Resources

Guide

Secure Managed File Transfer Ultimate Buyer's Guide

In this Ultimate Buyer's Guide, you'll find all the information you need to help you successfully evaluate different managed file transfer solutions (MFT) and find the right solution for your organization.
blog

File Transfer Solutions Emerge as a Key Technology for the Age of Collaboration

We live and work in an era with more collaboration than ever before. Organizational structures are flatter, the world is smaller, and it is commonplace to work together with colleagues, partners, customers, suppliers, and many other stakeholders on a wide variety of projects. Furthermore, technology has emerged that makes such collaboration easy. It is as straightforward to work on a PowerPoint...
Guide

The Unknown Threat Report

We surveyed 1,000 UK public sector employees to discover the current cybersecurity state-of-play, specifically within local and central government.
Blog

Lightning Can Strike Twice: Marriott International Suffers Second Data Breach

It feels like only 18 months ago that international hotel group Marriott was subject to a data breach in which hackers stole the records of 339 million guests. That’s because it *was* only 18 months ago, and yet despite Marriott being fined almost £100m by the Information Commissioner’s Office (ICO) under the General Data Protection Regulation (GDPR), it has fallen victim to another significant...
Blog

The Unthought About Risks of Encryption

We hear a lot about encryption in this day in age, particularly around it being the panacea for compliance with data protection regulations. It’s true it can be a component of an information security and compliance strategy, but there are a variety of different encryption options available on the market today, so care needs to be taken with selecting the right solution to ensure it doesn’t turn...
Blog

GDPR - It’s Not Just for Europe: Protection of Data at the World Cup in Russia, Tokyo Olympics, and Beyond

With the World Cup in Russia this summer and the Olympics in Tokyo in 2020 further down the line; organizations conducting business around the event will face unprecedented challenges with cybersecurity and data protection. With the rise in data breaches in recent times, it might not be too strong to say that the success of these major international events relies upon the whole country being data...
Blog

Preparing for the Inevitable: A Guide to Handling a Data Breach

Cyber-attacks and data breaches are now so widespread that it isn’t a matter of ‘if’ but ‘when’ your organization gets hit. According to the UK Government’s latest Cyber Security Breaches Survey , nearly seven in ten large businesses identified a breach or attack in the past year. When taking into consideration all sizes of businesses in the UK, nearly half had suffered a breach or attack. The...
Blog

Tips to Protect the Potential Next Target of the Financial Sector – Trading Apps

The media landscape today continues to share stories of the increased cyber vulnerabilities in mobile applications. While banks have had many years to develop and tailor their apps to respond to various security issues, with increased security around detecting fraudulent use, trading apps from smaller businesses have flown under the radar and missed out on improved security. Although cyber...
Blog

What Can Businesses do to Keep secure in the Mobile Working Revolution?

The age of mobile working continues to gather pace. More people than ever before are working from home or on the move, rather than in the traditional office environment. This isn’t surprising. Businesses are becoming increasingly digital and as such, can provide staff with increased opportunities to work outside the office. It isn’t just businesses that are leading the mobile working revolution -...
Blog

Winning at RSA Conference 2016

RSA Conference 2016 - Clearswift is all powered up for a huge three days of demonstrating our truly game changing adaptive DLP solution...
Blog

USBs: The Inconspicuous Enemy

At around three centimetres in length and weighing less than 30 grams on average, the USB flash drive would appear to be a relatively innocuous storage device, but losing or inserting an unknown USB into a personal or company computer could have devastating consequences. With over 22,000 USB sticks being left in the pockets of clothing sent to Britain’s dry cleaners, alone last year, we thought it...
Blog

And the Award for “Best Data Loss Prevention” Solution Goes to…

It’s that time of year again; to roll out the red carpet, dress up in designer fashions and announce the nominations for the industry’s best information security solutions. Yes, while millions of movie fans around the world anxiously await their favorite celebrity to be adorned with prestigious accolades for their cinematic performances, nothing can impact the safety of their day-to-day digital...
Blog

What Is Adaptive Data Loss Prevention?

There’s a bewildering volume of data in modern business. IDC has predicted that by 2025, there will be 175 zettabytes of data in the world, a figure that's almost impossible to conceive. While this data will not be of interest to many people, there will be some that is highly prized indeed. Data has become highly valuable IP for many organizations, and the need to keep it protected from cyber...
Blog

Standalone DLP Solutions – Are They Right for You?

According to TATA Tele Business Services' blog in 2023, ". . .data loss prevention (DLP) has seen remarkable growth over the years and shows no signs of slowing down. . .and will continue to adapt and stay relevant." When we talk about data loss prevention, there are two major categories that DLP covers: DLP to stop sensitive data from being inadvertently accessed when an individual is authorized...