• Homepage
  • Products
    • Secure Email
    • Secure Workspace
    • Secure Sign
    • Secure Files & Rights Management
    • Secure Messaging – LockChat
    • Galaxkey Shield
  • Contact Us
  • Login
Galaxkey
  • Home
  • Products
    • Secure Email
    • Secure Workspace
    • Secure Sign
    • Secure Files & Rights Management
    • Secure Messaging – LockChat
    • Galaxkey Shield
  • Contact Us
  • Login
Search site...

Category / Cybersecurity

  • Data encryption

    Mark Data Privacy Day by deploying encryption

    Data Privacy Day, also known as Data Protection Day in Europe, is an annual event that aims to raise awareness about the importance of protecting…

    18 January 2023
    Cybersecurity
  • Data encryption

    What’s the difference between transport-layer encryption and end-to-end encryption?

    Data encryption is a security solution designed to achieve data privacy and compliance, which are the utmost requirements of every business environment. It can help…

    14 January 2023
    Cybersecurity
  • Data Protection

    5 Great IT tips for National Clean Up Your Computer Month

    January is well-known around the world as National Clean Up Your Computer Month. While good housekeeping and best practices are advised all year round, it…

    12 January 2023
    Cybersecurity
  • Information concept: data collection on digital background

    Stolen Twitter user data released for free

    More than 5.4 million user records for the social media platform Twitter were recently shared free of charge on a hacker forum on the dark…

    2 December 2022
    Cyberattack, Cybersecurity
  • Hacking phishing attack. Flat vector illustration of young hacker sitting on the laptop to hack protection system.

    Malicious extensions allowing hackers control

    A brand-new browser-targeting botnet called ‘Cloud9’ has been identified by experts using malicious extensions with the aims of logging keystrokes, stealing online accounts, injecting malicious…

    16 November 2022
    Cybersecurity
  • Faceless Detective Identifying Insider Threat

    Threat operators selling corporate network access

    A fresh report has uncovered that hackers are currently selling accessibility to 576 different corporate networks around the world for four million dollars, fuelling cyberattack…

    8 November 2022
    Cybersecurity
  • Data encryption

    Three types of data exchange that benefit from encryption

    Collaborating and communicating are key processes for most successful enterprises. However, when data is exchanged that regards confidential company deals or the personally identifiable information…

    28 October 2022
    Cybersecurity
  • Hacker on a computer

    Zero-day flaw leads to severe server hack

    Close to 900 servers were recently hacked employing critical vulnerability in Zimbra Collaboration Suite, which had a zero-day status without a security patch for around…

    24 October 2022
    Cyberattack, Cybersecurity
  • Virus and malwares

    Understanding the difference between common malware types.

    Malware unleashed on today’s enterprises takes many forms. As a result, there is often a great deal of confusion regarding what these insidious programs are…

    22 October 2022
    Cybersecurity
  • Malware Detected Warning Screen

    Anti-malware measures firms must adopt

    From spyware that observes and records online activity to ransomware that encrypts company data to leverage payments, there are a wide range of different malware…

    18 October 2022
    Cybersecurity
Previous
1234…1213
Next
  • The Technology
  • FAQs
  • Legal
  • News & Our Thoughts
  • About Us
  • Compliance
  • Case Studies
  • Privacy Policy

Galaxkey Leap Limited
1st Floor Annexe, New Barnes Mill,
Cotton Mill Lane, St Albans, AL1 2HA
+44 (0) 333 150 6660
sales@galaxkey.com

© Copyright 2025  Galaxkey. All Rights Reserved. Galaxkey® and LockChat® are registered trademark of Galaxkey Limited, UK