• Homepage
  • Products
    • Secure Email
    • Secure Workspace
    • Secure Sign
    • Secure Files & Rights Management
    • Secure Messaging – LockChat
    • Galaxkey Shield
  • Contact Us
  • Login
Galaxkey
  • Home
  • Products
    • Secure Email
    • Secure Workspace
    • Secure Sign
    • Secure Files & Rights Management
    • Secure Messaging – LockChat
    • Galaxkey Shield
  • Contact Us
  • Login
Search site...

Category / Data Protection

  • Data Breach Security Hack Breaking Through 3d Illustration

    What are the potential consequences of a data breach?

    When private or confidential information that is held by a firm is exposed, it can have a serious impact on its business and any individuals…

    25 March 2021
    Data Protection
  • data breach dial

    Ministry of Defence security incidents revealed

    A recent report issued by Sky News has highlighted that sensitive Ministry of Defence (MOD) data was exposed when confidential files were

    18 March 2021
    Data Protection
  • Protection network security computer and safe your data concept. Laptop working develop coding program with key on keyboard

    What are credential stuffing attacks and how can they be conquered?

    A type of attack method used by cybercriminals, credential stuffing involves malicious operators employing lists containing user credentials to

    26 February 2021
    Data Protection
  • data breach dial

    How to react correctly following a data breach

    The most successful firms operating today are acutely aware of the most common issues haunting data security, and they put extensive time and effort into…

    20 February 2021
    Data Protection
  • Protection network security computer and safe your data concept. Laptop working develop coding program with key on keyboard

    What is the purpose of enterprise data classification?

    To ensure enterprise data is protected correctly, it’s essential that IT professionals understand the information they are caretakers of. Classifying data is a critical element…

    18 February 2021
    Data Protection
  • Backdoor to access the code

    What are the business benefits of employing encryption?

    Cybersecurity experts may disagree on the potency of different protective measures, but one topic they all share the same viewpoint on is

    15 February 2021
    Data Protection
  • Boeing 747-400 British Airlines

    How UK firms should encrypt data

    Encryption software available today offers an innovative solution that can help companies protect data retained on a

    24 January 2021
    Data Protection
  • Computer hacker silhouette of hooded man

    What does a man in the middle (MITM) attack involve?

    The term man in the middle (MITM), refers to a cybercriminal attack where a threat operator manages to place themselves within a conversation held between…

    16 January 2021
    Data Protection
  • Backdoor to access the code

    Backdoor account identified in Zyxel security solutions

    Security experts have uncovered a vulnerability in over a 100,000 dedicated Zyxel firewalls, access point controllers

    12 January 2021
    Data Protection
  • Beautiful businesswoman working with laptop and documents at hom

    Best cybersecurity practices for working off site

    In recent years, new technology solutions and the need to work flexibly have been shaping the way enterprise employees are now working. The

    8 January 2021
    Data Protection
Previous
12…45678…1617
Next
  • The Technology
  • FAQs
  • Legal
  • News & Our Thoughts
  • About Us
  • Compliance
  • Case Studies
  • Privacy Policy

Galaxkey Leap Limited
1st Floor Annexe, New Barnes Mill,
Cotton Mill Lane, St Albans, AL1 2HA
+44 (0) 333 150 6660
sales@galaxkey.com

© Copyright 2025  Galaxkey. All Rights Reserved. Galaxkey® and LockChat® are registered trademark of Galaxkey Limited, UK