Resources

Blog

Cyber Threats & Technology Tips That Your Business Can’t Ignore

As new threats are introduced into the cyberscape as well as evolved traditional threats, businesses need to be more prepared than ever for a data breach and have the latest tools in place to mitigate risks.
Blog

GDPR and the Insider Threat: How New Regulations are Changing Our Data Handling Habits

Clearswift’s Adaptive Data Loss Prevention (A-DLP) solution has the ability to inspect all content coming in and going out of the organization – whether through email or the web – to prevent any sensitive information being shared or exposed unauthorized. The document sanitization and adaptive redaction features ensure that GDPR compliance is upheld by scanning all emails and documents flowing in...
Blog

Cloud Storage, File Sharing Apps and GDPR: This Could Get Ugly Fast!

Cloud storage services and file sharing apps such as Dropbox, Box, Microsoft OneDrive and Google Drive are so widely adopted by employees—knowingly or unknowingly by their IT departments—that most don’t think twice about using them to share corporate information.
Blog

The GDPR Deadline is Here – So What Next?

It’s finally here, the EU General Data Protection Regulation (GDPR) is now in full effect. Is that a sigh of relief I hear? Well, it shouldn’t be too heavy a sigh, there’s still work to be done. The first thing to remember is that just because it’s the 25th May, doesn’t mean GDPR efforts are over. In fact, there should be a bigger push than ever to ensure your organization is compliant and remains...
Blog

GDPR - It’s Not Just for Europe: Protection of Data at the World Cup in Russia, Tokyo Olympics, and Beyond

With the World Cup in Russia this summer and the Olympics in Tokyo in 2020 further down the line; organizations conducting business around the event will face unprecedented challenges with cybersecurity and data protection. With the rise in data breaches in recent times, it might not be too strong to say that the success of these major international events relies upon the whole country being data...
Blog

Smoke and Mirrors: The Key to Snaring a Cyber-Criminal

Understanding your enemy is the first step to defeating them; a sentiment often touted by generals and commanders on the battlefield, but just as applicable to cybersecurity. Comprehending how cybercriminals operate, the techniques they use and the weapons available to them enables organizations to better defend themselves.
Blog

Getting Ready for GDPR: Key Actions to Ensure Your Organization is Compliant

General Data Protection Regulation (GDPR), the EU’s largest and most significant cross-border regulation comes into effect in May 2018. Organizations and businesses operating in the EU are racing to make changes and implement new technologies in order to become compliant. With varying performance across sectors in the race to GDPR readiness, you don’t want to be left in the dust. Clearswift’s...
Blog

Right to be Forgotten Requests: How to Ensure Your Business Doesn’t Grind to Halt

GDPR is the most comprehensive data protection legislation to date and it's revolutionizing the information security landscape. The impending enforcement of the regulation is forcing organizations to understand, and transform, the way they collect, process and store data. One of the most challenging aspects of the legislation is the ‘right to be forgotten’ (RTBF), the ruling that dictates...
Blog

Tips to Protect the Potential Next Target of the Financial Sector – Trading Apps

The media landscape today continues to share stories of the increased cyber vulnerabilities in mobile applications. While banks have had many years to develop and tailor their apps to respond to various security issues, with increased security around detecting fraudulent use, trading apps from smaller businesses have flown under the radar and missed out on improved security. Although cyber...
Blog

Silicon Review Accolade for Clearswift!

Clearswift is honored to have been named as one of the Top 10 Fastest Growing Cyber Security companies in 2017 by Silicon Review magazine. The US-based publication was particularly impressed by Clearswift’s technology portfolio in the areas of data loss prevention and deep content inspection. Silicon Review also referenced Clearswift’s collaborative approach to Adaptive Data Loss Prevention (DLP)...
Blog

Microsoft Deal Is a Start, But More Needs to be Done to Protect the NHS from Cyber Threats

Following the recent WannaCry attack that affected so many organizations, both public and private, across the globe, many firms are now taking steps to protect themselves from potential threats in the future. One establishment in the UK that the WannaCry attack had ramifications for was the NHS. The incident meant multiple hospitals across England and Scotland had to cancel procedures after vital...
Blog

What Can Businesses do to Keep secure in the Mobile Working Revolution?

The age of mobile working continues to gather pace. More people than ever before are working from home or on the move, rather than in the traditional office environment. This isn’t surprising. Businesses are becoming increasingly digital and as such, can provide staff with increased opportunities to work outside the office. It isn’t just businesses that are leading the mobile working revolution -...
Blog

Clearswift’s Adaptive DLP Wins Top CEO World Award

Clearswift takes home the Gold Award for its Adaptive Data Loss Prevention innovation and transformative leadership. Gold Winner – New Products, Upgrades, and Innovations – Security Services - ARgon for Email Gold Winner - Most Innovative CEO - Security Services: Heath Davies, Chief Executive Officer, Clearswift Gold Winner - Executive of the Year - Security Services: Dr. Guy Bunker, SVP of...
Blog

Winning at RSA Conference 2016

RSA Conference 2016 - Clearswift is all powered up for a huge three days of demonstrating our truly game changing adaptive DLP solution...
Blog

8 Reasons Why DLP is Now Practical for SMB, Education and Local Government Organizations

While SMBs and public sector organizations were not the primary target for cyber-attacks and data breaches when DLP solutions were first brought to market, newer automated threats via malware and data theft monetization strategies (i.e. identify theft, ransomware, etc.) have made it more efficient and profitable to focus on smaller organizations that were apparently in the clear. As a result, the...
Blog

USBs: The Inconspicuous Enemy

At around three centimetres in length and weighing less than 30 grams on average, the USB flash drive would appear to be a relatively innocuous storage device, but losing or inserting an unknown USB into a personal or company computer could have devastating consequences. With over 22,000 USB sticks being left in the pockets of clothing sent to Britain’s dry cleaners, alone last year, we thought it...