Blog
Five Key Points When Preventing Cybersecurity Attacks in a World of Hybrid Working
Tue, 06/07/2022
On 19 July, the UK will finally lift the final social distancing measures that were put in place during the pandemic. Although concerns about the pandemic still exist, many people will now be contemplating a tentative return to the office. Although the benefits of homeworking are well-documented and recent events have proven that people can work just as effectively from home as they can from the...
Blog
SMTPS: Securing SMTP and the Differences Between SSL, TLS, and the Ports They Use
Thu, 05/26/2022
What is the difference between SMTPS and SMTP?
SMTPS uses additional SSL or TLS cryptographic protocols for improved security, and the extra "S" stands for SECURE!
By default, SMTP to send email lacks encryption and can be used for sending without any protection in place, leaving emails with an SMTP setup susceptible to man-in-the-middle attacks and...
Blog
Why Cybersecurity Matters: Elevating IT to the C-Suite in Your Organization
Fri, 04/29/2022
There isn’t a CEO or board member in the world that would publicly state that their organization believes cybersecurity doesn’t matter. A Cybersecurity Ventures report has forecast that cybercrime will cost businesses worldwide an astonishing $10.5 trillion annually by 2025, so it’s an evident and sizable area of concern.
Any CEO not taking this seriously would be roundly criticized by customers,...
Blog
5 Big Myths about DMARC, Debunked
By Monica Delyani on Tue, 04/26/2022
With email attacks contributing to billions of lost dollars each year, a growing number of organizations are adopting Domain-based Message Authentication, Reporting & Conformance (DMARC) in an effort to protect themselves and their customers from fraudsters. Adoption of DMARC has steadily gained traction since the onset of the pandemic, and the original email authentication protocols at the heart...
Blog
The Threat of Unwanted Data Acquisition
Mon, 03/21/2022
Central to many cyber security strategies are technologies, processes and procedures designed to prevent sensitive data from leaving the organization. Avoiding data breaches is something most companies avidly work to avoid especially in the wake of several high-profile non-compliance cases reported in the media recently. The damage to reputation alone is usually enough of an incentive for...
Blog
Securing Your Email with DMARC
Wed, 03/09/2022
Understanding the What, How, and Why of DMARCYou probably already know this, but it bears repeating: Email by itself is NOT secure; anyone can use someone else’s identity to send emails. In fact, email is the #1 way cyberattackers can target your customers and your email ecosystem. No brand is untouchable when it comes to attackers using or spoofing email domains to send spam, phishing attempts,...
Blog
Top Social Media Threats Targeting the Retail Industry
Fri, 03/04/2022
Social media threats targeting enterprises more than doubled last year. Attacks on the retail industry specifically have grown, as threat actors are targeting victims with impersonation and counterfeit ad campaigns.
Purchasing behavior is increasingly influenced by social media, making it an attractive vector for these kinds of campaigns. The tendency of social media users to consume information...
Blog
The Consequences of a Data Breach: Why Fines are Just the Tip of the Iceberg
Mon, 02/28/2022
When it comes to the true ramifications of a data breach, suffering a financial penalty imposed by the ICO is just the tip of the iceberg. Although significant, fines are only one aspect financial organizations have to deal with as part of the aftermath. We saw the media frenzy that surrounded the Capital One data breach, and most of us heard when First American exposed 885 million sensitive...
Blog
Hiding Malware Inside Images
Tue, 02/01/2022
We recently wrote a blog about the Clearswift Information Governance Server and using Microsoft’s File Server Resource Manager (FSRM) to add custom document properties to documents which the Clearswift Secure Gateways can act upon. These properties are also called ‘meta-data’, and in a recent article published in the media, there was a discussion about how malware has been found hidden inside the...
Blog
2022 Data Privacy Week – Education and Inspiration
Mon, 01/24/2022
As the world becomes more and more dependent on online resources to complete daily tasks, such as work meetings, grocery shopping, and even exercising, the risk of cyber attacks, data breaches, and information stealing increases. If you’re not already protecting your personal information online, now is the perfect time to start, as Data Privacy Weeks kicks off today.Led by the National Cyber...
Blog
Six Steps to Email Security Best Practice
Thu, 01/13/2022
To help IT teams define a robust email security policy and determine what’s required from an email security solution, we’ve put together a new six-step guide.
Blog
Is It Time Your Organization Adopted A Zero-Trust Approach to Cybersecurity?
Thu, 12/16/2021
Zero-trust is a rapidly emerging approach in modern cybersecurity. Clearswift DLP solutions can help with zero-trust without impacting the day-to-day business operations.
Blog
Common Phishing Email Attacks | Examples & Descriptions
Thu, 12/16/2021
What does a phishing email look like? We've compiled phishing email examples to help show what a spoofed email looks like to prevent against phishing attacks. Brand deception phishing is the most common example of phishing people will come across. Brand deception phishing occurs when an attacker mimics a trusted company in an email and asks someone for their personal information like credit card...
Blog
What Is Email Phishing? Protect Your Enterprise
Wed, 12/08/2021
Phishing emails can steal sensitive data and cost companies' their reputation. However, protecting a company from these scammers doesn't need to be difficult.
What Is Email Phishing?
Phishing is when an attacker mimics a trusted person or brand in an attempt to steal sensitive information, or gain a foothold inside a company network. While phishing emails are by far the most popular, these...
Blog
Identifying and Mitigating Email Threats
Wed, 12/01/2021
Email threats are ever evolving, and it’s important to stay up to date. Here are the current most common email threats and how to identify and mitigate them. So, what are the most common types of email threats today?
Business Email Compromise
Ransomware
Phishing
Spear Phishing
Data Breach
Spam
Keyloggers
Domain Impersonation
We’ll explain these and more. Then, we’ll cover how to prevent,...
Blog
It’s the Most Wonderful Time of the Year… for Cybercriminals
Mon, 11/29/2021
The holiday season is upon us, which means it’s also the busiest time of the year for online shopping. There’s Black Friday, Cyber Monday, and gifts to buy for loved ones. Plus, gifts to buy for yourself when the deals are this good! But beware, for cybercriminals ‘tis also the season to scam millions of dollars from unsuspecting people and companies. They’re banking on people being in a rush and...
Blog
How to Neutralize the Rising Threat of Ransomware
Wed, 11/24/2021
In IBM's "Cost of a Data Breach 2022" report, the average payout for ransom was $812,360. The steady payout incline suggests that ransomware remains big business for cyber criminals, particularly as successful execution means easy money without the need for malicious actors to worry about exfiltration of the data they have stolen. On top of this, the tools for a ransomware attack are becoming...
Blog
Spear Phishing Emails: What They Are & How to Prevent Them
Fri, 11/05/2021
Spear phishing is more focused than normal phishing. To protect against this type of phishing, your entire company will need to be educated and protected.
What is a typical spear phishing attempt?
A typical spear phishing attempt is a fraudulent personalized email that is usually sent with an attachment or requests a response. The fraudster then tries to entice the recipient to open the infected...
Blog
Email Protection: Tools for Maximum Security
Thu, 10/28/2021
If you haven’t protected your email yet, you’re open to attacks. This comprehensive guide explains what you need for complete email protection and where to get it.Email protection solutions provide features like spam filtering, firewalls, anti-phishing controls, antivirus policies, spyware detection, login security, data loss protection, and encryption to help secure your organization against...