Award: Red Sift wins at UK Business Tech Awards 2022

Red Sift were delighted to be named winners of ‘Best Application of Tech – Security’ at this year’s UK Business Tech Awards.

The Awards celebrate the UK’s finest tech businesses and rewards innovative and exceptional application of technology to transform and grow businesses.

With the world becoming ever more virtual, tech developments are even more important to developing the future, than they have been in shaping the past. The UK Business Tech Awards were looking for tech that has added tangible benefits to customer experience, management systems, marketing and sales information storage and data tracking.

The ‘Best Application of Tech – Security’ category aims to recognise exceptional use of technology in the security sector. Judged by an independent panel of leading technology experts, they were looking for the thinking and approach specific to the needs of the security sector and the client’s or company’s goals.

We thought Red Sift had clear visuals demonstrating interface. They grew their customer base by 22% to include global clients which is impressive. The campaign gave a real sense this is a platform that is making the complex task of security less complex with it’s applications. Well done!

This positive feedback is testimony to the hard work and technical skills of the Red Sift team and we look forward to celebrating more success in the future!

PUBLISHED BY

Red Sift

21 Oct. 2022

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
BEC

What is email spoofing and how can you prevent it?

Faisal Misle

Executive summary: Email spoofing is a growing cyber threat where attackers forge the sender’s address to impersonate trusted sources, enabling phishing, business email compromise, and financial fraud. Because legacy email protocols like SMTP lack strong authentication, spoofing can bypass traditional filters. Organizations can mitigate this risk by implementing robust email authentication measures, especially DMARC.…

Read more
Email

What is social engineering and how can you prevent it?

Jack Lilley

Executive summary: Email phishing has evolved and criminals now use social engineering to impersonate executives, suppliers, and even government agencies, persuading recipients to approve payments or disclose credentials. Because human judgment sits at the heart of these attacks, technical controls that eliminate spoofed messages before they reach the inbox are essential. DMARC provides that…

Read more
Cybersecurity

Attackers are abusing Microsoft 365: Here’s how to stay protected

Jack Lilley

Executive summary: Varonis has surfaced an active phishing campaign that spoofs internal users by abusing Microsoft 365’s Direct Send feature. Because Direct Send doesn’t require authentication and is treated as “internal,” these messages often bypass the checks you rely on for outside mail. Microsoft now offers an opt-in switch, RejectDirectSend, to block the pathway,…

Read more
BEC

SVGs with JavaScript are bypassing traditional email security: Learn how to stay…

Jack Lilley

Executive summary: Hackers are hiding JavaScript inside SVG attachments that pass as harmless images, and slipping past Secure Email Gateways (SEGs). To stay secure, organizations need to enforce a DMARC policy of p=reject, easily implemented with Red Sift OnDMARC, to stop compromised SVGs before they reach the end user. Key takeaways: Scalable Vector Graphics…

Read more