Resources

Blog

How to Actively Prevent Workplace Cyber Bullying & Harassment

Organizations, for the most part, have systematically followed the same approach and strategy for years in their effort to prevent the costly impact of workplace cyber bullying and harassment. Human resources, legal and IT departments would work closely together to define detailed policies, conduct extensive trainings, and implement comprehensive response processes, while at the same time...
Blog

10 Shocking Malware and Ransomware Statistics

“Malware Mania” is back with a vengeance creating havoc for organizations of all sizes and in all industries. Cyber criminals have morphed their attack methods with the resurgence of macro malware and encrypting ransomware to evade traditional antivirus and sandbox defenses. As a result, cybersecurity teams are scrambling for a more effective way to deal with these shocking realities: 2,500 cases...
Blog

Four Simple Questions to Help Defend Law Firms From Cyber Attacks

I was fortunate enough to speak at the Defending Law Firms from Cyber Attack Conference this week, with the speaking slot directly after Christopher Graham, the UK Information Commissioner which worked really well – as he provided a few stories, the government view on privacy and legislation old and new, and then I spoke about some of today’s threats and risks and more importantly what can be done...
Blog

The Hidden Dangers Lurking Inside Public Sector Documents

Today, we live in an age where the ability to collaborate and share – with our colleagues, our family and our friends – has become critical to the public’s ability to operate as a whole. There has never been so much access to data and so many ways to share it, facilitating cooperation and collaboration between not only between citizens of the U.S., but also abroad. While the private sector has led...
Blog

'Cyber Essential' Advice for the Small Business

Small businesses, indeed businesses of all sizes for that matter, continue to face critical business challenges whether due to the economy, changes to regulations or financial issues. One challenge that never goes away, is how to keep information secure, in an ever-changing world.
Blog

Clearswift Recognized in the 2016 Gartner Magic Quadrant for Enterprise Data Loss Prevention

We are excited to share the news that we’ve been included in this year’s Gartner Magic Quadrant report for Enterprise Data Loss Prevention. As a new entrant to the January 2016 Magic Quadrant (MQ) for DLP, we are honored that we have been recognized among established players in the field by the industry’s top analyst firm. We believe this recognition is due to our unique, non-disruptive approach...
Press Release

Dexceo announced as new Scandinavia Distributor for Clearswift

March 11 , 2016 , Theale, UK – Clearswift, a global cybersecurity innovator and data loss prevention specialist, and Dexceo, leading Scandinavian security distributor, today announced a partnership bringing Clearswift adaptive data loss prevention solutions to the region. Dexceo CEO, Dennis Wøldike, having previously worked with Clearswift, is delighted to be given this opportunity; “I appreciate...
Blog

Winning at RSA Conference 2016

RSA Conference 2016 - Clearswift is all powered up for a huge three days of demonstrating our truly game changing adaptive DLP solution...
Press Release

Clearswift and SecureMySocial Announce Combined Offering

Clearswift, a global cyber security innovator and data loss prevention specialist, and SecureMySocial, provider of the world’s first comprehensive social media information-leak-prevention technology, today announced a joint offering that will enable businesses to protect critical information from threats regardless of employees’ locations or the medium used for communication.
Blog

8 Reasons Why DLP is Now Practical for SMB, Education and Local Government Organizations

While SMBs and public sector organizations were not the primary target for cyber-attacks and data breaches when DLP solutions were first brought to market, newer automated threats via malware and data theft monetization strategies (i.e. identify theft, ransomware, etc.) have made it more efficient and profitable to focus on smaller organizations that were apparently in the clear. As a result, the...
Blog

USBs: The Inconspicuous Enemy

At around three centimetres in length and weighing less than 30 grams on average, the USB flash drive would appear to be a relatively innocuous storage device, but losing or inserting an unknown USB into a personal or company computer could have devastating consequences. With over 22,000 USB sticks being left in the pockets of clothing sent to Britain’s dry cleaners, alone last year, we thought it...
Blog

Malware in Attachments - Stop Them Striking Your Organization

Recently, we have been hearing from our customers and partners of a concerning increase in the number of sophisticated malware attacks which are striking organizations. These are not simple attacks, but involve compromising reputable web servers in order to deliver malware infected content. The good news is that there is a solution to this – but why are traditional methods simply not working?
Blog

And the Award for “Best Data Loss Prevention” Solution Goes to…

It’s that time of year again; to roll out the red carpet, dress up in designer fashions and announce the nominations for the industry’s best information security solutions. Yes, while millions of movie fans around the world anxiously await their favorite celebrity to be adorned with prestigious accolades for their cinematic performances, nothing can impact the safety of their day-to-day digital...
Blog

Your Holiday Security Checklist

Are you ready for the holidays? As everyone wraps up for their holiday break, have you ensured that your organization is set to handle anything and everything when it comes to security while you’re out of the office? Stay ahead of the game by following our quick holiday security checklist. And don’t forget to check it twice!
Blog

New Email-Embedded Malware Getting Through Major AV Scans

Clearswift has recently been approached by a number of top cybersecurity teams and organizations to help them address an increasing threat of ongoing attempts to deliver embedded malware hidden in email attachments that is automatically activated by malicious scripting code. The sophistication and continuous morphing of delivery methods have made it so these new malware variants go undetected and...
Blog

What Is Adaptive Data Loss Prevention?

There’s a bewildering volume of data in modern business. IDC has predicted that by 2025, there will be 175 zettabytes of data in the world, a figure that's almost impossible to conceive. While this data will not be of interest to many people, there will be some that is highly prized indeed. Data has become highly valuable IP for many organizations, and the need to keep it protected from cyber...
Blog

Don’t Let “Dropbox” Cloud Your Security Controls

File Synchronisation and Sharing (FSS), or Cloud Storage solutions such as Dropbox, Onedrive, and Google Drive, enable individuals to sync and share documents, photos and other files across multiple platforms and devices. The success of Cloud Storage is largely driven by the consumer adoption of mobile devices and mobile workers requirements to access documents anywhere on any device. Cloud...
Press Release

New Research Reveals a Dramatic Disconnect in Data Security Within Organizations

Clearswift released new information that underscores the need for educating employees about security. The results show a dramatic disconnect between employees and IT within an organization with 73 percent of U.S. employees believing their company provides sufficient training on how to protect sensitive information, while 72 percent of IT professional believe that employers are not doing enough to educate employees.