Security, Threat Intelligence Hub
Exploit Using Microsoft Excel Power…
Mimecast Threat Center discovered a weak…
Read More >
Mimecast Threat Center discovered a weakness in the Microsof… Read More >
Here’s how to extend your email security strategy for rapid detection and remediatio… Read More >
Here’s how to extend your email security strategy for rapid detection and remediation of threats inside the perimeter of your Exchange Online cloud-based gateway. Email account takeover attacks are hardly new but as cloud services surge in popularity, the risks of a data leak or financial frau… Read More >
As the UK’s National Hea… Read More >
As the UK’s National Health Service embraces Microsoft 365 security and productivity services, there are lessons f… Read More >
Microsoft Office 365 has some good email security features, but also some significant vuln… Read More >
Microsoft Office 365 has some good email security features, but also some significant vulnerabilities. A defense in depth strategy can compensate for these weaknesses, and create a more secure email environment. Key Points: Microsoft offers several robust security tools for MS 365 and its email ser… Read More >
Threat intelligence teams know… Read More >
Threat intelligence teams know that cyberattacks are most frequently conducted via email, and they know many simple atta… Read More >
Prevent cyber risks by not putting your eggs in everyone else’s basket. Microsoft's… Read More >
Prevent cyber risks by not putting your eggs in everyone else’s basket. Microsoft's announcement that it has launched its first cloud data centers in Africa—one in Cape Town, another in Johannesburg—is a cause for celebration among South Africa's business sector. As we hurtle into… Read More >
The Old World Meets the New Wh… Read More >
The Old World Meets the New When It Comes to Backup and Recovery Many of us have the made the journey to Microsoft Offi… Read More >
Mimecast Threat Center discovered a weak…
Read More >
Mimecast Threat Center discovered a weakness in the Microsof… Read More >
Since the dawn of social engineering, at…
Read More >
Since the dawn of social engineering, attack methodology has… Read More >
With Cybersecurity Awareness Month here,…
Read More >
With Cybersecurity Awareness Month here, we’re ready t… Read More >
Get posts like this delivered to…
Read More >
Get posts like this delivered to your inbox. Subscri… Read More >
“@Microsoft: please don’t ruin Thanksgiving.” Ah, Thanksgiving. Typically, a week full of family travels, exercising booked vacation time and in some cases, thinking ahead to bargain deals on Friday. But now, it’s perhaps not…
There’s a new phishing attack targeting Office 365/SharePoint users. Cybersecurity is a lot like an ongoing, worldwide game of chess. One side—those defending critical information, IP, money, etc.—put up defenses against attackers—those who want to …
A major outage in the US takes down a key Microsoft datacenter and a host of cloud services in the process. What to do when the “cloud” goes down? Every vendor offering a cloud-based solution pours ungodly amounts of money into re…
The email features in Office 365 may not be all you need. Businesses continue moving their productivity platforms to Microsoft Office 365™ in droves. As of their April 2018 earnings announcement, Microsoft said over 135 million business users worldwi…
Mimecast Threat Center discovered a weak…
Read More >
Mimecast Threat Center discovered a weakness in the Microsof… Read More >
Since the dawn of social engineering, at…
Read More >
Since the dawn of social engineering, attack methodology has… Read More >
With Cybersecurity Awareness Month here,…
Read More >
With Cybersecurity Awareness Month here, we’re ready t… Read More >
Get posts like this delivered to…
Read More >
Get posts like this delivered to your inbox. Subscri… Read More >