Blog

The Clearswift Blog covers all the latest IT Security news as it applies to you and your business.

Multi-factor Identification

Authenticating with Authority: Can Multi-Factor Authentication Provide Total Protection?

Monday, March 4, 2019 - 14:02

The need for a stronger defense against security threats is greater than ever, as the threat of data-driven crimes such as identity theft and corporate espionage grow each year. The recent data...

Read More Tags:
Enhancing cyber threat protection in Microsoft Office 365

Enhancing cyber threat protection in Microsoft Office 365

Monday, February 11, 2019 - 14:58

In our last blog, we explored the risk of receiving sensitive data unauthorized via email, the sharing sensitive information internally across departments, and the need for advanced data protection...

Read More Tags:
Unwanted data acquisition in downloadable documents

Download for a data breach. How to avoid unwanted data acquisition in downloadable documents

Wednesday, December 19, 2018 - 13:55

Downloading a document from websites and cloud collaboration applications is a common practice for many businesses. The finance department downloads an invoice, the HR department, a CV, and Business...

Read More Tags:
Managed File Transfers

Managing critical file transfers

Thursday, November 15, 2018 - 14:02

While methods for digital collaboration are increasing, such as Instant Messaging, Social Media and a multitude of cloud applications, email remains a universal business communication tool for...

Read More Tags:
Top Threats 2018

Cyber Threats & Technology Tips That Your Business Can’t Ignore

Tuesday, October 30, 2018 - 11:25

2018 has seen a number of new threats introduced into the cyberscape as well as an evolution of traditional threats. This means businesses need to be more prepared than ever for a data breach and...

Read More Tags:
Hidden in images

Hiding Malware Inside Images

Monday, August 20, 2018 - 14:34

We recently wrote a blog about the Clearswift Information Governance Server and using Microsoft’s File Server Resource Manager (FSRM) to add custom document properties to documents which the...

Read More Tags:
Insider Threat

GDPR and the Insider Threat: How new regulations are changing our data handling habits

Monday, July 30, 2018 - 16:16

The General Data Protection Regulation (GDPR) has been covered extensively over the past year and has come to sit at the forefront of employees’ mind. Having been implemented on 25th May 2018, the...

Read More Tags:

Tips to protect the potential next target of the financial sector – Trading apps

Thursday, October 12, 2017 - 14:55

The media landscape today continues to share stories of the increased cyber vulnerabilities in mobile applications. While banks have had many years to develop and tailor their apps to respond to...

Read More Tags: