Blog

The Clearswift Blog covers all the latest IT Security news as it applies to you and your business.

File Transfer Solutions Emerge as a Key Technology for the Age of Collaboration

Thursday, June 18, 2020 - 09:00

We live and work in an era with more collaboration than ever before. Organizational structures are flatter, the world is smaller, and it is commonplace to work together with colleagues, partners,...

Read More Tags: Cyber-attacks File Transfers Data Breach

Debunking Cybersecurity Jargon Part Three – What is an Information Governance Server?

Tuesday, June 9, 2020 - 12:52

To clarify some of the widely used phrases in the cybersecurity sector, we have launched our ‘debunking cybersecurity jargon’ series of blog posts. We have already covered Adaptive Redaction and the...

Read More Tags: Information Governance Data Loss Prevention

Six Step Guide to Email Security Best Practice

Thursday, June 4, 2020 - 13:41

The popularity of email as a collaboration tool shows no sign of abating. In fact, research group Radicati predicts that in 2020 the number of emails sent and received per day will exceed 306 billion...

Read More Tags:

What Type of Email Encryption is Right for Your Organization?

Tuesday, June 2, 2020 - 11:03

For all the growth in use of productivity tools such as Trello or Slack, for all the deployment of collaboration and file-sharing systems such as Dropbox and Huddle, email remains the most widely-...

Read More Tags: Encryption Email Security eDRM

Another Day, Another Significant Data Breach – What We Know About the EasyJet Cyber-attack

Thursday, May 28, 2020 - 10:06

Significant data breaches feel like they are arriving now with ever-increasingly regularity. The latest breach to hit the headlines was with EasyJet. The budget airline announced on 19 May 2020 that...

Read More Tags: IT Security Data Breach GDPR

New Clearswift Report Highlights Areas of Cybersecurity Improvement for UK Public Sector

Tuesday, May 19, 2020 - 15:12

It’s been three years since the WannaCry ransomware cryptoworm first appeared, causing untold damage to organizations all over the world. One of the worst hit was the NHS, with the attack causing 200...

Read More Tags: Malware Phishing Inbound Threats
Debunking cybersecurity jargon

Debunking cybersecurity jargon part two – what is a deep content inspection engine?

Thursday, May 14, 2020 - 14:46

Given the prevalence of jargon and technical terms within the cybersecurity sector, we have launched a series of blog posts that look to debunk some of those terms and explain what they are in more...

Read More Tags: Adaptive Redaction Malware IT Security
Redaction Blog Image

Debunking cybersecurity jargon part one – what is adaptive redaction?

Friday, April 24, 2020 - 15:25

Like many industries and areas of technology, the cybersecurity sector is prone to using jargon, technical terms, and acronyms that can confuse even the most seasoned industry insider. We work with...

Read More Tags: Adaptive Redaction Data Loss Prevention IT Security