Blog

Blog

March Madness Challenge for Cybersecurity Professionals

Let the "madness" begin! The NCAA Basketball tournament is different for everyone. Some experience madness after a gut-wrenching triple overtime victory by their alma mater, while others after a buzzer-beater shot from half-court by a 16th-ranked Cinderella underdog that instantly knocks out one of your final four selections. However, to me there is nothing more maddening, in the delightful sense...
Blog

Stolen Credit Union Data on Dark Web Hits High in Q4

In Q4, Dark Web activity targeting Credit Unions reached its highest count in five consecutive quarters, according to Fortra’s PhishLabs. Attacks on Credit Unions jumped significantly during the second half of 2022, with threat actors advertising stolen card data from these institutions almost as frequently as National/Regional Banks. Data tied to financial institutions is considered especially...
Blog

Today’s Email Encryption Options. Which One is Right For You?

Email encryption is the process of encrypting or disguising the content of email messages, protecting sensitive information from being read by anyone other than the intended recipient. With the continual evolution and enforcement of data protection laws, email encryption is more necessary than ever before to protect sensitive data from being exposed unauthorized and to mitigate the risk of data breaches occurring.
Blog

How to Remove the Data Security Risk from File Transfers

The ability to communicate and share information – both inside and outside the organization – is key to the success of any modern business. Many industries have a requirement to request or share information for compliance purposes and some of that data will be sensitive in nature. For example, HR teams receiving copies of passports, driver’s licenses and bank details for new employees, healthcare...
Blog

Managing Critical File Transfers

For those wanting to collaborate on a sensitive document, there are a variety of cloud-based solutions that enable this - for sharing a file or simultaneously editing a document. Use of cloud solutions is also required if large files need to be shared.
Blog

Public Sector Cybersecurity Priorities in 2021

The Covid-19 pandemic has undoubtedly changed working patterns for good. What are the implications for public sector organizations and what can they do to improve their cybersecurity posture?
Blog

File Transfer Solutions Emerge as a Key Technology for the Age of Collaboration

We live and work in an era with more collaboration than ever before. Organizational structures are flatter, the world is smaller, and it is commonplace to work together with colleagues, partners, customers, suppliers, and many other stakeholders on a wide variety of projects.Furthermore, technology has emerged that makes such collaboration easy. It is as straightforward to work on a PowerPoint...
Blog

The Unthought About Risks of Encryption

We hear a lot about encryption in this day in age, particularly around it being the panacea for compliance with data protection regulations. It’s true it can be a component of an information security and compliance strategy, but there are a variety of different encryption options available on the market today, so care needs to be taken with selecting the right solution to ensure it doesn’t turn into a nightmare resulting in non-compliance.
Blog

Paying the Piper: What We Learned From the British Airways Fine

Protecting your data using Clearswift’s Secure Web Gateway solution and Secure ICAP Gateway deployed in both forward- and reverse-proxy modes and used to mitigate advanced threats on web pages. It also helps keep your business compliant.
Blog

Fighting the War at Home: How Your Employees are Your Greatest Asset in the Battle Against Data Loss

Sun Tzu once stated that: “The supreme art of war is to subdue the enemy without fighting” and two and a half thousand years later his rhetoric stands the test of time, as today we are seeing this ancient ideal applied in the most modern of battlegrounds: the fight against cyber-crime. To tackle both the malicious and accidental data loss threat, organizations need to have preventative technology...
Blog

Like, Share and Destroy: How to Protect Your Business From the Social Media Threat

Social media is now the window to any business. 83% of organizations use social media as a marketing tactic, making it the most popular marketing tool. It is updated far more regularly than any website and businesses build a following based on publishing engaging content regularly. While businesses see the importance of using social media to quickly build their brand and reputation, there has been little emphasis on the downside to this. How social media can destroy a company’s reputation in an instant.
Blog

Cyber Threats & Technology Tips That Your Business Can’t Ignore

As new threats are introduced into the cyberscape as well as evolved traditional threats, businesses need to be more prepared than ever for a data breach and have the latest tools in place to mitigate risks.
Blog

Cloud Storage, File Sharing Apps and GDPR: This Could Get Ugly Fast!

Cloud storage services and file sharing apps such as Dropbox, Box, Microsoft OneDrive and Google Drive are so widely adopted by employees—knowingly or unknowingly by their IT departments—that most don’t think twice about using them to share corporate information.
Blog

Information Management Responsibility?

The management of information is primarily the owner’s responsibility and secondly the responsibility of all other stakeholders that may have a vested interest in the information, or the data owner. In a world where individuals and businesses are becoming engulfed in new data every day; personal ownership needs to take a more pro-active role in its management.