Image

Photo Security: Why a Picture Is Worth a Thousand Files
Jun 22, 2022
Communication through photos and short videos have now become commonplace with applications like Instagram and TikTok. While this popular use of imagery feels safe, many may not realize that photos can also be used to inconspicuously share data or carry out a ransomware cyberattack. Explore the threats of steganography and why ignoring it can be a significant email security mistake.
Image
One Email Security Solution, One Big Threat Protection Problem
Jun 15, 2022
Office 365 remains a popular tool worldwide, and It also remains a popular target for cyberattacks. Utilizing the email security solutions from Microsoft may seem the most convenient option, but the reality is, it comes with big gaps and workarounds for cybercriminal activity. Learn how Clearswift Secure Email Gateway can work alongside Microsoft to create an email security powerhouse.
Image

Prevent Supply Chain Cybersecurity Attacks with Safer Data Sharing
Apr 27, 2022
A supply chain cybersecurity attack comes from any outside partner vulnerabilities. Indeed your supply chain can be as risky as it is helpful. Find out how Clearswift's array of robust email security features keep your organization secure from external cyber risks.
Image

Data Compliance – Take a Practical Approach with 5 Key Steps
Mar 31, 2022
Being data compliant is not a simple process, but it is vital. We look at five steps organizations need to take to assist in data compliance and protection.
Image
Top Social Media Threats Targeting the Retail Industry
Mar 1, 2022
Social Media attacks targeting enterprises increased 103 percent in 2021, according to PhishLabs Quarterly Threat Treats & Intelligence Report.
Image

The Four 'C's of Security
Feb 17, 2022
Why the Three 'C's of Cybersecurity is arguably missing a very important 'C' and why it is vital to an solid cybersecurity solution.
Image

Do You Have a Sensitive Data Protection Checklist?
Feb 8, 2022
Data breaches and data loss, including the loss of sensitive information, are scary scenarios, and while no one can guarantee a cyberattack will not happen, there are ways to protect your organization’s data. We take a look at the top five tips for protecting your sensitive data.
Image

Data Privacy Day - Education and Inspiration
Jan 28, 2022
Dependency on the internet for communications and business are at an all time high, and so are cyberattacks. We discuss how you can protect your organization's sensitive information.
Image

Three Key Elements of Successful IoT Cybersecurity
Jan 25, 2022
The growth in IoT devices shows no sign of slowing. How can enterprises maintain strong IoT cybersecurity?
Image

How Top Cyber Security Teams Neutralize Ransomware Attacks
Jan 12, 2022
While organizations cannot stop ransomware attacks from happening, they can control how they protect themselves from these sophisticated attacks.
Image

Is your enterprise ready for the latest LockBit ransomware?
Nov 9, 2021
Perhaps the hardest element in staying protected against ransomware is managing the many different variants. LockBit 2.0 is the latest strain. Find out if you're ready, and what needs to be done to be prepared for tomorrow's threats.
Image

How to approach advanced email protection in your organization
Oct 7, 2021
Email is still perhaps the greatest potential cybersecurity threat to most organizations. We look at the best way of approaching advanced email protection.
Image
Is It Time Your Organization Adopted A Zero-Trust Approach to Cybersecurity?
Sep 20, 2021
Zero-trust is a rapidly emerging approach in modern cybersecurity. Clearswift DLP solutions can help with zero-trust without impacting the day-to-day business operations.
Image

Cybersecurity Risks in the Supply Chain Are Leaving Organizations Vulnerable
Sep 13, 2021
The cybersecurity risk from weaknesses in an organization’s supply chain is a growing challenge. How can this risk be successfully mitigated?
Image

Are Cybersecurity and Data Protection Now Integral to Business Success?
Sep 9, 2021
Organizations have had to increase the cybersecurity measures they put in place to keep data safe and secure. Consequently, cybersecurity solutions are more widely deployed, and data protection measures are prioritized more than ever.
Image
Why Cybersecurity Matters – Elevating Cybersecurity to the C-Suite in Your Organization
Sep 8, 2021
Any CEO not taking this seriously would be roundly criticized by customers, shareholders, partners, and more for such a stance. Yet is there a difference between what is said publicly by CEOs and what is actually done in private?
Image

Heads up! New Canadian Data Privacy Act is Around the Corner
Sep 6, 2021
The time to prepare to meet soon-to-be-enacted Canadian data privacy regulations is now. Around the world, the awareness of the need to protect the privacy rights of individuals, including the access, transparency, and security of personal information has never been higher.
Image
Maintaining Cybersecurity During Rapid Digital Transformation
Sep 1, 2021
Digital transformation is the process of using digital technologies to create new — or modify existing — business processes, culture, and customer experiences to meet changing business and market requirements.

Five Key Points When Preventing Cybersecurity Attacks in a World of Hybrid Working
Aug 30, 2021
Although the benefits of homeworking are well-documented and recent events have proven that people can work just as effectively from home as they can from the office, many people will likely want at least a partial return to the workplace.
Image
Ryuk, REvil, and Clop – How to Prevent Ransomware in Your Organization
Aug 26, 2021
Ryuk, REvil, NHS, Clop, Cezar, Pubg, Webroot, and Cryptolocker are just some examples of ransomware that have been prevalent over the past 12 months or so – there are others, and there undoubtedly will be more to come.
Pagination
- Page 1
- Next page