Ransomware attack strikes Canadian retail giant

Pharmacies and grocery stores belonging to Sobeys, the Canadian food retail company recently experienced IT systems issues following a cyberattack. Sobeys is one of Canada’s two major grocery retailers, with around 134,000 personnel servicing a network of approximately 1,500 stores under a variety of retail banners that include Thrifty Foods, Safeway, Foodland, Lawtons Drugs, IGA […]

Read More… from Ransomware attack strikes Canadian retail giant

How poor email security protocols can lead to data breaches

Email is an essential tool for businesses, but it also presents a serious security risk. Poor email security protocols can lead to data breaches, which can result in fines from regulatory bodies, the cost of remediation measures, operational downtime, and compensation for individuals affected by the incident. The long-term effects can include a loss of […]

Read More… from How poor email security protocols can lead to data breaches

How can enterprises avoid a fine from data regulators?

The Information Commissioner’s Office (ICO) is the data regulator for the UK. Each year, it oversees around 500 data breaches and if it finds that firms have been negligent, it has the power to issue massive fines that can amount to millions of pounds. If a company accidentally leaks private information belonging to data subjects […]

Read More… from How can enterprises avoid a fine from data regulators?

Are your email accounts protected from threats?

Company mail systems and the associated accounts used by their staff often gain unwanted attention from threat operators. While email user accounts are used to send and receive messages daily, they are also used as storehouses for past communications. It is not a common practice to delete old messages in this day and age as […]

Read More… from Are your email accounts protected from threats?

The cloud and its security benefits of modern collaboration

By making use of available cloud services, enterprises no longer need to select between enhanced usability or greater security. When cloud services are in use, it is important for firms to balance the requirement of making access to information open to allow collaboration against the need to protect private information by locking it down. […]

Read More… from The cloud and its security benefits of modern collaboration

What types of documents cannot be signed electronically?

In the modern business world, signings are increasingly conducted using electronic methods. In recent years, firms have found that being able to add a signature to a document electronically has multiple advantages. While admissible in a UK court of law, electronic document signing can be used for almost all applications. However, there are still some […]

Read More… from What types of documents cannot be signed electronically?

Cyber espionage: everything you need to know about this terror

The activity referred to as cyber espionage describes the launching of an attack or several attacks that enable an unauthorised entity to view sensitive or confidential data. Typically, the target of these assaults are enterprises and government departments, and often simply consist of a background process or a code iteration running on an employee workstation […]

Read More… from Cyber espionage: everything you need to know about this terror

Two new features on Galaxkey Secure Workspace to make it even easier to manage your files

Managing your files and documents should be simple, and we’re working hard to ensure that we make your life as easy as possible. All whilst keeping your data safe, secure and out of harm’s way. Our latest releases on Galaxkey Secure Workspace will make everything that little bit easier. They’ll improve communications and ensure that […]

Read More… from Two new features on Galaxkey Secure Workspace to make it even easier to manage your files