Resources

Blog

Preparing for the Inevitable: A Guide to Handling a Data Breach

Cyber-attacks and data breaches are now so widespread that it isn’t a matter of ‘if’ but ‘when’ your organization gets hit. According to the UK Government’s latest Cyber Security Breaches Survey , nearly seven in ten large businesses identified a breach or attack in the past year. When taking into consideration all sizes of businesses in the UK, nearly half had suffered a breach or attack. The...
Blog

Tips to Protect the Potential Next Target of the Financial Sector – Trading Apps

The media landscape today continues to share stories of the increased cyber vulnerabilities in mobile applications. While banks have had many years to develop and tailor their apps to respond to various security issues, with increased security around detecting fraudulent use, trading apps from smaller businesses have flown under the radar and missed out on improved security. Although cyber...
Blog

Silicon Review Accolade for Clearswift!

Clearswift is honored to have been named as one of the Top 10 Fastest Growing Cyber Security companies in 2017 by Silicon Review magazine. The US-based publication was particularly impressed by Clearswift’s technology portfolio in the areas of data loss prevention and deep content inspection. Silicon Review also referenced Clearswift’s collaborative approach to Adaptive Data Loss Prevention (DLP)...
Blog

WannaCry Fallout: What the Ransomware Epidemic Means for the Future of Business

Cyber security is now an agenda item in the boardroom, not just the IT department, in the wake of May’s Ransomware attack and the countdown to GDPR compliance well underway. In May, multiple organizations including the NHS, Spain’s Telefónica and Deutsche Bahn were struck with what is arguably the world’s most publicized cyber-attack. Within a day, the ransomware cryptoworm known as WannaCry...
Blog

Winning at RSA Conference 2016

RSA Conference 2016 - Clearswift is all powered up for a huge three days of demonstrating our truly game changing adaptive DLP solution...
Blog

USBs: The Inconspicuous Enemy

At around three centimetres in length and weighing less than 30 grams on average, the USB flash drive would appear to be a relatively innocuous storage device, but losing or inserting an unknown USB into a personal or company computer could have devastating consequences. With over 22,000 USB sticks being left in the pockets of clothing sent to Britain’s dry cleaners, alone last year, we thought it...
Blog

And the Award for “Best Data Loss Prevention” Solution Goes to…

It’s that time of year again; to roll out the red carpet, dress up in designer fashions and announce the nominations for the industry’s best information security solutions. Yes, while millions of movie fans around the world anxiously await their favorite celebrity to be adorned with prestigious accolades for their cinematic performances, nothing can impact the safety of their day-to-day digital...
Blog

Need to Know, or Really, Really Need to Know?

From the latest set of statistics released as part of the Clearswift Insider Threat Index, the one that really caught my eye, was the fact that 35% of employees say they have access to information above their pay grade.
Blog

Standalone DLP Solutions – Are They Right for You?

According to TATA Tele Business Services' blog in 2023, ". . .data loss prevention (DLP) has seen remarkable growth over the years and shows no signs of slowing down. . .and will continue to adapt and stay relevant." When we talk about data loss prevention, there are two major categories that DLP covers: DLP to stop sensitive data from being inadvertently accessed when an individual is authorized...
Blog

Next Generation Organization Agility... Are You Ready?

The blurring of work and life boundaries that exist on devices, both with the changes to the law on flexible working and the general rise of BYOD, means that it’s far too easy to send information to the wrong person via email – and then be penalised for it.
Blog

The Never-Ending Learning Curve

Not so long ago I wrote two blog posts on the Heartbleed vulnerability in OpenSSL. In one of them I alluded to the fact that we have not seen the end of it, unfortunately I was right.
Blog

10 Essential Steps to Security for Businesses - part 2

To mark the close of EU National Cyber Security Awareness Month, this week we’ll be providing a couple of top tips per day to help ensure that both internal and external company data remains secure. Top Tip 3: Attack spyware from multiple angles Spyware is one of the more insidious (and annoying) web hazards. Fight it from all directions: Stop it at the gateway – with automated filtering and...
Blog

Information Management Responsibility?

The management of information is primarily the owner’s responsibility and secondly the responsibility of all other stakeholders that may have a vested interest in the information, or the data owner. In a world where individuals and businesses are becoming engulfed in new data every day; personal ownership needs to take a more pro-active role in its management.
Blog

The Pitfalls of Handling Credit Card Details

Credit card fraud in 2012 cost $5.55 billion worldwide. But there are other problems - is the way you handle credit card information sufficient?
Blog

Adaptive Redaction - A World First in a Challenging Cyber Landscape

Following on from our recent acquisition news, I’m excited to share more news today. In the latest release of our award-winning Secure Web and Email Gateways we have added a world first: Adaptive Redaction technology. This is another step on our journey toward being a leader in the Information Governance space.