Resources

On-Demand Webinar

Spam Mechanisms in the Secure Email Gateway

This first webinar in a series of five spanning Best Practices for using Clearswift's Secure Gateways covered the more than 15 configurable spam mechanisms in the Secure Email Gateway (SEG) appliance with a choice of local or global policy. Listen as Dr. Steve Jeffery, Lead Solutions Engineer at Fortra, discusses the spam rules, where they get evaluated, URL detection, and message sanitisation...
Blog

March Madness Challenge for Cybersecurity Professionals

Let the "madness" begin! The NCAA Basketball tournament is different for everyone. Some experience madness after a gut-wrenching triple overtime victory by their alma mater, while others after a buzzer-beater shot from half-court by a 16th-ranked Cinderella underdog that instantly knocks out one of your final four selections. However, to me there is nothing more maddening, in the delightful sense...
Guide

Protecting Your Organization From Advanced Threats

Today’s cyber attacks appear relentless, growing in frequency and intensity, and proliferating throughout all industries. There is no ‘normal’ and the impact of each attack is felt throughout organizations--from supply chain to customers, partners, and beyond.
Blog

Holiday Season Triggers Rise in Counterfeit Activity

Counterfeit activity increases every year during the pre-holiday shopping blitz -- most notably Black Friday, Cyber Monday, Christmas and Hanukkah. Arm yourself with defenses now to combat ever-evolving counterfeiting methods during peak retail shopping season.
Blog

Financials & Card Data Top Q3 Targets on the Dark Web

In Q3, credit unions nearly overtook national banks as the top targeted industry on the Dark Web, according to recent data from Fortra’s PhishLabs.
Blog

Enhance Microsoft 365 Data Loss Prevention

DLP policies can identify, monitor, and automatically protect sensitive items across Microsoft 365 services. That's why using DLP tools, such as Clearswift, can enhance Microsoft 365 to protect data better.
Guide

Securing Government Data

Government agencies need to stay on top of the latest cyber threats and understanding the data that flows in, out, out and even within the organization. This guide takes a look at how the data travels and the solutions for keeping the data protected where ever it flows.
Video

What's New with Clearswift V5.4.3?

Learn about the V5.4.3 Clearswift updates, what's on the roadmap for Clearswift features, and how to voice your feature priorities.
Blog

Photo Security: Why a Picture Is Worth a Thousand Files

Communication through photos and short videos have now become commonplace with applications like Instagram and TikTok. While this popular use of imagery feels safe, many may not realize that photos can also be used to inconspicuously share data or carry out a ransomware cyberattack. Explore the threats of steganography and why ignoring it can be a significant email security mistake.
Video

Building on Your Clearswift Investment for Unrivalled Data Security

The Clearswift Secure Email Gateway is a powerhouse of email security that protects against inbound email cyberattacks and outbound data loss prevention. But did you know your Clearswift investment can do more? Cyberattacks are ever-changing, and what works today may not fully protect tomorrow. Your Clearswift investment, alongside your other technology investments such as Microsoft 365 (a common...
Blog

The Four 'C's of Security

Why the Three 'C's of Cybersecurity is arguably missing a very important 'C,' and why it is vital to an solid cybersecurity solution.
Datasheet

Using Fortra's Clearswift Secure Email Gateway Appliance to Enhance Data Security in Microsoft 365

For many organizations, Microsoft 365 is the ideal collaboration tool, providing a convenient platform for employees to share information and communicate daily. Microsoft offers different tiered packages to suit a variety of customer requirements. Its Microsoft 365 E5 package provides platforms for mid- and larger-sized enterprises, with the lower-tiered packages (e.g., E1 and E3) offering fewer...
Blog

Heads up! New Canadian Data Privacy Act is Around the Corner

The time to prepare to meet soon-to-be-enacted Canadian data privacy regulations is now. Around the world, the awareness of the need to protect the privacy rights of individuals, including the access, transparency, and security of personal information has never been higher.
Blog

New Encryption Guidance Published by UK’s Information Commissioner

The UK’s Information Commissioner’s Office published update guidance on encryption on 3rd March 2016, amidst concerns that there was a general lack of understanding of how and when to use encryption. It is the lack of appropriate technical measures, such as the use of encryption that has led to a significant number of fines issued in the UK since 2010. There is a risk of bigger fines with the...
Blog

Managing Critical File Transfers

For those wanting to collaborate on a sensitive document, there are a variety of cloud-based solutions that enable this - for sharing a file or simultaneously editing a document. Use of cloud solutions is also required if large files need to be shared.