Hit enter to search or ESC to close
GalaxkeyGalaxkey
  • Welcome
  • Products
    • Email Security
    • Document Security
    • Secure Workspace
    • Digital Document Signing
  • Technology
    • What Is The Product?
    • Who Do We Help?
  • Resources
    • FAQ
    • Case Studies
    • Compliance
    • Legal
    • Downloads
    • Datasheets
  • Connect
    • Contact
    • Book A Demo
    • Trial
    • Support
    • Partners
  • About Us
    • Our Executive Team
    • Our Investment Team
  • Blog
  • LOGIN
  • BUY
Monthly Archives

August 2012

Encryption News

Email Security

Abstract This white paper offers an overview of how to achieve secure, private emailing over…
Galaxkey Security
Galaxkey Security20th August 2012
Encryption News

Myths of cloud storage security

Cloud storage explosion! Cloud storage has exploded in the last 24 months, and has become…
Galaxkey Security
Galaxkey Security20th August 2012

Recent Posts

  • What does the term “penetration testing” mean?
  • How UK firms should encrypt data
  • New malware uncovered by experts examining SolarWinds strike
  • It’s perfectly safe to send email attachments…isn’t it?
  • Finnish government struck by cybercrime attack

Archives

  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • November 2019
  • June 2019
  • May 2019
  • April 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • November 2017
  • June 2017
  • March 2017
  • January 2017
  • December 2016
  • October 2016
  • September 2016
  • July 2016
  • June 2016
  • May 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • September 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • October 2014
  • September 2014
  • May 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • April 2012

Categories

  • Business
  • Clickjacking
  • Cyberattack
  • Data Protection
  • Electronic Signatures
  • Email
  • Encryption News
  • File Integrity Monitoring
  • Middle East & Asia
  • News
  • Penetration Testing
  • Phishing
  • Ransomware
  • Release News
  • Spoofing
  • Trojan
  • Uncategorised

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About The Blog

Aiming to bring you the latest news and articles from the world of cybersecurity.

Recent Posts

  • What does the term “penetration testing” mean? 26th January 2021
  • How UK firms should encrypt data 24th January 2021
  • New malware uncovered by experts examining SolarWinds strike 22nd January 2021
  • It’s perfectly safe to send email attachments…isn’t it? 21st January 2021
  • Finnish government struck by cybercrime attack 20th January 2021

Contact

2 Falcon Gate Shire Park
Welwyn Garden City
AL7 1TW

+44 (0) 333 150 6660

info@galaxkey.com


Discover

  • Case Studies
  • FAQ
  • Compliance
  • Legal

Galaxkey Tweets

GalaxkeyFollow

Galaxkey
GalaxkeyGalaxkey@Galaxkey·
21h

The main reason why cybercriminal campaigns that employ social engineering can be so dangerous is the fact that they rely mostly on user error, instead of operating system or software vulnerabilities.

Read more 👉 https://lttr.ai/cJJ0

#SocialEngineeringAttack

Reply on Twitter 1353664990667014146Retweet on Twitter 1353664990667014146Like on Twitter 1353664990667014146Twitter 1353664990667014146
GalaxkeyGalaxkey@Galaxkey·
24h

By encrypting all your files, a hacker may spend hours decoding the content, only to find the data involves nothing useful and quickly become discouraged.

Read the full article: Three tips to protect your company data
▸ https://lttr.ai/cIyr

#CompanyData #Encryption

Reply on Twitter 1353624755077861377Retweet on Twitter 1353624755077861377Like on Twitter 1353624755077861377Twitter 1353624755077861377
GalaxkeyGalaxkey@Galaxkey·
25 Jan

Fully compatible on an extensive range of devices and with a wide selection of operating systems, Galaxkey provides a secure environment for users to email.

Read the full article: My email has been spoofed – what should I do?
▸ https://lttr.ai/cIq9

#Encryption

Reply on Twitter 1353609646574084096Retweet on Twitter 1353609646574084096Like on Twitter 1353609646574084096Twitter 1353609646574084096
GalaxkeyGalaxkey@Galaxkey·
24 Jan

Setting up FIM: After all files have baselines recorded, the FIM solution must monitor all data records continuously for any alterations.

Read the full article: How to set up effective File Integrity Monitoring
▸ https://lttr.ai/cHBC

#LatestArticle #GalaxkeyBlog

Reply on Twitter 1353302608195293185Retweet on Twitter 1353302608195293185Like on Twitter 1353302608195293185Twitter 1353302608195293185
GalaxkeyGalaxkey@Galaxkey·
24 Jan

To avoid a recent attack aimed at macOS users, enterprise personnel must be educated to spot phishing emails and how to handle them.

Read the full article: Mac users targeted by hackers with upgraded malware
▸ https://lttr.ai/cGy4

#MacUsersTargeted #UpgradedMalware

Reply on Twitter 1353262358433587200Retweet on Twitter 1353262358433587200Like on Twitter 1353262358433587200Twitter 1353262358433587200

2010-2021 Galaxkey Limited. All Rights Reserved

  • Welcome
  • Products
    • Email Security
    • Document Security
    • Secure Workspace
    • Digital Document Signing
  • Technology
    • What Is The Product?
    • Who Do We Help?
  • Resources
    • FAQ
    • Case Studies
    • Compliance
    • Legal
    • Downloads
    • Datasheets
  • Connect
    • Contact
    • Book A Demo
    • Trial
    • Support
    • Partners
  • About Us
    • Our Executive Team
    • Our Investment Team
  • Blog
  • LOGIN
  • BUY
  • Download
  • Trial
  • Support