How to neutralize the rising threat of ransomware

How to neutralize the rising threat of ransomware

|
Language EnglishTags: Earlier this month it was reported that the average pay-out for cybercriminals targeting individuals and businesses has increased to over $41,000 in Q3 of 2019, a growth of 13.1% over the previous quarter. The increase suggests that ransomware remains big business for cyber criminals, particularly as successful execution ... Read More
NIAS’19 in review by Clearswift CTO, Guy Bunker

NIAS’19 in review by Clearswift CTO, Guy Bunker

|
Language EnglishTags: Last week, Clearswift was a gold sponsor at NATO’s NIAS’19 three-day cyber security summit in Mons, Belgium, and it was a great event with over 1,800 delegates from 46 nations. Organised by the NCIA agency, whose mission is to create a ‘fully digital NATO enterprise’, the overall theme ... Read More
The threat of unwanted data acquisition

The threat of unwanted data acquisition

|
Language EnglishTags: Central to many cyber security strategies are technologies, processes and procedures designed to prevent sensitive data from leaving the organization. Avoiding data breaches is something most companies avidly work to avoid especially in the wake of several high-profile non-compliance cases reported in the media recently. The damage to ... Read More
5 cyber security threats you didn’t know you should be threatened by

5 cyber security threats you didn’t know you should be threatened by

|
Language EnglishTags: High profile hacks over the last few months have put large organizations front and center of a media frenzy that highlights the dangers of inadequate data protection. Global bank, Capital One, and leading hotel chain, Marriott International, have both been made an example of recently after customer data ... Read More
NIAS’19 in review by Clearswift CTO, Guy Bunker

NIAS’19 in review by Clearswift CTO, Guy Bunker

|
Language EnglishTags: Last week, Clearswift was a gold sponsor at NATO’s NIAS’19 three-day cyber security summit in Mons, Belgium, and it was a great event with over 1,800 delegates from 46 nations. Organised by the NCIA agency, whose mission is to create a ‘fully digital NATO enterprise’, the overall theme ... Read More
The threat of unwanted data acquisition

The threat of unwanted data acquisition

|
Language EnglishTags: Central to many cyber security strategies are technologies, processes and procedures designed to prevent sensitive data from leaving the organization. Avoiding data breaches is something most companies avidly work to avoid especially in the wake of several high-profile non-compliance cases reported in the media recently. The damage to ... Read More
5 cyber security threats you didn’t know you should be threatened by

5 cyber security threats you didn’t know you should be threatened by

|
Language EnglishTags: <a href='/blog?tag=Ransomware'>Ransomware</a> High profile hacks over the last few months have put large organizations front and center of a media frenzy that highlights the dangers of inadequate data protection. Global bank, Capital One, and leading hotel chain, Marriott International, have both been made an example of recently after ... Read More
Clearswift’s SECURE Email Gateway wins gold at Golden Bridge Awards

Clearswift’s SECURE Email Gateway wins gold at Golden Bridge Awards

|
Language EnglishTags: The winners of this year’s Golden Bridge Awards were announced last week, and we are delighted that Clearswift’s SECURE Email Gateway was recognized in the ‘Email Security Innovation’ category. The coveted annual awards program celebrates global, cross-industry business achievements and honors the world’s best in organizational performance, products ... Read More
Five ways to secure data within the defense supply chain

Five ways to secure data within the defense supply chain

|
Language EnglishTags: Unsurprisingly the defense industry requires the most secure information sharing environment in the world, but what implications does this have for ensuring the effective mitigation of cyber risks? There is something of a paradox between the need for complete information governance in the defense sector and the rise ... Read More
Five ways to secure data within the defense supply chain

Five ways to secure data within the defense supply chain

|
Language EnglishTags: Unsurprisingly the defense industry requires the most secure information sharing environment in the world, but what implications does this have for ensuring the effective mitigation of cyber risks? There is something of a paradox between the need for complete information governance in the defense sector and the rise ... Read More
Loading...