Blog

The Clearswift Blog covers all the latest IT Security news as it applies to you and your business.

Top Threats 2018

Cyber Threats & Technology Tips That Your Business Can’t Ignore

Wednesday, October 21, 2020 - 11:25

2018 has seen a number of new threats introduced into the cyberscape as well as an evolution of traditional threats. This means businesses need to be more prepared than ever for a data breach and...

Read More Tags:

How to Protect Your Organization from Advanced Persistent Threats

Thursday, September 3, 2020 - 12:49

Keeping your cyber defense strategies ahead of the game today is no easy task, especially when organizations face a daily proliferation of increasingly evasive cyber-attacks. Advanced persistent...

Read More Tags: Advance Threat Protection Cyber-attacks Inbound Threats Malware Phishing

Why Do I Need a Managed File Transfer Solution?

Friday, August 21, 2020 - 10:56

With data breaches and cyber-attacks seemingly now a daily occurrence, it’s no surprise to see technologies that can help secure sensitive data increasing in popularity and deployment. One such...

Read More Tags: File Transfers Compliance Information Governance

PCI Compliance: How to Automatically Redact Credit Card Information from Inbound Email

Wednesday, July 29, 2020 - 11:56

An often-overlooked challenge when it comes to PCI compliance are the occasions where customers ‘helpfully’ email their credit card details in an attempt to expedite an order or refund, or when they...

Read More Tags: Compliance Inbound Threats Adaptive Redaction
Debunking Lexical Expressions

Debunking Cybersecurity Jargon Part Five – What Are Lexical Expression Qualifiers?

Wednesday, July 15, 2020 - 09:54

Although in broad terms Clearswift is undoubtedly a technology firm, we always try and use business language rather than technical talk when discussing cybersecurity and how we can help organizations...

Read More Tags: Data Loss Prevention Data Breach Healthcare

Debunking Cybersecurity Jargon Part Four – What is Optical Character Recognition?

Monday, July 6, 2020 - 11:01

As part of our on-going blog series explaining some of the many acronyms and pieces of jargon that bedevil the cybersecurity industry, we turn our attention to optical character recognition...

Read More Tags: Adaptive Redaction Data Breach Compliance

File Transfer Solutions Emerge as a Key Technology for the Age of Collaboration

Thursday, June 18, 2020 - 09:00

We live and work in an era with more collaboration than ever before. Organizational structures are flatter, the world is smaller, and it is commonplace to work together with colleagues, partners,...

Read More Tags: Cyber-attacks File Transfers Data Breach

Debunking Cybersecurity Jargon Part Three – What is an Information Governance Server?

Tuesday, June 9, 2020 - 12:52

To clarify some of the widely used phrases in the cybersecurity sector, we have launched our ‘debunking cybersecurity jargon’ series of blog posts. We have already covered Adaptive Redaction and the...

Read More Tags: Information Governance Data Loss Prevention