Resources

Blog

The Not-So-Hidden Dangers of Hidden Data

Odds are, files and documents in your organization are not sitting in a folder on a desk or in a filing cabinet in the office. On the contrary, they are sitting on the cloud or computer desktop, and they are being transferred over email. The convenience of sending documents quickly with a few clicks has transformed the speed of business. But, like all things digital, convenience comes with risks....
Blog

Gone Phishing: What’s the Best Way to Educate Staff on Security?

How do you work out the weakest link in your team? Who is that employee most likely to fall prey to the socially engineered scams that are making billions of pounds for cyber criminals on the black market?Pertinent questions in the aftermath of the recent Kaspersky Lab report that revealed more than 100 banks, financial institutions and e-payment systems in over 30 countries had been targeted by...
Blog

The Seven Deadly Sins of Cybersecurity

Knowing what your employees are up to, enables you to strengthen your security policies. We all make mistakes at work from time to time. And sometimes we do things we know we shouldn’t. In the fast paced modern world, it’s easy enough to send an email to the wrong person or end up taking company information home. Often the consequences will be a bit of embarrassment, but every now and again they...
Blog

Cybersecurity and the Finance Sector: The Need for Stronger Data Protection Capabilities

After the fallout of the recent Capital One and Equifax data breaches, Clearswift commissioned a survey into the financial services sector to find out the extent of financial companies’ data protection capabilities. Worryingly, the results highlighted that 70% of financial enterprise organizations have experienced a cyber security incident in the past 12 months. This finding (among others uncovered by our survey) highlights an increased industry need for financial organizations to shift gears and speed up the innovation and deployment of effective risk-mitigation strategies to address the latest cyber threats.
Blog

Do You Have a Sensitive Data Protection Checklist?

Data breaches and data loss, including the loss of sensitive information, are scary scenarios, and while no one can guarantee a cyberattack will not happen, there are ways to protect your organization’s data. We take a look at the top five tips for protecting your sensitive data.
Blog

Phishing with Invisible Ink

You might remember as a child, there was a revelation…invisible ink. Stepping forward to today, there is now a new type of phishing which uses invisible ink, or as it’s also called, ‘zero font’, as a means to beat the spam and phishing filters. Anti-spam / phishing filters work in several different ways; they look for specific words or phrases and there is then a statistical element. If there are 100,000 instances of the same message, it’s probably spam.
Blog

Download for a Data Breach. How to Avoid Unwanted Data Acquisition in Downloadable Documents

Downloading a document from websites and cloud collaboration applications is a common practice for many businesses. The finance department downloads an invoice, the HR department, a CV, and Business Development an RFP. While it’s often as common as replying to an email, employees often forget there is active content and hidden metadata embedded in everyday documents that have the potential to cause major data breaches.
Blog

Best Practice Steps for Safe Data Sharing

Digital data is everywhere, you only have to look at how much data is transmitted over the internet on a weekly, daily, hourly, or even second-by-second basis to understand just how much data is being shared.
Blog

Top 5 Cybersecurity Threats to the UK Healthcare Sector

The sheer volume and complexity of data held within the UK healthcare sector makes it a challenge from a cybersecurity perspective to keep secure. In fact, research from a survey we conducted recently revealed that 67% of healthcare organizations in the UK have suffered a cybersecurity incident over the last 12 months.With the introduction of new data regulations and new technologies across the...
Blog

QBot Campaigns Overwhelmingly Lead Reported Payloads in Q4

QBot was the most reported payload targeting employee inboxes in Q4, according to Fortra’s PhishLabs. This is the fourth consecutive month QBot has led malware activity as bad actors target organizations with a steady stream of high-volume attack campaigns. QBot previously represented the second most reported payload family, trailing behind RedLine Stealer in Q3. Email payloads remain the primary...
Blog

Advanced Information Security Features for Microsoft Office 365

In the last few years, Microsoft 365 (M365) has eclipsed all other cloud providers to emerge as the most widely used enterprise cloud service and the latest survey data shows that adoption of M365 is still increasing.It is not just impressive in its adoption rates, Microsoft has also been incremental evolving business technology; organizations now rely on cloud technology to function. However,...
Blog

What Is an Enterprise’s Secondary Line of Defense Against Phishing Emails?

Following a multi-layered approach to phishing defense is a good idea, but using what you have close to home is best when it comes to a sensible security posture. In practice, a robust security awareness training program is key to instruct employees on what to look for when trying to spot phishing emails that may have landed in their inboxes.