Hit enter to search or ESC to close
GalaxkeyGalaxkey
  • Welcome
  • Products
    • Email Security
    • Document Security
    • Secure Workspace
    • Digital Document Signing
  • Technology
    • What Is The Product?
    • Who Do We Help?
  • Resources
    • FAQ
    • Case Studies
    • Compliance
    • Legal
    • Downloads
    • Datasheets
  • Connect
    • Contact
    • Book A Demo
    • Trial
    • Support
    • Partners
  • About Us
    • Our Executive Team
    • Our Investment Team
  • Blog
  • LOGIN
  • BUY

Our News

Encryption News

ICO enforcement doubled in 2012

28 March 2013 Monetary penalties issued by the Information Commissioner’s Office to organisations over the…
Galaxkey Security
Galaxkey Security29th March 2013
Encryption News

The ICO offers guidance as survey reveals concerns surrounding Bring your own device – BYOD – policy

7 March 2013 A survey has revealed that businesses seem to have a relaxed approach…
Galaxkey Security
Galaxkey Security8th March 2013
Encryption News

The former US President’s, George H. W. Bush, emails have been hacked.

The US media have reported that the former US President, George H. W. Bush, has…
Galaxkey Security
Galaxkey Security19th February 2013
Encryption News

Sony Computer Entertainment Europe Limited is fined £250 000 by the ICO following a data security breach.

24 January 2013 Millions of customer’s personal details have been compromised following the hacking of…
Galaxkey Security
Galaxkey Security25th January 2013
Encryption News

The Information Commissioner’s Office highlights the need for the encryption of sensitive data

26 October 2012 The definite need to encrypt sensitive data has been highlighted once again. …
Galaxkey Security
Galaxkey Security26th October 2012
Encryption News

Greater Manchester Police Force fined by the ICO for data breach

17 October 2012 The ICO imposed a monetary penalty of £150000 after an investigation into…
Galaxkey Security
Galaxkey Security17th October 2012
Encryption News

Email Encryption-government face challenges around securing emails

The days of leaking information through physical means is long over; email is by far…
Galaxkey Security
Galaxkey Security11th October 2012
Encryption News

Businesses remain responsible for data even when using cloud computing

4 Oct 2012 The ICO have confirmed that businesses will remain responsible for data that…
Galaxkey Security
Galaxkey Security4th October 2012
Encryption News

ICO pressing for custodial sentences for data loss

24 September 2012 At present the ICO are enforcing the data protection law through monetary…
Galaxkey Security
Galaxkey Security24th September 2012
Encryption News

Dropbox hacked placing user information at risk

July/August 2012 Dropbox have confirmed that user accounts have been hacked. Users realised something was…
Galaxkey Security
Galaxkey Security5th September 2012
Previous 1 … 35 36 37 38 Next

Recent Posts

  • German telecoms giant discloses data leak
  • Ransomware gang hits Finnish IT services firm
  • Top tactics used in phishing attacks today
  • What are “Common Vulnerabilities and Exposures” (CVEs)?
  • What are credential stuffing attacks and how can they be conquered?

Archives

  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • November 2019
  • June 2019
  • May 2019
  • April 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • November 2017
  • June 2017
  • March 2017
  • January 2017
  • December 2016
  • October 2016
  • September 2016
  • July 2016
  • June 2016
  • May 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • September 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • October 2014
  • September 2014
  • May 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • April 2012

Categories

  • Business
  • Clickjacking
  • Cyberattack
  • Data Protection
  • Electronic Signatures
  • Email
  • Encryption News
  • File Integrity Monitoring
  • Middle East & Asia
  • News
  • Penetration Testing
  • Phishing
  • Ransomware
  • Release News
  • Spoofing
  • Trojan

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About The Blog

Aiming to bring you the latest news and articles from the world of cybersecurity.

Recent Posts

  • German telecoms giant discloses data leak 4th March 2021
  • Ransomware gang hits Finnish IT services firm 2nd March 2021
  • Top tactics used in phishing attacks today 1st March 2021
  • What are “Common Vulnerabilities and Exposures” (CVEs)? 28th February 2021
  • What are credential stuffing attacks and how can they be conquered? 26th February 2021

Contact

2 Falcon Gate Shire Park
Welwyn Garden City
AL7 1TW

+44 (0) 333 150 6660

info@galaxkey.com


Discover

  • Case Studies
  • FAQ
  • Compliance
  • Legal

Galaxkey Tweets

GalaxkeyFollow

Galaxkey
GalaxkeyGalaxkey@Galaxkey·
4h

Galaxkey Secure Workspace provides a solution to the problem of insecure file sharing by allowing users to upload and share files and folders securely.

Read more 👉 https://lttr.ai/d7AO

#CompletePeace #LatestArticle #GalaxkeyBlog #Encryption #Cybersecurity #DataProtection

Reply on Twitter 1367435723247394817Retweet on Twitter 13674357232473948171Like on Twitter 1367435723247394817Twitter 1367435723247394817
GalaxkeyGalaxkey@Galaxkey·
5h

On 17th March, investigative journalist, Geoff White will join us to discuss everything there is to know about #Encryption as a Security Solution.

🔗 Book your place here: https://bit.ly/2NDR0Dd

#Galaxkey #security #dataprotection #privacy #cyber #databreach #Distology

Reply on Twitter 1367414812821622785Retweet on Twitter 13674148128216227851Like on Twitter 13674148128216227851Twitter 1367414812821622785
GalaxkeyGalaxkey@Galaxkey·
6h

A ploy found in spam and phishing emails are malicious links staff are urged to click on.

Read the full article: Why your enterprise needs protection from spam
▸ https://lttr.ai/d6kt

#Encryption #Cybersecurity #LatestArticle #Phishing #ConstantWarUpgrading

Reply on Twitter 1367395476757184512Retweet on Twitter 13673954767571845121Like on Twitter 13673954767571845122Twitter 1367395476757184512
GalaxkeyGalaxkey@Galaxkey·
20h

To help companies keep their staff and confidential files safe when using email, at Galaxkey, we have developed a secure platform with robust email security features.

Read more 👉 https://lttr.ai/d5Kl

#SafeguardingStaff #EmailSpoofing #LatestArticle #GalaxkeyBlog

Reply on Twitter 1367187854259089411Retweet on Twitter 1367187854259089411Like on Twitter 1367187854259089411Twitter 1367187854259089411
GalaxkeyGalaxkey@Galaxkey·
3 Mar

From regular testing to informational literature, there are many ways to train staff on the threats of phishing emails.

Read the full article: Three essential security practices for malware protection
▸ https://lttr.ai/d3Vr

#EssentialSecurityPractices #MalwareProtection

Reply on Twitter 1367073344953200644Retweet on Twitter 1367073344953200644Like on Twitter 1367073344953200644Twitter 1367073344953200644

2010-2021 Galaxkey Limited. All Rights Reserved

  • Welcome
  • Products
    • Email Security
    • Document Security
    • Secure Workspace
    • Digital Document Signing
  • Technology
    • What Is The Product?
    • Who Do We Help?
  • Resources
    • FAQ
    • Case Studies
    • Compliance
    • Legal
    • Downloads
    • Datasheets
  • Connect
    • Contact
    • Book A Demo
    • Trial
    • Support
    • Partners
  • About Us
    • Our Executive Team
    • Our Investment Team
  • Blog
  • LOGIN
  • BUY
  • Download
  • Trial
  • Support