Clearswift Secure Email and ICAP Gateway now Available on AWS Marketplace

Clearswift Secure Email and ICAP Gateway now Available on AWS Marketplace

|
Language EnglishTags: <a href='/blog?tag='></a> <a href='/blog?tag='></a> <a href='/blog?tag='></a> There’s no doubting the many benefits brought by a move to the cloud; it offers organizations flexibility, scalability and reduces capital costs. The adoption of cloud computing is widespread with 80% of organizations predicted to make the move by 2025. When moving on-premise ... Read More
How Data Classification Helps Organizations Maintain a Strong Data Security Posture

How Data Classification Helps Organizations Maintain a Strong Data Security Posture

|
Language EnglishTags: <a href='/blog?tag=Data Classification'>Data Classification</a> <a href='/blog?tag=Data Loss Prevention'>Data Loss Prevention</a> <a href='/blog?tag=Information Governance'>Information Governance</a> The rise of globally dispersed workforces and new work from home requirements are placing extraordinary pressure on every organization’s cybersecurity. And wherever there is upheaval, so cyber criminals thrive. Alongside the devastating health and economic ... Read More
How to Prevent Data Exfiltration

How to Prevent Data Exfiltration

|
Language EnglishTags: <a href='/blog?tag=Data Loss Prevention'>Data Loss Prevention</a> <a href='/blog?tag=Data Breach'>Data Breach</a> <a href='/blog?tag=Endpoint Protection'>Endpoint Protection</a> What is Data Exfiltration? Today, data is a valuable commodity. It has value to the organizations who own it and to those looking to exploit it through illegal activity. Data can be sensitive information about ... Read More
62% of Financial Services Firms in the UK have Suffered a Cyber-attack in the Last 12 Months

62% of Financial Services Firms in the UK have Suffered a Cyber-attack in the Last 12 Months

|
Language EnglishTags: <a href='/blog?tag=Data Loss Prevention'>Data Loss Prevention</a> <a href='/blog?tag=Cybersecurity'>Cybersecurity</a> <a href='/blog?tag=Information Governance'>Information Governance</a> Financial Services (FS) is a sector facing unprecedented cybersecurity challenges. 62% of FS firms in the UK have suffered a cyber security attack in the last 12 months, while 40% have noticed more cybersecurity incidents since the ... Read More
How to Protect Your Organization from Advanced Persistent Threats

How to Protect Your Organization from Advanced Persistent Threats

|
Language EnglishTags: <a href='/blog?tag=Advance Threat Protection'>Advance Threat Protection</a> <a href='/blog?tag=Cyber-attacks'>Cyber-attacks</a> <a href='/blog?tag=Inbound Threats'>Inbound Threats</a> <a href='/blog?tag=Malware'>Malware</a> <a href='/blog?tag=Phishing'>Phishing</a> Keeping your cyber defense strategies ahead of the game today is no easy task, especially when organizations face a daily proliferation of increasingly evasive cyber-attacks. Advanced persistent threats (APTs) are a particular concern ... Read More
Why Do I Need a Managed File Transfer Solution?

Why Do I Need a Managed File Transfer Solution?

|
Language EnglishTags: <a href='/blog?tag=File Transfers'>File Transfers</a> <a href='/blog?tag=Compliance'>Compliance</a> <a href='/blog?tag=Information Governance'>Information Governance</a> With data breaches and cyber-attacks seemingly now a daily occurrence, it’s no surprise to see technologies that can help secure sensitive data increasing in popularity and deployment. One such technology is Managed File Transfer – a software solution to ... Read More
PCI Compliance: How to Automatically Redact Credit Card Information from Inbound Email

PCI Compliance: How to Automatically Redact Credit Card Information from Inbound Email

|
Language EnglishTags: <a href='/blog?tag=Compliance'>Compliance</a> <a href='/blog?tag=Inbound Threats'>Inbound Threats</a> <a href='/blog?tag=Adaptive Redaction'>Adaptive Redaction</a> An often-overlooked challenge when it comes to PCI compliance are the occasions where customers ‘helpfully’ email their credit card details in an attempt to expedite an order or refund, or when they have issues ordering online. These actions ... Read More
Debunking Cybersecurity Jargon Part Five – What Are Lexical Expression Qualifiers?

Debunking Cybersecurity Jargon Part Five – What Are Lexical Expression Qualifiers?

|
Language EnglishTags: <a href='/blog?tag=Data Loss Prevention'>Data Loss Prevention</a> <a href='/blog?tag=Data Breach'>Data Breach</a> <a href='/blog?tag=Healthcare'>Healthcare</a> Although in broad terms Clearswift is undoubtedly a technology firm, we always try and use business language rather than technical talk when discussing cybersecurity and how we can help organizations. Over the last few months, we’ve ... Read More
Debunking Cybersecurity Jargon Part Four – What is Optical Character Recognition?

Debunking Cybersecurity Jargon Part Four – What is Optical Character Recognition?

|
Language EnglishTags: <a href='/blog?tag=Adaptive Redaction'>Adaptive Redaction</a> <a href='/blog?tag=Data Breach'>Data Breach</a> <a href='/blog?tag=Compliance'>Compliance</a> As part of our on-going blog series explaining some of the many acronyms and pieces of jargon that bedevil the cybersecurity industry, we turn our attention to optical character recognition technology or OCR as it is commonly known ... Read More
File Transfer Solutions Emerge as a Key Technology for the Age of Collaboration

File Transfer Solutions Emerge as a Key Technology for the Age of Collaboration

|
Language EnglishTags: <a href='/blog?tag=Cyber-attacks'>Cyber-attacks</a> <a href='/blog?tag=File Transfers'>File Transfers</a> <a href='/blog?tag=Data Breach'>Data Breach</a> We live and work in an era with more collaboration than ever before. Organizational structures are flatter, the world is smaller, and it is commonplace to work together with colleagues, partners, customers, suppliers, and many other stakeholders on ... Read More