Hit enter to search or ESC to close
GalaxkeyGalaxkey
  • Welcome
  • Products
    • Email Security
    • Document Security
    • Secure Workspace
    • Digital Document Signing
  • Technology
    • What Is The Product?
    • Who Do We Help?
  • Resources
    • FAQ
    • Case Studies
    • Compliance
    • Legal
    • Downloads
    • Datasheets
  • Connect
    • Contact
    • Book A Demo
    • Trial
    • Support
    • Partners
  • About Us
    • Our Executive Team
    • Our Investment Team
  • Blog
  • LOGIN
  • BUY
Monthly Archives

May 2018

Encryption News

Study identifies UK as most breached country in Europe

A recent Thales (a Galaxkey partner) report, Europe edition, identifies the trends in encryption and data…
Galaxkey Security
Galaxkey Security31st May 2018
Encryption News

Personal information of nearly 1 million South Africans breached

A traffic fine platform has leaked sensitive personal data of nearly 1 million South Africans.…
Galaxkey Security
Galaxkey Security25th May 2018
Encryption News

The University of Greenwich fined £120,000 for serious data breach

The Information Commissioner's Office (ICO) has fined the University of Greenwich £120,000 for a serious…
Galaxkey Security
Galaxkey Security22nd May 2018
Encryption News

GDPR and mounting cybersecurity threats highlight the need for data protection

There has always been a need for data protection and security in business. Issues around…
Galaxkey Security
Galaxkey Security21st May 2018
Encryption News

Limited-time offer: Free GXK 25 data protection licences for all charities

With over 180000 registered charities in the Channel Islands, England and Wales alone, Galaxkey is…
Galaxkey Security
Galaxkey Security17th May 2018
Encryption News

New Galaxkey features: Authorised Data Distribution and Classification

The Galaxkey Dev Team has been super busy resulting in the official launch of two…
Galaxkey Security
Galaxkey Security15th May 2018
Encryption News

Warning: Serious #Efail vulnerabilities allow attackers to view PGP encrypted email content

Users of PGP (Pretty Good Privacy) and S/MIME (Secure/Multipurpose Internet Mail Extension) have been warned…
Galaxkey Security
Galaxkey Security15th May 2018
Encryption News

6 GDPR myths businesses should be wary of

With just two weeks to go until GDPR comes into effect, your organisation should be…
Galaxkey Security
Galaxkey Security15th May 2018
Encryption News

Why so much panic around the right to erasure?

There are 23 days to go to GDPR D-day! On the 25th May, the EU…
Galaxkey Security
Galaxkey Security2nd May 2018

Recent Posts

  • Five frightening capabilities of botnets
  • UK education charity disrupted by ransomware
  • Australian TV network hit by hack
  • UK clothing retailer notifies customers of data leak
  • How can you reduce the impact of criminal hacking?

Archives

  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • November 2019
  • June 2019
  • May 2019
  • April 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • November 2017
  • June 2017
  • March 2017
  • January 2017
  • December 2016
  • October 2016
  • September 2016
  • July 2016
  • June 2016
  • May 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • September 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • October 2014
  • September 2014
  • May 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • April 2012

Categories

  • Botnets
  • Business
  • Clickjacking
  • Cyberattack
  • Data Protection
  • Electronic Signatures
  • Email
  • Encryption News
  • File Integrity Monitoring
  • Middle East & Asia
  • News
  • Penetration Testing
  • Phishing
  • Ransomware
  • Release News
  • Spoofing
  • Spyware
  • Trojan

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About The Blog

Aiming to bring you the latest news and articles from the world of cybersecurity.

Recent Posts

  • Five frightening capabilities of botnets 10th April 2021
  • UK education charity disrupted by ransomware 8th April 2021
  • Australian TV network hit by hack 4th April 2021
  • UK clothing retailer notifies customers of data leak 2nd April 2021
  • How can you reduce the impact of criminal hacking? 30th March 2021

Contact

2 Falcon Gate Shire Park
Welwyn Garden City
AL7 1TW

+44 (0) 333 150 6660

info@galaxkey.com


Discover

  • Case Studies
  • FAQ
  • Compliance
  • Legal

Galaxkey Tweets

GalaxkeyFollow

Galaxkey
GalaxkeyGalaxkey@Galaxkey·
20h

In DDoS attacks, malicious operators overwhelm domain name system (DNS) servers with a relentless barrage of what often appear to be real service requests.

Read more 👉 https://lttr.ai/fWVD

#LatestArticle #GalaxkeyBlog #Encryption #Cybersecurity #Cyberattack

Reply on Twitter 1380481689839931394Retweet on Twitter 13804816898399313941Like on Twitter 1380481689839931394Twitter 1380481689839931394
GalaxkeyGalaxkey@Galaxkey·
23h

A botnet is the name given to a collection of enslaved internet-connected computers and other devices that have been infected by malicious software, empowering a cybercriminal to control their functions.

Read more 👉 https://lttr.ai/fVrR

#LatestArticle #GalaxkeyBlog

Reply on Twitter 1380441429927993346Retweet on Twitter 1380441429927993346Like on Twitter 1380441429927993346Twitter 1380441429927993346
GalaxkeyGalaxkey@Galaxkey·
8 Apr

Phishing tests, also known as phishing simulations, are regularly employed by many businesses looking make their personnel more aware of the potential dangers of spam social engineering tactics.

Read more 👉 https://lttr.ai/fVDr

#PhishingTests #LatestArticle #GalaxkeyBlog

Reply on Twitter 1380233799007604737Retweet on Twitter 1380233799007604737Like on Twitter 1380233799007604737Twitter 1380233799007604737
GalaxkeyGalaxkey@Galaxkey·
8 Apr

Attachments added to emails often include confidential material ranging from invoices containing financial account details, to company contracts describing private deals.

Read more 👉 https://lttr.ai/fUEM

#SecureEmail #Encryption #Cybersecurity #Email

Reply on Twitter 1380119304125972481Retweet on Twitter 13801193041259724811Like on Twitter 1380119304125972481Twitter 1380119304125972481
GalaxkeyGalaxkey@Galaxkey·
8 Apr

Following your assessment of a data breach, draw conclusions on the potential risks to data subjects involved and describe all possible solutions that will help them.

Read more 👉 https://lttr.ai/fTxU

#ReactCorrectly #DataBreach #LatestArticle #GalaxkeyBlog #Encryption

Reply on Twitter 1380079043941384192Retweet on Twitter 13800790439413841923Like on Twitter 13800790439413841921Twitter 1380079043941384192

2010-2021 Galaxkey Limited. All Rights Reserved

  • Welcome
  • Products
    • Email Security
    • Document Security
    • Secure Workspace
    • Digital Document Signing
  • Technology
    • What Is The Product?
    • Who Do We Help?
  • Resources
    • FAQ
    • Case Studies
    • Compliance
    • Legal
    • Downloads
    • Datasheets
  • Connect
    • Contact
    • Book A Demo
    • Trial
    • Support
    • Partners
  • About Us
    • Our Executive Team
    • Our Investment Team
  • Blog
  • LOGIN
  • BUY
  • Download
  • Trial
  • Support