Blog
Read the latest from our team and get inspired
Read the latest from our team and get inspired
6 min read
Ever wonder what’s lurking in your employee’s inboxes? You’re right to be on the defensive. In 2025, email isn't just a communication tool; it's a battleground where cybercriminals are constantly laun...
2 min read
May 2025: Zivver is proud to announce its inclusion in the 2025 DataTech50 list by FinTech Global, recognising the company as one of the most innovative technology providers driving transformation in ...
2 min read
What does effortless mean to you?
1 min read
Care group Elde Maasduinen has chosen Zivver as their new secure email solution to empower employees and clients to prevent data leaks and cyber attacks.
4 min read
In 2022, according to the ICO, local and central government bodies reported the third highest number of data incidents, second only to the healthcare and education sectors.
2 min read
Mistakes happen, especially when we're working under pressure and to tight deadlines. But while a typo in a personal email is a bit embarrassing, in a business context it can have huge consequences. B...
1 min read
In part one of our webinar series dedicated to digital security in the public sector, we investigate whether security training is enough for confronting the industry's greatest security challenges; ca...
2 min read
As a next generation email security solution, we’re dedicated to taking the effort out of email security — and, in doing so, addressing the leading cause of data breaches: human error. Zivver Secure E...
3 min read
Data privacy legislation, such as GDPR, is designed to protect individuals' personal information from being mishandled or misused. Failing to comply with these laws can lead to significant consequence...
4 min read
Transport Layer Security (TLS) is an end-to-end encryption protocol used to protect information as it moves between two parties on the internet. It’s commonly used in digital communication, such as em...
2 min read
Identity and Access Management (IAM) is a vital yet time-consuming process for IT leaders today, particularly in larger organizations. Controlling access to data and functions within a growing and cha...
Subscribe to get more email security tips straight to your inbox.