Image

Hybrid Vishing. It's Such A Thing.

Sep 8, 2022
This podcast discusses what vishing is, how it's on the rise, and methods are best in fighting it.
Image

Are You Ready for PCI DSS 4.0?

Aug 17, 2022
PCI DSS 4.0 is here. If your organization handles PII data, you will need to be compliant with the new updates. We take a look at the new version and what it takes to stay compliant.
Image
Hidden Data

The Not-So-Hidden Dangers of Hidden Data

Aug 4, 2022
Sometimes sensitive data exposure can come from routine practices within an organization. Everyday habits such as sending a document without removing hidden data like revision history and author details can expose sensitive data and even break compliance regulations.
Image
secure photos

Photo Security: Why a Picture Is Worth a Thousand Files

Jun 22, 2022
Communication through photos and short videos have now become commonplace with applications like Instagram and TikTok. While this popular use of imagery feels safe, many may not realize that photos can also be used to inconspicuously share data or carry out a ransomware cyberattack. Explore the threats of steganography and why ignoring it can be a significant email security mistake.
Image
Office 365 Security

One Email Security Solution, One Big Threat Protection Problem

Jun 15, 2022
Office 365 remains a popular tool worldwide, and It also remains a popular target for cyberattacks. Utilizing the email security solutions from Microsoft may seem the most convenient option, but the reality is, it comes with big gaps and workarounds for cybercriminal activity. Learn how Clearswift Secure Email Gateway can work alongside Microsoft to create an email security powerhouse.
Image
Supply Chain Cybersecurity Attacks

Prevent Supply Chain Cybersecurity Attacks with Safer Data Sharing

Apr 27, 2022
A supply chain cybersecurity attack comes from any outside partner vulnerabilities. Indeed your supply chain can be as risky as it is helpful. Find out how Clearswift's array of robust email security features keep your organization secure from external cyber risks.
Image
Cybersecurity

Data Compliance – Take a Practical Approach with 5 Key Steps

Mar 31, 2022
Being data compliant is not a simple process, but it is vital. We look at five steps organizations need to take to assist in data compliance and protection.
Image
Social Media

Top Social Media Threats Targeting the Retail Industry

Mar 1, 2022
Social Media attacks targeting enterprises increased 103 percent in 2021, according to PhishLabs Quarterly Threat Treats & Intelligence Report.
Image
Cybersecurity

The Four 'C's of Security

Feb 17, 2022
Why the Three 'C's of Cybersecurity is arguably missing a very important 'C,' and why it is vital to an solid cybersecurity solution.
Image
Protecting Sensitive Data

Do You Have a Sensitive Data Protection Checklist?

Feb 8, 2022
Data breaches and data loss, including the loss of sensitive information, are scary scenarios, and while no one can guarantee a cyberattack will not happen, there are ways to protect your organization’s data. We take a look at the top five tips for protecting your sensitive data.
Image
Clearswift Secure Email Gateway

Data Privacy Day - Education and Inspiration

Jan 28, 2022
Dependency on the internet for communications and business are at an all time high, and so are cyberattacks. We discuss how you can protect your organization's sensitive information.
Image
locks

Three Key Elements of Successful IoT Cybersecurity

Jan 25, 2022
The growth in IoT devices shows no sign of slowing. How can enterprises maintain strong IoT cybersecurity?
Image
Security Shield

How Top Cyber Security Teams Neutralize Ransomware Attacks

Jan 12, 2022
While organizations cannot stop ransomware attacks from happening, they can control how they protect themselves from these sophisticated attacks.
Image
Ransomware

Is your enterprise ready for the latest LockBit ransomware?

Nov 9, 2021
Perhaps the hardest element in staying protected against ransomware is managing the many different variants. LockBit 2.0 is the latest strain. Find out if you're ready, and what needs to be done to be prepared for tomorrow's threats.
Image
Clearswift Secure Email Gateway

How to approach advanced email protection in your organization

Oct 7, 2021
Email is still perhaps the greatest potential cybersecurity threat to most organizations. We look at the best way of approaching advanced email protection.
Image
Guide

Is It Time Your Organization Adopted A Zero-Trust Approach to Cybersecurity?

Sep 20, 2021
Zero-trust is a rapidly emerging approach in modern cybersecurity. Clearswift DLP solutions can help with zero-trust without impacting the day-to-day business operations.
Image
Cybersecurity

Cybersecurity Risks in the Supply Chain Are Leaving Organizations Vulnerable

Sep 13, 2021
The cybersecurity risk from weaknesses in an organization’s supply chain is a growing challenge. How can this risk be successfully mitigated?
Image
Cybersecurity

Are Cybersecurity and Data Protection Now Integral to Business Success?

Sep 9, 2021
Organizations have had to increase the cybersecurity measures they put in place to keep data safe and secure. Consequently, cybersecurity solutions are more widely deployed, and data protection measures are prioritized more than ever.
Image
UK Financial Budgets for Cybersecurity

Why Cybersecurity Matters – Elevating Cybersecurity to the C-Suite in Your Organization

Sep 8, 2021
Any CEO not taking this seriously would be roundly criticized by customers, shareholders, partners, and more for such a stance. Yet is there a difference between what is said publicly by CEOs and what is actually done in private?
Image
Canadian Data Privacy Act

Heads up! New Canadian Data Privacy Act is Around the Corner

Sep 6, 2021
The time to prepare to meet soon-to-be-enacted Canadian data privacy regulations is now. Around the world, the awareness of the need to protect the privacy rights of individuals, including the access, transparency, and security of personal information has never been higher.