Working in cybersecurity is one of the most challenging roles in the organization. Not only are you tasked with keeping the business and its data safe and secure, but you must do so in the face of ever-increasing professionalism and sophistication on the part of cyber-criminals. There are more threats than ever before, and the consequences of a data breach are more significant too. In recent...
Organizations have had to increase the cybersecurity measures they put in place to keep data safe and secure. Consequently, cybersecurity solutions are more widely deployed, and data protection measures are prioritized more than ever.
Any CEO not taking this seriously would be roundly criticized by customers, shareholders, partners, and more for such a stance. Yet is there a difference between what is said publicly by CEOs and what is actually done in private?
The time to prepare to meet soon-to-be-enacted Canadian data privacy regulations is now. Around the world, the awareness of the need to protect the privacy rights of individuals, including the access, transparency, and security of personal information has never been higher.
The UK’s Information Commissioner’s Office published update guidance on encryption on 3rd March 2016, amidst concerns that there was a general lack of understanding of how and when to use encryption. It is the lack of appropriate technical measures, such as the use of encryption that has led to a significant number of fines issued in the UK since 2010. There is a risk of bigger fines with the...
Email encryption is the process of encrypting or disguising the content of email messages, protecting sensitive information from being read by anyone other than the intended recipient. With the continual evolution and enforcement of data protection laws, email encryption is more necessary than ever before to protect sensitive data from being exposed unauthorized and to mitigate the risk of data...
Whilst attacks from external hackers continue to present an ongoing danger to businesses, by unpacking these reported breaches, it is clear that the threat from within the organization is just as great.
For those wanting to collaborate on a sensitive document, there are a variety of cloud-based solutions that enable this - for sharing a file or simultaneously editing a document. Use of cloud solutions is also required if large files need to be shared.
There are technology solutions that can be deployed to mitigate the risk of weaponized documents coming into the organization (the most popular route for a ransomware attack), as well as strategies to segregate networks, systems and data to ensure that lateral movement from an infection is minimized.
The potential for revealing personally identifiable information (PII) in the ‘To’ or ‘CC’ fields of an email is a risk well understood. Yet despite this, it remains the source of far too many data breaches.
To mitigate the threat of data exfiltration, organizations deploy data loss prevention software tools at key egress points – email, web (cloud), and the endpoint. The security software provides visibility of the data being shared (who is sending what to whom) and allows controls to be put in place that prevent sensitive data from leaving the organization and malware from getting in.
Office 365 is a powerful collaboration tool, but can organizations be sure it provides the level of DLP capabilities required in today’s ever-morphing threat environment? Discover the benefits of pairing Clearswift with your Office 365 deployment.
Whether you are a subscriber to the Inbox Zero mode of email management or prefer to let your unread emails rack up to hundreds or even thousands, there can be little doubt about the sheer volume of email communication.
Although the benefits of homeworking are well-documented and recent events have proven that people can work just as effectively from home as they can from the office, many people will likely want at least a partial return to the workplace.