Resources

Video

Manage, Sanitize and Secure Your File Transfers

Join our cybersecurity experts to learn how Fortra can help you mount a triple-defense of managing, sanitizing, and securing your file transfers.

File Transfer Solutions Emerge as a Key Technology for the Age of Collaboration

We live and work in an era with more collaboration than ever before. Organizational structures are flatter, the world is smaller, and it is commonplace to work together with colleagues, partners, customers, suppliers, and many other stakeholders on a wide variety of projects. Furthermore, technology has emerged that makes such collaboration easy. It is as straightforward to...
Guide

The Unknown Threat Report

We surveyed 1,000 UK public sector employees to discover the current cybersecurity state-of-play, specifically within local and central government.
Blog

Lightning Can Strike Twice: Marriott International Suffers Second Data Breach

It feels like only 18 months ago that international hotel group Marriott was subject to a data breach in which hackers stole the records of 339 million guests. That’s because it *was* only 18 months ago, and yet despite Marriott being fined almost £100m by the Information Commissioner’s Office (ICO) under the General Data Protection Regulation (GDPR), it has fallen victim to another significant data breach.
Blog

Moving on From Encryption – The Case for eDRM

Enterprise digital rights management (eDRM or Information Rights Management, IRM) has had a rocky start to life. While it’s been around for the last 20 years and is seen as the next step on from encryption, it just hasn’t made it into mainstream use.
Blog

The Unthought About Risks of Encryption

We hear a lot about encryption in this day in age, particularly around it being the panacea for compliance with data protection regulations. It’s true it can be a component of an information security and compliance strategy, but there are a variety of different encryption options available on the market today, so care needs to be taken with selecting the right solution to ensure it doesn’t turn into a nightmare resulting in non-compliance.
Blog

GDPR - It’s Not Just for Europe: Protection of Data at the World Cup in Russia, Tokyo Olympics, and Beyond

With the World Cup in Russia this summer and the Olympics in Tokyo in 2020 further down the line; organizations conducting business around the event will face unprecedented challenges with cybersecurity and data protection. With the rise in data breaches in recent times, it might not be too strong to say that the success of these major international events relies upon the whole country being data security conscious. Everything from local hotels to travel agents and tour operators will process increasingly large quantities of customer data, including credit card details, making them ripe targets for cybercriminals. This personally identifiable data (PII) will include EU citizen data and so will need to be protected as per the EU General Data Protection Regulation (GDPR).
Blog

Preparing for the Inevitable: A Guide to Handling a Data Breach

Cyber-attacks and data breaches are now so widespread that it isn’t a matter of ‘if’ but ‘when’ your organization gets hit. According to the UK Government’s latest Cyber Security Breaches Survey, nearly seven in ten large businesses identified a breach or attack in the past year. When taking into consideration all sizes of businesses in the UK, nearly half had suffered a breach...
Blog

Tips to Protect the Potential Next Target of the Financial Sector – Trading Apps

The media landscape today continues to share stories of the increased cyber vulnerabilities in mobile applications. While banks have had many years to develop and tailor their apps to respond to various security issues, with increased security around detecting fraudulent use, trading apps from smaller businesses have flown under the radar and missed out on improved security. ...
Blog

What Can Businesses do to Keep Secure in the Mobile Working Revolution?

The age of mobile working continues to gather pace.  More people than ever before are working from home or on the move, rather than in the traditional office environment. This isn’t surprising. Businesses are becoming increasingly digital and as such, can provide staff with increased opportunities to work outside the office. It isn’t just businesses that are leading the mobile...
Blog

Winning at RSA Conference 2016

RSA Conference 2016 - Clearswift is all powered up for a huge three days of demonstrating our truly game changing adaptive DLP solution...
Blog

USBs: The Inconspicuous Enemy

At around three centimetres in length and weighing less than 30 grams on average, the USB flash drive would appear to be a relatively innocuous storage device, but losing or inserting an unknown USB into a personal or company computer could have devastating consequences. With over 22,000 USB sticks being left in the pockets of clothing sent to Britain’s dry cleaners, alone last year, we thought it valuable to outline the dangers of the simple USB and how individuals and organizations alike can protect against the potential cyber weaknesses they can bring about.
Blog

And the Award for “Best Data Loss Prevention” Solution Goes to…

It’s that time of year again; to roll out the red carpet, dress up in designer fashions and announce the nominations for the industry’s best information security solutions. Yes, while millions of movie fans around the world anxiously await their favorite celebrity to be adorned with prestigious accolades for their cinematic performances, nothing can impact the safety of their day-to-day digital lives than the critical information protection provided by breakthrough technologies.