Blog
How Data Classification Helps Organizations Maintain a Strong Data Security Posture
Tuesday, December 1, 2020 - 09:11The rise of globally dispersed workforces and new work from home requirements are placing extraordinary pressure on every organization’s cybersecurity. And wherever there is upheaval, so cyber...
Read More62% of Financial Services Firms in the UK have Suffered a Cyber-attack in the Last 12 Months
Friday, November 6, 2020 - 09:48Financial Services (FS) is a sector facing unprecedented cybersecurity challenges. 62% of FS firms in the UK have suffered a cyber security attack in the last 12 months, while 40% have noticed more...
Read MoreWhy Do I Need a Managed File Transfer Solution?
Friday, August 21, 2020 - 10:56With data breaches and cyber-attacks seemingly now a daily occurrence, it’s no surprise to see technologies that can help secure sensitive data increasing in popularity and deployment. One such...
Read MoreDebunking Cybersecurity Jargon Part Three – What is an Information Governance Server?
Tuesday, June 9, 2020 - 12:52To clarify some of the widely used phrases in the cybersecurity sector, we have launched our ‘debunking cybersecurity jargon’ series of blog posts. We have already covered Adaptive Redaction and the...
Read MorePaying the Piper: What we learned from the British Airways fine
Monday, July 15, 2019 - 15:23The Breach
Truth be told it was never really a question of ‘if’ but rather ‘when’ a significant fine for GDPR non-compliance would occur. Following the announcement that British Airways has been...
The Top 5 Cyber Threats that Brexit Brings
Tuesday, May 14, 2019 - 09:12Regardless of your thoughts on Brexit, it can’t be denied that the drawn-out process has created mass confusion as firms rush to prepare for an unpredictable future. Because of this, we decided...
Read More‘Discovering’ Critical Data Stored On The Endpoint
Thursday, November 8, 2018 - 11:22Ever wondered exactly how much data you have stored on your laptop? It doesn’t take long to amass a gazillion files, some are ones you have authored, some have been sent by email, some are from...
Read MoreClearswift Endpoint Data Loss Prevention
Monday, November 5, 2018 - 15:16There are multiple places within your IT infrastructure where critical information is stored. These include email Inboxes, file servers, collaboration servers (some of which might be ‘in the cloud’)...
Read More