• Homepage
  • Products
    • Secure Email
    • Secure Workspace
    • Secure Sign
    • Secure Files & Rights Management
    • Secure Messaging – LockChat
    • Galaxkey Shield
  • Contact Us
  • Login
Galaxkey
  • Home
  • Products
    • Secure Email
    • Secure Workspace
    • Secure Sign
    • Secure Files & Rights Management
    • Secure Messaging – LockChat
    • Galaxkey Shield
  • Contact Us
  • Login
Search site...

Category / Cybersecurity

  • general data protection regulation GDPR

    Understanding post-Brexit penalties and fines for GDPR

    Now that the set period for Brexit transition has come to an end, there are two different versions of the General Data Protection Regulation (GDPR) that…

    30 May 2021
    Cybersecurity
  • The problem with KYC – and how to solve it

    The problem with KYC – and how to solve it

    How well do you Know Your Customers? Sure, you perform KYC (Know Your Customer) checks on all new clients, but is that enough? How do…

    25 May 2021
    Cybersecurity
  • data protection and internet security concept, woman user typing password

    Celebrate World Password Day with hard-to-crack credentials

    May 6th will see people all over the planet take part in World Password Day editing and updating the multi-character credentials they have adopted to…

    6 May 2021
    Cybersecurity
  • data protection and internet security concept, woman user typing password

    What makes a strong password?

    Despite all the warnings issued by cybercrime experts, many people are still employing passwords that are simple to guess. From “1234” and “password” to the…

    25 April 2021
    Cybersecurity
  • Malware Detected Warning Screen

    How can you tell if your company computer has a malware infection?

    Whether it’s downloaded by accident or insidiously planted on a device, malware can cause a host of issues for an enterprise, from slow systems to…

    27 March 2021
    Cybersecurity
  • Virus and malwares

    What are “Common Vulnerabilities and Exposures” (CVEs)?

    When upgrades are issued for software and hardware used by your firm, you may find security fixes for known vulnerabilities included in the update. If…

    28 February 2021
    Cybersecurity
  • Protection network security computer and safe your data concept. Laptop working develop coding program with key on keyboard

    Is Your Business Data Being Used Without Your Consent?

    If your business uses Microsoft Office 365 Enterprise, you and your employees may have started receiving weekly emails with the subject line ‘Your daily briefing’…

    18 January 2021
    Cybersecurity
  • Cyber attack.

    How to set up effective File Integrity Monitoring

    File Integrity Monitoring, or FIM for short, is the name given to IT security processes and technology that has been designed to examine and identify…

    2 January 2021
    Cybersecurity
  • Data encryption

    Seven advantages of data backups for enterprises

    Across the UK, businesses use mobile devices and desktop computers to search through data and to store and conduct data processes. Performing regular backups of…

    26 November 2020
    Cybersecurity
  • data protection and internet security concept, woman user typing password

    Three essential security practices for malware protection

    The National Cyber Security Centre (NCSC) website recommends that companies should always work on the premise that systems may be

    18 November 2020
    Cybersecurity
Previous
12…678910…1213
Next
  • The Technology
  • FAQs
  • Legal
  • News & Our Thoughts
  • About Us
  • Compliance
  • Case Studies
  • Privacy Policy

Galaxkey Leap Limited
1st Floor Annexe, New Barnes Mill,
Cotton Mill Lane, St Albans, AL1 2HA
+44 (0) 333 150 6660
sales@galaxkey.com

© Copyright 2025  Galaxkey. All Rights Reserved. Galaxkey® and LockChat® are registered trademark of Galaxkey Limited, UK