HTML Sitemap
Explore our website
Posts
- 12 Reasons why enterprises need digital document signing
- 2022 - A Year in Review
- 4 top ransomware attack vectors and how to avoid them
- 4 ways that electronic document signing can benefit your business
- 5 Best Practices for Secure File Transfer in the Modern Workplace
- 5 Great IT tips for National Clean Up Your Computer Month
- 5 steps to digital security when your employees work from home
- 5 Ways To Improve Data Security In Your Business
- 6 GDPR myths businesses should be wary of
- 9 Essential tips to keep your logins secure
- A glossary of cybersecurity terms
- A guide to understanding Personally Identifiable Information
- A look back at when the UK government website was hacked
- A word on resilience in innovation from Sir George Zambellas
- Accounting firms are prime targets for hackers, here’s how to protect your business
- Accounting software provider impersonated in phishing scam
- Airline issues apology after customer data is compromised
- American not-for profit discloses data leak
- Android malware infects devices to steal social media accounts
- Android malware seizes control of Facebook accounts
- Annual cybercrime report reveals startling UK statistics
- Anti-malware measures firms must adopt
- API flaw exposes sensitive student data
- Apple Misleadingly Claims Encryption of Email Attachments for Devices
- Apple warns US State Department of spyware threat
- Are phishing tests an effective way to protect your firm?
- Are spam emails a serious threat to enterprises?
- Are you at risk from ransomware?
- Are your email accounts protected from threats?
- Are your people prepared for phishing attacks?
- Arizona faces large-scale data breach
- Article: PRISM and our Privacy
- Attack exposes nearly 300,000 US patients’ data
- Australian agency raises alert on ransomware attacks
- Australian entertainment and gambling company confirms data breach
- Australian telecoms provider, Telstra, apologises for data breach
- Australian TV network hit by hack
- Automaker discloses data breach
- Aviation IT supplier suffers massive data breach
- Avoid data security risks by deploying email encryption
- Avoid data spillage with end-to-end email encryption
- Avoid phishing attacks by understanding operations
- Backdoor account identified in Zyxel security solutions
- Backdoors for Spying and Encryption Keys for all...
- Bank holding company hit by cyberattack
- BBC Provides a Simple Explanation for Encryption
- BEC Scams: How Email Encryption Can Help Secure Your Data
- Best cybersecurity practices for working off site
- Best password practices for enterprise email accounts
- Best practices for businesses using encryption
- Best practices for email security in 2022
- Best practices for secure file transfers
- Beyond Firewalls and Antivirus: The Importance of Securing Your Business Data
- Big business data exposed in Canada Post breach
- Blender vendor hit by Magecart attack
- Bogus investment network targets Europe
- Bogus ransomware attacks plague WordPress sites
- Bogus ransomware operators target US firms with empty threats
- Book distribution giant breached by hack
- Botnet expands reach by adding exploits
- British Airways Hacked: Aviation industry is a growing target for cybercriminals
- British Army social media accounts hijacked
- British criminal records office admits cyber incident
- British police officers arrest suspected hackers
- Budget airline struck by cyberattack
- Business technology company struck by ransomware attack
- Businesses remain responsible for data even when using cloud computing
- California tech company reveals network breach
- Can councils do more to prevent data breaches?
- Canada’s biggest bookstore shuts down website following attack
- Canadian banks hacked…what can consumers do in such a situation
- Carphone Warehouse issued with massive fine for data breach
- Celebrate World Password Day with hard-to-crack credentials
- Chinese attackers use Google Drive to deploy malware on government systems
- Chrome hijacked by insidious banking trojan
- Clop ransomware group strikes back with cybercrime spree
- Cloud Data Sovereignty and Collaboration only Possible through Sharing Data Securely
- CloudPets is not the only hackable toy, read this before giving a child any…
- Commercial communication provider used to spread malicious software
- Common questions regarding email encryption
- Complete peace of mind when sending business files securely
- Consequences of a company data breach
- Conti gang behind Emotet botnet return, suggest experts
- Core cybersecurity steps every local government must take
- Correct notification process following a data breach
- Countdown to May 25th: time to take your GDPR preparation to the next level
- Credential stealing spyware identified in industrial sector
- Credential-stealing malware makes unwelcome return
- Credit card stealing service gains traction
- Croatian telecom carrier suffers data breach
- Crucial cybersecurity protocols for enterprises
- Crypto wallets stolen using bogus breach emails
- Cryptocurrency exchange forced offline by hack
- Customised Cobalt Strike beacon employed in attacks
- Cyber espionage: everything you need to know about this terror
- Cyber Fraud: 'Tis the season to be careful
- Cyber-attack costs UK startup millions
- Cyberattack on Australia telecoms company exposes personal data
- Cyberattack on Scandinavian Airlines results in customer data leak
- Cyberattack on UK MoD training academy uncovered
- Cybercriminal campaign targets VoIP systems
- Cybercriminal group increases stock by leaking data
- Cybercriminals target small healthcare centres and hospitals
- Cybersecurity and its critical place in manufacturing
- Cybersecurity experts uncover voice phishing ploys
- Cybersecurity tips when using remote teams
- Damage caused by T-Mobile data breach increases
- Data Breach at Isle of Scilly Council Highlights the Need for Encryption
- Data breach consequences: understanding the devastating aftermath
- Data breach exposed: details revealed on password manager compromise
- Data breach exposes details of Google personnel
- Data breach makes UK water company suffer
- Data Breaches on the Rise with Costly Consequences to Enterprises
- Data centre company reveals ransomware attack
- Data is the new gold for criminals
- Data leak broker releases private user records
- Data loss prevention: what are the best practices?
- Data privacy is an essential investment for any business
- Data Protection Experts, Galaxkey join CAMI as a Cornerstone Sponsor
- Data protection for enterprises
- Data reveals NHS bombarded by scam emails during pandemic peak
- Data threat report, perhaps an eye-opener for some...
- Data wiper malware used to decimate Windows domains
- Defending Against MITM Attacks: The Role of Email Encryption in Company Security
- Demand for Backdoors into Encryption Solutions is not the Answer
- Department for Education partners with Galaxkey
- Digital security company hit by ransomware group
- Distributed Denial of Service attacks hit record high
- Dixons Carphone breach compromises data of nearly 6 million customers
- Dixons Carphone: Oops...personal records of 10 million customers actually compromised-sorry!
- Do you know where your data is?
- Documents Show Evidence of a Close Relationship between Microsoft and the NSA
- Does your company have these email security vulnerabilities?
- Does your email encryption software have these key features?
- Don’t be caught short – how to keep your business’ data secure in a Cambridge Analytica age
- Double encryption tool poses as free ransomware decryptor
- Doubting Office 365 security...build security layers!
- Draft Overhaul of Surveillance Bill UK
- Dropbox Hacked Again, Compromising Millions of Users Personal Data
- Dropbox hacked placing user information at risk
- Educational website services provider hit by ransomware
- Eight cybersecurity insights to keep you safe
- Eight ways to minimise ransomware risks
- Electronic document signing vs. standard signatures
- Electronics multinational faces $34m ransom
- Electronics retail firm hit by Hive ransomware
- Email encryption
- Email encryption and HIPAA: a quick, useful guide
- Email Encryption-government face challenges around securing emails
- Email encryption: how does it prevent an intended data breach?
- Email passwords: 4 essential tips for keeping your accounts secure
- Email remains cybercriminals' attack vector of choice
- Email Security
- Email security essentials for enterprises
- Email security: why encryption is 100% the best option
- Email threat awareness tips for enterprises
- Email was not designed to be secure
- Emotet abuses Cobalt Strike for rapid attacks
- Emotet botnet returns with new techniques
- Emotet launches dangerous malware attachment
- Encrypted email timeout
- Encrypted Emails on BlackBerry/PGP Devices are Readable
- Encrypted emails: how long do they truly last?
- Encrypting Your Email Works
- Encryption Back Doors in Europe, Not Yet Part of the Plans
- Encryption is Necessary and an Entitlement
- Encryption Must Advance
- Energy giant faces ransomware demands
- Enhance your enterprise security by protecting data in transit
- Enterprise email accounts employed to send RAT
- Enterprise phishing awareness: How can it help?
- ePrivacy, the next big regulation change
- Estate Agents and Solicitors Continue to make the Same Security Mistakes
- European airlines inform customers of personal data exposure
- European Banking Authority struck by Microsoft Exchange attack
- Everything you need to know about data protection for education providers
- Everything You Need To Know About Encrypted Email
- Everything you need to know about the importance of encryption
- Experiment reveals rapid hacker attacks on servers
- Experts uncover new Windows worm
- Experts uncover sophisticated cybercriminal tactics
- Exploring the multiple causes of data leaks
- Exploring WannaCry ransomware
- Facebook opens up about its extensive data sharing habits
- Facebook quiz app leaks data of 120 million users
- Facebook to exclude 1.5 billion users from the GDPR
- Fashion retailer informs customers of data leak
- Financial services company, Liberty, hacked: sensitive data of millions compromised
- Finnish government struck by cybercrime attack
- Five business benefits of using data encryption
- Five common kinds of malware explained
- Five damaging effects of phishing attacks on enterprises
- Five enterprise benefits of using encryption
- Five frightening capabilities of botnets
- Five indicators of a potential data breach
- Five major benefits of electronic document signing
- Five phishing attacks UK firms are facing in 2022
- Five ransomware mitigation measures for every firm
- Five security features your email solution must supply
- Five signs for spotting a phishing email
- Five steps to protect Personally Identifiable Information online
- Five tips for improving business cybersecurity
- Five tips to avoid a malware infection
- Five tips to safeguard data while remote working
- Five ways hackers can take over your email
- Five ways to secure data with employees offsite
- Focus your security efforts right: data-centric security is spot-on!
- Following a manageable path to GDPR compliance
- Four advantages of using email encryption
- Four enterprise challenges of using IP blacklists
- Four kinds of data breach and how they impact enterprises
- Four proactive tactics for data protection success
- Four reasons why companies aren’t using encryption
- Four signs you might be reading a phishing email
- Four steps to protect yourself from spam
- Four steps to ultra-secure collaboration
- Four ways to honour National Computer Security Day
- Four ways to restrict access to confidential data
- Four ways to sidestep spyware and viruses
- French cosmetics group hit by REvil attack
- French cybersecurity firm hit by hackers
- French firm calculates huge loss from ransomware attack
- French healthcare group hit by hackers
- French telco giant suffers ransomware attack
- From email to FTP: Sharing files securely
- Fujitsu reveals stolen data involved customer information
- Galaxkey and Gems Modern Academy Dubai introduce cyber security to students
- Galaxkey announced as finalist in Cyber Security Awards 2022
- Galaxkey announces its participation at GITEX 2021
- Galaxkey Announces Partnership with Distology
- Galaxkey Email Encryption Software
- Galaxkey encrypts and secures office 365
- Galaxkey encrypts Gmail, Googlemail and Google docs
- Galaxkey encrypts Yahoo email and documents stored in the yahoo cloud, independently.
- Galaxkey for Windows now Available in German
- Galaxkey is Taking on Kilimanjaro in Support of ActionAid UK
- Galaxkey joins the elite Global CyberTech100 list
- Galaxkey partners with Advantage Technologies to protect the data of enterprises across the US
- Galaxkey partners with Evolver to provide Data Privacy Protection in the USA
- Galaxkey Release Sharepoint Add-in
- Galaxkey selects evolv networks as Platinum Partner
- Galaxkey Shortlisted for Prestigious SC Awards 2021
- Galaxkey Signs Leading Research Institute in London
- Galaxkey takes its Education CSR program to Bradford schools
- Galaxkey Wins Bradford MDC Security Contract
- Galaxkey wins UK Government funding to enable children to communicate safely online
- Galaxkey works with HIPAA
- Gartner and Galaxkey on Email Encryption Security
- GDPR and mounting cybersecurity threats highlight the need for data protection
- GDPR: 7 Fundamental principles pivotal to privacy by design
- GDPR: An organisation’s guide to Data Protection Impact Assessments
- GDPR: Personal information and PII
- General Data Protection Regulation (GDPR) 2018
- General Electric personnel files exposed by provider data breach
- German government targeted by COVID-19 phishing attack
- German logistics company confirms cyber strike
- German telecoms giant discloses data leak
- Getting to grips with advanced threat protection
- Getting to grips with email encryption
- Getting to grips with ransomware
- Getting to grips with Ryuk ransomware
- Giant copper producer struck by cyberattack
- Glasgow City Council receives penalty of £150,000
- Gloucestershire Police fined £80,000 for identifying abuse victims in bulk email
- Gmail app developers are actually reading your emails!
- Go green while staying secure with e-signatures
- Google deploys spam-focused algorithm update
- Google in landmark ‘right to be forgotten’ case
- Google Scans Student Email
- Google warns Gmail users over Russian hack
- Government agencies in Japan hit by data leaks
- Government department apologises for data leak
- Government fighting for unrestricted access to encryption keys
- Government requests advice on defence against supply chain attacks
- GP practice receives warning after patients’ details are compromised following email attack
- Greater Manchester Police Force fined by the ICO for data breach
- Hacked email account source of data breach at Boys Town Children’s Hospital
- Hacked start-ups admit breaches after huge data leak
- Hacker gang uses signed Windows driver to attack banks
- Hackers breach social media firm to steal internal data
- Hackers employ fake application to steal crypto
- Hackers launch brand new cryptojacking campaign
- Hackers took £11 million of law firms’ money last year, here’s how to protect your business
- Hackers wreak havoc on UK fishing website
- Half a million VPN passwords leaked by hackers
- Has REvil shut down its operations again?
- Health Care Outlets Heavily Fined after 6800 Patient Records are Leaked
- Health records, in the millions, for sale on the darkweb
- Healthcare giant hit by Ryuk ransomware
- Hidden hacker group revealed
- High-profile accounts hacked following Twitter security breach
- Hillary Clinton Endorses Encryption
- Hired hackers attack with 3D graphics app malware
- How are botnets created and used?
- How are private passwords obtained?
- How can companies prepare for ransomware attacks?
- How can e-signatures enhance enterprise workflow?
- How can email encryption protect firms from APT attacks?
- How can enterprises avoid a fine from data regulators?
- How can enterprises overcome password problems?
- How can local councils access new cybersecurity skills?
- How can you reduce the impact of criminal hacking?
- How can you tell if your company computer has a malware infection?
- How can your company prevent a data breach?
- How companies can protect against the dangers of phishing attacks
- How data encryption helps enterprises
- How digital signatures help businesses stay resilient
- How do company email accounts get hacked?
- How do computer worms work?
- How do e-signatures improve workflow?
- How do GDPR and email encryption go hand in hand?
- How do hackers use stolen PII?
- How do I know if my email address has been spoofed?
- How do ransomware attackers operate?
- How do you reduce the risk of enterprise email phishing attacks?
- How do you select a commercial document security solution?
- How does a buffer overflow attack work?
- How does backdoor malware work?
- How does data encryption provide file protection?
- How does malicious software work?
- How does social engineering work in cyberattacks?
- How does spear phishing differ from standard phishing attacks?
- How does spyware end up on your enterprise devices and systems?
- How does the Maze Ransomware work?
- How easy is it to spoof an email address?
- How electronic document signing can save money for firms
- How Heaton St Barnabas’ school keeps safeguarding info and other confidential data safe
- How important is employee training to cybersecurity?
- How Ledger users can secure their assets
- How local authorities can benefit from secure file transfer
- How much does email encryption cost?
- How poor email security protocols can lead to data breaches
- How prepared are cloud services for the GDPR?
- How privileged access management can help local councils
- How to balance protection and practicality in your security system
- How to combat Wide Area Network cyber threats while remote working
- How to create a multilayered defence against phishing
- How to create stronger passwords for your systems
- How to deal with data breaches
- How to enhance business email security
- How to keep data safe while hybrid working
- How to legally sign a document electronically
- How to lessen the impact of a cyberattack
- How to maintain control of your cloud strategy
- How to prepare a data breach incident report
- How to protect a small business from cybercrime
- How to protect against website spoofing
- How to protect enterprise email from threat operators
- How to protect personally identifiable information over email
- How to protect your business against email spoofing
- How to protect your firm from BEC attacks
- How to protect your firm from hackers
- How to react correctly following a data breach
- How to report a data breach
- How to report fraudulent emails to the NCSC
- How to report suspicious emails
- How to safely send sensitive information via email
- How to select an email encryption solution
- How to set up effective File Integrity Monitoring
- How to share enterprise data files safely
- How to share files securely
- How to simplify your cybersecurity protocols
- How to spot a COVID-19 track and trace scam
- How to stay secure while working remotely
- How to stay secure working in lockdown
- How to stop my email address from being spoofed
- How to strike a balance between security and usability
- How to test your employees' reaction to a phishing email
- How UK firms should encrypt data
- How well can you spot a phishing attempt?
- How your company can avoid passwords pitfalls
- HR software company, PageUp, informs UK’s ICO of suspected data breach
- ICO cautions small businesses about the importance of encryption
- ICO enforcement doubled in 2012
- ICO fines Bupa £175,000 for failing to protect customer data from misuse
- ICO fines Equifax £500,000 for failing to protect customers’ data
- ICO fines The Independent Inquiry into Child Sexual Abuse £200,000 for bulk email data breach
- ICO fines Uber £385,000 for failing to protect data of 2.7 million UK customers
- ICO pressing for custodial sentences for data loss
- IKEA communication system struck by cyberattack
- Important password policies your company should consider
- Improving Cloud Controls and Best Practice
- Industrial control systems infected with malware
- International airline discloses extensive data breach
- International library services company struck by ransomware attack
- International Programmers Day – how programming affects cybersecurity
- International taskforce takes out Russian botnet
- Investigatory Powers Bill update
- Investment banking company confirms data breach
- Irish health services impacted by ransomware attack
- Is a digitally signed document legally binding?
- Is an email address easy to spoof?
- Is the FBI reading your emails without a Warrant
- Is there a difference between anti-malware and antivirus?
- Is there an email spoofing test?
- Is this new ransomware gang DarkSide rebranded?
- Is Your Business Data Being Used Without Your Consent?
- Is your data safe in your cloud email store?
- Is your firm "malware aware”?
- Is your secure email solution effective?
- It’s an Uber-breach!
- It’s perfectly safe to send email attachments…isn’t it?
- Italian drinks company struck by ransomware attack
- Japanese auto manufacturer confirms data leak after GitHub exposure
- Japanese comic book application suffers extensive data breach
- Key cybersecurity protocols for start-up businesses
- Key points to know about ransomware attacks
- Key steps to prep for a cyberattack
- Largest alcohol retailer in Canada hacked
- Lavabit opens for 72 hours after its recent shutdown
- Law giant suffers major data breach
- Legal firms remain a target for hackers
- Lessons from the Minneapolis Public Schools Ransomware Attack
- LinkedIn becomes most mimicked brand in world
- Local councillors reveal fears of cyberattacks
- London architectural firm hit by hacker
- London Borough council suffers data breach
- Luxury Macao hotels targeted in cyberattacks
- Mac users targeted by hackers with upgraded malware
- Mailchimp breach exposes DigitalOcean customer data
- Major beverage industry operator discloses data breach compromising PII
- Major cybercriminal gang swaps phishing for ransomware
- Major IT service enterprise hit by ransomware attack
- Major sports retailer discloses data breach
- Major US airline confirms data breach following email compromise
- Major US fuel pipeline forced to shut following cyberattack
- Malicious actors clone targets website for stolen data leak
- Malicious code collects pre-stolen credit card details
- Malicious extensions allowing hackers control
- Malicious software and how it works
- Malware infection hits 500,000 Android devices
- Malware named after comedy character presents triple threat
- Malware used to deploy Cobalt Strike
- Mark Data Privacy Day by deploying encryption
- Marketing automation firm hacked for data theft
- Marlborough Group Chooses Galaxkey as their Preferred Security Solution
- Marriott hack exposes personal data of 500 million guests
- Massive attack on the Norwegian healthcare provider, Health South-East RHF
- Massive cyberattack hits US organisations
- Massive data leak exposes millions of Facebook users’ data
- Maximizing Business Benefits with Secure File Transfer Protocols
- Maze claims ownership of Canon ransomware attack
- Maze ransomware attacks target two US enterprises
- Medical software company faces fine for data leak
- Medical tech leader hit by ransomware attack
- Metropolitan Police Service’s 'Gangs Matrix' breached data protection laws
- Microsoft Exchange servers hit by insidious attacks
- Microsoft Outlook vulnerability allows hackers to steal Windows passwords
- Microsoft warns Azure customers of two-year data exposure
- Millions of malware application installs identified on Google Play
- Ministry of Defence security incidents revealed
- Most imitated brand by cybercriminals revealed
- Mounting privacy concerns: Facebook shares user data with 60 device partners
- Mr Trump aspires to use a courier service!
- My email has been spoofed – what should I do?
- MyHeritage breach exposes account details of 92million users
- Myths of cloud storage security
- NASA confirms potential personal information breach
- NCA creates bogus cybercrime hire sites to identify threat operators
- NCSC Certification Achievement - Galaxkey has the government seal of approval
- NCSC hails success of reporting service
- NCSC issues data security warning amid Ukraine invasion
- NCSC Report: Cyber threats facing UK law firms
- NCSC takes new steps to tackle COVID-19 cybercrime
- NCSC warns companies to fortify defences
- Nearly a third of companies using public cloud not encrypting data
- New cybercriminal service offers all hackers access to advanced phishing tools
- New Galaxkey features: Authorised Data Distribution and Classification
- New Integration: Galaxkey and Image Analyzer Partnership Enhances Data Security
- New malware and phishing attacks signal Trickbot’s return
- New malware exposed by US and UK collaboration
- New malware roots infected Android devices
- New malware uncovered by experts examining SolarWinds strike
- New malware variant presents threat to enterprises
- New mobile banking Trojan unleashed in Europe
- New ransomware gang rises
- New ransomware gang targets global automotive manufacturer
- New ransomware operation connected to infamous REvil gang
- New ransomware revealed employing Google encryption tool
- New report reveals poor 2022 password practices
- New SMS scam campaign targets UK residents
- New stealth Trojan employed in ransomware raids
- New UK law proposed- To monitor everyone’s internet activities and communications within the UK
- New York financial service giant faces $35 million charge for data breach
- NHS Breaches the Data Protection Act
- NHS's Centralised Database System is Vulnerable to Attack
- Nine important GDPR requirements for UK enterprises
- Non-profits warned over ransomware Robin Hoods
- North-Korean hackers swap tactics
- Olympic error: Chris Froome and Bradley Wiggins
- Online auction house announces major data breach
- Onsite document security – what protocols do firms need?
- Our Privacy is under attack…it’s time to protect it!
- Outdoor outfitter hit by credential stuffing
- Outsourcer fined millions after failing to prevent cyber-attack
- Over three million customers impacted by data breach
- Password Protection 101: How to Keep Your Passwords Safe
- Patient data exposed in US health system ransomware attack
- PayPal hack highlights the vulnerability of passwords
- Personal data of 9.4 million Cathay Pacific passengers breached
- Personal data of Welsh NHS employees stolen
- Personal information exposed in NBA data breach
- Personal information of nearly 1 million South Africans breached
- Phishing attack employs Colonial Pipeline theme to trick targets
- Phishing Attacks: Stay informed and act to mitigate their threat
- Phishing campaigns target low-ranking victims
- Phishing emails can bypass Office 365 Security
- Phishing emails lure university students in the UK
- Phishing ring broken by European law enforcement operation
- Polish government email breach investigated
- PRISM and our Privacy
- Protect your data: spear-phishing attacks continue to lure organisations
- Protection and security: what's the difference?
- Ransomware attack hammers city of Oakland
- Ransomware attack hits major car dealer
- Ransomware attack impacts Canadian mining company
- Ransomware attack strikes Canadian retail giant
- Ransomware attack strikes renowned gaming studio
- Ransomware attack strikes Royal Mail
- Ransomware attacks show spike in double extortion tactics
- Ransomware drives exodus of cybersecurity professionals
- Ransomware gang assume control of malware operation
- Ransomware gang claims ownership of wind turbine giant attack
- Ransomware gang hits Finnish IT services firm
- Ransomware gang launch leak site for double extortion
- Ransomware gang targets remote desktop services
- Ransomware gangs strikes out at Australian state
- Ransomware gangs target US farming sector
- Ransomware group claims hack on NASA service provider
- Ransomware groups exploit Windows vulnerabilities
- Ransomware groups infect visitors via SEO poisoning
- Ransomware groups ramp up data leak threats
- Ransomware groups use sites to enlist affiliates
- Ransomware operators target Balkans country
- Ransomware operators target UK universities
- Ransomware operators target VPN devices in attacks
- Ransomware operators to switch up attack strategy
- Ransomware outfit demands millions from tech giant
- Ransomware risks on the rise, US agencies warn
- Ransomware strike hits Swiss aviation
- Ransomware warning issued by US Health Department
- Ransomware: Protect Your Enterprise Against Attacks with Email Encryption
- Reality of Data Security within the NHS
- Research reveals UK firms paid hackers over £200 million
- Research team reports rise in cybercrime during COVID-19 crisis
- Researchers warn of cloud platform security risk
- Retail giant faces massive data leak settlement
- Retail giant hit by REvil ransomware operators
- Revealing signs that you’ve received a phishing email
- REvil demands $70m from Kaseya attack victims
- REvil ransomware gang returns at full strength
- Rising email fraud risk for enterprises seeking crisis aid
- Russian cryptocurrency exchange hit by hackers
- Russian drivers’ PII up for grabs
- Safeguarding staff against email spoofing
- Safeguarding your enterprise from spear phishing
- Scottish engineering giant disrupted by ransomware attack
- Security and usability without a trade-off
- Security researchers identify increase in reverse tunnel services
- Semiconductor manufacturing firm struck by ransomware attack
- Seven advantages of data backups for enterprises
- Seven features every secure workspace requires
- Seven steps to take after your email account is hacked
- Seven types of malware your firm should be aware of
- Shocking ransomware gang extortion figures revealed
- Should I encrypt my emails if my email client uses TLS?
- Silicon Valley, Money and Spying
- Simple security practices for secure email
- Simple Ways to Better Secure Enterprise Email Communications
- Singapore health system hack affects personal data of 1.5 million
- Sir George Zambellas - a long journey in entrepreneurship
- Sir George Zambellas on The Digitisation of our Brains
- Six advantages of adopting digital document signing
- Six common questions and concerns about data security
- Six easy-to-adopt cybersecurity practices
- Six key protocols for enterprise data security
- Six of the most common cybersecurity mistakes
- Six reasons why hackers spoof emails
- Six security features all enterprise email requires
- Six tips to keep compliant with the GDPR
- Six UK schools struck by ransomware attack
- Six ways firms can ward off malware attacks
- Smartwatch services disrupted by ransom attack
- Social media icons hide skimming malware
- Solicitors expose clients to risk of fraudulent activity
- Sony Computer Entertainment Europe Limited is fined £250 000 by the ICO following a data security breach.
- South American insurance giant struck by cyberattack
- Specialist phishing strategies to watch out for
- Spy agencies, US and UK, bypass encryption
- Start 2022 with improved data security
- Start 2023 with stronger email passwords
- State hackers hit organisations in critical sectors
- Stockport Primary Care Trust receives £100,000 monetary penalty
- Stolen Twitter user data released for free
- Streamline the way you work with electronic document signing
- Student data exposed following ransomware attack
- Study identifies UK as most breached country in Europe
- Supercomputers across Europe infected with malware
- Supply-chain attack affects hundreds of apps and websites
- Swedish automaker reveals cyberattack
- T-Mobile discloses massive data breach
- Tech manufacturer forced to pay massive ransom
- Technology giant admits data breach and cyberattack
- Telecom company thrives under lockdown using digital signing
- Telecommunications company reveals SIM swap attacks
- Telefonica leaks millions of customers’ personal information
- Texas cloud provider faces lawsuits following ransomware attack
- The 6 GDPR privacy principles and encryptions primary role
- The Belfast Health and Social Care Trust Breach the Data Protection Act
- The biggest breach in history: questions for Yahoo
- The cloud and its security benefits of modern collaboration
- The danger of double extortion ransomware attacks
- The former US President’s, George H. W. Bush, emails have been hacked.
- The ICO has published a new IT security guide
- The ICO offers guidance as survey reveals concerns surrounding Bring your own device - BYOD - policy
- The Importance Of Document Information Security
- The importance of electronic document signing
- The Information Commissioner's Office highlights the need for the encryption of sensitive data
- The key data loss prevention practices you should consider
- The NSA hack the email account of the Mexican President
- The phishing strategies your firm must be aware of
- The problem with KYC – and how to solve it
- The rising threat of botnet attacks
- The University of Greenwich fined £120,000 for serious data breach
- The Vital Reason Your Business Needs Secure Email
- Thousands of VNC servers exposed without password protection
- Threat actors exploit Silicon Valley Bank collapse
- Threat actors sharpen attacks with English speakers
- Threat actors use KMSPico installers for crypto raids
- Threat group uses browser extension for undetected email theft
- Threat operators employ bogus NFT game to control user devices
- Threat operators selling corporate network access
- Three essential security practices for malware protection
- Three important indicators of a phishing email
- Three important tips for business backups
- Three key benefits of digital document signing
- Three key benefits of enhanced email security
- Three key points to remember for enterprise backups
- Three million patient records stolen in healthcare ransomware attack
- Three million people targeted in mental health platform data breach
- Three of the worst hacks in history
- Three phishing strategies businesses must be aware of
- Three questions to ask before buying encryption software
- Three reasons to start using secure file transfers
- Three reasons why document transfers should use digital signatures
- Three reasons why ransomware attackers target the education sector
- Three simple steps to data file security
- Three staff-related cybersecurity issues to consider
- Three tips to defend your enterprise from malware
- Three tips to protect your company data
- Three types of data exchange that benefit from encryption
- Three types of DDoS attack you can’t ignore
- Three types of Distributed Denial of Service (DDoS) attacks
- Three types of multifactor authentication explained
- Ticketmaster breach compromises personal data of 40,000 UK customers
- Time to wake up and act on cyber security
- Top data loss prevention protocols for email
- Top executive email accounts exposed
- Top tactics used in phishing attacks today
- Top three trends in cybersecurity for 2020
- Top Tips For Data Protection Security
- Top tips for handling confidential information in your business
- Trade publication giant hit by ransomware gang
- Trojan malware targets banks customer data
- Two cybersecurity features every firm can benefit from
- Two new features on Galaxkey Secure Workspace to make it even easier to manage your files
- Typeform breach has significant knock-on effect and...the data was not encrypted!
- Uber data leaked online after attack on third-party vendor
- Uber internal systems hacked by teenager
- Uber to pay £113 million to settle 2016 data breach
- UK clothing retailer notifies customers of data leak
- UK contractors firm confirms cyberattack
- UK cryptocurrency exchange knocked offline
- UK cybersecurity experts warn of attacks from foreign hackers
- UK education charity disrupted by ransomware
- UK Emergency Surveillance Law to be Challenged in High Court
- UK experts speak out on ransomware payments
- UK fast food outlets impacted by ransomware attack
- UK financial sector threatened by cybercrime
- UK firms choose to move their data out of the US
- UK minister urges ransomware victims to report attacks
- UK regulator fines hotel group millions over data leak
- UK suffers O2-focused data stealing scam
- UK train operator struck by cyberattack
- UK universities and charities hit by hack
- UK university struck by cyberattack
- Ukraine data wipe attack employs ransomware decoy
- Under Armour reports MyFitnessPal data breach affecting 150 million accounts
- Understanding electronic signatures for lawyers
- Understanding encryption and GDPR
- Understanding health data security
- Understanding methods of secure data transfer
- Understanding post-Brexit penalties and fines for GDPR
- Understanding the difference between common malware types.
- Understanding the difference between digital and e-signatures
- Understanding the human causes of ransomware attacks
- Understanding the impact of clickjacking
- Understanding Trojans and how they work
- Unleashing the Power of Encryption: The Most Effective Security Tool to Prevent Data Breaches
- Unzip and Copy/Move files across Workspaces
- US asks Supreme Court to not take up the case on NSA cyber-snooping
- US automotive tool maker suffers data breach
- US chipmaker hit by Maze Ransomware group
- US city discloses disastrous data breach
- US communication company hit by phishing attack
- US component maker suffers data leak
- US electronics e-commerce platform discloses breach
- US enterprises infiltrated by Maze ransomware operators
- US fertility clinic reveals patient details disclosed
- US Food delivery firm hit by hackers
- US government warns banks of North Korean operators
- US hospital devastated by intense cyberattack that causes over 3 days of disruption
- US hospitals hit by ransomware attacks
- US Navy hacked, what can organisations learn from this...
- US police department suffers data leak
- US school system data breach follows ransomware attack
- US security service disrupts BEC attack gang activities
- US software company hit by BlackCat ransomware gang
- US software provider advises password change
- US sports team struck by cyberattack
- US student data exposed in attack
- US university gives in to ransomware demands
- VoIP services firm hit by cyberattack
- VTech Data Breach, Another High-Profile Breach Occurs
- Warning: Rise in W-2 Form phishing scams
- Warning: Serious #Efail vulnerabilities allow attackers to view PGP encrypted email content
- Web hosting giant GoDaddy reveals shocking hacker breach
- Web hosting service shuts after systems breached
- Websites hacked with bogus Cloudflare alerts
- Welcome Financial Services Fined £150,000 for Breaching the Data Protection Act
- Welsh council assumes strong cybersecurity stance
- WeTransfer abused by threat actors
- What are “Common Vulnerabilities and Exposures” (CVEs)?
- What are botnets and how do they function?
- What are Business Email Compromise attacks?
- What are credential stuffing attacks and how can they be conquered?
- What are the benefits of a secure workspace?
- What are the benefits of using an electronic signature?
- What are the business benefits of efficient backups?
- What are the business benefits of employing encryption?
- What are the cybersecurity challenges faced by local authorities?
- What are the dangers with my email being spoofed?
- What are the different types of email security?
- What are the different types of Trojan malware?
- What are the key benefits of digital document signing for businesses?
- What are the key cybersecurity challenges during the COVID-19 lockdown?
- What are the most common types of email-based cyberattacks?
- What are the potential consequences of a data breach?
- What are the principles of email security?
- What are the reporting protocols for phishing attacks?
- What are the risks involved in email intrusion?
- What are the risks of sending unencrypted emails?
- What are the types of protective security?
- What are zero-day vulnerabilities?
- What can criminals do with my email address?
- What can cybercriminals do with personal information?
- What can threat operators do with stolen credentials?
- What can your business do to protect itself from ransomware?
- What company actions should follow a personal data breach?
- What damage can a data breach cause to companies?
- What do local authorities need to understand about phishing?
- What does a man in the middle (MITM) attack involve?
- What does the phrase “cyber resilience” mean for companies?
- What does the term "double extortion" refer to?
- What does the term “pharming” mean?
- What does the term “Zero Trust Security” mean?
- What does the term end-to-end encryption mean?
- What email security features are important for local authorities?
- What is 256-Bit Encryption?
- What is a “botnet”?
- What is a business email compromise?
- What is a computer virus?
- What is a distributed denial of service attack?
- What is a formjacking attack?
- What is a network spoofer and how do I protect against it?
- What is a Remote Access Trojan?
- What is a secure email gateway?
- What is a social engineering attack?
- What is a Trojan horse and how do I protect against it?
- What is data protection software?
- What is email encryption and how does it work?
- What is Emotet malware?
- What is file integrity monitoring?
- What is file sharing security?
- What Is HIPAA and what does it mean to be HIPAA compliant?
- What is malware and how do I protect against it?
- What is personally identifiable information?
- What is phishing and how do I protect against it?
- What is ransomware and how can I stop it?
- What is ransomware and how do I protect against it?
- What is the best defence against phishing?
- What is the best way to send a confidential email?
- What is the difference between secure email and encrypted email?
- What is the integration between Galaxkey and Yoti and what does it mean for me?
- What is the most secure way to transfer a file?
- What is the most useful solution to secure documents during collaboration?
- What is the purpose of enterprise data classification?
- What makes a strong password?
- What makes e-signatures more secure than traditional signatures?
- What makes phishing emails so dangerous?
- What ransomware infection vectors should educational authorities understand?
- What should I do after a data leak?
- What to do when your firm faces a data breach
- What type of data are ransomware operators after?
- What types of documents cannot be signed electronically?
- What’s the best practice for secure email use?
- What’s the difference between a digital signature and an electronic signature?
- What’s the difference between transport-layer encryption and end-to-end encryption?
- What’s the true cost of a data breach?
- What’s wrong with using FTP for transferring large files?
- What’s your company’s digital footprint?
- WhatsApp faces €5.5 million fine for violating data regulation
- Why an unencrypted email is like a letter without an envelope
- Why are backups no longer adequate protection from ransomware attacks?
- Why are DLP protocols vital for enterprise email?
- Why are electronic documents more effective than wet ink signatures?
- Why are local councils targeted by ransomware gangs?
- Why are phishing attacks still working?
- Why are regimented data backups critical for companies?
- Why are user-friendly cybersecurity measures critical for companies?
- Why backups and encryption are essential to prevent ransomware
- Why companies should consider their digital footprint
- Why cybersecurity really matters during lockdown
- Why cybersecurity training should be included during onboarding
- Why data-centric security is essential for positive data protection
- Why digital document signing is better than signing by post
- Why do cybercriminals spoof emails?
- Why do enterprises need secure collaboration platforms more than ever?
- Why does your business need email encryption?
- Why e-signatures make sense for UK enterprises in 2022
- Why electronic signatures are an important asset
- Why electronic signatures matter in the coronavirus crisis
- Why email encryption is vital for lawyers
- Why encryption is critical for email security
- Why end-to-end encryption is critical for competitive companies
- Why enterprise users must beware of Trojans
- Why enterprises should encrypt emails
- Why is building a security culture for your company key?
- Why is cybersecurity so critical for educational institutions?
- Why is cybersecurity vital in education?
- Why is email security critical for companies in 2021?
- Why is it vital to take care of email account credentials?
- Why is remote working at risk from ransomware?
- Why is updating software and systems essential for enterprises?
- Why keeping calm is key when faced by with a cyberattack
- Why should businesses use digital document signing?
- Why should companies invest in document security?
- Why should you keep an audit log when using electronic document signing?
- Why so much panic around the right to erasure?
- Why the shift to remote document signing?
- Why updates and backups are essential for enterprise security
- Why use electronic signatures?
- Why your enterprise needs protection from spam
- WordPress plugin used to gain backdoor access
- Yahoo UK Services fined £250,000 for compromising British citizens’ data
- YouTube accused of violating the Children’s Online Privacy Protection Act
- Zero Trust vs. Zero Knowledge - Understanding the Differences and Similarities
- Zero-day attacks launched against international companies
- Zero-day flaw leads to severe server hack