot;https://proton.me/business/drive/templates/offboarding-checklist&quot;&gt;&lt;strong&gt;Employee offboarding&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;:&lt;/strong&gt; When an employee leaves the organization, administrators can immediately revoke access to shared credentials and internal systems, reducing the risk of unauthorized access.&lt;br&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;https://proton.me/pass/password-sharing&quot;&gt;&lt;strong&gt;Secure credential sharing&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;:&lt;/strong&gt; Teams that rely on shared SaaS tools can grant access to credentials without exposing the underlying password, ensuring access remains traceable and controlled.&lt;br&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;https://proton.me/business/blog/incident-response&quot;&gt;&lt;strong&gt;Incident response&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;:&lt;/strong&gt; If a credential is compromised during a security incident, administrators can quickly identify affected systems, rotate passwords, and document mitigation measures for regulatory reporting.&lt;br&gt;&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;These operational efficiencies are particularly valuable for organizations managing hundreds or thousands of digital services across distributed teams and cloud platforms. The Proton guide to building a &lt;a href=&quot;https://proton.me/blog/small-business-cyber-security-culture-workplace&quot;&gt;cybersecurity culture in small businesses&lt;/a&gt; highlights how organizations can combine security tools with employee training and clear policies to reinforce secure practices across teams.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;beyond-password&quot;&gt;GDPR compliance goes beyond password managers&lt;/h2&gt;



&lt;p&gt;Although password managers strengthen security controls, they’re only one component of a comprehensive GDPR compliance program.&lt;/p&gt;



&lt;p&gt;They don’t replace:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Data mapping and processing activity records.&lt;/li&gt;



&lt;li&gt;Legal assessments of lawful data processing.&lt;/li&gt;



&lt;li&gt;Data minimization policies and retention frameworks.&lt;/li&gt;



&lt;li&gt;Employee training and internal governance policies.&lt;/li&gt;



&lt;li&gt;Incident detection and regulatory notification processes.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;GDPR compliance requires both technical safeguards and organizational governance. Password managers contribute to the technical side of this framework but must be integrated with broader data protection practices.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Integrating password management in a wider compliance strategy&lt;/h3&gt;



&lt;p&gt;Organizations seeking to strengthen GDPR compliance should treat credential management as part of a wider data protection architecture.&lt;/p&gt;



&lt;p&gt;Effective strategies typically combine:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Centralized credential management&lt;/li&gt;



&lt;li&gt;Role-based access governance&lt;/li&gt;



&lt;li&gt;Employee security awareness training&lt;/li&gt;



&lt;li&gt;Documented data protection policies&lt;/li&gt;



&lt;li&gt;Continuous monitoring of authentication activity&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;When combined with robust policies and security awareness programs, password management becomes an important operational control that supports both security and regulatory accountability.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;structured-approach&quot;&gt;Structuring your approach: Step-by-step guidance for businesses&lt;/h2&gt;



&lt;p&gt;Implementing effective access governance requires both technical controls and structured processes. Organizations beginning their GDPR security journey can follow the practical sequence below to strengthen authentication practices.&lt;/p&gt;



&lt;ol class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Inventory all systems and services that process or store personal data.&lt;/strong&gt; This includes internal platforms, SaaS applications, and third-party integrations.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Assign individual user accounts to employees.&lt;/strong&gt; When shared accounts are unavoidable, access should be managed through secure, auditable methods that maintain traceability and allow administrators to control, monitor, and revoke access as needed.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Deploy a business password manager&lt;/strong&gt;, such as Proton Pass for Business, and assign administrative roles to security or IT teams.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Store all business credentials within the password manager&lt;/strong&gt; and enforce strong password generation policies across systems.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Implement structured onboarding and offboarding procedures&lt;/strong&gt;, ensuring credentials are granted and revoked in line with employee roles.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Conduct periodic access reviews&lt;/strong&gt;, verifying that users only retain access to systems required for their current responsibilities.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Provide employee training on password security risks&lt;/strong&gt;, including phishing, credential reuse, and safe credential sharing practices.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Maintain activity logs and document reviews&lt;/strong&gt; to demonstrate compliance during security audits.&lt;/li&gt;
&lt;/ol&gt;



&lt;p&gt;By following these steps, organizations can significantly reduce their attack surface while also creating repeatable workflows that support ongoing regulatory compliance.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;real-tips&quot;&gt;Real-world tips for better access control and password security&lt;/h2&gt;



&lt;p&gt;Strong credential hygiene practices are most effective when they combine technical safeguards with practical operational policies. If you’re a security leader responsible for protecting personal data, you should consider implementing the following practices:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Enforce unique passwords for every business service.&lt;/strong&gt; Password reuse significantly increases the risk of credential compromise through credential stuffing attacks.&lt;br&gt;&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Rotate credentials for sensitive systems periodically&lt;/strong&gt;, particularly following employee departures or role changes.&lt;br&gt;&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Avoid transmitting credentials through email or messaging platforms.&lt;/strong&gt; Use secure password sharing tools within password managers instead.&lt;br&gt;&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Disable unused accounts promptly.&lt;/strong&gt; Dormant accounts frequently become entry points for attackers.&lt;br&gt;&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Provide regular security awareness training.&lt;/strong&gt; Short, frequent reminders about phishing and password hygiene are often more effective than annual training sessions.&lt;br&gt;&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Use credential health monitoring tools&lt;/strong&gt; to identify weak, reused or breached passwords early.&lt;br&gt;&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Encourage employee feedback on authentication workflows&lt;/strong&gt; so security policies remain both effective and practical.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;These operational practices complement technical safeguards and help organizations maintain a resilient authentication environment.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;proton-pass&quot;&gt;How Proton Pass for Business supports secure access governance&lt;/h2&gt;



&lt;p&gt;For organizations operating under GDPR or other data protection frameworks, access governance must extend beyond basic password storage. Modern enterprises rely on dozens, often hundreds, of SaaS applications, internal systems, and cloud services, each requiring secure authentication and controlled access.&lt;/p&gt;



&lt;p&gt;According to research from Okta’s &lt;em&gt;Businesses at Work&lt;/em&gt; report, large organizations now use an average of over 100&lt;strong&gt; &lt;/strong&gt;SaaS applications, creating significant complexity in managing credentials and permissions across teams.&lt;/p&gt;



&lt;p&gt;Proton Pass for Business is designed to address this operational challenge by combining secure credential management with enterprise-grade access governance. Built on Proton’s privacy-first infrastructure, the platform applies end-to-end encryption to stored credentials and metadata, ensuring that sensitive authentication data remains protected at all times, even from the service provider.&lt;/p&gt;



&lt;p&gt;The Proton Pass architecture also aligns closely with the transparency and accountability principles embedded in GDPR. Proton Pass is open source and independently audited, allowing organizations to verify security claims and evaluate how data is handled. This level of transparency is increasingly important as enterprises face growing scrutiny around vendor security practices and supply chain risk.&lt;/p&gt;



&lt;p&gt;Key capabilities that support GDPR-related security and governance include:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Centralized administrative controls:&lt;/strong&gt; Security teams can allocate, modify, and revoke credential access across employees or teams in seconds, ensuring access privileges remain aligned with organizational roles.&lt;br&gt;&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Open-source transparency:&lt;/strong&gt; Publicly available code enables independent security review and reduces the risk of undisclosed data flows.&lt;br&gt;&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;End-to-end encryption:&lt;/strong&gt; All stored credentials and sensitive metadata are encrypted on the user’s device, ensuring only authorized users can access login data.&lt;br&gt;&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Swiss privacy jurisdiction:&lt;/strong&gt; Proton operates under Switzerland’s strong privacy laws, providing clear legal protections and predictable jurisdictional oversight for data handling.&lt;br&gt;&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Independent security audits:&lt;/strong&gt; Regular third-party audits reinforce accountability and validate security claims.&lt;br&gt;&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Streamlined deployment:&lt;/strong&gt; Quick implementation and intuitive interfaces help organizations adopt strong authentication practices without disrupting workflows.&lt;br&gt;&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Seamless workflow integration:&lt;/strong&gt; Proton Pass integrates with browser environments and existing productivity tools, supporting rapid onboarding for employees and contractors.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Together, these capabilities transform Proton Pass from a simple password manager into a centralized access governance tool. For security leaders responsible for protecting sensitive data and maintaining compliance, the ability to manage credentials, enforce strong authentication practices, and maintain visibility over access activity is essential.&lt;/p&gt;



&lt;p&gt;As organizations expand their digital infrastructure, fragmented credential management and inconsistent authentication policies become significant risk factors. A unified &lt;a href=&quot;https://proton.me/business/pass&quot;&gt;business password manager&lt;/a&gt; helps reduce this complexity while strengthening operational security controls.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;FAQs&quot;&gt;Frequently asked questions about GDPR and password management&lt;/h2&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;What role does password management play in GDPR security requirements?&lt;/h3&gt;



&lt;p&gt;Password management supports GDPR security requirements by strengthening authentication and access control across systems that process personal data. Under Article 32, organizations must implement appropriate technical and organizational measures to protect data. Password managers help enforce strong credentials, secure storage, and controlled access to accounts, reducing the likelihood of unauthorized access and credential-based attacks.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Does GDPR require strong password policies for businesses?&lt;/h3&gt;



&lt;p&gt;GDPR does not prescribe specific password rules, but it requires organizations to implement appropriate security measures to protect personal data. In practice, this means enforcing strong password policies, preventing password reuse, and implementing secure authentication systems. Many organizations use password managers to automate these practices and ensure consistent enforcement across cloud services and internal applications.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;How do password managers reduce the risk of data breaches?&lt;/h3&gt;



&lt;p&gt;Password managers reduce breach risk by generating strong, unique passwords for each account and securely storing them in encrypted vaults. This prevents common vulnerabilities such as password reuse, weak credentials, and insecure credential storage.&lt;/p&gt;



&lt;p&gt;They also strengthen defenses by supporting two-factor or multi-factor authentication (2FA/MFA), alerting users to compromised or reused credentials, and enabling secure credential sharing without exposing sensitive information.&lt;/p&gt;



&lt;p&gt;By addressing both technical weaknesses and human error, password managers help organizations protect systems from phishing attacks, credential stuffing, and other forms of unauthorized access.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;How do password managers support access governance in organizations?&lt;/h3&gt;



&lt;p&gt;Password managers improve access governance by centralizing credential management and enabling administrators to control who can access specific systems or accounts. Organizations can track credential usage through audit logs and revoke access quickly when employees leave or change roles, which helps enforce the principle of least privilege and strengthen accountability across teams.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;What features should a password manager have for GDPR compliance?&lt;/h3&gt;



&lt;p&gt;When evaluating password managers for &lt;a href=&quot;https://proton.me/business/gdpr&quot;&gt;GDPR-aligned security practices&lt;/a&gt;, organizations should look for features such as end-to-end encryption, strong administrative controls, secure credential sharing, detailed activity logging, and independent security audits. Transparency, open-source architecture, and clear data protection policies can also help organizations verify that the solution aligns with privacy and compliance expectations.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Can password managers help during a GDPR audit or compliance review?&lt;/h3&gt;



&lt;p&gt;Yes. Password managers can provide valuable documentation during audits or compliance reviews by demonstrating how authentication and access control policies are enforced. Activity logs, centralized management, and credential access records can show auditors that the organization maintains oversight of who can access sensitive systems and how those permissions are managed over time.&lt;/p&gt;
</content:encoded><category>For business</category><author>Kate Menzies</author></item><item><title>Congress is about to renew warrantless surveillance. And VPN users are caught in
the middle.</title><link>https://proton.me/blog/fisa-702-vpn-surveillance-risk</link><guid isPermaLink="true">https://proton.me/blog/fisa-702-vpn-surveillance-risk</guid><description>As Section 702 renewal approaches, lawmakers warn VPN users could be treated as “foreign” under US surveillance law, exposing a new privacy risk.</description><pubDate>Wed, 01 Apr 2026 19:06:39 GMT</pubDate><content:encoded>
&lt;p&gt;As Congress moves toward renewing &lt;a href=&quot;https://proton.me/blog/us-warrantless-surveillance#section-702-loophole&quot;&gt;Section 702&lt;/a&gt; of the Foreign Intelligence Surveillance Act (FISA), the debate is starting to encroach upon something far more familiar: the tools people use to protect themselves online.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://protonvpn.com/&quot;&gt;VPNs&lt;/a&gt;, used by millions to keep their internet activity private, route traffic through servers around the world. But that basic function raises a question lawmakers are only beginning to confront: What happens when protecting your privacy makes your activity look foreign?&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;A surveillance law that was never meant for you&lt;/h2&gt;



&lt;p&gt;Section 702 allows &lt;a href=&quot;https://proton.me/blog/trump-controls-nsa-fbi&quot;&gt;US intelligence agencies&lt;/a&gt; to collect communications from foreigners abroad without a warrant. In practice, that boundary has never held.&lt;/p&gt;



&lt;p&gt;The system routinely pulls in Americans’ emails, messages, and calls when they interact with foreign targets or pass through global infrastructure.&lt;/p&gt;



&lt;p&gt;Civil liberties groups, lawmakers, and even courts have raised concerns for years about how often that data is searched &lt;a href=&quot;https://proton.me/blog/us-warrantless-surveillance&quot;&gt;without a warrant&lt;/a&gt;. Now the law is up for renewal again, with an April deadline fast approaching. And despite repeated evidence of overreach, there is a push in Washington to extend these powers with minimal changes.&lt;/p&gt;



&lt;p&gt;Support for surveillance is bipartisan, but so is the backlash. Jim Himes, the top Democrat on the House Intelligence Committee, recently &lt;a href=&quot;https://www.nancyonnorwalk.com/protesters-gather-outside-town-hall-with-rep-jim-himes-raising-surveillance-concerns/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;faced protesters at a town hall&lt;/a&gt; raising concerns about Section 702.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;The VPN problem no one accounted for&lt;/h2&gt;



&lt;p&gt;A new &lt;a href=&quot;https://www.wyden.senate.gov/imo/media/doc/wyden_letter_to_gabbard_on_commercial_vpn.pdf&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;letter&lt;/a&gt; from senators including Ron Wyden raises a different risk — one that didn’t exist when Section 702 was written.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://protonvpn.com/what-is-a-vpn&quot;&gt;VPNs obscure a user’s location&lt;/a&gt; by routing traffic through &lt;a href=&quot;https://protonvpn.com/vpn-servers&quot;&gt;servers around the world&lt;/a&gt;. But under current surveillance rules, that same behavior can make an American look like a foreigner.&lt;/p&gt;



&lt;p&gt;Lawmakers are asking whether intelligence agencies treat VPN traffic as “foreign” by default — a classification that could strip users of constitutional protections and place them inside the Section 702 surveillance pipeline.&amp;nbsp;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;A renewal without reform expands the risk&lt;/h2&gt;



&lt;p&gt;There are proposals on the table to fix this. Mark Warner, who chairs the Senate Intelligence Committee, has said lawmakers will address concerns around the expanded definition of “electronic communication service providers” (ECSPs).&lt;/p&gt;



&lt;p&gt;That &lt;a href=&quot;https://proton.me/blog/us-warrantless-surveillance&quot;&gt;expansion&lt;/a&gt; widened who can be forced to assist in surveillance. It no longer stops at telecoms or email providers. It can include anyone with access to the systems your data passes through, from cloud services to public WiFi networks. Surveillance moves closer to the infrastructure of the internet, increasing the number of places where data can be collected under Section 702.&lt;/p&gt;



&lt;p&gt;The bipartisan &lt;a href=&quot;https://www.lee.senate.gov/2026/3/lee-introduces-bipartisan-government-surveillance-reform-act&quot; type=&quot;link&quot; id=&quot;https://www.lee.senate.gov/2026/3/lee-introduces-bipartisan-government-surveillance-reform-act&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Government Surveillance Reform Act&lt;/a&gt; would go further. Backed by lawmakers including Ron Wyden and Mike Lee, the bill would require a warrant before agencies can search Americans’ data collected under Section 702 and close a loophole that allows the government to &lt;a href=&quot;https://proton.me/blog/data-brokers&quot; type=&quot;link&quot; id=&quot;https://proton.me/blog/data-brokers&quot;&gt;buy personal data from brokers&lt;/a&gt; instead of going to court.&lt;/p&gt;



&lt;p&gt;That loophole matters because information that would normally require a warrant, like location data or browsing history, can be purchased on the open market with no judicial oversight.&lt;/p&gt;



&lt;p&gt;The bill would also roll back some of the most controversial recent changes, including how broadly the government can force companies or infrastructure providers to assist with surveillance.&lt;/p&gt;



&lt;p&gt;These changes target a known issue: surveillance systems built for foreign intelligence have been turned inward through technical loopholes and broad interpretations. As Ron Wyden has warned, Americans would be “&lt;a href=&quot;https://www.wyden.senate.gov/news/press-releases/wyden-calls-on-senate-to-reform-mass-surveillance-protect-americans-rights-and-reject-rudd-to-lead-nsa&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;stunned&lt;/a&gt;” to learn how these authorities are actually being used.&lt;/p&gt;



&lt;p&gt;Without reform, those gaps stay open. And as VPN use becomes more common, more ordinary behavior risks being swept into foreign intelligence collection.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Where Proton stands&lt;/h2&gt;



&lt;p&gt;At Proton, we build tools that give people control over their data without exposing them to hidden tradeoffs. Privacy should not depend on how your traffic is classified by a surveillance system. It should be the default.&lt;/p&gt;



&lt;p&gt;Using a VPN still protects you. It encrypts your internet traffic and prevents your provider, network operator, or anyone on the same connection from seeing what you do online. That protection matters, and it works. But encryption alone does not fix how surveillance laws are written. If your activity falls outside that protection, or is collected elsewhere, it can still be swept into systems like Section 702.&lt;/p&gt;



&lt;p&gt;This also raises a broader issue. Privacy should not stop at national borders. People should not be subject to surveillance simply because they are not American. Legal protections may vary. The principle does not.&lt;/p&gt;



&lt;p&gt;As lawmakers debate the future of Section 702, the stakes extend beyond intelligence policy. They shape what protection actually means in practice, and who receives it.&lt;/p&gt;
</content:encoded><category>Privacy news</category><author>Edward Komenda</author></item></channel></rss>