• Homepage
  • Products
    • Secure Email
    • Secure Workspace
    • Secure Sign
    • Secure Files & Rights Management
    • Secure Messaging – LockChat
    • Galaxkey Shield
  • Contact Us
  • Login
Galaxkey
  • Home
  • Products
    • Secure Email
    • Secure Workspace
    • Secure Sign
    • Secure Files & Rights Management
    • Secure Messaging – LockChat
    • Galaxkey Shield
  • Contact Us
  • Login
Search site...

Galaxkey How do hackers use stolen PII?
  • Hacker stealing account information like username and password

    How do hackers use stolen PII?

    From the recently released Facebook user phone numbers headlines, to disclosed email communications between the Ministry of Defence and third parties, no organisation or

    27 April 2021
    Data Protection
  • People outside on a laptop

    UK university struck by cyberattack

    A lethal cyberattack has targeted a university, knocking out its online learning facilities and dedicated IT systems.

    26 April 2021
    Cyberattack
  • data protection and internet security concept, woman user typing password

    What makes a strong password?

    Despite all the warnings issued by cybercrime experts, many people are still employing passwords that are simple to guess. From “1234” and “password” to the…

    25 April 2021
    Cybersecurity
  • Email security key on computer keyboard

    What are Business Email Compromise attacks?

    Business Email Compromise (BEC) attacks are defined as cybercrimes that employ email fraud tactic to strike a range of targets – from commercial and

    24 April 2021
    Secure Communications
  • Email security key on computer keyboard

    How do company email accounts get hacked?

    Recent headlines have been awash with email accounts connected to large corporations, international cabinet ministers, and government agencies being hacked – but how does this

    23 April 2021
    Secure Communications
  • Email encryption and data security

    What are the business benefits of efficient backups?

    Data backup is a business-critical process that all companies are advised to conduct systematically and to schedule. From managing day-to-day information requests, to

    22 April 2021
    Data Protection
  • Email attacks and email encryption

    What is the best way to send a confidential email?

    Even if your company’s policy is to limit confidential communications via email to a bare minimum, there may be times when the vendors, suppliers, and

    21 April 2021
    Secure Communications
  • Malware Detected Warning Screen

    Malware infection hits 500,000 Android devices

    Over 500,000 Huawei customers have downloaded applications from the enterprise’s official Android store that are infected with a malicious software known as

    20 April 2021
    Cyberattack
  • Virus and malwares

    Why are phishing attacks still working?

    Despite the fact that dedicated filters have been designed by mail providers and most people are well aware of the threat they represent, phishing attacks…

    19 April 2021
    Secure Communications
  • Doctor working in hospital writing prescription clipboard, working an Laptop on desk in hospital with report analysis, Healthcare and medical concept, selective focus

    French cosmetics group hit by REvil attack

    Leading French cosmetics and pharmaceutical company Pierre Fabre has been struck by a REvil ransomware assault, demanding an initial payment of

    18 April 2021
    Cyberattack
Previous
12…4748495051…8990
Next
  • The Technology
  • FAQs
  • Legal
  • News & Our Thoughts
  • About Us
  • Compliance
  • Case Studies
  • Privacy Policy

Galaxkey Leap Limited
1st Floor Annexe, New Barnes Mill,
Cotton Mill Lane, St Albans, AL1 2HA
+44 (0) 333 150 6660
sales@galaxkey.com

© Copyright 2025  Galaxkey. All Rights Reserved. Galaxkey® and LockChat® are registered trademark of Galaxkey Limited, UK