Resources

Blog

999,999.99 - It's a Big Number

This week there was an announcement of a new vulnerability in contactless pay cards. In the UK, is restricted to a maximum £20 per transaction, when dealing with foreign currency, the restriction is 999,999.99 in the currency of your choice.
Blog

The Hidden Costs of an Insider Attack

This past July I posted a blog regarding an insider attack on education services provider Benesse. At the time 10.2 million items of personal identifiable information relating to children had been hacked. Now, two months later, it is becoming disturbingly clear that the reality is in fact much worse.
Blog

'Accepted Everywhere'

Originally, when thinking about the claim ‘Accepted Everywhere’ I was sure it was the slogan of a specific credit card from across the pond.
Blog

Next Generation Organization Agility... Are You Ready?

The blurring of work and life boundaries that exist on devices, both with the changes to the law on flexible working and the general rise of BYOD, means that it’s far too easy to send information to the wrong person via email – and then be penalised for it.
Blog

The Never-Ending Learning Curve

Not so long ago I wrote two blog posts on the Heartbleed vulnerability in OpenSSL. In one of them I alluded to the fact that we have not seen the end of it, unfortunately I was right.
Blog

Fallout From eBay Cyber-Attack - One week On

I was kindly invited to speak with BBC business reporter Steph McGovern last week on BBC Breakfast News on the eBay cyber-attack, further to commenting on the story in the national and technology media.
Blog

Clearswift Triumphs at Info Security Awards 2014

By Heath Davies, Chief Executive. Direct from the annual RSA Conference I am delighted to share the news that Clearswift won an impressive three awards at the 10th Annual Info Security Awards 2014 ceremony.

Essential Tips to Protect Your Information at Work on Android and iOS

Essential Tips to Protect Your Information at Work on Android and iOS clearswift_admin Fri, 02/07/2014 - 10:26
Social Apps for Work - the fine line between professional and social communications
Data Loss Prevention
Email Security
Blog

Inside Out, Outside in, Inside in...

Threats from outside the organization are still happening, but it's the threats from within which are causing a greater challenge. Not just employees but third parties who have access to internal systems and information.
Blog

EU Regulations - The Latest Instalment to Protect European Data

Blog by Kevin Bailey, Head of Market Strategy. They say that there is no smoke without fire and the proposed EU Data Protection Regulation (EU DPR) that will supersede the previous EU Data Protection Directive 95/46/EC maybe the fire from which a lot of smoke and hot air has been expelled from Belgium over the past 2 years.
Blog

10 Essential Steps to Security for Businesses - part 2

To mark the close of EU National Cyber Security Awareness Month, this week we’ll be providing a couple of top tips per day to help ensure that both internal and external company data remains secure. Top Tip 3: Attack spyware from multiple angles Spyware is one of the more insidious (and annoying) web hazards. Fight it from all directions: Stop it at the gateway – with automated filtering and...
Blog

Why Access Information?

Blog by Kevin Bailey, Head of Market Strategy. One of the easiest ways to stop attacks on information is to close down the shutters, build impenetrable firewalls, stop all access and return to the world of the chalk and blackboard.
Blog

Information Management Responsibility?

The management of information is primarily the owner’s responsibility and secondly the responsibility of all other stakeholders that may have a vested interest in the information, or the data owner. In a world where individuals and businesses are becoming engulfed in new data every day; personal ownership needs to take a more pro-active role in its management.