Blog

The Clearswift Blog covers all the latest IT Security news as it applies to you and your business.

Multi-factor Identification

Authenticating with Authority: Can Multi-Factor Authentication Provide Total Protection?

Monday, March 4, 2019 - 14:02

The need for a stronger defense against security threats is greater than ever, as the threat of data-driven crimes such as identity theft and corporate espionage grow each year. The recent data...

Read More Tags:
Enhancing cyber threat protection in Microsoft Office 365

Enhancing cyber threat protection in Microsoft Office 365

Monday, February 11, 2019 - 14:58

In our last blog, we explored the risk of receiving sensitive data unauthorized via email, the sharing sensitive information internally across departments, and the need for advanced data protection...

Read More Tags:
Enhancing Information Security in Microsoft Office 365

Advanced Information Security Features for Microsoft Office 365

Monday, January 21, 2019 - 11:42

In the last few years, Microsoft Office 365 (MO365) has eclipsed all other cloud providers to emerge as the most widely used enterprise cloud service and the latest survey data shows that adoption of...

Read More Tags:
Unwanted data acquisition in downloadable documents

Download for a data breach. How to avoid unwanted data acquisition in downloadable documents

Wednesday, December 19, 2018 - 13:55

Downloading a document from websites and cloud collaboration applications is a common practice for many businesses. The finance department downloads an invoice, the HR department, a CV, and Business...

Read More Tags:
Computing Security Excellence Awards 2018

Clearswift Wins DLP Award at Computer Security Excellence Awards!

Thursday, November 22, 2018 - 14:28

The Clearswift team is delighted to announce our 2018 Computer Security Excellence Award Win for Data Loss Prevention (email and web).  The awards dinner was held on November 22nd at the London...

Read More Tags:
Social Media

Like, share and destroy: How to protect your business from the social media threat

Thursday, November 22, 2018 - 13:08

Social media is now the window to any business. 83% of organizations use social media as a marketing tactic, making it the most popular marketing tool. It is updated far more regularly than any...

Read More Tags:
Unwanted Data Acquisition in Emails

Return to sender: the threat of unwanted sensitive data acquisition via email

Friday, November 2, 2018 - 10:13

Over 281 billion emails are sent every day. In today’s technology-driven world, email is undoubtedly the main tool for business communication, and it’s estimated that the average employee will...

Read More Tags:
OCR

Has Your Multifunction Printer Become A Data Loss Risk? Consider DLP For Images.

Monday, July 16, 2018 - 15:14

Do you have one of those multi-purpose photocopier / printer / scanners? I’m sure you will say that you have several, but how are they used?  And do you understand the potential cyber risks they...

Read More Tags: