Home
Powered by Galaxkey
Email Encryption
File Encryption
Electronic Signatures
Secure File Exchange
The Platform
Support
GET STARTED
What we do
Email Encryption
Secure Signatures
Secure File Transfer
Secure File Exchange
How it Works
Explore
About Us
Our Partners
Datasheets
Case Studies
White Papers
News & Blog
Compliance
Download our Software
FAQs
Contact Support
HTML Sitemap
Explore our website
Scroll down to view our Sitemap
Posts
12 Reasons why enterprises need digital document signing
2022 - A Year in Review
4 top ransomware attack vectors and how to avoid them
4 ways that electronic document signing can benefit your business
5 Best Practices for Secure File Transfer in the Modern Workplace
5 Great IT tips for National Clean Up Your Computer Month
5 steps to digital security when your employees work from home
5 Ways To Improve Data Security In Your Business
6 GDPR myths businesses should be wary of
9 Essential tips to keep your logins secure
A glossary of cybersecurity terms
A guide to understanding Personally Identifiable Information
A look back at when the UK government website was hacked
A word on resilience in innovation from Sir George Zambellas
Accounting firms are prime targets for hackers, here’s how to protect your business
Accounting software provider impersonated in phishing scam
Airline issues apology after customer data is compromised
American not-for profit discloses data leak
Analyzing Microsoft 365's Cloud Email Breach
Android malware infects devices to steal social media accounts
Android malware seizes control of Facebook accounts
Annual cybercrime report reveals startling UK statistics
Anti-malware measures firms must adopt
API flaw exposes sensitive student data
Apple Misleadingly Claims Encryption of Email Attachments for Devices
Apple warns US State Department of spyware threat
Are phishing tests an effective way to protect your firm?
Are spam emails a serious threat to enterprises?
Are you at risk from ransomware?
Are your email accounts protected from threats?
Are your people prepared for phishing attacks?
Arizona faces large-scale data breach
Article: PRISM and our Privacy
Attack exposes nearly 300,000 US patients’ data
Australian agency raises alert on ransomware attacks
Australian entertainment and gambling company confirms data breach
Australian telecoms provider, Telstra, apologises for data breach
Australian TV network hit by hack
Automaker discloses data breach
Aviation IT supplier suffers massive data breach
Avoid data security risks by deploying email encryption
Avoid data spillage with end-to-end email encryption
Avoid phishing attacks by understanding operations
Backdoor account identified in Zyxel security solutions
Backdoors for Spying and Encryption Keys for all...
Bank holding company hit by cyberattack
BBC Provides a Simple Explanation for Encryption
BEC Scams: How Email Encryption Can Help Secure Your Data
Best cybersecurity practices for working off site
Best password practices for enterprise email accounts
Best practices for businesses using encryption
Best practices for email security in 2022
Best practices for secure file transfers
Beyond Firewalls and Antivirus: The Importance of Securing Your Business Data
Big business data exposed in Canada Post breach
Blender vendor hit by Magecart attack
Bogus investment network targets Europe
Bogus ransomware attacks plague WordPress sites
Bogus ransomware operators target US firms with empty threats
Book distribution giant breached by hack
Botnet expands reach by adding exploits
British Airways Hacked: Aviation industry is a growing target for cybercriminals
British Army social media accounts hijacked
British criminal records office admits cyber incident
British police officers arrest suspected hackers
Budget airline struck by cyberattack
Building a Cybersecurity Culture in Engineering Organisations
Business technology company struck by ransomware attack
Businesses remain responsible for data even when using cloud computing
California tech company reveals network breach
Can councils do more to prevent data breaches?
Canada’s biggest bookstore shuts down website following attack
Canadian banks hacked…what can consumers do in such a situation
Capita Cyberattack: A Costly Breach with Far-Reaching Consequences
Carphone Warehouse issued with massive fine for data breach
Celebrate World Password Day with hard-to-crack credentials
Chinese attackers use Google Drive to deploy malware on government systems
Chrome hijacked by insidious banking trojan
Clop ransomware group strikes back with cybercrime spree
Cloud Data Sovereignty and Collaboration only Possible through Sharing Data Securely
CloudPets is not the only hackable toy, read this before giving a child any…
Commercial communication provider used to spread malicious software
Common questions regarding email encryption
Complete peace of mind when sending business files securely
Consequences of a company data breach
Conti gang behind Emotet botnet return, suggest experts
Core cybersecurity steps every local government must take
Correct notification process following a data breach
Countdown to May 25th: time to take your GDPR preparation to the next level
Credential stealing spyware identified in industrial sector
Credential-stealing malware makes unwelcome return
Credit card stealing service gains traction
Croatian telecom carrier suffers data breach
Crucial cybersecurity protocols for enterprises
Crypto wallets stolen using bogus breach emails
Cryptocurrency exchange forced offline by hack
Customised Cobalt Strike beacon employed in attacks
Cyber espionage: everything you need to know about this terror
Cyber Fraud: 'Tis the season to be careful
Cyber-attack costs UK startup millions
Cyberattack on Australia telecoms company exposes personal data
Cyberattack on Scandinavian Airlines results in customer data leak
Cyberattack on UK MoD training academy uncovered
Cybercriminal campaign targets VoIP systems
Cybercriminal group increases stock by leaking data
Cybercriminals target small healthcare centres and hospitals
Cybersecurity and its critical place in manufacturing
Cybersecurity experts uncover voice phishing ploys
Cybersecurity tips when using remote teams
Damage caused by T-Mobile data breach increases
Data Breach at Isle of Scilly Council Highlights the Need for Encryption
Data breach consequences: understanding the devastating aftermath
Data breach exposed: details revealed on password manager compromise
Data breach exposes details of Google personnel
Data Breach Exposes Pilot Personal Information at American Airlines and Southwest Airlines
Data breach makes UK water company suffer
Data Breaches on the Rise with Costly Consequences to Enterprises
Data centre company reveals ransomware attack
Data is the new gold for criminals
Data leak broker releases private user records
Data loss prevention: what are the best practices?
Data privacy is an essential investment for any business
Data Protection Experts, Galaxkey join CAMI as a Cornerstone Sponsor
Data protection for enterprises
Data Protection’s New Landscape and Thinking Beyond Network & Device Security
Data reveals NHS bombarded by scam emails during pandemic peak
Data threat report, perhaps an eye-opener for some...
Data wiper malware used to decimate Windows domains
Defending Against MITM Attacks: The Role of Email Encryption in Company Security
Demand for Backdoors into Encryption Solutions is not the Answer
Demystifying eKYC - Simplifying Customer Verification in the Digital Age
Department for Education partners with Galaxkey
Digital security company hit by ransomware group
Distributed Denial of Service attacks hit record high
Dixons Carphone breach compromises data of nearly 6 million customers
Dixons Carphone: Oops...personal records of 10 million customers actually compromised-sorry!
Do you know where your data is?
Documents Show Evidence of a Close Relationship between Microsoft and the NSA
Does your company have these email security vulnerabilities?
Does your email encryption software have these key features?
Don’t be caught short – how to keep your business’ data secure in a Cambridge Analytica age
Double encryption tool poses as free ransomware decryptor
Doubting Office 365 security...build security layers!
Draft Overhaul of Surveillance Bill UK
Dropbox Hacked Again, Compromising Millions of Users Personal Data
Dropbox hacked placing user information at risk
Educational website services provider hit by ransomware
Eight cybersecurity insights to keep you safe
Eight ways to minimise ransomware risks
Electronic document signing vs. standard signatures
Electronics multinational faces $34m ransom
Electronics retail firm hit by Hive ransomware
Email encryption
Email encryption and HIPAA: a quick, useful guide
Email Encryption-government face challenges around securing emails
Email encryption: how does it prevent an intended data breach?
Email passwords: 4 essential tips for keeping your accounts secure
Email remains cybercriminals' attack vector of choice
Email Security
Email security essentials for enterprises
Email security: why encryption is 100% the best option
Email threat awareness tips for enterprises
Email was not designed to be secure
Emotet abuses Cobalt Strike for rapid attacks
Emotet botnet returns with new techniques
Emotet launches dangerous malware attachment
Encrypted email timeout
Encrypted Emails on BlackBerry/PGP Devices are Readable
Encrypted emails: how long do they truly last?
Encrypting Your Email Works
Encryption Back Doors in Europe, Not Yet Part of the Plans
Encryption is Necessary and an Entitlement
Encryption Must Advance
Energy giant faces ransomware demands
Enhance your enterprise security by protecting data in transit
Enhancing Collaboration with Advanced Security
Enterprise email accounts employed to send RAT
Enterprise phishing awareness: How can it help?
ePrivacy, the next big regulation change
Estate Agents and Solicitors Continue to make the Same Security Mistakes
European airlines inform customers of personal data exposure
European Banking Authority struck by Microsoft Exchange attack
Everything you need to know about data protection for education providers
Everything You Need To Know About Encrypted Email
Everything you need to know about the importance of encryption
Experiment reveals rapid hacker attacks on servers
Experts uncover new Windows worm
Experts uncover sophisticated cybercriminal tactics
Exploring the multiple causes of data leaks
Exploring WannaCry ransomware
Facebook opens up about its extensive data sharing habits
Facebook quiz app leaks data of 120 million users
Facebook to exclude 1.5 billion users from the GDPR
Fashion retailer informs customers of data leak
Financial services company, Liberty, hacked: sensitive data of millions compromised
Finnish government struck by cybercrime attack
Five business benefits of using data encryption
Five common kinds of malware explained
Five damaging effects of phishing attacks on enterprises
Five enterprise benefits of using encryption
Five frightening capabilities of botnets
Five indicators of a potential data breach
Five major benefits of electronic document signing
Five phishing attacks UK firms are facing in 2022
Five ransomware mitigation measures for every firm
Five security features your email solution must supply
Five signs for spotting a phishing email
Five steps to protect Personally Identifiable Information online
Five tips for improving business cybersecurity
Five tips to avoid a malware infection
Five tips to safeguard data while remote working
Five ways hackers can take over your email
Five ways to secure data with employees offsite
Focus your security efforts right: data-centric security is spot-on!
Following a manageable path to GDPR compliance
Four advantages of using email encryption
Four enterprise challenges of using IP blacklists
Four kinds of data breach and how they impact enterprises
Four proactive tactics for data protection success
Four reasons why companies aren’t using encryption
Four signs you might be reading a phishing email
Four steps to protect yourself from spam
Four steps to ultra-secure collaboration
Four ways to honour National Computer Security Day
Four ways to restrict access to confidential data
Four ways to sidestep spyware and viruses
French cosmetics group hit by REvil attack
French cybersecurity firm hit by hackers
French firm calculates huge loss from ransomware attack
French healthcare group hit by hackers
French telco giant suffers ransomware attack
From email to FTP: Sharing files securely
Fujitsu reveals stolen data involved customer information
Galaxkey and Gems Modern Academy Dubai introduce cyber security to students
Galaxkey announced as finalist in Cyber Security Awards 2022
Galaxkey announces its participation at GITEX 2021
Galaxkey Announces Partnership with Distology
Galaxkey Announces Strategic Partnership with Shield 7 Consulting
Galaxkey Email Encryption Software
Galaxkey encrypts and secures office 365
Galaxkey encrypts Gmail, Googlemail and Google docs
Galaxkey encrypts Yahoo email and documents stored in the yahoo cloud, independently.
Galaxkey for Windows now Available in German
Galaxkey is Taking on Kilimanjaro in Support of ActionAid UK
Galaxkey joins the elite Global CyberTech100 list
Galaxkey partners with Advantage Technologies to protect the data of enterprises across the US
Galaxkey partners with Evolver to provide Data Privacy Protection in the USA
Galaxkey Release Sharepoint Add-in
Galaxkey selects evolv networks as Platinum Partner
Galaxkey Shortlisted for Prestigious SC Awards 2021
Galaxkey Signs Leading Research Institute in London
Galaxkey takes its Education CSR program to Bradford schools
Galaxkey Wins Bradford MDC Security Contract
Galaxkey wins UK Government funding to enable children to communicate safely online
Galaxkey works with HIPAA
Galaxkey's Platform is now available in Arabic
Gartner and Galaxkey on Email Encryption Security
GDPR and mounting cybersecurity threats highlight the need for data protection
GDPR: 7 Fundamental principles pivotal to privacy by design
GDPR: An organisation’s guide to Data Protection Impact Assessments
GDPR: Personal information and PII
General Data Protection Regulation (GDPR) 2018
General Electric personnel files exposed by provider data breach
German government targeted by COVID-19 phishing attack
German logistics company confirms cyber strike
German telecoms giant discloses data leak
Getting to grips with advanced threat protection
Getting to grips with email encryption
Getting to grips with ransomware
Getting to grips with Ryuk ransomware
Giant copper producer struck by cyberattack
Glasgow City Council receives penalty of £150,000
Gloucestershire Police fined £80,000 for identifying abuse victims in bulk email
Gmail app developers are actually reading your emails!
Go green while staying secure with e-signatures
Google deploys spam-focused algorithm update
Google in landmark ‘right to be forgotten’ case
Google Scans Student Email
Google warns Gmail users over Russian hack
Government agencies in Japan hit by data leaks
Government department apologises for data leak
Government fighting for unrestricted access to encryption keys
Government requests advice on defence against supply chain attacks
GP practice receives warning after patients’ details are compromised following email attack
Greater Manchester Police Force fined by the ICO for data breach
Hacked email account source of data breach at Boys Town Children’s Hospital
Hacked start-ups admit breaches after huge data leak
Hacker gang uses signed Windows driver to attack banks
Hackers breach social media firm to steal internal data
Hackers employ fake application to steal crypto
Hackers launch brand new cryptojacking campaign
Hackers took £11 million of law firms’ money last year, here’s how to protect your business
Hackers wreak havoc on UK fishing website
Half a million VPN passwords leaked by hackers
Has REvil shut down its operations again?
Health Care Outlets Heavily Fined after 6800 Patient Records are Leaked
Health records, in the millions, for sale on the darkweb
Healthcare giant hit by Ryuk ransomware
Hidden hacker group revealed
High-profile accounts hacked following Twitter security breach
Hillary Clinton Endorses Encryption
Hired hackers attack with 3D graphics app malware
How are botnets created and used?
How are private passwords obtained?
How can companies prepare for ransomware attacks?
How can e-signatures enhance enterprise workflow?
How can email encryption protect firms from APT attacks?
How can enterprises avoid a fine from data regulators?
How can enterprises overcome password problems?
How can local councils access new cybersecurity skills?
How can you reduce the impact of criminal hacking?
How can you tell if your company computer has a malware infection?
How can your company prevent a data breach?
How companies can protect against the dangers of phishing attacks
How data encryption helps enterprises
How digital signatures help businesses stay resilient
How do company email accounts get hacked?
How do computer worms work?
How do e-signatures improve workflow?
How do GDPR and email encryption go hand in hand?
How do hackers use stolen PII?
How do I know if my email address has been spoofed?
How do ransomware attackers operate?
How do you reduce the risk of enterprise email phishing attacks?
How do you select a commercial document security solution?
How does a buffer overflow attack work?
How does backdoor malware work?
How does data encryption provide file protection?
How does malicious software work?
How does social engineering work in cyberattacks?
How does spear phishing differ from standard phishing attacks?
How does spyware end up on your enterprise devices and systems?
How does the Maze Ransomware work?
How easy is it to spoof an email address?
How electronic document signing can save money for firms
How Heaton St Barnabas’ school keeps safeguarding info and other confidential data safe
How important is employee training to cybersecurity?
How Ledger users can secure their assets
How local authorities can benefit from secure file transfer
How much does email encryption cost?
How poor email security protocols can lead to data breaches
How prepared are cloud services for the GDPR?
How privileged access management can help local councils
How to balance protection and practicality in your security system
How to combat Wide Area Network cyber threats while remote working
How to create a multilayered defence against phishing
How to create stronger passwords for your systems
How to deal with data breaches
How to enhance business email security
How to keep data safe while hybrid working
How to legally sign a document electronically
How to lessen the impact of a cyberattack
How to maintain control of your cloud strategy
How to prepare a data breach incident report
How to protect a small business from cybercrime
How to protect against website spoofing
How to protect enterprise email from threat operators
How to protect personally identifiable information over email
How to protect your business against email spoofing
How to protect your firm from BEC attacks
How to protect your firm from hackers
How to Protect your Team with Visual Threat Intelligence: Galaxkey's Latest Workspace Feature
How to react correctly following a data breach
How to report a data breach
How to report fraudulent emails to the NCSC
How to report suspicious emails
How to safely send sensitive information via email
How to select an email encryption solution
How to set up effective File Integrity Monitoring
How to share enterprise data files safely
How to share files securely
How to simplify your cybersecurity protocols
How to spot a COVID-19 track and trace scam
How to stay secure while working remotely
How to stay secure working in lockdown
How to stop my email address from being spoofed
How to strike a balance between security and usability
How to test your employees' reaction to a phishing email
How UK firms should encrypt data
How well can you spot a phishing attempt?
How your company can avoid passwords pitfalls
HR software company, PageUp, informs UK’s ICO of suspected data breach
ICO cautions small businesses about the importance of encryption
ICO enforcement doubled in 2012
ICO fines Bupa £175,000 for failing to protect customer data from misuse
ICO fines Equifax £500,000 for failing to protect customers’ data
ICO fines The Independent Inquiry into Child Sexual Abuse £200,000 for bulk email data breach
ICO fines Uber £385,000 for failing to protect data of 2.7 million UK customers
ICO pressing for custodial sentences for data loss
IKEA communication system struck by cyberattack
Important password policies your company should consider
Improving Cloud Controls and Best Practice
Industrial control systems infected with malware
International airline discloses extensive data breach
International library services company struck by ransomware attack
International Programmers Day – how programming affects cybersecurity
International taskforce takes out Russian botnet
Investigatory Powers Bill update
Investment banking company confirms data breach
Irish health services impacted by ransomware attack
Is a digitally signed document legally binding?
Is an email address easy to spoof?
Is the FBI reading your emails without a Warrant
Is there a difference between anti-malware and antivirus?
Is there an email spoofing test?
Is this new ransomware gang DarkSide rebranded?
Is Your Business Data Being Used Without Your Consent?
Is your data safe in your cloud email store?
Is your firm "malware aware”?
Is your secure email solution effective?
It’s an Uber-breach!
It’s perfectly safe to send email attachments…isn’t it?
Italian drinks company struck by ransomware attack
Japanese auto manufacturer confirms data leak after GitHub exposure
Japanese comic book application suffers extensive data breach
Key cybersecurity protocols for start-up businesses
Key points to know about ransomware attacks
Key steps to prep for a cyberattack
Largest alcohol retailer in Canada hacked
Lavabit opens for 72 hours after its recent shutdown
Law giant suffers major data breach
Legal firms remain a target for hackers
Lessons from the Minneapolis Public Schools Ransomware Attack
LinkedIn becomes most mimicked brand in world
Local councillors reveal fears of cyberattacks
London architectural firm hit by hacker
London Borough council suffers data breach
Luxury Macao hotels targeted in cyberattacks
Mac users targeted by hackers with upgraded malware
Mailchimp breach exposes DigitalOcean customer data
Major beverage industry operator discloses data breach compromising PII
Major cybercriminal gang swaps phishing for ransomware
Major IT service enterprise hit by ransomware attack
Major sports retailer discloses data breach
Major US airline confirms data breach following email compromise
Major US fuel pipeline forced to shut following cyberattack
Malicious actors clone targets website for stolen data leak
Malicious code collects pre-stolen credit card details
Malicious extensions allowing hackers control
Malicious software and how it works
Malware infection hits 500,000 Android devices
Malware named after comedy character presents triple threat
Malware used to deploy Cobalt Strike
Mark Data Privacy Day by deploying encryption
Marketing automation firm hacked for data theft
Marlborough Group Chooses Galaxkey as their Preferred Security Solution
Marriott hack exposes personal data of 500 million guests
Massive attack on the Norwegian healthcare provider, Health South-East RHF
Massive cyberattack hits US organisations
Massive data leak exposes millions of Facebook users’ data
Maximizing Business Benefits with Secure File Transfer Protocols
Maze claims ownership of Canon ransomware attack
Maze ransomware attacks target two US enterprises
Medical software company faces fine for data leak
Medical tech leader hit by ransomware attack
Metropolitan Police Service’s 'Gangs Matrix' breached data protection laws
Microsoft Exchange servers hit by insidious attacks
Microsoft Outlook vulnerability allows hackers to steal Windows passwords
Microsoft warns Azure customers of two-year data exposure
Millions of malware application installs identified on Google Play
Ministry of Defence security incidents revealed
Most imitated brand by cybercriminals revealed
Mounting privacy concerns: Facebook shares user data with 60 device partners
Mr Trump aspires to use a courier service!
MS 365: A Powerful Business Tool with Email Security Risks
My email has been spoofed – what should I do?
MyHeritage breach exposes account details of 92million users
Myths of cloud storage security
NASA confirms potential personal information breach
NCA creates bogus cybercrime hire sites to identify threat operators
NCSC Certification Achievement - Galaxkey has the government seal of approval
NCSC hails success of reporting service
NCSC issues data security warning amid Ukraine invasion
NCSC Report: Cyber threats facing UK law firms
NCSC takes new steps to tackle COVID-19 cybercrime
NCSC warns companies to fortify defences
Nearly a third of companies using public cloud not encrypting data
New cybercriminal service offers all hackers access to advanced phishing tools
New Galaxkey features: Authorised Data Distribution and Classification
New Integration: Galaxkey and Image Analyzer Partnership Enhances Data Security
New malware and phishing attacks signal Trickbot’s return
New malware exposed by US and UK collaboration
New malware roots infected Android devices
New malware uncovered by experts examining SolarWinds strike
New malware variant presents threat to enterprises
New mobile banking Trojan unleashed in Europe
New ransomware gang rises
New ransomware gang targets global automotive manufacturer
New ransomware operation connected to infamous REvil gang
New ransomware revealed employing Google encryption tool
New report reveals poor 2022 password practices
New SMS scam campaign targets UK residents
New stealth Trojan employed in ransomware raids
New UK law proposed- To monitor everyone’s internet activities and communications within the UK
New York financial service giant faces $35 million charge for data breach
NHS Breaches the Data Protection Act
NHS's Centralised Database System is Vulnerable to Attack
Nine important GDPR requirements for UK enterprises
Non-profits warned over ransomware Robin Hoods
North-Korean hackers swap tactics
Olympic error: Chris Froome and Bradley Wiggins
Online auction house announces major data breach
Onsite document security – what protocols do firms need?
Our Privacy is under attack…it’s time to protect it!
Outdoor outfitter hit by credential stuffing
Outsourcer fined millions after failing to prevent cyber-attack
Over three million customers impacted by data breach
Password Protection 101: How to Keep Your Passwords Safe
Patient data exposed in US health system ransomware attack
PayPal hack highlights the vulnerability of passwords
Personal data of 9.4 million Cathay Pacific passengers breached
Personal data of Welsh NHS employees stolen
Personal information exposed in NBA data breach
Personal information of nearly 1 million South Africans breached
Phishing attack employs Colonial Pipeline theme to trick targets
Phishing Attacks: Stay informed and act to mitigate their threat
Phishing campaigns target low-ranking victims
Phishing emails can bypass Office 365 Security
Phishing emails lure university students in the UK
Phishing ring broken by European law enforcement operation
Polish government email breach investigated
PRISM and our Privacy
Protect your data: spear-phishing attacks continue to lure organisations
Protecting Your Business from Email-Related Threats
Protection and security: what's the difference?
Ransomware attack hammers city of Oakland
Ransomware attack hits major car dealer
Ransomware attack impacts Canadian mining company
Ransomware attack strikes Canadian retail giant
Ransomware attack strikes renowned gaming studio
Ransomware attack strikes Royal Mail
Ransomware attacks show spike in double extortion tactics
Ransomware drives exodus of cybersecurity professionals
Ransomware gang assume control of malware operation
Ransomware gang claims ownership of wind turbine giant attack
Ransomware gang hits Finnish IT services firm
Ransomware gang launch leak site for double extortion
Ransomware gang targets remote desktop services
Ransomware gangs strikes out at Australian state
Ransomware gangs target US farming sector
Ransomware group claims hack on NASA service provider
Ransomware groups exploit Windows vulnerabilities
Ransomware groups infect visitors via SEO poisoning
Ransomware groups ramp up data leak threats
Ransomware groups use sites to enlist affiliates
Ransomware operators target Balkans country
Ransomware operators target UK universities
Ransomware operators target VPN devices in attacks
Ransomware operators to switch up attack strategy
Ransomware outfit demands millions from tech giant
Ransomware risks on the rise, US agencies warn
Ransomware strike hits Swiss aviation
Ransomware warning issued by US Health Department
Ransomware: Protect Your Enterprise Against Attacks with Email Encryption
Reality of Data Security within the NHS
Research reveals UK firms paid hackers over £200 million
Research team reports rise in cybercrime during COVID-19 crisis
Researchers warn of cloud platform security risk
Retail giant faces massive data leak settlement
Retail giant hit by REvil ransomware operators
Revealing signs that you’ve received a phishing email
REvil demands $70m from Kaseya attack victims
REvil ransomware gang returns at full strength
Rising email fraud risk for enterprises seeking crisis aid
Russian cryptocurrency exchange hit by hackers
Russian drivers’ PII up for grabs
Safeguarding staff against email spoofing
Safeguarding your enterprise from spear phishing
Scottish engineering giant disrupted by ransomware attack
Security and usability without a trade-off
Security researchers identify increase in reverse tunnel services
Semiconductor manufacturing firm struck by ransomware attack
Seven advantages of data backups for enterprises
Seven features every secure workspace requires
Seven steps to take after your email account is hacked
Seven types of malware your firm should be aware of
Shocking ransomware gang extortion figures revealed
Should I encrypt my emails if my email client uses TLS?
Silicon Valley, Money and Spying
Simple security practices for secure email
Simple Ways to Better Secure Enterprise Email Communications
Singapore health system hack affects personal data of 1.5 million
Sir George Zambellas - a long journey in entrepreneurship
Sir George Zambellas on The Digitisation of our Brains
Six advantages of adopting digital document signing
Six common questions and concerns about data security
Six easy-to-adopt cybersecurity practices
Six key protocols for enterprise data security
Six of the most common cybersecurity mistakes
Six reasons why hackers spoof emails
Six security features all enterprise email requires
Six tips to keep compliant with the GDPR
Six UK schools struck by ransomware attack
Six ways firms can ward off malware attacks
Smartwatch services disrupted by ransom attack
Social media icons hide skimming malware
Solicitors expose clients to risk of fraudulent activity
Sony Computer Entertainment Europe Limited is fined £250 000 by the ICO following a data security breach.
South American insurance giant struck by cyberattack
Specialist phishing strategies to watch out for
Spy agencies, US and UK, bypass encryption
Start 2022 with improved data security
Start 2023 with stronger email passwords
State hackers hit organisations in critical sectors
Stockport Primary Care Trust receives £100,000 monetary penalty
Stolen Twitter user data released for free
Streamline the way you work with electronic document signing
Student data exposed following ransomware attack
Study identifies UK as most breached country in Europe
Supercomputers across Europe infected with malware
Supply-chain attack affects hundreds of apps and websites
Swedish automaker reveals cyberattack
T-Mobile discloses massive data breach
Tech manufacturer forced to pay massive ransom
Technology giant admits data breach and cyberattack
Telecom company thrives under lockdown using digital signing
Telecommunications company reveals SIM swap attacks
Telefonica leaks millions of customers’ personal information
Texas cloud provider faces lawsuits following ransomware attack
The 6 GDPR privacy principles and encryptions primary role
The Belfast Health and Social Care Trust Breach the Data Protection Act
The biggest breach in history: questions for Yahoo
The cloud and its security benefits of modern collaboration
The danger of double extortion ransomware attacks
The former US President’s, George H. W. Bush, emails have been hacked.
The ICO has published a new IT security guide
The ICO offers guidance as survey reveals concerns surrounding Bring your own device - BYOD - policy
The Importance Of Document Information Security
The Importance of Document Security for Businesses
The importance of electronic document signing
The Information Commissioner's Office highlights the need for the encryption of sensitive data
The key data loss prevention practices you should consider
The NSA hack the email account of the Mexican President
The phishing strategies your firm must be aware of
The problem with KYC – and how to solve it
The rising threat of botnet attacks
The Rising Threat to File-Sharing Platforms and Galaxkey's Unique Solution
The University of Greenwich fined £120,000 for serious data breach
The Vital Reason Your Business Needs Secure Email
Thousands of VNC servers exposed without password protection
Threat actors exploit Silicon Valley Bank collapse
Threat actors sharpen attacks with English speakers
Threat actors use KMSPico installers for crypto raids
Threat group uses browser extension for undetected email theft
Threat operators employ bogus NFT game to control user devices
Threat operators selling corporate network access
Three essential security practices for malware protection
Three important indicators of a phishing email
Three important tips for business backups
Three key benefits of digital document signing
Three key benefits of enhanced email security
Three key points to remember for enterprise backups
Three million patient records stolen in healthcare ransomware attack
Three million people targeted in mental health platform data breach
Three of the worst hacks in history
Three phishing strategies businesses must be aware of
Three questions to ask before buying encryption software
Three reasons to start using secure file transfers
Three reasons why document transfers should use digital signatures
Three reasons why ransomware attackers target the education sector
Three simple steps to data file security
Three staff-related cybersecurity issues to consider
Three tips to defend your enterprise from malware
Three tips to protect your company data
Three types of data exchange that benefit from encryption
Three types of DDoS attack you can’t ignore
Three types of Distributed Denial of Service (DDoS) attacks
Three types of multifactor authentication explained
Ticketmaster breach compromises personal data of 40,000 UK customers
Time to wake up and act on cyber security
Top data loss prevention protocols for email
Top executive email accounts exposed
Top tactics used in phishing attacks today
Top three trends in cybersecurity for 2020
Top Tips For Data Protection Security
Top tips for handling confidential information in your business
Trade publication giant hit by ransomware gang
Trojan malware targets banks customer data
Two cybersecurity features every firm can benefit from
Two new features on Galaxkey Secure Workspace to make it even easier to manage your files
Typeform breach has significant knock-on effect and...the data was not encrypted!
Uber data leaked online after attack on third-party vendor
Uber internal systems hacked by teenager
Uber to pay £113 million to settle 2016 data breach
UK clothing retailer notifies customers of data leak
UK contractors firm confirms cyberattack
UK cryptocurrency exchange knocked offline
UK cybersecurity experts warn of attacks from foreign hackers
UK education charity disrupted by ransomware
UK Emergency Surveillance Law to be Challenged in High Court
UK experts speak out on ransomware payments
UK fast food outlets impacted by ransomware attack
UK financial sector threatened by cybercrime
UK firms choose to move their data out of the US
UK minister urges ransomware victims to report attacks
UK regulator fines hotel group millions over data leak
UK suffers O2-focused data stealing scam
UK train operator struck by cyberattack
UK universities and charities hit by hack
UK university struck by cyberattack
Ukraine data wipe attack employs ransomware decoy
Under Armour reports MyFitnessPal data breach affecting 150 million accounts
Understanding electronic signatures for lawyers
Understanding encryption and GDPR
Understanding health data security
Understanding methods of secure data transfer
Understanding post-Brexit penalties and fines for GDPR
Understanding the difference between common malware types.
Understanding the difference between digital and e-signatures
Understanding the human causes of ransomware attacks
Understanding the impact of clickjacking
Understanding Trojans and how they work
Unleashing the Power of Encryption: The Most Effective Security Tool to Prevent Data Breaches
Unlocking Business Potential with Electronic Document Signing
Unzip and Copy/Move files across Workspaces
US asks Supreme Court to not take up the case on NSA cyber-snooping
US automotive tool maker suffers data breach
US chipmaker hit by Maze Ransomware group
US city discloses disastrous data breach
US communication company hit by phishing attack
US component maker suffers data leak
US electronics e-commerce platform discloses breach
US enterprises infiltrated by Maze ransomware operators
US fertility clinic reveals patient details disclosed
US Food delivery firm hit by hackers
US government warns banks of North Korean operators
US hospital devastated by intense cyberattack that causes over 3 days of disruption
US hospitals hit by ransomware attacks
US Navy hacked, what can organisations learn from this...
US police department suffers data leak
US school system data breach follows ransomware attack
US security service disrupts BEC attack gang activities
US software company hit by BlackCat ransomware gang
US software provider advises password change
US sports team struck by cyberattack
US student data exposed in attack
US university gives in to ransomware demands
VoIP services firm hit by cyberattack
VTech Data Breach, Another High-Profile Breach Occurs
Warning: Rise in W-2 Form phishing scams
Warning: Serious #Efail vulnerabilities allow attackers to view PGP encrypted email content
Web hosting giant GoDaddy reveals shocking hacker breach
Web hosting service shuts after systems breached
Websites hacked with bogus Cloudflare alerts
Welcome Financial Services Fined £150,000 for Breaching the Data Protection Act
Welsh council assumes strong cybersecurity stance
WeTransfer abused by threat actors
What are “Common Vulnerabilities and Exposures” (CVEs)?
What are botnets and how do they function?
What are Business Email Compromise attacks?
What are credential stuffing attacks and how can they be conquered?
What are the benefits of a secure workspace?
What are the benefits of using an electronic signature?
What are the business benefits of efficient backups?
What are the business benefits of employing encryption?
What are the cybersecurity challenges faced by local authorities?
What are the dangers with my email being spoofed?
What are the different types of email security?
What are the different types of Trojan malware?
What are the key benefits of digital document signing for businesses?
What are the key cybersecurity challenges during the COVID-19 lockdown?
What are the most common types of email-based cyberattacks?
What are the potential consequences of a data breach?
What are the principles of email security?
What are the reporting protocols for phishing attacks?
What are the risks involved in email intrusion?
What are the risks of sending unencrypted emails?
What are the types of protective security?
What are zero-day vulnerabilities?
What can criminals do with my email address?
What can cybercriminals do with personal information?
What can threat operators do with stolen credentials?
What can your business do to protect itself from ransomware?
What company actions should follow a personal data breach?
What damage can a data breach cause to companies?
What do local authorities need to understand about phishing?
What does a man in the middle (MITM) attack involve?
What does the phrase “cyber resilience” mean for companies?
What does the term "double extortion" refer to?
What does the term “pharming” mean?
What does the term “Zero Trust Security” mean?
What does the term end-to-end encryption mean?
What email security features are important for local authorities?
What is 256-Bit Encryption?
What is a “botnet”?
What is a business email compromise?
What is a computer virus?
What is a distributed denial of service attack?
What is a formjacking attack?
What is a network spoofer and how do I protect against it?
What is a Remote Access Trojan?
What is a secure email gateway?
What is a social engineering attack?
What is a Trojan horse and how do I protect against it?
What is data protection software?
What is email encryption and how does it work?
What is Emotet malware?
What is file integrity monitoring?
What is file sharing security?
What Is HIPAA and what does it mean to be HIPAA compliant?
What is malware and how do I protect against it?
What is personally identifiable information?
What is phishing and how do I protect against it?
What is ransomware and how can I stop it?
What is ransomware and how do I protect against it?
What is the best defence against phishing?
What is the best way to send a confidential email?
What is the difference between secure email and encrypted email?
What is the integration between Galaxkey and Yoti and what does it mean for me?
What is the most secure way to transfer a file?
What is the most useful solution to secure documents during collaboration?
What is the purpose of enterprise data classification?
What makes a strong password?
What makes e-signatures more secure than traditional signatures?
What makes phishing emails so dangerous?
What ransomware infection vectors should educational authorities understand?
What should I do after a data leak?
What to do when your firm faces a data breach
What type of data are ransomware operators after?
What types of documents cannot be signed electronically?
What’s the best practice for secure email use?
What’s the difference between a digital signature and an electronic signature?
What’s the difference between transport-layer encryption and end-to-end encryption?
What’s the true cost of a data breach?
What’s wrong with using FTP for transferring large files?
What’s your company’s digital footprint?
WhatsApp faces €5.5 million fine for violating data regulation
Why an unencrypted email is like a letter without an envelope
Why are backups no longer adequate protection from ransomware attacks?
Why are DLP protocols vital for enterprise email?
Why are electronic documents more effective than wet ink signatures?
Why are local councils targeted by ransomware gangs?
Why are phishing attacks still working?
Why are regimented data backups critical for companies?
Why are user-friendly cybersecurity measures critical for companies?
Why backups and encryption are essential to prevent ransomware
Why companies should consider their digital footprint
Why cybersecurity really matters during lockdown
Why cybersecurity training should be included during onboarding
Why Data-Centric Encryption is Essential for Data Security
Why data-centric security is essential for positive data protection
Why digital document signing is better than signing by post
Why do cybercriminals spoof emails?
Why do enterprises need secure collaboration platforms more than ever?
Why does your business need email encryption?
Why e-signatures make sense for UK enterprises in 2022
Why electronic signatures are an important asset
Why electronic signatures matter in the coronavirus crisis
Why email encryption is vital for lawyers
Why encryption is critical for email security
Why end-to-end encryption is critical for competitive companies
Why enterprise users must beware of Trojans
Why enterprises should encrypt emails
Why is building a security culture for your company key?
Why is cybersecurity so critical for educational institutions?
Why is cybersecurity vital in education?
Why is email security critical for companies in 2021?
Why is it vital to take care of email account credentials?
Why is remote working at risk from ransomware?
Why is updating software and systems essential for enterprises?
Why keeping calm is key when faced by with a cyberattack
Why should businesses use digital document signing?
Why should companies invest in document security?
Why should you keep an audit log when using electronic document signing?
Why so much panic around the right to erasure?
Why the shift to remote document signing?
Why updates and backups are essential for enterprise security
Why use electronic signatures?
Why Your Business Needs Galaxkey When Using Microsoft Teams
Why your enterprise needs protection from spam
WordPress plugin used to gain backdoor access
Yahoo UK Services fined £250,000 for compromising British citizens’ data
YouTube accused of violating the Children’s Online Privacy Protection Act
Zero Trust vs. Zero Knowledge - Understanding the Differences and Similarities
Zero-day attacks launched against international companies
Zero-day flaw leads to severe server hack
Pages
About Us
Accessibility Statement
Compliance
Contact Us
Cookie Policy
Copyright Infringement & Takedown Policy
Data Protection Policy
Datasheets
Electronic Signatures
Email Encryption
FAQs
File Encryption
Get Started
Home
How it Works
HTML Sitemap
Information Security Management System – Policy Statement
Legal information & resources
News
Partners
Privacy Policy
Secure File Exchange
Secure Workspace old
Support
Terms of Service & Licence Agreement
Trademarks & Intellectual Property
Website Legal Notice & Terms
Case Studies
How Bradford Council found an affordable, efficient way to secure 1000's of emails and files daily
How Class Insurance protects highly sensitive data for insurance claims
How DDO Solicitors Secures, Tracks and Controls Sensitive Information
How Galaxkey Helps UCL Securely Share Clinical Trials Data
How Galaxkey’s military-grade encryption helps WFEL comply with the Official Secrets Act
How Heaton St Barnabus Primary School Shares Confidential Data Securely
How Palm Cove Society Protects Sensitive Data in Emails and Ensures GDPR Compliance
White Papers
Galaxkey Secure Communication
Galaxkey Security Technical white paper
Galaxkey Trusted Digital Document Signing
Protecting Sensitive Engineering Data - Galaxkey's solution for manufacturing & engineering companies
Categories
Company News
Cyberattack
Cybersecurity
Data Leak
Data Protection
Electronic Signatures
Secure Collaboration
Secure Communications
Secure File Storage
Secure File Transfer
Webinar
Official
kms activation
For Windows&Office