Resources

Blog

Clearswift sees 70% growth in its ‘Advanced Threat Protection’ Solution

Organizations look to a more effective layer of sanitization to defend against advanced malware and the resurgence of ransomware. Advanced malware attacks evading traditional perimeter defenses have exploded this past year enabling cybercriminals to steal sensitive data or hold it hostage for a hefty ransom. As a result, organizations across the spectrum from healthcare,...
Blog

Malware in Attachments - Stop Them Striking Your Organization

Recently, we have been hearing from our customers and partners of a concerning increase in the number of sophisticated malware attacks which are striking organizations. These are not simple attacks, but involve compromising reputable web servers in order to deliver malware infected content. The good news is that there is a solution to this – but why are traditional methods simply not working?
Blog

Your Holiday Security Checklist

Are you ready for the holidays? As everyone wraps up for their holiday break, have you ensured that your organization is set to handle anything and everything when it comes to security while you’re out of the office? Stay ahead of the game by following our quick holiday security checklist. And don’t forget to check it twice!
Blog

Next Generation Organization Agility... Are You Ready?

The blurring of work and life boundaries that exist on devices, both with the changes to the law on flexible working and the general rise of BYOD, means that it’s far too easy to send information to the wrong person via email – and then be penalised for it.
Blog

EU Regulations - The Latest Instalment to Protect European Data

Blog by Kevin Bailey, Head of Market Strategy. They say that there is no smoke without fire and the proposed EU Data Protection Regulation (EU DPR) that will supersede the previous EU Data Protection Directive 95/46/EC maybe the fire from which a lot of smoke and hot air has been expelled from Belgium over the past 2 years.
Blog

Why Access Information?

Blog by Kevin Bailey, Head of Market Strategy. One of the easiest ways to stop attacks on information is to close down the shutters, build impenetrable firewalls, stop all access and return to the world of the chalk and blackboard.
Blog

Quit While You’re Ahead...?

Last week saw The Open Group conference take place in London. In conjunction with this was The Jericho Forum’s announcement that after ten years they were declaring success and sunsetting.
Blog

The Pitfalls of Handling Credit Card Details

Credit card fraud in 2012 cost $5.55 billion worldwide. But there are other problems - is the way you handle credit card information sufficient?