Blog
Five Key Points When Preventing Cybersecurity Attacks in a World of Hybrid Working
Tue, 06/07/2022
On 19 July, the UK will finally lift the final social distancing measures that were put in place during the pandemic. Although concerns about the pandemic still exist, many people will now be contemplating a tentative return to the office. Although the benefits of homeworking are well-documented and recent events have proven that people can work just as effectively from home as they can from the...
Blog
SMTPS: Securing SMTP and the Differences Between SSL, TLS, and the Ports They Use
Thu, 05/26/2022
What is the difference between SMTPS and SMTP? SMTPS uses additional SSL or TLS cryptographic protocols for improved security, and the extra "S" stands for SECURE! By default, SMTP to send email lacks encryption and can be used for sending without any protection in place, leaving emails with an SMTP setup susceptible to man-in-the-middle attacks and eavesdropping from bad actors while messages are...
Blog
Why Cybersecurity Matters: Elevating IT to the C-Suite in Your Organization
Fri, 04/29/2022
There isn’t a CEO or board member in the world that would publicly state that their organization believes cybersecurity doesn’t matter. A Cybersecurity Ventures report has forecast that cybercrime will cost businesses worldwide an astonishing $10.5 trillion annually by 2025, so it’s an evident and sizable area of concern. Any CEO not taking this seriously would be roundly criticized by customers...
Blog
5 Big Myths about DMARC, Debunked
By Monica Delyani on Tue, 04/26/2022
With email attacks contributing to billions of lost dollars each year, a growing number of organizations are adopting Domain-based Message Authentication, Reporting & Conformance (DMARC) in an effort to protect themselves and their customers from fraudsters. Adoption of DMARC has steadily gained traction since the onset of the pandemic, and the original email authentication protocols at the heart...
Press Release
Blunting BEC Capers that Continue to Target and Devastate SMBs and Enterprises
In his guest blog on The Last Watchdog, John Wilson looks at why Business Email Compromise (BEC) attacks are on the rise, how they are orchestrated, and what organizations can do to stop this all-too-common attack vector. Excerpt: "BEC is a growing concern, and attackers have taken full advantage of the upheaval the COVID-19 pandemic has caused to ramp up their efforts. These campaigns are hard to...
Blog
The Threat of Unwanted Data Acquisition
Mon, 03/21/2022
Central to many cyber security strategies are technologies, processes and procedures designed to prevent sensitive data from leaving the organization. Avoiding data breaches is something most companies avidly work to avoid especially in the wake of several high-profile non-compliance cases reported in the media recently. The damage to reputation alone is usually enough of an incentive for...
Press Release
Fortra to Acquire Alert Logic to Enable Customers to Address Cybersecurity Skills Shortage with Hybrid IT Approach
Managed detection and response (MDR) forms new cornerstone of Fortra's cybersecurity portfolio MINNEAPOLIS March 9, 2022—Fortra announced today it has signed a merger agreement to acquire Alert Logic, a well-known leader in managed detection and response (MDR) services. Alert Logic works as a seamless extension of security teams, augmenting existing cybersecurity resources and technology to...
Blog
Securing Your Email with DMARC
Wed, 03/09/2022
Understanding the What, How, and Why of DMARC You probably already know this, but it bears repeating: Email by itself is NOT secure; anyone can use someone else’s identity to send emails. In fact, email is the #1 way cyberattackers can target your customers and your email ecosystem. No brand is untouchable when it comes to attackers using or spoofing email domains to send spam, phishing attempts...
Blog
Top Social Media Threats Targeting the Retail Industry
Fri, 03/04/2022
Social media threats targeting enterprises more than doubled last year. Attacks on the retail industry specifically have grown, as threat actors are targeting victims with impersonation and counterfeit ad campaigns. Purchasing behavior is increasingly influenced by social media, making it an attractive vector for these kinds of campaigns. The tendency of social media users to consume information...
Blog
The Consequences of a Data Breach: Why Fines are Just the Tip of the Iceberg
Mon, 02/28/2022
When it comes to the true ramifications of a data breach, suffering a financial penalty imposed by the ICO is just the tip of the iceberg. Although significant, fines are only one aspect financial organizations have to deal with as part of the aftermath. We saw the media frenzy that surrounded the Capital One data breach , and most of us heard when First American exposed 885 million sensitive...
Blog
Hiding Malware Inside Images
Tue, 02/01/2022
We recently wrote a blog about the Clearswift Information Governance Server and using Microsoft’s File Server Resource Manager (FSRM) to add custom document properties to documents which the Clearswift Secure Gateways can act upon. These properties are also called ‘meta-data’, and in a recent article published in the media , there was a discussion about how malware has been found hidden inside the...
Blog
2022 Data Privacy Week – Education and Inspiration
Mon, 01/24/2022
As the world becomes more and more dependent on online resources to complete daily tasks, such as work meetings, grocery shopping, and even exercising, the risk of cyber attacks, data breaches, and information stealing increases. If you’re not already protecting your personal information online, now is the perfect time to start, as Data Privacy Weeks kicks off today. Led by the National Cyber...
Blog
Six Steps to Email Security Best Practice
Thu, 01/13/2022
To help IT teams define a robust email security policy and determine what’s required from an email security solution, we’ve put together a new six-step guide.
Press Release
Clearswift and Agari: Best Email Security Providers & Services 2022
Channel Insiders looks at considerations for Email Security Solutions and assesses the best providers and services in 2022. Originally published in Channel Insiders Excerpt: "On Gartner Peer Insights, Agari and Clearswift both hold an average score of 4.8 / 5 stars across a dozen reviews. Top client reviews mention the vendor service and support, contract flexibility, ease of implementation, and...
Blog
Is It Time Your Organization Adopted A Zero-Trust Approach to Cybersecurity?
Thu, 12/16/2021
Zero-trust is a rapidly emerging approach in modern cybersecurity. Clearswift DLP solutions can help with zero-trust without impacting the day-to-day business operations.
Blog
Common Phishing Email Attacks | Examples & Descriptions
Thu, 12/16/2021
What does a phishing email look like? We've compiled phishing email examples to help show what a spoofed email looks like to prevent against phishing attacks. Brand deception phishing is the most common example of phishing people will come across. Brand deception phishing occurs when an attacker mimics a trusted company in an email and asks someone for their personal information like credit card...
Blog
What Is Email Phishing? Protect Your Enterprise
Wed, 12/08/2021
Phishing emails can steal sensitive data and cost companies' their reputation. However, protecting a company from these scammers doesn't need to be difficult. What Is Email Phishing? Phishing is when an attacker mimics a trusted person or brand in an attempt to steal sensitive information, or gain a foothold inside a company network. While phishing emails are by far the most popular, these attacks...
Blog
Identifying and Mitigating Email Threats
Wed, 12/01/2021
Email threats are ever evolving, and it’s important to stay up to date. Here are the current most common email threats and how to identify and mitigate them. So, what are the most common types of email threats today? Business Email Compromise Ransomware Phishing Spear Phishing Data Breach Spam Keyloggers Domain Impersonation We’ll explain these and more. Then, we’ll cover how to prevent, mitigate...
Blog
It’s the Most Wonderful Time of the Year… for Cybercriminals
Mon, 11/29/2021
The holiday season is upon us, which means it’s also the busiest time of the year for online shopping. There’s Black Friday, Cyber Monday, and gifts to buy for loved ones. Plus, gifts to buy for yourself when the deals are this good! But beware, for cybercriminals ‘tis also the season to scam millions of dollars from unsuspecting people and companies. They’re banking on people being in a rush and...