Resources

Blog

March Madness Challenge for Cybersecurity Professionals

Let the "madness" begin! The NCAA Basketball tournament is different for everyone. Some experience madness after a gut-wrenching triple overtime victory by their alma mater, while others after a buzzer-beater shot from half-court by a 16th-ranked Cinderella underdog that instantly knocks out one of your final four selections. However, to me there is nothing more maddening, in the delightful sense...
Blog

Are You Ready for PCI DSS 4.0?

PCI DSS 4.0 is here. If your organization handles PII data, you will need to be compliant with the new updates. We take a look at the new version and what it takes to stay compliant.
Datasheet

Clearswift and Cryoserver: Secure Email Archive

With email still being the primary business collaboration tool, organizations need to ensure that the content and information they send and receive is kept secure. Together, Clearswift and Cryoserver help to safeguard your organization’s critical information found within email thereby protecting the intellectual property and brand reputation of your organization while ensuring compliance, legal...
Blog

What Is an Enterprise’s Secondary Line of Defense Against Phishing Emails?

Following a multi-layered approach to phishing defense is a good idea, but using what you have close to home is best when it comes to a sensible security posture. In practice, a robust security awareness training program is key to instruct employees on what to look for when trying to spot phishing emails that may have landed in their inboxes.
Blog

Enhance Microsoft 365 Data Loss Prevention

DLP policies can identify, monitor, and automatically protect sensitive items across Microsoft 365 services. That's why using DLP tools, such as Clearswift, can enhance Microsoft 365 to protect data better.
Blog

Photo Security: Why a Picture Is Worth a Thousand Files

Communication through photos and short videos have now become commonplace with applications like Instagram and TikTok. While this popular use of imagery feels safe, many may not realize that photos can also be used to inconspicuously share data or carry out a ransomware cyberattack. Explore the threats of steganography and why ignoring it can be a significant email security mistake.
Blog

The Four 'C's of Security

Why the Three 'C's of Cybersecurity is arguably missing a very important 'C,' and why it is vital to an solid cybersecurity solution.
Blog

Heads up! New Canadian Data Privacy Act is Around the Corner

The time to prepare to meet soon-to-be-enacted Canadian data privacy regulations is now. Around the world, the awareness of the need to protect the privacy rights of individuals, including the access, transparency, and security of personal information has never been higher.
Blog

How to Enhance Data Loss Prevention in Office 365

Office 365 is a powerful collaboration tool, but can organizations be sure it provides the level of DLP capabilities required in today’s ever-morphing threat environment? Discover the benefits of pairing Clearswift with your Office 365 deployment.
Blog

New Encryption Guidance Published by UK’s Information Commissioner

The UK’s Information Commissioner’s Office published update guidance on encryption on 3rd March 2016, amidst concerns that there was a general lack of understanding of how and when to use encryption. It is the lack of appropriate technical measures, such as the use of encryption that has led to a significant number of fines issued in the UK since 2010. There is a risk of bigger fines with the...
Datasheet

Clearswift Secure Web Gateway

The internet is now considered an extension of an enterprise’s own infrastructure. With the ever growing adoption of cloud-based services such as Salesforce.com and Microsoft 365 , alongside employee use of the internet whilst at work, organizations need to ensure that the content and information that exists and is viewed online is both appropriate and permitted. Protecting themselves from any...
Datasheet

Clearswift Secure Email Gateway

Powerful Email Security with Real-Time Protection Around the world, defense agencies, governments, and financial institutions rely on Clearswift’s award-winning, on-premise Secure Email Gateway (SEG) to provide the highest level of protection for email, transforming it from a high-risk communication channel to one that is safe and secure. With deep content inspection capability and powerful...
Datasheet

Clearswift and Secure File Transfer

Find out how the Clearswift Secure ICAP Gateway, with its Deep Content Inspection engine, Adaptive Data Loss Prevention technology and Advanced Threat Protection , combine with Fortra' Secure File Transfer solutions to provide versatile secure collaboration. Safely Share Information while keeping your Critical Information Protected Advanced Threat Protection and Adaptive Data Loss Prevention for...
Blog

Data Security Best Practices Every CISO Should Know

The responsibility for an organization’s information and data security is a hefty one, knowing each day that it’s not a matter of whether a cybersecurity attack will happen, but rather when it will happen on your watch.