Resources

Blog

The Consequences of a Data Breach: Why Fines are Just the Tip of the Iceberg

When it comes to the true ramifications of a data breach, suffering a financial penalty imposed by the ICO is just the tip of the iceberg. Although significant, fines are only one aspect financial organizations have to deal with as part of the aftermath. We saw the media frenzy that surrounded the Capital One data breach , and most of us heard when First American exposed 885 million sensitive...
Blog

Moving on From Encryption – The Case for eDRM

Enterprise digital rights management (eDRM or Information Rights Management, IRM) has had a rocky start to life. While it’s been around for the last 20 years and is seen as the next step on from encryption, it just hasn’t made it into mainstream use.
Blog

Clearswift Wins DLP Award at Computing Security Excellence Awards

Today, we are thrilled to announce our 2019 Computing Security Excellence Award win for Data Loss Prevention (email and web) – the second consecutive win for us at the awards! The Computing Security Excellence Awards celebrate the highest quality cybersecurity products, so it’s fantastic to see our Adaptive Data Loss Prevention (DLP) solution recognized for its market-leading offering. Big threats...
Blog

The Threat of Unwanted Data Acquisition

Central to many cyber security strategies are technologies, processes and procedures designed to prevent sensitive data from leaving the organization. Avoiding data breaches is something most companies avidly work to avoid especially in the wake of several high-profile non-compliance cases reported in the media recently. The damage to reputation alone is usually enough of an incentive for...
Blog

Clearswift’s Secure Email Gateway Wins Gold at Golden Bridge Awards

The winners of this year’s Golden Bridge Awards were announced last week, and we are delighted that Clearswift’s Secure Email Gateway was recognized in the ‘Email Security Innovation’ category. The coveted annual awards program celebrates global, cross-industry business achievements and honors the world’s best in organizational performance, products and services, innovations, executives and...
Blog

Five Ways to Secure Data Within the Defense Supply Chain

Unsurprisingly the defense industry requires the most secure information sharing environment in the world, but what implications does this have for ensuring the effective mitigation of cyber risks? There is something of a paradox between the need for complete information governance in the defense sector and the rise of IoT, BYOD, cloud computing and the democratization of data in today’s blurred...
Blog

Defense in Focus: With New Technology Comes New Risk

In any industry, the strive for digital transformation brings with it risk as well as opportunity. This is no more apparent than in the defense sector where several high-profile incidents have exposed vulnerabilities in areas such as email applications and other connected IoT devices.
Blog

Cyber Security and the Finance Sector: The Need for Stronger Data Protection Capabilities

After the fallout of the recent Capital One and Equifax data breaches, Clearswift commissioned a survey into the financial services sector to find out the extent of financial companies’ data protection capabilities. Worryingly, the results highlighted that 70% of financial enterprise organizations have experienced a cyber security incident in the past 12 months. This finding (among others...
Blog

Capital One Data Breach: A Reminder to Lock Your Back Door

In July 2019, leading financial organization Capital One received an anonymous e-mail revealing some bad news: “There appears to be some leaked data of yours in someone’s Github.” This leaked data was revealed to be the personal details of about 106 million individuals across the US and Canada, mostly consumers and small business owners that have applied for credit card products, including their...
Blog

The Unthought About Risks of Encryption

We hear a lot about encryption in this day in age, particularly around it being the panacea for compliance with data protection regulations. It’s true it can be a component of an information security and compliance strategy, but there are a variety of different encryption options available on the market today, so care needs to be taken with selecting the right solution to ensure it doesn’t turn...
Blog

Paying the Piper: What We Learned From the British Airways Fine

Protecting your data using Clearswift’s Secure Web Gateway solution and Secure ICAP Gateway deployed in both forward and reverse proxy modes and used to mitigate advanced threats on web pages. It also helps keep your business compliant.
Blog

Next Generation Cyber Threats: Images

Traditional Data Loss Prevention (DLP) technology provides protection against the traditional threat of someone trying to send a file to an unauthorized individual, but it required a step change to enable Adaptive Data Loss Prevention with Deep Content Inspection (DCI) to address threats such as ransomware that is delivered embedded in innocuous-looking documents. Clearswift delivered our first...
Blog

From Pesky to Dangerous - Image-based Spam

Those of you that can remember back to 2006 may recall that High School Musical was the highest selling album of the year. “We’re all in this together” was one of the most popular songs played at the time and, some would say, a pesky tune that would stick in your head. It also happened to be the same time when image-based spam was at its peak, another pesky occurrence that was hammering our...
Blog

The Top 5 Cyber Threats that Brexit Brings

Our data shows that 53% of firms are increasing their cybersecurity budgets in preparation for a rise in threats once we leave the EU. Businesses anticipate that Cybercriminals will seek to use confusion to their advantage, whether that is through malware attacks or targeted phishing campaigns to coerce critical data or financial gain from organizations.
Blog

Fighting the War at Home: How Your Employees are Your Greatest Asset in the Battle Against Data Loss

Sun Tzu once stated that: “The supreme art of war is to subdue the enemy without fighting” and two and a half thousand years later his rhetoric stands the test of time, as today we are seeing this ancient ideal applied in the most modern of battlegrounds: the fight against cyber-crime. To tackle both the malicious and accidental data loss threat, organizations need to have preventative technology...
Blog

A Business World in the Clouds

Safeguarding Against the Security Pitfalls of Cloud-Based Platforms Majority of us are intimately familiar with the concept of ‘the Cloud’, the seemingly omnipresent information sharing and storage solution. But how much do you know about the security systems that defend it? Most of you may already be using cloud-based programs such as GoogleDocs, DropBox or, more commonly, Microsoft 365 – the...