Resources | Clearswift

Resources

Blog

Clearswift Wins Info Security PG Awards for Adaptive DLP, Office 365™ Email Security and Advanced Threat Prevention

Clearswift was recognized at the 13th Annual 2017 Info Security PG’s Global Excellence Awards® for its unique ability to prevent evasive cyber-attacks and data breaches through its game-changing Adaptive DLP, Office 365 Email Security and Advanced Threat Prevention solutions. Clearswift’s award-winning cyber security innovations are built around its unique layer of inspection and sanitization that...
Blog

Cyber Security Predictions for 2017

Cyber attacks dominated the headlines in 2016. The tentacles of cyber threats span the globe and every industry; cyberwarfare involving critical infrastructure services, massive data breaches where troves of emails and data were stolen, and blackmarket ransomware attacks that have taken over control of critical IT systems - only to be released after the ransom sums were paid. Over two billion...
Blog

Data Harvesting Opens the Door to More Ransomware Attacks

We all know about the much publicised 2014 Yahoo hack that saw 500 million accounts compromised, wiping $350 million off the value of the company. In fact, it wasn’t a good year for anyone with a vested interested in keeping their social security number, address, email or first pet’s name out of the clutches of the dark side. If you add up the number of data breaches in 2014 alone, you’ll see that...
Blog

Stop Cyber Attacks Before They Start: Data Harvesting and Targeting

The Greek philosopher Plato wrote that “the beginning is the most important part of the work.” The great American statesman, scientist, and philosopher Benjamin Franklin similarly emphasized the importance of planning when he stated that “by failing to prepare, you are preparing to fail.” It is unfortunate that many cybercriminals heed their advice today. The number of threats continues to...
Blog

Healthcare: Top Trends Threatening the Privacy of Patient Data

The cyber-threat landscape is rapidly evolving, and it is becoming increasingly difficult to comply with new regulations and protect against the loss of patient. While the majority of news reports focus on malicious external threats and actors, 65 percent are the result of internal leaks. In addition, 73 percent of those are the result of inadvertent sharing of information. Challenges in...
Blog

How Banks are Adapting to Digital Disruption and Data Privacy Regulations

Digital disruption, changing consumer demographics and preferences on how they engage with their banks, along with burgeoning regulatory requirements are having far-reaching repercussions on banking. And banking executives are feeling the pressure; 85 percent believe industry boundaries are being erased and new banking paradigms are emerging. Digital Disruption Banks that resist digital...
Blog

GDPR: How to Prepare for a Borderless World of Data Privacy

One of the most influential business books of the early 21 st century is Thomas Friedman’s The World is Flat: A Brief History of the Twenty-First Century. He argued that the world is a level playing field where all competitors have equal opportunity. Historical and geographical divisions that gave certain advantages to countries, companies, and individuals are becoming increasingly irrelevant, and...
Blog

Clearswift to Discuss the “END of Ransomware Attacks” at Orlando and Atlanta Tech-Security Conferences

Ransomware and morphed forms of embedded malware are creating havoc for IT security organizations. Weaponized invoices, resumes and other malicious documents are distributed through compelling social engineering campaigns to evade existing email security gateways and sandbox analysis. Organizations are scrambling to find an immediate solution and have turned to Clearswift (see article Clearswift...
Blog

Document Sanitization and Redaction Safety Net for The Forgetful User

Policies written. Tools provided. Training conducted. As IT leaders, you have sufficiently enabled your users to properly sanitize and redact their documents before sharing outside the organization, but what happens when they forget? Worse, what happens if they intentionally ignore the policy and process altogether? No longer can the sanitization and redaction of documents for secure sharing rely...
Blog

Clearswift Wins Best Healthcare & Wellbeing Award!

We are pleased to share news that Clearswift was announced the winner of Very Important Benefits (VIBs) ‘Best Healthcare and Wellbeing Strategy Award’ for our approach to employee health and wellbeing! The VIBs are dedicated to championing the reward strategies of organizations of all sizes and sectors, and their providers. The finalists were hand selected by a best of breed panel of industry...
Blog

Clearswift’s Adaptive DLP Wins Top CEO World Award

Clearswift takes home the Gold Award for its Adaptive Data Loss Prevention innovation and transformative leadership. Gold Winner – New Products, Upgrades, and Innovations – Security Services - ARgon for Email Gold Winner - Most Innovative CEO - Security Services: Heath Davies, Chief Executive Officer, Clearswift Gold Winner - Executive of the Year - Security Services: Dr. Guy Bunker, SVP of...
Blog

Clearswift sees 70% growth in its ‘Advanced Threat Protection’ Solution

Organizations look to a more effective layer of sanitization to defend against advanced malware and the resurgence of ransomware. Advanced malware attacks evading traditional perimeter defenses have exploded this past year enabling cybercriminals to steal sensitive data or hold it hostage for a hefty ransom. As a result, organizations across the spectrum from healthcare, finance and manufacturing...
Blog

Give All Your Secrets to the Intern?

I recently spoke at an information security conference for Lawyers in Manchester. It was a good event, and there were lots of interesting discussions while there. However, it has been in some of the follow-up meetings, with more in-depth conversations that the penny has dropped over one particular issue –access to information. Both legal firms and accountancy firms hold enormous amounts of...
Blog

Forewarned is Forearmed: Preparing for a Cyber-Breach

The only thing in life that is certain is death and taxes, or so the saying used to go. Unfortunately, if you have a business then there is another certainty, a data loss incident. This might not be a hacker, in fact it is far less likely to be a hacker than someone inside your organization – and that someone could be you. Mistakes made by employees make up around 80% of data loss incidents. How...
Blog

How to Actively Prevent Workplace Cyber Bullying & Harassment

Organizations, for the most part, have systematically followed the same approach and strategy for years in their effort to prevent the costly impact of workplace cyber bullying and harassment. Human resources, legal and IT departments would work closely together to define detailed policies, conduct extensive trainings, and implement comprehensive response processes, while at the same time...
Blog

10 Shocking Malware and Ransomware Statistics

“Malware Mania” is back with a vengeance creating havoc for organizations of all sizes and in all industries. Cyber criminals have morphed their attack methods with the resurgence of macro malware and encrypting ransomware to evade traditional antivirus and sandbox defenses. As a result, cybersecurity teams are scrambling for a more effective way to deal with these shocking realities: 2,500 cases...
Blog

Four Simple Questions to Help Defend Law Firms From Cyber Attacks

I was fortunate enough to speak at the Defending Law Firms from Cyber Attack Conference this week, with the speaking slot directly after Christopher Graham, the UK Information Commissioner which worked really well – as he provided a few stories, the government view on privacy and legislation old and new, and then I spoke about some of today’s threats and risks and more importantly what can be done...
Blog

The Hidden Dangers Lurking Inside Public Sector Documents

Today, we live in an age where the ability to collaborate and share – with our colleagues, our family and our friends – has become critical to the public’s ability to operate as a whole. There has never been so much access to data and so many ways to share it, facilitating cooperation and collaboration between not only between citizens of the U.S., but also abroad. While the private sector has led...
Blog

'Cyber Essential' Advice for the Small Business

Small businesses, indeed businesses of all sizes for that matter, continue to face critical business challenges whether due to the economy, changes to regulations or financial issues. One challenge that never goes away, is how to keep information secure, in an ever-changing world.