Resources

Blog

Clearswift’s Secure Email Gateway Wins Gold at Golden Bridge Awards

The winners of this year’s Golden Bridge Awards were announced last week, and we are delighted that Clearswift’s Secure Email Gateway was recognized in the ‘Email Security Innovation’ category. The coveted annual awards program celebrates global, cross-industry business achievements and honors the world’s best in organizational performance, products and services, innovations, executives and...
Blog

Defense in Focus: With New Technology Comes New Risk

In any industry, the strive for digital transformation brings with it risk as well as opportunity. This is no more apparent than in the defense sector where several high-profile incidents have exposed vulnerabilities in areas such as email applications and other connected IoT devices.
Blog

Capital One Data Breach: A Reminder to Lock Your Back Door

In July 2019, leading financial organization Capital One received an anonymous e-mail revealing some bad news: “There appears to be some leaked data of yours in someone’s Github.” This leaked data was revealed to be the personal details of about 106 million individuals across the US and Canada, mostly consumers and small business owners that have applied for credit card products, including their...
Blog

The Unthought About Risks of Encryption

We hear a lot about encryption in this day in age, particularly around it being the panacea for compliance with data protection regulations. It’s true it can be a component of an information security and compliance strategy, but there are a variety of different encryption options available on the market today, so care needs to be taken with selecting the right solution to ensure it doesn’t turn...
Blog

Paying the Piper: What We Learned From the British Airways Fine

Protecting your data using Clearswift’s Secure Web Gateway solution and Secure ICAP Gateway deployed in both forward- and reverse-proxy modes and used to mitigate advanced threats on web pages. It also helps keep your business compliant.
Blog

Next Generation Cyber Threats: Images

Traditional Data Loss Prevention (DLP) technology provides protection against the traditional threat of someone trying to send a file to an unauthorized individual, but it required a step change to enable Adaptive Data Loss Prevention with Deep Content Inspection (DCI) to address threats such as ransomware that is delivered embedded in innocuous-looking documents. Clearswift delivered our first...
Blog

From Pesky to Dangerous - Image-based Spam

Those of you that can remember back to 2006 may recall that High School Musical was the highest selling album of the year. “We’re all in this together” was one of the most popular songs played at the time and, some would say, a pesky tune that would stick in your head. It also happened to be the same time when image-based spam was at its peak, another pesky occurrence that was hammering our...
Blog

The Top 5 Cyber Threats that Brexit Brings

Our data shows that 53% of firms are increasing their cybersecurity budgets in preparation for a rise in threats once we leave the EU. Businesses anticipate that Cybercriminals will seek to use confusion to their advantage, whether that is through malware attacks or targeted phishing campaigns to coerce critical data or financial gain from organizations.
Blog

Fighting the War at Home: How Your Employees are Your Greatest Asset in the Battle Against Data Loss

Sun Tzu once stated that: “The supreme art of war is to subdue the enemy without fighting” and two and a half thousand years later his rhetoric stands the test of time, as today we are seeing this ancient ideal applied in the most modern of battlegrounds: the fight against cyber-crime. To tackle both the malicious and accidental data loss threat, organizations need to have preventative technology...
Blog

A Business World in the Clouds

Safeguarding Against the Security Pitfalls of Cloud-Based Platforms Majority of us are intimately familiar with the concept of ‘the Cloud’, the seemingly omnipresent information sharing and storage solution. But how much do you know about the security systems that defend it? Most of you may already be using cloud-based programs such as GoogleDocs, DropBox or, more commonly, Microsoft 365 – the...

Enhancing Cyber Threat Protection in Microsoft 365

Enhancing Cyber Threat Protection in Microsoft 365 clearswift_admin Mon, 02/11/2019 - 08:58
The National Cyber Security Centre (NCSC) has recently published an advisory report that explores the ways M365 can be compromised by malicious parties, explaining how cybercriminals can use compromised M365 accounts to obtain financial profit. Integrating advanced threat prevention and data protection features to a M365 platform can enhance the existing security capabilities it offers. Clearswift...
Email Security
Microsoft 365
Blog

Cutting Out the ‘False Positive’ with Lexical Expression Qualifiers

When it comes to traditional Data Loss Prevention (DLP) solutions, the ‘false positive’ is frequently the downfall. This is where an event is triggered by a policy in error. For example, a 16-digit number could be a credit card number, or it could be a reference number. If one is mistaken for the other, then this gives rise to a false positive. All DLP events need to be investigated, so the false...
Blog

Like, Share and Destroy: How to Protect Your Business From the Social Media Threat

Social media is now the window to any business. 83% of organizations use social media as a marketing tactic, making it the most popular marketing tool. It is updated far more regularly than any website and businesses build a following based on publishing engaging content regularly. While businesses see the importance of using social media to quickly build their brand and reputation, there has been...
Blog

‘Discovering’ Critical Data Stored On The Endpoint

Clearswift’s Endpoint DLP (Data Loss Prevention) solution leverages the same Deep Content Inspection Engine (DCI) which is used in its core SECURE Gateway products. The DCI can be used to scan saved files (referred to as data at rest (DAR)) on various endpoints, to identify potential data breach risks or non-compliance with company policy. For example, there may be spreadsheets containing PCI or...
Blog

Clearswift Endpoint Data Loss Prevention

Learn about the three key components to endpoint data loss prevention; device control, content transfer control and encryption, and discovering critical information at rest.