Resources | Clearswift

Resources

Blog

Heads up! New Canadian Data Privacy Act is Around the Corner

The time to prepare to meet soon-to-be-enacted Canadian data privacy regulations is now. Around the world, the awareness of the need to protect the privacy rights of individuals, including the access, transparency, and security of personal information has never been higher.
Blog

New Encryption Guidance Published by UK’s Information Commissioner

The UK’s Information Commissioner’s Office published update guidance on encryption on 3rd March 2016, amidst concerns that there was a general lack of understanding of how and when to use encryption. It is the lack of appropriate technical measures, such as the use of encryption that has led to a significant number of fines issued in the UK since 2010. There is a risk of bigger fines with the...
Blog

Today’s Email Encryption Options. Which One is Right For You?

Email encryption is the process of encrypting or disguising the content of email messages, protecting sensitive information from being read by anyone other than the intended recipient. With the continual evolution and enforcement of data protection laws, email encryption is more necessary than ever before to protect sensitive data from being exposed unauthorized and to mitigate the risk of data...
Blog

Managing Critical File Transfers

For those wanting to collaborate on a sensitive document, there are a variety of cloud-based solutions that enable this - for sharing a file or simultaneously editing a document. Use of cloud solutions is also required if large files need to be shared.
Blog

How to Neutralize the Rising Threat of Ransomware

There are technology solutions that can be deployed to mitigate the risk of weaponized documents coming into the organization (the most popular route for a ransomware attack), as well as strategies to segregate networks, systems and data to ensure that lateral movement from an infection is minimized.
Blog

How to Prevent The Data Breach That Keeps On Happening

The potential for revealing personally identifiable information (PII) in the ‘To’ or ‘CC’ fields of an email is a risk well understood. Yet despite this, it remains the source of far too many data breaches.
Blog

How to Remove the Data Security Risk from File Transfers

The ability to communicate and share information – both inside and outside the organization – is key to the success of any modern business. Many industries have a requirement to request or share information for compliance purposes and some of that data will be sensitive in nature. For example, HR teams receiving copies of passports, driver’s licenses and bank details for new employees, healthcare...
Blog

How to Prevent Data Exfiltration

To mitigate the threat of data exfiltration, organizations deploy data loss prevention software tools at key egress points – email, web (cloud), and the endpoint. The security software provides visibility of the data being shared (who is sending what to whom) and allows controls to be put in place that prevent sensitive data from leaving the organization and malware from getting in.
Blog

How to Enhance Data Loss Prevention in Office 365

Office 365 is a powerful collaboration tool, but can organizations be sure it provides the level of DLP capabilities required in today’s ever-morphing threat environment? Discover the benefits of pairing Clearswift with your Office 365 deployment.
Blog

Five Key Points When Preventing Cybersecurity Attacks in a World of Hybrid Working

Although the benefits of homeworking are well-documented and recent events have proven that people can work just as effectively from home as they can from the office, many people will likely want at least a partial return to the workplace.
Blog

Maintaining Cybersecurity During Rapid Digital Transformation

Digital transformation is the process of using digital technologies to create new — or modify existing — business processes, culture, and customer experiences to meet changing business and market requirements.
Blog

Reflecting on RSA Conference 2014

The end of February. The RSA Conference 2014. Downtown San Francisco with 25,000+ other security professionals. It’s big... really, really big... 400 exhibitors, 500 speakers and tens of thousands of attendees. But what was hot? (Other than the Clearswift of course…)