Resources

Blog

March Madness Challenge for Cybersecurity Professionals

Let the "madness" begin! The NCAA Basketball tournament is different for everyone. Some experience madness after a gut-wrenching triple overtime victory by their alma mater, while others after a buzzer-beater shot from half-court by a 16th-ranked Cinderella underdog that instantly knocks out one of your final four selections. However, to me there is nothing more maddening, in the delightful sense...
Datasheet

Clearswift Endpoint DLP

Business Problem With over 3 billion records lost through data breaches in 2017 and new data protections law being enforced across the globe, organizations need to understand where their critical information resides and ensure it can’t be leaked through removable devices. We live in a data centric world. Businesses provide employees access to data in order for them to do their job; to collaborate...
Blog

Do You Have a Sensitive Data Protection Checklist?

Data breaches and data loss, including the loss of sensitive information, are scary scenarios, and while no one can guarantee a cyberattack will not happen, there are ways to protect your organization’s data. We take a look at the top five tips for protecting your sensitive data.
Blog

Is your enterprise ready for the latest LockBit ransomware?

Perhaps the hardest element in staying protected against ransomware is managing the many different variants. LockBit 3.0 is the latest strain. Find out if you're ready, and what needs to be done to be prepared for tomorrow's threats.
Press Release

Fortra Expands Anti-phishing and DLP with Latest Acquisitions

Originally published in Enterprise Times In this article, Mike Devine and John Grancarich talk about the acquisition of PhishLabs and Digital Guardian. Excerpt: Another challenge with a wide product portfolio is how do you present it to customers. Is it a set of individual solutions? Are they complementary to each other? Are they integrated closely into a platform? Grancarich sees the platform as...
Blog

How to Enhance Data Loss Prevention in Office 365

Office 365 is a powerful collaboration tool, but can organizations be sure it provides the level of DLP capabilities required in today’s ever-morphing threat environment? Discover the benefits of pairing Clearswift with your Office 365 deployment.
Blog

Five Key Points When Preventing Cybersecurity Attacks in a World of Hybrid Working

Although the benefits of homeworking are well-documented and recent events have proven that people can work just as effectively from home as they can from the office, many people will likely want at least a partial return to the workplace.
Blog

Maintaining Cybersecurity During Rapid Digital Transformation

Digital transformation is the process of using digital technologies to create new — or modify existing — business processes, culture, and customer experiences to meet changing business and market requirements.
Blog

New Encryption Guidance Published by UK’s Information Commissioner

The UK’s Information Commissioner’s Office published update guidance on encryption on 3rd March 2016, amidst concerns that there was a general lack of understanding of how and when to use encryption. It is the lack of appropriate technical measures, such as the use of encryption that has led to a significant number of fines issued in the UK since 2010. There is a risk of bigger fines with the...
Blog

How to Neutralize the Rising Threat of Ransomware

There are technology solutions that can be deployed to mitigate the risk of weaponized documents coming into the organization (the most popular route for a ransomware attack), as well as strategies to segregate networks, systems and data to ensure that lateral movement from an infection is minimized.
Blog

How to Prevent Data Exfiltration

To mitigate the threat of data exfiltration, organizations deploy data loss prevention software tools at key egress points – email, web (cloud), and the endpoint. The security software provides visibility of the data being shared (who is sending what to whom) and allows controls to be put in place that prevent sensitive data from leaving the organization and malware from getting in.
Guide

Healthcare Cybersecurity Infographic

We surveyed senior IT decision makers working in the industry to find out the current cybersecurity state-of-play and identity the risks that present the greatest threats. The following infographic illustrates the survey’s key findings.
Demo

Fortra's Clearswift Endpoint Data Loss Prevention Demo

Endpoint DLP allows for organizations to detect, inspect, and secure critical data on endpoints even when users are not connected to the network. It is important to ensure that critical data that resides on laptops, servers and in the Cloud services is only used by the correct people and for the appropriate purposes. Your live demo will include: Discussion around your unique challenges and...
Blog

Best Practice Steps for Safe Data Sharing

Digital data is everywhere, you only have to look at how much data is transmitted over the internet on a weekly, daily, hourly, or even second-by-second basis to understand just how much data is being shared.