Resources | HelpSystems

Resources

Blog

Source Authentication for Email

This guest blog from Dr Edward Amoroso, Tag Cyber provides a high-level overview of modern advances in email security using source authentication and how the HelpSystems cybersecurity portfolio supports this important method for reducing information risk in enterprise.
Blog

SaaS-based Data Loss Prevention

https://www.tag-cyber.com/about-usThis guest blog, Christopher Wilder of Tag Cyber provides a high-level overview of how companies can improve data security while minimizing data leaks in SaaS solutions.
Blog

Customer Phishing Protection Couldn’t Be Easier with Agari and PhishLabs

It’s not news that cybercrime is a constant battle—large enterprises and small businesses everywhere are susceptible to a myriad of advanced email threats and socially engineered attacks, such as executive or brand impersonation. According to IC3’s Internet Crime Report, over $44 million in losses in 2021 were a direct result of malicious phishing and advanced email scams.
Blog

Modern Data Security for the Enterprise

In this guest blog, Christopher Wilder of Tag Cyber provides a high-level overview of how companies can layer security solutions to ensure their data is fully protected no matter where it resides, how it travels or is shared.
Live Webinar
Jul
28

Simple Ways to Tame Document Chaos

Modern organizations need critical documents to be readily accessible and secure. Join this 30-minute webinar to learn how web-based document management systems can streamline document control and improve efficiency.
Live Webinar
With the release of Globalscape EFT 8.0.7, the Express and Enterprise products have been merged into one. Express customers now have the ability to add additional modules for enhanced authentication options as well as compliance with GDPR, PCI, FIPS, and other mandates.
Press Release

Forbes: Common Online Scams and How To Avoid Them

From fake holiday home rentals to counterfeit medications, online scams are now an unfortunate common occurrence. Forbes contributor, John Wilson takes a detailed look at online scams and provides 5 ways to protect yourself from them. Originally published on Forbes Advisor. Excerpt: “Mary was lonely. The recently divorced mom of three was ready to dip her toe back into the Orlando, Florida, dating...
Press Release

Keeping Personal Data Secure

With the rise in phishing attacks and identify theft, Ciaran Rafferty, Managing Director, Email Security at HelpSystems looks at emerging trends and ways organizations can keep their sensitive data secure. He also provides an update on what to expect from HelpSystems in 2022.
Video

MFT Rights Management: Use Cases

What happens to files after they are securely transferred to their end recipients? The HelpSystems Rights Management Bundle helps you maintain control and security for files wherever they travel. Watch the video for three ways you can use this bundle to encrypt and control file access.
On-Demand Webinar

IBM i Automation Series: Job Scheduling

Watch this webinar series for your FREE opportunity to learn what every beginner should know about Robot Schedule software for IBM i (iSeries, AS/400) automation, plus tips and tricks for the veterans.
On-Demand Webinar

Boost Your IT Department with RPA from Automate

The pressure facing IT teams has never been higher. With an increase in responsibilities coupled with ongoing staffing shortages, there’s less time to focus on driving innovation and strengthening the value of the business. As challenges grow, ease the burden on your IT department with robotic process automation—to boost productivity, maximize efficiency, and optimize your resources. In this on...
On-Demand Webinar

How to Keep Sensitive Data Safe and Compliant

Keeping data secure is a constant exercise of fighting cyber threats that change daily and maintaining a strong training program for employees to stay vigilant. On top of protecting your data, it needs to be compliant which can be a daunting task - especially if your business transcends geographical boarders. Some of the most impactful regulations are General Data Protection Regulation (GDPR) and...
Live Webinar
Jul
20

IBM i in 2022: It's Not Just AS/400

Discover our experts' unique perspective on the direction of IBM i and how to optimize your strategy surrounding it.
On-Demand Webinar

Intermapper Customer Workshop

In this informative session, Kevin Jackson, Solutions Engineer, and Steve Vold, Senior Support Analyst, share tips and best practices for getting the most out of Intermapper.