Getting ready for GDPR: key actions to ensure your organization is compliant

Language EnglishTags: <a href='/blog?tag=GDPR'>GDPR</a> <a href='/blog?tag=Compliance'>Compliance</a> Guy Bunker, SVP Products & Marketing General Data Protection Regulation (GDPR), the EU’s largest and most significant cross-border regulation comes into effect in May 2018, just over 6 months’ time. Organizations and businesses operating in the EU are racing to make changes and implement new technologies in order to become compliant. With varying performance across sectors in the race to GDPR readiness, you don’t want to be left in the dust. Clearswift’s latest research survey asked 600 senior business decision makers and 1,200 employees across the UK, US, Germany and Australia whether their firms currently have all of the necessary processes in place to be compliant for GDPR. Leading the charge in compliance, the top five performing sectors included technology and telecommunications (32%), education (31%), IT (29%), business services (29%) and finance (29%). Many sectors are lagging behind, with only 17% of healthcare, 18% of retail and 19% of marketing currently ready for GDPR. As the average company-wide IT-project takes 6 months to roll out, if you’re to stay ahead of the game and become fully compliant for GDPR when it lands in May 2018, you need to start putting things into action...
Read more

3 ways to protect your organization against the insider threat

Language EnglishTags: <a href='/blog?tag=Internal Threats'>Internal Threats</a> <a href='/blog?tag=BYOD'>BYOD</a> <a href='/blog?tag=Data Loss Prevention'>Data Loss Prevention</a> <a href='/blog?tag=The Enemy Within'>The Enemy Within</a> Unless you’ve been living under a rock, you probably know that cyber-attacks are on the rise and hitting businesses hard. Over the past few years, swathes of high-profile attacks have dominated media headlines with eye-watering data-breach and lost revenue figures. With global corporations, including Yahoo, Equifax and the NHS suffering devastating attacks, defending your organization might seem like a monumental task, especially if multimillion-dollar companies are struggling to defend against the sea of online threats. However, understanding where the threats are coming from and how incidents occur will give you the ability to protect your organization against them.  Our latest research reveals that the extended enterprise (employees, customers, suppliers, and ex-employees) is responsible for 74% of cyber incidents. The research, which surveyed 600 business decision makers and 1,200 employees across the UK, US, Germany, and Australia, found that an organization’s employees alone – whether through malicious or accidental actions – made up 42% of incidents, providing organizations with a clear starting point in addressing their cyber security.  Know thy enemy Sun Tzu’s frequently quoted sentiment is as applicable to...
Read more

Tips to protect the potential next target of the financial sector – Trading apps

Language EnglishTags: <a href='/blog?tag=Advanced Threat Protection'>Advanced Threat Protection</a> <a href='/blog?tag=Malware'>Malware</a> <a href='/blog?tag=Compliance'>Compliance</a> The media landscape today continues to share stories of the increased cyber vulnerabilities in mobile applications. While banks have had many years to develop and tailor their apps to respond to various security issues, with increased security around detecting fraudulent use, trading apps from smaller businesses have flown under the radar and missed out on improved security. Although cyber criminals do continue to invest their time and effort into targeting mainstream banking apps, the less frequently deployed trading apps are providing an easier opportunity for criminals looking for a bigger prize. In the past, it made sense for the cyber-criminal to target the mainstream app - more targets, more opportunity; it was a scattergun approach. However, as app security has improved and as methods of targeting have become more sophisticated, the cyber-criminal is now able to aim for the high value trading app. This is compounded by the fact that there is no official best practice for general app security, and the technology for such platforms is constantly changing. With this in mind, we’ve outlined a few simple tips that app vendors, including trading app...
Read more

Data harvesting opens the door to more Ransomware attacks

Language EnglishTags: <a href='/blog?tag=Cyber-attacks'>Cyber-attacks</a> <a href='/blog?tag=Cyber Security'>Cyber Security</a> <a href='/blog?tag=Malware'>Malware</a> Guy Bunker, SVP Products & Marketing We all know about the much publicised 2014 Yahoo hack that saw 500 million accounts compromised, wiping $350 million off the value of the company. In fact, it wasn’t a good year for anyone with a vested interested in keeping their social security number, address, email or first pet’s name out of the clutches of the dark side. If you add up the number of data breaches in 2014 alone, you’ll see that over 850 million individual records were stolen. And that’s just the ones we know about. In 2016, that number rose to more than 3 billion, with the update to the Yahoo! breach taking it to a billion records on its own. While the impact of a laptop theft is simple to understand, the more complex attacks with advanced persistent threats can take weeks, months or even years to come to light and be fully understood. Now consider that Ransomware attacks usually originate in personal data that was stolen at least two years beforehand. It’s no coincidence that in our post-WannaCry Survey, 3 out of 4 business in the...
Read more

Avoid waking up to encrypted computers

Language EnglishTags: Niall Jeger So you signed with your current supplier of IT security three years ago after a lengthy RFI, due diligence, PoC and procurement process. The project went well and you have auto renewed. You now have a robust solution to keep your business safe - so why the sleeplessness nights? Why? Because a lot has changed in the last three years. When you put together your security requirements in 2014, how far up on the priority list was Ransomware? How far up was GDPR compliance? Was the C-Suite of your organization even involved in the decision, and why are they asking so many questions now! 2014 incidents were more about data mining hacks with headlines about Heartbleed (Open SSL), eBay and Sony. But 2017 is shaping up to be way more sinister with much-publicised business-stalling Ransomware attacks. It seems the data hostage takers behind the May 12 WannaCry attack have made about £110k in Bitcoin, but the real cost, the human cost of the attack, was 850 medical operations being canceled in the UK alone. In June and July, we commissioned a survey of 1200 employee and 600 business decision makers after the...
Read more

WannaCry illustrated: See how attitudes have changed

Language EnglishTags: <a href='/blog?tag=Malware'>Malware</a> <a href='/blog?tag=Cyber Security'>Cyber Security</a> Clearswift's recent survey with Vanson Bourne into the impact of May 2017’s WannaCry attack has revealed big changes in the way organizations and employees deal with cyber security. We've created an infographic that shows not only the devastating impact of the attack but also how this affected behavior of the 600 decision makers and 1200 employees surveyed across the UK, Germany, USA, and Australia. The results are startling, with 58% of organizations saying they believe another attack is imminent, and 26% of interviewees claiming they were directly impacted by the attack. Download the infographic for more details from the full set of responses. Additional Information Schedule a Ransomware Prevention briefing or demo Clearswift Security+: Augmenting existing security infrastructure Related Articles Microsoft deal is a start, but more needs to be done to protect the NHS from cyber threats WannaCry fallout: What the ransomware epidemic means for the future of business Tags: Featured: 0
Read more

Silicon Review Accolade for Clearswift!

Language EnglishTags: <a href='/blog?tag=Awards'>Awards</a> Clearswift is honored to have been named as one of the Top 10 Fastest Growing Cyber Security companies in 2017 by Silicon Review magazine. The US-based publication was particularly impressed by Clearswift’s technology portfolio in the areas of data loss prevention and deep content inspection. Silicon Review also referenced Clearswift’s collaborative approach to Adaptive Data Loss Prevention (DLP) which ensures a disruption-free approach for businesses, while protecting against the unauthorized loss of critical information. Dr Guy Bunker, SVP Products and Marketing at Clearswift, said: “We’re absolutely delighted to see our growth and product development being recognized, and with the backing of RUAG, we expect to see even greater growth going forwards.” The publication looked back at the history of Clearswift, from the launch of its legacy MIMEsweeper product in 1995, through to the 2006 launch of the SECURE Email Gateway, and highlighted how the product range has expanded up to, and since, the recent acquisition by RUAG at the start of 2017. Clearswift’s most recent security initiative, SECURITY + which was launched in June, is aimed at organizations who have security solutions in place today and recognize...
Read more

Microsoft deal is a start, but more needs to be done to protect the NHS from cyber threats

Language EnglishTags: <a href='/blog?tag=Advanced Threat Protection'>Advanced Threat Protection</a> <a href='/blog?tag=Internal Threats'>Internal Threats</a> <a href='/blog?tag=Malware'>Malware</a> Following the recent WannaCry attack that affected so many organizations, both public and private, across the globe, many firms are now taking steps to protect themselves from potential threats in the future. One establishment in the UK that the WannaCry attack had ramifications for was the NHS. The incident meant multiple hospitals across England and Scotland had to cancel procedures after vital systems were brought down, with hackers demanding money to release the systems. Needless to say, with such a high-profile public institution being breached, both media and public interest were piqued and questions asked about how this could have been prevented. Shockingly, it was revealed that many of the NHS networks were still running systems with Windows XP, an out of date operating system that is now highly vulnerable to attacks. Running critical infrastructure on outdated software is incredibly risky, and needless to say the NHS (and others) paid the price for this. However, steps are now being taken to address this issue. It...
Read more

WannaCry fallout: What the ransomware epidemic means for the future of business

Language EnglishTags: <a href='/blog?tag=ransomware'>ransomware</a> <a href='/blog?tag=Cyber Security'>Cyber Security</a> <a href='/blog?tag=Clearswift'>Clearswift</a> <a href='/blog?tag=WannaCry'>WannaCry</a> <a href='/blog?tag=NHS'>NHS</a> Cyber security is now an agenda item in the boardroom, not just the IT department, in the wake of May’s Ransomware attack and the countdown to GDPR compliance well underway.In May, multiple organizations including the NHS, Spain’s Telefónica and Deutsche Bahn were struck with what is arguably the world’s most publicized cyber-attack. Within a day, the ransomware cryptoworm known as WannaCry crippled over 230,000 computers in over 150 countries.This has been one of the most globally damaging ransomware attacks to date. Even months after the attack, many organizations are still in the process of liberating their systems of the infection, making both businesses and employees around the world rethink their approach to cyber security. We recently commissioned a survey of 600 business decision makers and 1,200 employees across the UK, US, Germany, and Australia about the attack. The independent survey was carried out by Vanson Bourne http://www.vansonbourne.com/ and one key finding was 29% of UK firms intending to add cyber security to the boardroom agenda. How the WannaCry attack changed attitudes to cyber security: Cyber security is front...
Read more

What can businesses do to keep secure in the mobile working revolution?

Language EnglishTags: <a href='/blog?tag=BYOD'>BYOD</a> <a href='/blog?tag=Data Loss Prevention'>Data Loss Prevention</a> Dr Guy Bunker, SVP Products & Marketing, Clearswift UK The age of mobile working continues to gather pace.  More people than ever before are working from home or on the move, rather than in the traditional office environment. This isn’t surprising. Businesses are becoming increasingly digital and as such, can provide staff with increased opportunities to work outside the office. It isn’t just businesses that are leading the mobile working revolution - increased flexibility is also being pushed by employees. A recent study from BT found that 76 per cent of office workers include flexible working in their top three priorities of a benefits package from the ideal employer. This increased demand for mobile working capabilities means that organizations are having to evolve in order to recruit and keep their workforce happy. However, as the demand for mobile working increases, so too does the threat to a business’s critical information. This was highlighted in a recent report, which revealed that 29 percent of organizations have experienced either a data loss or breach as a direct result of mobile working. The increased risk of attacks...
Read more
Page 1 of 212