Hit enter to search or ESC to close
GalaxkeyGalaxkey
  • Welcome
  • Products
    • Email Security
    • Document Security
    • Secure Workspace
    • Digital Document Signing
  • Technology
    • What Is The Product?
    • Who Do We Help?
  • Resources
    • FAQ
    • Case Studies
    • Compliance
    • Legal
    • Downloads
    • Datasheets
  • Connect
    • Contact
    • Book A Demo
    • Trial
    • Support
    • Partners
  • About Us
    • Our Executive Team
    • Our Investment Team
  • Blog
  • LOGIN
  • BUY
All Posts By

Lydia

Electronic Signatures

Three reasons why document transfers should use digital signatures

If your business involves process where a large volume of physical documents must be managed…
Lydia
Lydia17th January 2021
Data Protection

What’s wrong with using FTP for transferring large files?

A network protocol dating back to 1970s, the File Transfer Protocol or FTP is used…
Lydia
Lydia15th January 2021
Data Protection

Backdoor account identified in Zyxel security solutions

Security experts have uncovered a vulnerability in over a 100,000 dedicated Zyxel firewalls, access point…
Lydia
Lydia12th January 2021
Cyberattack

Russian cryptocurrency exchange hit by hackers

After losing control of its dedicated servers, Livecoin, the Russian exchange for cryptocurrency, has been…
Lydia
Lydia10th January 2021
File Integrity Monitoring

How to set up effective File Integrity Monitoring

File Integrity Monitoring, or FIM for short, is the name given to IT security processes…
Lydia
Lydia2nd January 2021
Spoofing

How to protect your firm from BEC attacks

A Business Email Compromise (BEC) attack starts with a hacker using spoofed email accounts to…
Lydia
Lydia26th December 2020
Data Protection

What are zero-day vulnerabilities?

Zero-day vulnerabilities are weaknesses in computer software that are unknown to individuals and organisations interested…
Lydia
Lydia23rd December 2020
Ransomware

Electronics multinational faces $34m ransom

International electronics manufacturing giant Foxconn is facing a multimillion-dollar ransom demand after its facility based…
Lydia
Lydia20th December 2020
Data Protection

Eight cybersecurity insights to keep you safe

From fraudsters seeking to steal financial details to ransomware operators using social engineering to infiltrate,…
Lydia
Lydia19th December 2020
Email

Mac users targeted by hackers with upgraded malware

Cybersecurity researchers have linked a new spate of malware assaults to the hacking group APT32,…
Lydia
Lydia12th December 2020
1 2 3 … 6 Next

Recent Posts

  • Top data loss prevention protocols for email
  • Three types of Distributed Denial of Service (DDoS) attacks
  • Is Your Business Data Being Used Without Your Consent?
  • Three reasons why document transfers should use digital signatures
  • What does a man in the middle (MITM) attack involve?

Archives

  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • November 2019
  • June 2019
  • May 2019
  • April 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • November 2017
  • June 2017
  • March 2017
  • January 2017
  • December 2016
  • October 2016
  • September 2016
  • July 2016
  • June 2016
  • May 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • September 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • October 2014
  • September 2014
  • May 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • April 2012

Categories

  • Business
  • Clickjacking
  • Cyberattack
  • Data Protection
  • Electronic Signatures
  • Email
  • Encryption News
  • File Integrity Monitoring
  • Middle East & Asia
  • News
  • Phishing
  • Ransomware
  • Release News
  • Spoofing
  • Trojan
  • Uncategorised

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About The Blog

Aiming to bring you the latest news and articles from the world of cybersecurity.

Recent Posts

  • Top data loss prevention protocols for email 19th January 2021
  • Three types of Distributed Denial of Service (DDoS) attacks 18th January 2021
  • Is Your Business Data Being Used Without Your Consent? 18th January 2021
  • Three reasons why document transfers should use digital signatures 17th January 2021
  • What does a man in the middle (MITM) attack involve? 16th January 2021

Contact

2 Falcon Gate Shire Park
Welwyn Garden City
AL7 1TW

+44 (0) 333 150 6660

info@galaxkey.com


Discover

  • Case Studies
  • FAQ
  • Compliance
  • Legal

Galaxkey Tweets

GalaxkeyFollow

Galaxkey
GalaxkeyGalaxkey@Galaxkey·
9h

IP blacklists commonly contain an individual IP address or a compilation of multiple IP addresses that a company wants to block.

Read more 👉 https://lttr.ai/b4Cj

#EnterpriseChallenges #IpBlacklists #LatestArticle #GalaxkeyBlog #Encryption #Cybersecurity #DataProtection

Reply on Twitter 1351605182606544897Retweet on Twitter 13516051826065448973Like on Twitter 1351605182606544897Twitter 1351605182606544897
GalaxkeyGalaxkey@Galaxkey·
17h

Data privacy directly affects the four mainstays of any business – customer trust, operational efficiency, the bottom line and compliance.

Read the full article: Data privacy is an essential investment for any business
â–¸ https://lttr.ai/b2lF

#DataPrivacy

Reply on Twitter 1351490675917922306Retweet on Twitter 1351490675917922306Like on Twitter 1351490675917922306Twitter 1351490675917922306
GalaxkeyGalaxkey@Galaxkey·
20h

Contact our expert team and arrange for a free online demonstration of our secure workspace and start protecting the personal information you hold without delay

Read the full article: A guide to understanding Personally Identifiable Information
â–¸ https://lttr.ai/b2Ox

Reply on Twitter 1351450431529115648Retweet on Twitter 1351450431529115648Like on Twitter 1351450431529115648Twitter 1351450431529115648
GalaxkeyGalaxkey@Galaxkey·
18 Jan

Social media icons hide skimming malware
â–¸ https://lttr.ai/bzvS

#LatestArticle #GalaxkeyBlog #Encryption #Cybersecurity #DataProtection #InsertingSkimmerScripts #PaymentDataEntered #CybercriminalGroupSServers #SkimCreditCards #ScalableVectorGraphic

Reply on Twitter 1351128285749637123Retweet on Twitter 13511282857496371231Like on Twitter 13511282857496371232Twitter 1351128285749637123
GalaxkeyGalaxkey@Galaxkey·
18 Jan

Earlier this year, one of the biggest IT managed services firms in the world, Cognizant, made headlines following an attack by the now retired Maze ransomware group.

Read more 👉 https://lttr.ai/bzXe

#RansomwareAttack #Encryption #Cybersecurity #Ransomware

Reply on Twitter 1351088019617574914Retweet on Twitter 13510880196175749142Like on Twitter 13510880196175749141Twitter 1351088019617574914

2010-2021 Galaxkey Limited. All Rights Reserved

  • Welcome
  • Products
    • Email Security
    • Document Security
    • Secure Workspace
    • Digital Document Signing
  • Technology
    • What Is The Product?
    • Who Do We Help?
  • Resources
    • FAQ
    • Case Studies
    • Compliance
    • Legal
    • Downloads
    • Datasheets
  • Connect
    • Contact
    • Book A Demo
    • Trial
    • Support
    • Partners
  • About Us
    • Our Executive Team
    • Our Investment Team
  • Blog
  • LOGIN
  • BUY
  • Download
  • Trial
  • Support