
TAG Cyber: Reduce human activated risk
TAG Cyber’s latest report explores this imperfect relationship and how it relates to a technology your business uses every day: email.
Read report95% of IT leaders believe their data is at risk – with good reason. Data loss is a daily occurrence and the costs of a breach are only getting higher. Understand the full risk picture and learn how to protect your business with intelligent email DLP.
TAG Cyber’s latest report explores this imperfect relationship and how it relates to a technology your business uses every day: email.
Read reportData loss prevention (DLP) software stops intentional and accidental leaks of information from your network.
Read articleWhat is DLP? What different DLP software is there? Explore this guide.
Read articleFind out more about accidental and intentional data loss, and why the risk is higher in 2021
Read articleIt’s estimated that 70% of enterprise organisations will move to Office 365 (O365) by 2021.
Read articleDLP solutions are evolving away from static dlp and more into human layer security.
Read articleLegacy DLP solutions have failed to stop data breaches from happening - and you need to understand your alternatives today to prevent your incidents of tomorrow.
Read articleThere are few people who have not experienced the sinking feeling caused by making a fat finger error.
Read articleFind out which DLP solutions you need to protect your business from data loss.
Read articleTraditionally, email data loss prevention software has used static rules to stop users from emailing sensitive or confidential data
Read articleChoose the right level of email protection for your business.
Read articleUse machine learning to control and secure data in emails and stop email breaches.
Read articleUnderstand the risk of mobile mistakes and learn how to keep your business secure.
Read articleLearn how to keep employees secure (and productive) while using email
Read articleDiscover the top five ways your organisation is losing data via email - every day.
Read articleHere’s a compilation of the top 10 most common email mistakes according to Egress.
Read articleLearn how to share your data via email with confidence.
Read articleChoose the right level of email protection for your business.
Read articleA zero-trust approach to email DLP makes sense - but how can we make it seamless and user-friendly?
Read articleFind out what steps to take right now and learn how to prevent misdirected emails in the future.
Read articleA ‘misdirected email’ describes an instance where an email is sent to the wrong person or the wrong attachment has been added to an email that has the correct recipients in it.
Read articleProtect data and prevent breaches by stopping confidential emails being sent to the wrong person by mistake
Read articleLearn how to protect yourself and your organization from misdirected email.
Read articleFind out what you should do when a misdirected email lands in your inbox.
Read articleFind out why you need to augment Microsoft 365's native security to minimise outbound email data loss
Read articleYou would expect we’d have got to grips with email by now.
Read articleUnderstand the true risk of accidentally hitting send to the wrong person.
Read articleFind out what to do when a confidential email accidentally hits your inbox.
Read articleFind out what you can do right now, and how you can prevent mistakes in the future.
Read articleNew report! Preventing email data loss in Microsoft 365
Read articleEgress determines the level of risk to sensitive data to help users apply the right security, as well as helping them to spot anomalies and identify mistakes.
Read articleDiscover the benefits (and risks) of bring your own devices (BYOD) in our quick guide.
Read articleHow can security standards be maintained when employees are using their own devices?
Read articleMake sure you've got the security basics covered with our expert guide on the risks and mitigations.
Read articleGot a bring your own device (BYOD) policy or thinking about implementing one? Make sure you check out our quick BYOD guide first.
Read articleUsing BYOD in your business? Here's how to make sure your employees stay both safe and productive.
Read articleData exfiltration is the unauthorized transfer of data, typically from a computer, and is more simply described as data theft. The malicious actor in data exfiltration can be a cyber attacker or an insider (i.e. a current employee, contractor or anyone else considered to be part of the organization).
Read articleData exfiltration can happen in a few ways - but the outcome is often serious for a business. Here's what you need to know.
Read articleGet actionable tips on how to stop data leaving your business without your knowledge or consent.
Read articleFollow these five expert tips to keep your business safe from the risks of data exfiltration.
Read articleUnderstand how and why data leaves your organization without your consent.
Read articleOur 2021 Data Loss Prevention Report has just been released Download now
Discover the key considerations, tools and methods you need to be aware of to protect sensitive patient data throughout its lifecycle and maximise your data security budget.
Read articleFind out why email security should as not just a revenue protector for law firms - but a revenue generator too.
Read articleFrom our research, we know that more than one in three workers (35%) have sent an email to the wrong person, while nearly half (46%) have received an email clearly intended for someone else.
Read articleFinancial services is a tightly regulated industry where trust is key - which makes email DLP vital.
Read articleLearn how to protect your investment management firm through intelligent email DLP.
Read articleIf you have always wondered how to recall an email in Gmail then here’s a quick step-by-step guide for you. It’s worth bearing in mind however that unlike other email clients like Outlook, you don’t have a recall button. Instead, you have a selected timeframe to “unsend” an email.
Read articleIf you use Outlook 2010 or 2013 to manage your email, then follow this simple how-to guide to work out how to pull those emails back from the brink.
Read articleSolomon Adote, Chief Security Officer, State of Delaware, explains the scale of insider breaches in US State Government today.
Learn what this CISO has to sayWe recently interviewed Sujeet Bambawale, the CISO for 7-Eleven, and asked him about his professional thoughts around misdirected emails.
Learn what this CISO has to say