Blog

The Clearswift Blog covers all the latest IT Security news as it applies to you and your business.

The top 3 emerging technologies posing a cyber-threat to our Critical National Infrastructure

Wednesday, July 17, 2019 - 15:57

In the last few years, we’ve seen digital transformation take over the mindset of businesses and there has been a huge push to ensure that organizations in all sectors are adopting technology that is...

Read More Tags:

Paying the Piper: What we learned from the British Airways fine

Monday, July 15, 2019 - 15:23

The Breach
Truth be told it was never really a question of ‘if’ but rather ‘when’ a significant fine for GDPR non-compliance would occur. Following the announcement that British Airways has been...

Read More Tags:
The Top 5 Cyber Threats that Brexit Brings

The Top 5 Cyber Threats that Brexit Brings

Tuesday, May 14, 2019 - 09:12

Regardless of your thoughts on Brexit, it can’t be denied that the drawn-out process has created mass confusion as firms rush to prepare for an unpredictable future.  Because of this, we decided...

Read More Tags: Adaptive Redaction Email Security Web Security Advanced Threat Protection Cyber-attacks Information Governance
The Brexit Backlash

The Brexit Backlash: How uncertainty is prompting UK businesses to bolster cyber security defenses

Tuesday, April 23, 2019 - 11:53

The consequences of Brexit are taking up the lion’s share of the news agenda. The further we delve into the topic, the more confusion arises. And that’s not just at the in the upper echelons of...

Read More Tags: GDPR Advanced Threat Protection
Multi-factor Identification

Authenticating with Authority: Can Multi-Factor Authentication Provide Total Protection?

Monday, March 4, 2019 - 14:02

The need for a stronger defense against security threats is greater than ever, as the threat of data-driven crimes such as identity theft and corporate espionage grow each year. The recent data...

Read More Tags:
Enhancing cyber threat protection in Microsoft Office 365

Enhancing cyber threat protection in Microsoft Office 365

Monday, February 11, 2019 - 14:58

In our last blog, we explored the risk of receiving sensitive data unauthorized via email, the sharing sensitive information internally across departments, and the need for advanced data protection...

Read More Tags:
Unwanted data acquisition in downloadable documents

Download for a data breach. How to avoid unwanted data acquisition in downloadable documents

Wednesday, December 19, 2018 - 13:55

Downloading a document from websites and cloud collaboration applications is a common practice for many businesses. The finance department downloads an invoice, the HR department, a CV, and Business...

Read More Tags:
Managed File Transfers

Managing critical file transfers

Thursday, November 15, 2018 - 14:02

While methods for digital collaboration are increasing, such as Instant Messaging, Social Media and a multitude of cloud applications, email remains a universal business communication tool for...

Read More Tags: