Resources

Blog

Enhancing Cyber Threat Protection in Microsoft 365

The National Cyber Security Centre (NCSC) has recently published an advisory report that explores the ways M365 can be compromised by malicious parties, explaining how cybercriminals can use compromised M365 accounts to obtain financial profit. Integrating advanced threat prevention and data protection features to a M365 platform can enhance the existing security capabilities it offers. Clearswift’s bolt-on solution for M365 be seamlessly implemented to enable deep content inspection of all email traffic through the platform – inbound, outbound and internal – in both email messages and attachments.
Blog

Weaponizing GDPR: When Right to Be Forgotten (RTBF) Gets Ugly

An inadvertent and unfortunate consequence of the new GDPR rules is that the right to erasure is now free to submit meaning it is much easier to have your data removed. With our research revealing that only 34% of organizations have actually successfully completed a ‘right to be forgotten’ (RTBF) request, there is a potential to weaponize the regulation, giving hacktivists a new opportunity to drain a company’s resources and grind the business to a halt.
Blog

Has Your Multifunction Printer Become A Data Loss Risk? Consider DLP For Images.

Optical Character Recognition (OCR) as a technology has been around for a long time. It inspects images for text and then decodes them. While the human eye is fantastic at recognizing text, be it upside down or at an angle, it is computationally intensive to do this by machine on a regular basis. However, new algorithms now exist to deal with skew (angled text) as well as being able to handle multiple languages. The latest versions of Clearswift’s email product portfolio – the SECURE Email Gateway (SEG), SECURE Exchange Gateway (SXG) and ARgon – have a new cost option for OCR to mitigate this risk.
Blog

#1 Cyber Security Threat: Protecting Your Organization Against Email Based Attacks

On Friday 12th May last year, a global ransomware attack, aptly named WannaCry, infected over 200,000 computers in at least 100 countries. It began with an email at roughly 8:30am London time. By midday, employees at Spain’s mobile operating giant Telefónica were being shut out of their work terminals and in the UK, emergency services were being pulled and hospital facilities...
Blog

Preparing for the Inevitable: A Guide to Handling a Data Breach

Cyber-attacks and data breaches are now so widespread that it isn’t a matter of ‘if’ but ‘when’ your organization gets hit. According to the UK Government’s latest Cyber Security Breaches Survey, nearly seven in ten large businesses identified a breach or attack in the past year. When taking into consideration all sizes of businesses in the UK, nearly half had suffered a breach...
Blog

Tips to Protect the Potential Next Target of the Financial Sector – Trading Apps

The media landscape today continues to share stories of the increased cyber vulnerabilities in mobile applications. While banks have had many years to develop and tailor their apps to respond to various security issues, with increased security around detecting fraudulent use, trading apps from smaller businesses have flown under the radar and missed out on improved security. ...
Blog

Silicon Review Accolade for Clearswift!

Clearswift is honored to have been named as one of the Top 10 Fastest Growing Cyber Security companies in 2017 by Silicon Review magazine. The US-based publication was particularly impressed by Clearswift’s technology portfolio in the areas of data loss prevention and deep content inspection. Silicon Review also referenced Clearswift’s collaborative approach to Adaptive Data...
Blog

Microsoft Deal Is a Start, But More Needs to be Done to Protect the NHS from Cyber Threats

Following the recent WannaCry attack that affected so many organizations, both public and private, across the globe, many firms are now taking steps to protect themselves from potential threats in the future. One establishment in the UK that the WannaCry attack had ramifications for was the NHS. The incident meant multiple hospitals across England and Scotland had to cancel...
Blog

WannaCry Fallout: What the Ransomware Epidemic Means for the Future of Business

Cyber security is now an agenda item in the boardroom, not just the IT department, in the wake of May’s Ransomware attack and the countdown to GDPR compliance well underway. In May, multiple organizations including the NHS, Spain’s Telefónica and Deutsche Bahn were struck with what is arguably the world’s most publicized cyber-attack. Within a day, the ransomware cryptoworm...
Blog

Security vs. Productivity: The Office Macro Dilemma

There is no doubt that macros are being increasingly used to execute malicious code around the world and we have all know what impact it can have on an organization when they strike. But sometimes team members just need to run macros to get their work done. So, what do you do? As a security professional, you want to prevent macros from running because it's safer and you don’t...
Blog

Clearswift Wins Info Security PG Awards for Adaptive DLP, Office 365™ Email Security and Advanced Threat Prevention

Clearswift was recognized at the 13th Annual 2017 Info Security PG’s Global Excellence Awards® for its unique ability to prevent evasive cyber-attacks and data breaches through its game-changing Adaptive DLP, Office 365 Email Security and Advanced Threat Prevention solutions. Clearswift’s award-winning cyber security innovations are built around its unique layer of inspection...
Blog

Winning at RSA Conference 2016

RSA Conference 2016 - Clearswift is all powered up for a huge three days of demonstrating our truly game changing adaptive DLP solution...
Blog

USBs: The Inconspicuous Enemy

At around three centimetres in length and weighing less than 30 grams on average, the USB flash drive would appear to be a relatively innocuous storage device, but losing or inserting an unknown USB into a personal or company computer could have devastating consequences. With over 22,000 USB sticks being left in the pockets of clothing sent to Britain’s dry cleaners, alone last year, we thought it valuable to outline the dangers of the simple USB and how individuals and organizations alike can protect against the potential cyber weaknesses they can bring about.
Blog

Malware in Attachments - Stop Them Striking Your Organization

Recently, we have been hearing from our customers and partners of a concerning increase in the number of sophisticated malware attacks which are striking organizations. These are not simple attacks, but involve compromising reputable web servers in order to deliver malware infected content. The good news is that there is a solution to this – but why are traditional methods simply not working?