Resources

Blog

Tips to Protect the Potential Next Target of the Financial Sector – Trading Apps

The media landscape today continues to share stories of the increased cyber vulnerabilities in mobile applications. While banks have had many years to develop and tailor their apps to respond to various security issues, with increased security around detecting fraudulent use, trading apps from smaller businesses have flown under the radar and missed out on improved security. ...
Blog

Microsoft Deal Is a Start, But More Needs to be Done to Protect the NHS from Cyber Threats

Following the recent WannaCry attack that affected so many organizations, both public and private, across the globe, many firms are now taking steps to protect themselves from potential threats in the future. One establishment in the UK that the WannaCry attack had ramifications for was the NHS. The incident meant multiple hospitals across England and Scotland had to cancel...
Blog

WannaCry Fallout: What the Ransomware Epidemic Means for the Future of Business

Cyber security is now an agenda item in the boardroom, not just the IT department, in the wake of May’s Ransomware attack and the countdown to GDPR compliance well underway. In May, multiple organizations including the NHS, Spain’s Telefónica and Deutsche Bahn were struck with what is arguably the world’s most publicized cyber-attack. Within a day, the ransomware cryptoworm...
Blog

What Can Businesses do to Keep Secure in the Mobile Working Revolution?

The age of mobile working continues to gather pace.  More people than ever before are working from home or on the move, rather than in the traditional office environment. This isn’t surprising. Businesses are becoming increasingly digital and as such, can provide staff with increased opportunities to work outside the office. It isn’t just businesses that are leading the mobile...
Blog

Security vs. Productivity: The Office Macro Dilemma

There is no doubt that macros are being increasingly used to execute malicious code around the world and we have all know what impact it can have on an organization when they strike. But sometimes team members just need to run macros to get their work done. So, what do you do? As a security professional, you want to prevent macros from running because it's safer and you don’t...
Blog

Clearswift Wins Info Security PG Awards for Adaptive DLP, Office 365™ Email Security and Advanced Threat Prevention

Clearswift was recognized at the 13th Annual 2017 Info Security PG’s Global Excellence Awards® for its unique ability to prevent evasive cyber-attacks and data breaches through its game-changing Adaptive DLP, Office 365 Email Security and Advanced Threat Prevention solutions. Clearswift’s award-winning cyber security innovations are built around its unique layer of inspection...
Blog

Document Sanitization and Redaction Safety Net for The Forgetful User

Policies written. Tools provided. Training conducted. As IT leaders, you have sufficiently enabled your users to properly sanitize and redact their documents before sharing outside the organization, but what happens when they forget? Worse, what happens if they intentionally ignore the policy and process altogether? No longer can the sanitization and redaction of documents for...
Blog

Clearswift sees 70% growth in its ‘Advanced Threat Protection’ Solution

Organizations look to a more effective layer of sanitization to defend against advanced malware and the resurgence of ransomware. Advanced malware attacks evading traditional perimeter defenses have exploded this past year enabling cybercriminals to steal sensitive data or hold it hostage for a hefty ransom. As a result, organizations across the spectrum from healthcare,...
Blog

Winning at RSA Conference 2016

RSA Conference 2016 - Clearswift is all powered up for a huge three days of demonstrating our truly game changing adaptive DLP solution...
Blog

USBs: The Inconspicuous Enemy

At around three centimetres in length and weighing less than 30 grams on average, the USB flash drive would appear to be a relatively innocuous storage device, but losing or inserting an unknown USB into a personal or company computer could have devastating consequences. With over 22,000 USB sticks being left in the pockets of clothing sent to Britain’s dry cleaners, alone last year, we thought it valuable to outline the dangers of the simple USB and how individuals and organizations alike can protect against the potential cyber weaknesses they can bring about.
Blog

Malware in Attachments - Stop Them Striking Your Organization

Recently, we have been hearing from our customers and partners of a concerning increase in the number of sophisticated malware attacks which are striking organizations. These are not simple attacks, but involve compromising reputable web servers in order to deliver malware infected content. The good news is that there is a solution to this – but why are traditional methods simply not working?
Blog

And the Award for “Best Data Loss Prevention” Solution Goes to…

It’s that time of year again; to roll out the red carpet, dress up in designer fashions and announce the nominations for the industry’s best information security solutions. Yes, while millions of movie fans around the world anxiously await their favorite celebrity to be adorned with prestigious accolades for their cinematic performances, nothing can impact the safety of their day-to-day digital lives than the critical information protection provided by breakthrough technologies.
Blog

New Email-Embedded Malware Getting Through Major AV Scans

Clearswift has recently been approached by a number of top cybersecurity teams and organizations to help them address an increasing threat of ongoing attempts to deliver embedded malware hidden in email attachments that is automatically activated by malicious scripting code. The sophistication and continuous morphing of delivery methods have made it so these new malware variants go undetected and pass right by major AV scanning solutions.
Blog

What Is Adaptive Data Loss Prevention?

There’s a bewildering volume of data in modern business. IDC has predicted that by 2025, there will be 175 zettabytes of data in the world, a figure that's almost impossible to conceive. While this data will not be of interest to many people, there will be some that is highly prized indeed. Data has become highly valuable IP for many organizations, and the need to keep it...
Blog

Need to Know, or Really, Really Need to Know?

From the latest set of statistics released as part of the Clearswift Insider Threat Index, the one that really caught my eye, was the fact that 35% of employees say they have access to information above their pay grade.
Blog

Standalone DLP Solutions – Are They Right for You?

According to TATA Tele Business Services' blog in 2023, ". . .data loss prevention (DLP) has seen remarkable growth over the years and shows no signs of slowing down. . .and will continue to adapt and stay relevant." When we talk about data loss prevention, there are two major categories that DLP covers: DLP to stop sensitive data from being inadvertently accessed when an...
Blog

Next Generation Organization Agility... Are You Ready?

The blurring of work and life boundaries that exist on devices, both with the changes to the law on flexible working and the general rise of BYOD, means that it’s far too easy to send information to the wrong person via email – and then be penalised for it.