Rachel.Woodford

Debunking Cybersecurity Jargon Part Three – What is an Information Governance Server?

Language EnglishTags: <a href='/blog?tag='></a> <a href='/blog?tag='></a> To clarify some of the widely used phrases in the cybersecurity sector, we have launched…

6 months ago

Six Step Guide to Email Security Best Practice

Language EnglishTags: <a href='/blog?tag='></a> <a href='/blog?tag='></a> The popularity of email as a collaboration tool shows no sign of abating. In fact,…

7 months ago

What Type of Email Encryption is Right for Your Organization?

Language EnglishTags: <a href='/blog?tag=Encryption'>Encryption</a> <a href='/blog?tag=Email Security'>Email Security</a> <a href='/blog?tag=eDRM'>eDRM</a> For all the growth in use of productivity tools such as…

7 months ago

Another Day, Another Significant Data Breach – What We Know About the EasyJet Cyber-attack

Language EnglishTags: <a href='/blog?tag=IT Security'>IT Security</a> <a href='/blog?tag=Data Breach'>Data Breach</a> <a href='/blog?tag=GDPR'>GDPR</a> Significant data breaches feel like they are arriving now…

7 months ago

New Clearswift Report Highlights Areas of Cybersecurity Improvement for UK Public Sector

Language EnglishTags: <a href='/blog?tag=Malware'>Malware</a> <a href='/blog?tag=Phishing'>Phishing</a> <a href='/blog?tag=Inbound Threats'>Inbound Threats</a> It’s been three years since the WannaCry ransomware cryptoworm first appeared,…

7 months ago

Debunking cybersecurity jargon part two – what is a deep content inspection engine?

Language EnglishTags: <a href='/blog?tag=Adaptive Redaction'>Adaptive Redaction</a> <a href='/blog?tag=Malware'>Malware</a> <a href='/blog?tag=IT Security'>IT Security</a> Given the prevalence of jargon and technical terms within…

7 months ago

Debunking cybersecurity jargon part one – what is adaptive redaction?

Language EnglishTags: <a href='/blog?tag=Adaptive Redaction'>Adaptive Redaction</a> <a href='/blog?tag=Data Loss Prevention'>Data Loss Prevention</a> <a href='/blog?tag=IT Security'>IT Security</a> Like many industries and areas…

8 months ago

10 things your endpoint security software must allow you to do

Language EnglishTags: <a href='/blog?tag=IT Security'>IT Security</a> <a href='/blog?tag=Endpoint Protection'>Endpoint Protection</a> <a href='/blog?tag=Compliance'>Compliance</a> Even during more normal times, there are millions of…

8 months ago