Blog

The Clearswift Blog covers all the latest IT Security news as it applies to you and your business.

Computing Security Excellence Awards 2018

Clearswift Wins DLP Award at Computer Security Excellence Awards!

Thursday, November 22, 2018 - 14:28

The Clearswift team is delighted to announce our 2018 Computer Security Excellence Award Win for Data Loss Prevention (email and web).  The awards dinner was held on November 22nd at the London...

Read More Tags: Awards Adaptive Redaction Data Loss Prevention
Social Media

Like, share and destroy: How to protect your business from the social media threat

Thursday, November 22, 2018 - 13:08

Social media is now the window to any business. 83% of organizations use social media as a marketing tactic, making it the most popular marketing tool. It is updated far more regularly than any...

Read More Tags: Adaptive Redaction Social Collaboration Web Security
Managed File Transfers

Managing critical file transfers

Thursday, November 15, 2018 - 14:02

While methods for digital collaboration are increasing, such as Instant Messaging, Social Media and a multitude of cloud applications, email remains a universal business communication tool for...

Read More Tags: Cloud Email Security Advanced Threat Protection Malware
‘Discovering’ Critical Data Stored On The Endpoint

‘Discovering’ Critical Data Stored On The Endpoint

Thursday, November 8, 2018 - 11:22

Ever wondered exactly how much data you have stored on your laptop?  It doesn’t take long to amass a gazillion files, some are ones you have authored, some have been sent by email, some are from...

Read More Tags: Compliance Internal Threats Information Governance
Clearswift Endpoint Data Loss Prevention

Clearswift Endpoint Data Loss Prevention

Monday, November 5, 2018 - 15:16

There are multiple places within your IT infrastructure where critical information is stored. These include email Inboxes, file servers, collaboration servers (some of which might be ‘in the cloud’)...

Read More Tags: Data Loss Prevention Information Governance Internal Threats Technology
Unwanted Data Acquisition in Emails

Return to sender: the threat of unwanted sensitive data acquisition via email

Friday, November 2, 2018 - 10:13

Over 281 billion emails are sent every day. In today’s technology-driven world, email is undoubtedly the main tool for business communication, and it’s estimated that the average employee will...

Read More Tags: Adaptive Redaction Compliance Email Security
Top Threats 2018

Cyber Threats & Technology Tips That Your Business Can’t Ignore

Tuesday, October 30, 2018 - 11:25

2018 has seen a number of new threats introduced into the cyberscape as well as an evolution of traditional threats. This means businesses need to be more prepared than ever for a data breach and...

Read More Tags: Advanced Threat Protection Cyber-attacks Cyber Security GDPR Phishing
Phishing with Invisible Ink

Phishing with Invisible Ink

Monday, October 29, 2018 - 16:36

By Dr. Guy Bunker
You might remember as a child, there was a revelation…invisible ink. Whether it was lemon juice, or the more modern (and frankly less messy) pen with UV light, there was suddenly...

Read More Tags: Phishing Cyber-attacks Data Loss Prevention