Resources

Press Release

From customer to competitor: Mitigating the financial sector’s chief threats

Originally published on fintechmagazine.com . CTO at Clearswift, Dr. Guy Bunker, discusses his views on the top threats to finance and how to mitigate them. Recent reports show that cyber-attacks on financial services sector rose fivefold in 2018 and in April 2018, seven of the UK's biggest banks suffered major cyber-attacks that forced them to reduce operations or even shut down systems. The...
Blog

The Unthought About Risks of Encryption

We hear a lot about encryption in this day in age, particularly around it being the panacea for compliance with data protection regulations. It’s true it can be a component of an information security and compliance strategy, but there are a variety of different encryption options available on the market today, so care needs to be taken with selecting the right solution to ensure it doesn’t turn...
Press Release

An entire nation just got hacked

Originally posted on CNN.com Excerpt: Asen Genov is pretty furious. His personal data was made public this week after records of more than 5 million Bulgarians got stolen by hackers from the country's tax revenue office. In a country of just 7 million people, the scale of the hack means that just about every working adult has been affected. Read the full article >
Press Release

Bulgaria's Entire Population of 7 Million Just Got Hacked

Originally published on FOX 17 . SOFIA, Bulgaria (CNN) — Asen Genov is pretty furious. His personal data was made public last week after records of more than 5 million Bulgarians got stolen by hackers from the country’s tax revenue office. In a country of just 7 million people, the scale of the hack means that just about every working adult has been affected. We should all be angry. … The...
Press Release

Wounded By The Cutting Edge: Why Firms Must Be Cautious Of Integrating Emerging Tech Solutions

Originally published on businesstelegraph.co.uk . For the last few years, digital transformation within the tech sector has seemed akin to the opening of Pandora’s box : seemingly overnight firms have begun to be bombarded with AI driven solutions, the possibilities of commercial drones, edge computing, cloud storage, and of course the ubiquitous IoT software that can be found everywhere from a...
Press Release

75% of Organisations Have Been Hit by Spear Phishing

Originally published on itgovernance.co.uk . Phishing scams aren’t as compelling as some of the more sophisticated attacks that you read about. But their prosaic nature is part of what makes them so concerning. After all, every unusual email you receive could be a phishing scam, whether it’s an account reset message from Amazon or a work request from your boss. And evidence shows that attacks like...
Press Release

Breaking Down Five 2018 Breaches — And What They Mean For Security In 2019

Originally published on CENTRACOMM.net. Big hacks and data leaks are nothing new, but this year has seen a surge in reported breaches. The reason for this might be simple: After the EU general update to data protection regulation (GDPR) came into place in May, firms are more likely to report attacks. But it also demonstrates that the huge amounts of data collected by companies is not immune to...
Press Release

The Brexit Threat: Chaos, Confusion and Con Men

Originally published on infosecurity-magazine.com . Brexit presents a unique opportunity for hackers as, similarly to con men, they thrive on confusion and chaos – something that today’s political uncertainty provides in spades. Most people think of hacking as using malicious code for some nefarious purpose – be it stealing data or installing malware – but many often forget that in order to upload...
Blog

Paying the Piper: What We Learned From the British Airways Fine

Protecting your data using Clearswift’s Secure Web Gateway solution and Secure ICAP Gateway deployed in both forward- and reverse-proxy modes and used to mitigate advanced threats on web pages. It also helps keep your business compliant.
Press Release

Cyber Security Commentary On The DDOS Attacks On Telegram During Hong Kong Protests

Originally published on informationsecurity.report . As part of our experts Comments Series, Dr Guy Bunker, CTO at Clearswift Cyber Security commented below on the subject of the recent use of DDOS attacks on the messaging app Telegram, which the founder of Telegram states was a concerted state-sponsored attack intended to disrupt the Cantonese anti-extradition protests. Dr Bunker discusses the...
Blog

Next Generation Cyber Threats: Images

Traditional Data Loss Prevention (DLP) technology provides protection against the traditional threat of someone trying to send a file to an unauthorized individual, but it required a step change to enable Adaptive Data Loss Prevention with Deep Content Inspection (DCI) to address threats such as ransomware that is delivered embedded in innocuous-looking documents. Clearswift delivered our first...
Blog

From Pesky to Dangerous - Image-based Spam

Those of you that can remember back to 2006 may recall that High School Musical was the highest selling album of the year. “We’re all in this together” was one of the most popular songs played at the time and, some would say, a pesky tune that would stick in your head. It also happened to be the same time when image-based spam was at its peak, another pesky occurrence that was hammering our...
Blog

The Top 5 Cyber Threats that Brexit Brings

Our data shows that 53% of firms are increasing their cybersecurity budgets in preparation for a rise in threats once we leave the EU. Businesses anticipate that Cybercriminals will seek to use confusion to their advantage, whether that is through malware attacks or targeted phishing campaigns to coerce critical data or financial gain from organizations.