• Homepage
  • Products
    • Secure Email
    • Secure Workspace
    • Secure Sign
    • Secure Files & Rights Management
    • Secure Messaging – LockChat
    • Galaxkey Shield
  • Contact Us
  • Login
Galaxkey
  • Home
  • Products
    • Secure Email
    • Secure Workspace
    • Secure Sign
    • Secure Files & Rights Management
    • Secure Messaging – LockChat
    • Galaxkey Shield
  • Contact Us
  • Login
Search site...

Category / Data Protection

  • Computer hacker silhouette of hooded man

    What is a social engineering attack?

    In computing, social engineering is a broad term that covers an extensive array of insidious activities conducted via human interactions. The tactic, which is employed…

    30 December 2020
    Data Protection
  • Stealing personal data through a laptop concept

    Four enterprise challenges of using IP blacklists

    An approach used for filtering out malicious or fake IP addresses, IP blacklisting has been designed to stop insidious threat actors from gaining access to

    28 December 2020
    Data Protection
  • Cyber attack.

    What are zero-day vulnerabilities?

    Zero-day vulnerabilities are weaknesses in computer software that are unknown to individuals and organisations interested in patching the deficiency, such as its vendor. Until this…

    23 December 2020
    Data Protection
  • Data Breach Button on Computer Keyboard

    Exploring the multiple causes of data leaks

    Companies that keep or use personal data are required by regulations to provide adequate security for this information to protect the individuals it belongs to.…

    21 December 2020
    Data Protection
  • Data Protection

    Eight cybersecurity insights to keep you safe

    From fraudsters seeking to steal financial details to ransomware operators using social engineering to infiltrate, online threats targeting individuals create serious risks for

    19 December 2020
    Data Protection
  • Facebook

    Social media icons hide skimming malware

    A new form of malware has been identified hidden inside sharing icons for social media, capable of stealing shoppers’

    18 December 2020
    Data Protection
  • Doctor working in hospital writing prescription clipboard, working an Laptop on desk in hospital with report analysis, Healthcare and medical concept, selective focus

    Attack exposes nearly 300,000 US patients’ data

    US-based healthcare provider AspenPointe has recently informed patients it has suffered a data leak resulting from a cyberattack back in

    16 December 2020
    Data Protection
  • Data Protection

    Three tips to protect your company data

    Safeguarding sensitive and personal data is the continuing mission of information security officers of enterprises. From switching computers off when not in

    14 December 2020
    Data Protection
  • Protection network security computer and safe your data concept. Laptop working develop coding program with key on keyboard

    Data privacy is an essential investment for any business

    One of the biggest threats currently facing businesses in the UK is that of a cyber attack. Hackers attack every 39 seconds, which costs businesses,…

    9 December 2020
    Data Protection
  • Hacker stealing account information like username and password

    A guide to understanding Personally Identifiable Information

    In today’s cybercriminal world, Personally Identifiable Information, or PII for short, has become a much sought-after commodity by hackers and

    8 December 2020
    Data Protection
Previous
12…56789…1617
Next
  • The Technology
  • FAQs
  • Legal
  • News & Our Thoughts
  • About Us
  • Compliance
  • Case Studies
  • Privacy Policy

Galaxkey Leap Limited
1st Floor Annexe, New Barnes Mill,
Cotton Mill Lane, St Albans, AL1 2HA
+44 (0) 333 150 6660
sales@galaxkey.com

© Copyright 2025  Galaxkey. All Rights Reserved. Galaxkey® and LockChat® are registered trademark of Galaxkey Limited, UK