Resources

Video

How to Enhance Data Loss Prevention in Office 365

In this webinar, Nick Hogg, Director of Technical Training, talks through the data risk challenges with Office 365 and looks at ways you can further protect your critical data and secure your installation from cyber threats.
Video

Managing Supply Chain Cybersecurity Risk

Discover how Clearswift mitigates the risks associated with an organization’s supply chain while keeping business communications progressing.
Video

Manage, Sanitize and Secure Your File Transfers

Join our cybersecurity experts to learn how Fortra can help you mount a triple-defense of managing, sanitizing, and securing your file transfers.
Guide

Secure Managed File Transfer Ultimate Buyer's Guide

In this Ultimate Buyer's Guide, you'll find all the information you need to help you successfully evaluate different managed file transfer solutions (MFT) and find the right solution for your organization.
blog

File Transfer Solutions Emerge as a Key Technology for the Age of Collaboration

We live and work in an era with more collaboration than ever before. Organizational structures are flatter, the world is smaller, and it is commonplace to work together with colleagues, partners, customers, suppliers, and many other stakeholders on a wide variety of projects. Furthermore, technology has emerged that makes such collaboration easy. It is as straightforward to work on a PowerPoint...
Blog

Clearswift Wins DLP Award at Computing Security Excellence Awards

Today, we are thrilled to announce our 2019 Computing Security Excellence Award win for Data Loss Prevention (email and web) – the second consecutive win for us at the awards! The Computing Security Excellence Awards celebrate the highest quality cybersecurity products, so it’s fantastic to see our Adaptive Data Loss Prevention (DLP) solution recognized for its market-leading offering. Big Threats...
Blog

Defense in Focus: With New Technology Comes New Risk

In any industry, the strive for digital transformation brings with it risk as well as opportunity. This is no more apparent than in the defense sector where several high-profile incidents have exposed vulnerabilities in areas such as email applications and other connected IoT devices.
Blog

Capital One Data Breach: A Reminder to Lock Your Back Door

In July 2019, leading financial organization Capital One received an anonymous e-mail revealing some bad news: “There appears to be some leaked data of yours in someone’s Github.” This leaked data was revealed to be the personal details of about 106 million individuals across the US and Canada, mostly consumers and small business owners that have applied for credit card products, including their...
Blog

The Unthought About Risks of Encryption

We hear a lot about encryption in this day in age, particularly around it being the panacea for compliance with data protection regulations. It’s true it can be a component of an information security and compliance strategy, but there are a variety of different encryption options available on the market today, so care needs to be taken with selecting the right solution to ensure it doesn’t turn...
Blog

Next Generation Cyber Threats: Images

Traditional Data Loss Prevention (DLP) technology provides protection against the traditional threat of someone trying to send a file to an unauthorized individual, but it required a step change to enable Adaptive Data Loss Prevention with Deep Content Inspection (DCI) to address threats such as ransomware that is delivered embedded in innocuous-looking documents. Clearswift delivered our first...
Blog

From Pesky to Dangerous - Image-based Spam

Those of you that can remember back to 2006 may recall that High School Musical was the highest selling album of the year. “We’re all in this together” was one of the most popular songs played at the time and, some would say, a pesky tune that would stick in your head. It also happened to be the same time when image-based spam was at its peak, another pesky occurrence that was hammering our...
Blog

The Top 5 Cyber Threats that Brexit Brings

Our data shows that 53% of firms are increasing their cybersecurity budgets in preparation for a rise in threats once we leave the EU. Businesses anticipate that Cybercriminals will seek to use confusion to their advantage, whether that is through malware attacks or targeted phishing campaigns to coerce critical data or financial gain from organizations.