Technology

Startups, listen up: Proton says you're not "too small" to be hacked

2026-02-05 15:55
422 views
Startups, listen up: Proton says you're not "too small" to be hacked

Proton's latest report shatters the myth that hackers only target big banks, urging European startups to "build in private" before it's too late.

  1. VPN
  2. VPN Privacy & Security
Startups, listen up: Proton says you're not "too small" to be hacked News By Rene Millman published 5 February 2026

New data reveals over 300 million records were exposed in 2025, with small tech firms increasingly in the crosshairs

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration. (Image credit: Shutterstock)
  • Copy link
  • Facebook
  • X
  • Whatsapp
  • Reddit
  • Pinterest
  • Flipboard
  • Threads
  • Email
Share this article 0 Join the conversation Follow us Add us as a preferred source on Google Newsletter Tech Radar Get the TechRadar Newsletter

Sign up for breaking news, reviews, opinion, top tech deals, and more.

Contact me with news and offers from other Future brands Receive email from us on behalf of our trusted partners or sponsors By submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.

You are now subscribed

Your newsletter sign-up was successful

An account already exists for this email address, please log in. Subscribe to our newsletter
  • Proton recorded 794 major breaches in 2025, exposing 306+ million records
  • 71% of breaches affected small- and medium-sized businesses
  • Proton urges startup founders to "build in private"

If you are a startup founder, you might assume your business is too small, too new, or too obscure to attract the attention of cybercriminals. You would also be wrong.

According to a new report from Swiss privacy giant Proton – the provider behind one of the best VPN and secure email services – early-stage companies are becoming a primary target for hackers.

Data sourced from Proton's Data Breach Observatory reveals that 794 significant breaches occurred in 2025 alone, exposing a staggering 306.1 million records. While massive corporations often dominate the headlines, Proton found that 71% of breaches actually affected small- and medium-sized businesses.

You may like
  • Caution sign data unlocking hackers. Malicious software, virus and cybercrime, System warning hacked alert, cyberattack on online network, data breach, risk of website Most SMBs aren't set up to survive a major cyberattack - here's what needs to be done
  • A padlock icon next to a person working on a laptop. Your email app isn't the weak link but your cloud configuration probably is
  • Person working at a desk Remote work and the big breaches of 2025: Cause or convenient excuse?

The "too small to hack" myth is dead

Cybercriminals are looking for the path of least resistance, and increasingly, that path leads to small businesses that hold valuable intellectual property (IP) but lack the dedicated security teams of a Global 500 enterprise.

The report identifies a dangerous mindset among European entrepreneurs: the prioritization of speed over security.

"In startup circles, 'speed wins,' and security can be seen as a hindrance to that speed. This can result in missing crucial steps when securing a business," said Patricia Egger, Head of Security at Proton.

The report highlights that access is often the first target. Nearly half (49%) of the breaches tracked involved compromised passwords. For a small team using shared logins over Slack or saving credentials in browsers, a single slip-up can hand the keys to the entire kingdom to a threat actor.

Proton’s report cites sobering examples from 2025, including PhoneMondo, a five-person team in Germany that saw over 10.5 million records exposed, and Tracelo, a US-based tracking app that leaked 1.4 million records. In both cases, the size of the company didn't protect the massive amount of customer data they held.

As most SMBs aren't set up to survive a major cyberattack, the consequences, ranging from GDPR fines to total loss of consumer trust, can be fatal for a young company.

Today's best Proton VPN dealsProtonVPNProton VPN 24 Month US$3.59/mthViewat Proton VPNProtonVPNProton VPN 12 Month US$4.32/mthViewat Proton VPNProtonVPNProton VPN 1 Month US$9.99/mthViewat Proton VPN

How to "Build in Private"

To combat this, Proton is urging startups to "build in private." This initiative pushes founders to embed privacy into their operations from day one, rather than bolting it on after a breach occurs.

You may like
  • A padlock icon next to a person working on a laptop. Your email app isn't the weak link but your cloud configuration probably is
  • Person working at a desk Remote work and the big breaches of 2025: Cause or convenient excuse?
  • Being online Most Brits worry about online privacy, but they trust the wrong apps

Raphael Auphan, COO of Proton, notes that while consumers understand privacy, it can be harder to convey to founders of startups when widely adopted big tech tools prioritize speed.

"I cannot stress enough to founders and business owners the importance of pausing to make the conscious choice to 'build in private'," Auphan adds.

If you are running a small business, Proton’s report suggests three critical controls to stop you from becoming a statistic in 2026:

  • Eliminate Reusable Credentials: Move away from shared passwords. Use passkeys or a dedicated password manager to generate unique, strong logins. Enforce Multi-Factor Authentication (MFA) everywhere.
  • Gate Your Access: Don't let every employee access every file. Centralize your access paths using business VPNs to create a single private gateway. This ensures that even if one device is compromised, the attacker cannot move laterally across your entire network.
  • Encrypt Everything: Encryption doesn't stop attacks, but it makes the stolen data useless. Ensure your email, cloud storage, and calendar tools use end-to-end encryption so that only you hold the keys.

Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

Are you a pro? Subscribe to our newsletterContact me with news and offers from other Future brandsReceive email from us on behalf of our trusted partners or sponsorsBy submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over. CATEGORIES Security Pro Rene MillmanRene MillmanContributing Writer

Rene Millman is a seasoned technology journalist whose work has appeared in The Guardian, the Financial Times, Computer Weekly, and IT Pro. With over two decades of experience as a reporter and editor, he specializes in making complex topics like cybersecurity, VPNs, and enterprise software accessible and engaging.

View More

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.

Logout Read more A padlock icon next to a person working on a laptop. Your email app isn't the weak link but your cloud configuration probably is    Person working at a desk Remote work and the big breaches of 2025: Cause or convenient excuse?    Being online Most Brits worry about online privacy, but they trust the wrong apps    Security padlock and circuit board to protect data Print security means business security: protecting data across the physical-digital boundary    A 3d illustration of a server room with node base programming. Data design element. Concept of big data storage and cloud computing technology. Protect yourself from data breaches with this Black Friday VPN Deal    World Password Day 2025 Dozens of organizations fall victim to infostealers after failing to enforce MFA    Latest in VPN Privacy & Security Swiss flag with view of Geneva city, Switzerland 'A violation of fundamental rights' – Civil society calls on Switzerland to abandon data retention proposals    View on National Assembly building in Paris, France, with French and European flags flying. "VPNs are next on my list" – France set to evaluate VPN use following social media ban for under-15s    Windscribe mobile VPN app Windscribe promises users in Iran and Russia "solutions" to ongoing VPN crackdown — here's everything we know    PrivadoVPN app on a mobile phone 'Our users deserve better' – PrivadoVPN set to leave Switzerland on privacy grounds    Being online Most Brits worry about online privacy, but they trust the wrong apps    In this photo illustration, the big tech companies Google, Apple, Meta, Amazon and Microsoft logos are seen displayed on a mobile phone screen. Big Tech needs less than a month to pay off over $7 billion in 2025 fines, Proton warns    Latest in News Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration. Startups, listen up: Proton says you're not "too small" to be hacked    The Elder Scrolls 4: Oblivion Remastered The Elder Scrolls 4: Oblivion Remastered is coming to Nintendo Switch 2 this year, along with two other huge Bethesda games    The ExpressKeys password manager app from ExpressVPN displayed on a phone screen. ExpressVPN unveils new standalone password manager – ExpressKeys is now available for iOS and Android    Headshot of emma stone in black and white for Squarespace campaign Forget Seahawks vs Patriots: Wix vs Squarespace is the real showdown at Super Bowl 2026    Close up of a PS5 console and Dualsense controller Sony says Ghost of Yotei made a 'significant contribution' to the 8 million PS5 units that were sold in late 2025, a feat that surpassed the Nintendo Switch 2 by 1 million units    Power button of Steam Machine Steam Machine is delayed due to RAM crisis — and price is to be 'revisited'    LATEST ARTICLES