• Homepage
  • Products
    • Secure Email
    • Secure Workspace
    • Secure Sign
    • Secure Files & Rights Management
    • Secure Messaging – LockChat
    • Galaxkey Shield
  • Contact Us
  • Login
Galaxkey
  • Home
  • Products
    • Secure Email
    • Secure Workspace
    • Secure Sign
    • Secure Files & Rights Management
    • Secure Messaging – LockChat
    • Galaxkey Shield
  • Contact Us
  • Login
Search site...

Galaxkey Four kinds of data breach and how they impact enterprises
  • Meter

    Four kinds of data breach and how they impact enterprises

    Data breaches can cause companies both time and money. While breaches are inspected and systems restored, valuable time can be lost due to the disruption.…

    4 September 2020
    Data Protection
  • Malware Detected Warning Screen

    Hired hackers attack with 3D graphics app malware

    A mercenary hacker group is using malicious software in the form of a 3Ds Max plugin to spread malware in enterprise systems while stealing

    2 September 2020
    Cyberattack
  • general data protection regulation GDPR

    Nine important GDPR requirements for UK enterprises

    The General Data Protection Regulation (GDPR) was established to provide rules for companies to adhere to when managing and storing personal data. GDPR states the…

    30 August 2020
    Data Protection
  • People working collaboratively

    Crucial cybersecurity protocols for enterprises

    Current research undertaken by cyber security experts reveals that a significant number of data breaches occurring in companies are caused by the weakest link in…

    28 August 2020
    Cybersecurity
  • Hacker working with computer in dark room with digital interface around. Image with glitch effect.

    US university gives in to ransomware demands

    The University of Utah has paid a ransomware group over $457,000 in order to safeguard

    26 August 2020
    Cyberattack
  • compromised data

    How easy is it to spoof an email address?

    Firstly, let’s get something straight. This isn’t a blog that will tell you how to spoof an email address. So, if that’s the information you’re…

    25 August 2020
    Secure Communications
  • Email encryption and data security

    Getting to grips with ransomware

    While phishing emails and malicious software can wreak havoc on an enterprise’s system, ransomware is gaining ground as a more dangerous weapon in the cybercriminal…

    24 August 2020
    Secure Communications
  • Words technology security code computer attack highlighted in against computer code background

    Business technology company struck by ransomware attack

    Japanese tech-giant Konica Minolta was recently hit by a newly discovered form of ransomware impacting its services and

    22 August 2020
    Cyberattack
  • Project manager meeting with team for decision on planning milestones and deliverables, Gantt chart schedule on computer screen, 3 people in office

    How to test your employees’ reaction to a phishing email

    Conducting a phishing test at your company can help identify the reactions of your employees to emails received from hackers. If executed correctly, it can…

    21 August 2020
    Secure Communications
  • phishing threats, fishing rod catching an email on laptop screen

    Data reveals NHS bombarded by scam emails during pandemic peak

    Figures released have shown that at the height of the coronavirus outbreak, the UK’s National Health Service (NHS) was struck by a torrent of

    20 August 2020
    Cyberattack
Previous
12…6364656667…8990
Next
  • The Technology
  • FAQs
  • Legal
  • News & Our Thoughts
  • About Us
  • Compliance
  • Case Studies
  • Privacy Policy

Galaxkey Leap Limited
1st Floor Annexe, New Barnes Mill,
Cotton Mill Lane, St Albans, AL1 2HA
+44 (0) 333 150 6660
sales@galaxkey.com

© Copyright 2025  Galaxkey. All Rights Reserved. Galaxkey® and LockChat® are registered trademark of Galaxkey Limited, UK