Quantcast
Channel: Clearswift Blog
Browsing all 31 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

GDPR Compliance – take a practical approach with 5 key steps

Language EnglishTags: <a href='/blog?tag=GDPR'>GDPR</a> <a href='/blog?tag=Compliance'>Compliance</a> I have been fortunate to be invited to speak about the EU GDPR at a variety...

View Article



Image may be NSFW.
Clik here to view.

Security v Productivity: The Office Macro Dilemma

Language EnglishTags: By Tim Peters, Pre-Sales Engineer, Clearswift AustraliaThere is no doubt that macros are being increasingly used to execute malicious code around the world and we have all know...

View Article

Image may be NSFW.
Clik here to view.

5 lessons the NHS cyber-attack has taught us

Language EnglishTags: <a href='/blog?tag=Cyber-attacks'>Cyber-attacks</a> <a href='/blog?tag=Email Security'>Email Security</a> <a href='/blog?tag=Web Security'>Web...

View Article

Image may be NSFW.
Clik here to view.

How Top Cyber Security Teams Neutralize Ransomware Attacks

Language EnglishTags: <a href='/blog?tag=Advanced Threat Protection'>Advanced Threat Protection</a> Ransomware and morphed forms of embedded malware are creating havoc for organizations of...

View Article

Image may be NSFW.
Clik here to view.

Cyber Security: A five point agenda for the next government

Language EnglishTags: In recent weeks, the Prime Minister Theresa May has repeatedly mentioned plans for a reallocation of police resources towards cyber-crime if her party returns to power. With a UK...

View Article


Image may be NSFW.
Clik here to view.

Clearswift SECURITY+: when you need more, but can’t afford to throw out what...

Language EnglishTags: <a href='/blog?tag=Adaptive Redaction'>Adaptive Redaction</a> <a href='/blog?tag=Email Security'>Email Security</a> <a href='/blog?tag=Web...

View Article

Image may be NSFW.
Clik here to view.

What can businesses do to keep secure in the mobile working revolution?

Language EnglishTags: <a href='/blog?tag=BYOD'>BYOD</a> <a href='/blog?tag=Data Loss Prevention'>Data Loss Prevention</a> Dr Guy Bunker, SVP Products & Marketing, Clearswift...

View Article

Image may be NSFW.
Clik here to view.

WannaCry fallout: What the ransomware epidemic means for the future of business

Language EnglishTags: <a href='/blog?tag=ransomware'>ransomware</a> <a href='/blog?tag=Cyber Security'>Cyber Security</a> <a...

View Article


Image may be NSFW.
Clik here to view.

Microsoft deal is a start, but more needs to be done to protect the NHS from...

Language EnglishTags: <a href='/blog?tag=Advanced Threat Protection'>Advanced Threat Protection</a> <a href='/blog?tag=Internal Threats'>Internal Threats</a> <a...

View Article


Image may be NSFW.
Clik here to view.

Silicon Review Accolade for Clearswift!

Language EnglishTags: <a href='/blog?tag=Awards'>Awards</a> Clearswift is honored to have been named as one of the Top 10 Fastest Growing Cyber Security companiesin 2017 by Silicon Review...

View Article

Image may be NSFW.
Clik here to view.

WannaCry illustrated: See how attitudes have changed

Language EnglishTags: <a href='/blog?tag=Malware'>Malware</a> <a href='/blog?tag=Cyber Security'>Cyber Security</a> Clearswift's recent survey with Vanson Bourne into the impact...

View Article

Image may be NSFW.
Clik here to view.

Avoid waking up to encrypted computers

Language EnglishTags: Niall JegerSo you signed with your current supplier of IT security three years ago after a lengthy RFI, due diligence, PoC and procurement process. The project went well and you...

View Article

Image may be NSFW.
Clik here to view.

Data harvesting opens the door to more Ransomware attacks

Language EnglishTags: <a href='/blog?tag=Cyber-attacks'>Cyber-attacks</a> <a href='/blog?tag=Cyber Security'>Cyber Security</a> <a...

View Article


Image may be NSFW.
Clik here to view.

Tips to protect the potential next target of the financial sector – Trading apps

Language EnglishTags: <a href='/blog?tag=Advanced Threat Protection'>Advanced Threat Protection</a> <a href='/blog?tag=Malware'>Malware</a> <a...

View Article

Image may be NSFW.
Clik here to view.

3 ways to protect your organization against the insider threat

Language EnglishTags: <a href='/blog?tag=Internal Threats'>Internal Threats</a> <a href='/blog?tag=BYOD'>BYOD</a> <a href='/blog?tag=Data Loss Prevention'>Data Loss...

View Article


Image may be NSFW.
Clik here to view.

Getting ready for GDPR: key actions to ensure your organization is compliant

Language EnglishTags: <a href='/blog?tag=GDPR'>GDPR</a> <a href='/blog?tag=Compliance'>Compliance</a> Guy Bunker, SVP Products & MarketingGeneral Data Protection Regulation...

View Article

Image may be NSFW.
Clik here to view.

Right to be forgotten requests: how to ensure your business doesn’t grind to...

Language EnglishTags: GDPR is the most comprehensive data protection legislation to date and it's revolutionizing the information security landscape. The impending enforcement of the regulation is...

View Article


Image may be NSFW.
Clik here to view.

Preparing for the Inevitable: A Guide to Handling a Data Breach

Language EnglishTags: Cyber-attacks and data breaches are now so widespread that it isn’t a matter of ‘if’ but ‘when’ your organization gets hit. According to the UK Government’s latest Cyber Security...

View Article

Image may be NSFW.
Clik here to view.

GDPR: How aligning the board and middle management will bring you one step...

Language EnglishTags: With the enforcement of the General Data Protection Regulation (GDPR) just around the corner, organizations are finally starting to implement new technologies, policies and...

View Article

Image may be NSFW.
Clik here to view.

Smoke and mirrors: the key to a snaring a cyber-criminal

Language EnglishTags: <a href='/blog?tag=Cyber Security'>Cyber Security</a> <a href='/blog?tag=IT Security'>IT Security</a> <a href='/blog?tag=Malware'>Malware</a>...

View Article
Browsing all 31 articles
Browse latest View live




Latest Images