Blog

The Clearswift Blog covers all the latest IT Security news as it applies to you and your business.

Multi-factor Identification

Authenticating with Authority: Can Multi-Factor Authentication Provide Total Protection?

Monday, March 4, 2019 - 14:02

The need for a stronger defense against security threats is greater than ever, as the threat of data-driven crimes such as identity theft and corporate espionage grow each year. The recent data...

Read More Tags:
Top Threats 2018

Cyber Threats & Technology Tips That Your Business Can’t Ignore

Tuesday, October 30, 2018 - 11:25

2018 has seen a number of new threats introduced into the cyberscape as well as an evolution of traditional threats. This means businesses need to be more prepared than ever for a data breach and...

Read More Tags:
Website skimming

Website skimming is on the rise and your organization needs to be prepared

Friday, October 12, 2018 - 16:43

Last month, British Airways was hacked and 380,000 payment details were stolen.
In the immediate aftermath, the question on everyone’s minds was, in the era of GDPR, whether the airline would see a...

Read More Tags:
Cybersecurity Tech Accord 2018

Principles grounded in action will be critical to the success of the Cybersecurity Tech Accord

Monday, May 14, 2018 - 09:46

This year’s RSA Conference saw 34 technology companies sign a pledge, outlining their commitment to ensuring better security in cyberspace for citizens and businesses alike. The Cybersecurity Tech...

Read More Tags:
Email phishing: #1 Cyber security threat

#1 Cyber security threat: Protecting your organization against email based attacks

Tuesday, March 20, 2018 - 14:16

On Friday 12th May last year, a global ransomware attack, aptly named WannaCry, infected over 200,000 computers in at least 100 countries. It began with an email at roughly 8:30am London time. By...

Read More Tags:
Document Sanitization and Metadata

Document Sanitization: avoid making your business look foolish

Monday, February 26, 2018 - 11:03

Human error is one of the biggest problems businesses face when it comes to data leaks and unwanted data acquisition. There can be a number of systems in place to ensure that confidential files...

Read More Tags:

Smoke and mirrors: the key to snaring a cyber-criminal

Friday, February 23, 2018 - 10:34

Understanding your enemy is the first step to defeating them; a sentiment often touted by generals and commanders on the battlefield, but just as applicable to cybersecurity.
Comprehending how...

Read More Tags:

Data harvesting opens the door to more Ransomware attacks

Tuesday, September 19, 2017 - 12:58

Guy Bunker, SVP Products & Marketing
We all know about the much publicised 2014 Yahoo hack that saw 500 million accounts compromised, wiping $350 million off the value of the company. In fact,...

Read More Tags: