Blog

The Clearswift Blog covers all the latest IT Security news as it applies to you and your business.

Why Do I Need a Managed File Transfer Solution?

Friday, August 21, 2020 - 10:56

With data breaches and cyber-attacks seemingly now a daily occurrence, it’s no surprise to see technologies that can help secure sensitive data increasing in popularity and deployment. One such...

Read More Tags: File Transfers Compliance Information Governance

PCI Compliance: How to Automatically Redact Credit Card Information from Inbound Email

Wednesday, July 29, 2020 - 11:56

An often-overlooked challenge when it comes to PCI compliance are the occasions where customers ‘helpfully’ email their credit card details in an attempt to expedite an order or refund, or when they...

Read More Tags: Compliance Inbound Threats Adaptive Redaction

Debunking Cybersecurity Jargon Part Four – What is Optical Character Recognition?

Monday, July 6, 2020 - 11:01

As part of our on-going blog series explaining some of the many acronyms and pieces of jargon that bedevil the cybersecurity industry, we turn our attention to optical character recognition...

Read More Tags: Adaptive Redaction Data Breach Compliance
Endpoint blog image

10 things your endpoint security software must allow you to do

Thursday, April 16, 2020 - 16:32

Even during more normal times, there are millions of people all over the world that work remotely or from home regularly. During the current coronavirus crisis, that number has increased dramatically...

Read More Tags: IT Security Endpoint Protection Compliance
Breach that keeps on happening

How to prevent the data breach that keeps on happening

Wednesday, March 11, 2020 - 08:08

By Dr Steve Jeffery, pre-sales engineer
The potential for revealing personally identifiable information (PII) in the ‘To’ or ‘CC’ fields of an email is a risk well understood. Yet despite this, it...

Read More Tags: IT Security Internal Threats Compliance
‘Discovering’ Critical Data Stored On The Endpoint

‘Discovering’ Critical Data Stored On The Endpoint

Thursday, November 8, 2018 - 11:22

Ever wondered exactly how much data you have stored on your laptop?  It doesn’t take long to amass a gazillion files, some are ones you have authored, some have been sent by email, some are from...

Read More Tags:
Unwanted Data Acquisition in Emails

Return to sender: the threat of unwanted sensitive data acquisition via email

Friday, November 2, 2018 - 10:13

Over 281 billion emails are sent every day. In today’s technology-driven world, email is undoubtedly the main tool for business communication, and it’s estimated that the average employee will...

Read More Tags:
Clearswift Information Governance Server

The Clearswift Information Governance Server: preventing data breaches, supporting compliance

Thursday, August 16, 2018 - 14:30

The latest release of the Clearswift Information Governance Server (IGS) product offers new features and Data Loss Prevention (DLP) functionality, as well as the ability to track unstructured...

Read More Tags: