• Homepage
  • Products
    • Secure Email
    • Secure Workspace
    • Secure Sign
    • Secure Files & Rights Management
    • Secure Messaging – LockChat
    • Galaxkey Shield
  • Contact Us
  • Login
Galaxkey
  • Home
  • Products
    • Secure Email
    • Secure Workspace
    • Secure Sign
    • Secure Files & Rights Management
    • Secure Messaging – LockChat
    • Galaxkey Shield
  • Contact Us
  • Login
Search site...

Category / Secure Communications

  • Laptop

    Understanding Trojans and how they work

    A Trojan may seem like an authentic file or app, but it isn’t. The aim of a Trojan is to fool you into loading up…

    12 February 2021
    Secure Communications
  • Email security key on computer keyboard

    Why do cybercriminals spoof emails?

    You receive an email from a colleague in your enterprise inbox, but something doesn’t click. They’re asking you for sensitive data they should have no

    6 February 2021
    Secure Communications
  • compromised data

    Why your enterprise needs protection from spam

    Although current providers are involved in a constant war upgrading their filters to spot and stop spam emails ever arriving in client inboxes, this

    30 January 2021
    Secure Communications
  • man facepalming

    It’s perfectly safe to send email attachments…isn’t it?

    Millions of emails are released per second every day throughout the world. In many cases, these missives include important documents and

    21 January 2021
    Secure Communications
  • Data Protection

    Top data loss prevention protocols for email

    Data Loss Prevention, or DLP for short, is among the most powerful tools an enterprise can employ to protect both itself and

    19 January 2021
    Secure Communications
  • Email attacks and email encryption

    What are the principles of email security?

    Despite the security risks involved in transmitting private information via email, for communication and document sharing, it is still

    13 January 2021
    Secure Communications
  • Email attacks and email encryption

    Safeguarding staff against email spoofing

    Email spoofing is just one of the techniques used by cybercriminals in their insidious campaigns. Hackers understand that while there are many new ways of…

    6 January 2021
    Secure Communications
  • Email security key on computer keyboard

    How to protect your firm from BEC attacks

    A Business Email Compromise (BEC) attack starts with a hacker using spoofed email accounts to effectively impersonate a firm’s CEO or managers. After penetrating email…

    26 December 2020
    Secure Communications
  • Hacking phishing attack. Flat vector illustration of young hacker sitting on the laptop to hack protection system.

    Safeguarding your enterprise from spear phishing

    Spear phishing attacks are targeted assaults aimed at specific individuals and enterprises to trick them into downloading malware or exposing sensitive information. Ramping up traditional…

    25 December 2020
    Secure Communications
  • Hacker working with computer in dark room with digital interface around. Image with glitch effect.

    Eight ways to minimise ransomware risks

    Along with exorbitant bitcoin payments, ransomware operators have been stealing headlines this year, attacking companies that are desperate to safeguard confidential data from exposure. Deploying…

    22 December 2020
    Secure Communications
Previous
12…1011121314…1617
Next
  • The Technology
  • FAQs
  • Legal
  • News & Our Thoughts
  • About Us
  • Compliance
  • Case Studies
  • Privacy Policy

Galaxkey Leap Limited
1st Floor Annexe, New Barnes Mill,
Cotton Mill Lane, St Albans, AL1 2HA
+44 (0) 333 150 6660
sales@galaxkey.com

© Copyright 2025  Galaxkey. All Rights Reserved. Galaxkey® and LockChat® are registered trademark of Galaxkey Limited, UK