Resources

Blog

What Is an Enterprise’s Secondary Line of Defense Against Phishing Emails?

Following a multi-layered approach to phishing defense is a good idea, but using what you have close to home is best when it comes to a sensible security posture. In practice, a robust security awareness training program is key to instruct employees on what to look for when trying to spot phishing emails that may have landed in their inboxes.
Blog

Holiday Season Triggers Rise in Counterfeit Activity

Counterfeit activity increases every year during the pre-holiday shopping blitz -- most notably Black Friday, Cyber Monday, Christmas and Hanukkah. Arm yourself with defenses now to combat ever-evolving counterfeiting methods during peak retail shopping season.
Blog

Financials & Card Data Top Q3 Targets on the Dark Web

In Q3, credit unions nearly overtook national banks as the top targeted industry on the Dark Web, according to recent data from Fortra’s PhishLabs.
Datasheet

Clearswift Malware Protection

The Clearswift Secure Gateways provide a number of ways to eliminate the risk of malware entering or proliferating around an organization.The primary methods of malware detection will be performed through the use of Sophos and Avira Anti-Virus (AV) software. In recent real-world testing conducted by AV-Test in May-June 2023, both anti-virus vendors scored perfect scores against zero-day malware...
Datasheet

Clearswift and Secure File Transfer

Find out how the Clearswift Secure ICAP Gateway, with its Deep Content Inspection engine, Adaptive Data Loss Prevention technology and Advanced Threat Protection , combine with Fortra' Secure File Transfer solutions to provide versatile secure collaboration. Safely Share Information while keeping your Critical Information Protected Advanced Threat Protection and Adaptive Data Loss Prevention for...
Datasheet

Clearswift and Cyber Kill Chain

The Cyber Kill Chain is a framework developed by Lockheed Martin for the identification and prevention of cyberattack activity. The model identifies what adversaries must complete in order to achieve their objective. Interrupt the chain, defeat the attack. Reconnaissance Installation Research, identification and selection of targets, looking for publically available information on the Internet and...
Blog

Microsoft 365 Is Good. Clearswift Makes it Safer and More Secure.

Microsoft 365 has certainly become a mainstay. In order to stay safe and secure, Fortra's Clearswift Secure Email Gateway provides an additional needed layer to Microsoft 365.
Blog

Capital One Data Breach: A Reminder to Lock Your Back Door

In July 2019, leading financial organization Capital One received an anonymous e-mail revealing some bad news: “There appears to be some leaked data of yours in someone’s Github.” This leaked data was revealed to be the personal details of about 106 million individuals across the US and Canada, mostly consumers and small business owners that have applied for credit card products, including their...
Blog

Next Generation Cyber Threats: Images

Traditional Data Loss Prevention (DLP) technology provides protection against the traditional threat of someone trying to send a file to an unauthorized individual, but it required a step change to enable Adaptive Data Loss Prevention with Deep Content Inspection (DCI) to address threats such as ransomware that is delivered embedded in innocuous-looking documents. Clearswift delivered our first...