Office-365

Office 365™ Extends Lead in Cloud Adoption

A recent survey confirms that Microsoft Office 365 continues to outpace Google’s G Suite in the race to the cloud. Overall it’s clear that more organizations are using cloud or hybrid deployment models over on-premises, but let’s dig into the survey …

Read More
Archiving, Productivity

Breakaway: Gartner Names Mimecast a Leader in 2016 EIA Magic Quadrant

We’re honored and humbled by Gartner’s recognition of Mimecast Cloud Archiving in its 2016 Magic Quadrant for Enterprise Information Archiving. With this year’s recognition, Mimecast has been named as a Leader for the second year in a row.  More…

Read More
Security

Planning for Tomorrow’s Cyberattacks

The end of a year is often a time of reflection as organizations focus on what they might do differently in the year to come, how they might align themselves against their competitors, and up their game. As organizations think through their cybe…

Read More
Security

Mimecast Security Services Scoop Industry Awards

We are very pleased to share that Mimecast recently won two industry security awards. Firstly, Mimecast won Security Vendor of the Year at the CRN Channel Awards 2016 held in London at the Battersea Park Events Arena. With Office 365 adoption growing…

Read More
Security

Cyber Resilience Planning: Life or Death for the Medium Enterprise

 Nowadays, no one is safe from being the target of a cyberattack, especially as more businesses move to the cloud: The U.S. SMB cloud computing and services market is expected to grow from $43 billion in 2015 to $55 billion in 2016.  This …

Read More
Security

Enhancing Security versus Buying Cyber-Insurance – Substitutes or Complements?

Every now and again I hear otherwise sensible security people question why they should improve their security controls, when increasing their cyber-insurance coverage seems much easier and less costly, as if they were alternatives to one another.&nbs…

Read More
Security

Six Top Moments at Black Hat EU

Last week at Black Hat Europe, Mimecast had the pleasure of meeting hundreds of people from around the world.  Many conversations were had and, with security being the focus of the conference, Mimecast was able to demonstrate exactly how our pro…

Read More
Archiving

Our Top 3 Takeaways from The Forrester Wave: Information Archiving Cloud Providers Report

The just-released The Forrester WaveTM: Information Archiving Cloud Providers, Q4 2016 provides a fascinating touchpoint on the rapid evolution of the State of Archiving. We hold Forrester Research in high regard as a global leader in research and ad…

Read More
Security

It's Not Just The Ransom You're Losing: Quantifying the Real Cost of Malware Attacks

It takes just half a second to infect a computer with ransomware, but affected companies deal with the fallout for months. The FBI estimates that more than 4,000 ransomware attacks occur each day in the U.S. – representing a 300% …

Read More
Security

Why Cyber Resilience in Today's Complex Environment Requires an Integrated Ransomware Solution

More than 50 new types of malware used in ransomware attacks were released in the first half of 2016 alone. The pace of ransomware attacks is escalating. Nearly 40% of companies have been hit with ransomware attacks this year, and the …

Read More
Security, Office-365

Never Be a Ransomware Hostage

What often impacts more than 100,000 computers a day, and can cost you thousands of dollars in remediation, downtime, and cleanup cost? Ransomware. In a ransomware attack, you are literally held hostage and denied access to critical productivity…

Read More
Office-365

What You Need to Know Now About Our Data Logging API & Splunk Application

Mimecast is pleased to announce the general availability of the Data Logging Application Programming Interface (API) and Splunk application. The API allows customers and partners to integrate data to their security information and event management (S…

Read More
Security

Key Facts About Ransomware

Have you ever wondered about the key issues with ransomware? How it might affect you or even what to look for? Maybe you're simply curious as to how to react when you get hit? Look no further than this whiteboard session with our in-house security ex…

Read More
Archiving

Six Critical Considerations for Exchange Online Archiving

Adoption of Office 365 continues to grow rapidly, adding 50,000 customers a month, with Exchange email remaining the number one workload. At the same time, increasing regulation, litigation, and operational drivers necessitate the need for speedy, a…

Read More
Productivity

Roadshow Podcast - Episode 3

Episode 3: ILTACON Event, Washington DC   J Peter Roadshow Podcast - Episode 3   J. Peter, where are you? Greetings!  J .Peter here and this week I’m in Washington DC.  DC is an amazing town with so many historical locat…

Read More
Security

Cybersecurity at Microsoft Ignite 2016

When fall rolls around this year you may want to be in Atlanta, GA for Microsoft's Ignite 2016, where cybersecurity will be front and center. The 2015 conference sold-out early, so if you haven't secured your conference passes yet you may be out…

Read More
Productivity

Roadshow Podcast- Episode 2

Episode 2: Lunch Event at the Palms - Nashville, TN J Peter Roadshow Podcast - Episode 2   Q: J. Peter, where are you? A: Greetings!  J .Peter here and this week I’m in Nashville Tennessee.  When I think of Nashville I think of country…

Read More
Security

Four Tips to Defend Against the Malicious Insider

I am in the middle of my second week here at Mimecast and am excited to focus on all things security. The timing of my arrival is good as we just released  important new data around malicious insiders. Here’s my take on the topic … The…

Read More
Productivity, Security

Seven Top Moments at Black Hat

This past week Mimecast had the pleasure of attending the Black Hat Event in Las Vegas, NV. The atmosphere was energetic and our booth, although small, was mightier than any other booth on the floor. The Mimecast team varied members from marketing to…

Read More
Office-365

Road Show Podcast: Episode 1

Episode 1:  Microsoft Worldwide Partner Conference in Toronto, Canada JP-Roadshow-Toronto   Q: J. Peter, where are you? A: Greetings! This week I’m in Toronto Canada. Toronto is an interesting place to visit. Whenever I visit a city I …

Read More
Office-365

Road Show Podcast 2016

Get ready as Mimecast travels the world in a “Road Show” with J.Peter Bruzzese, a Microsoft MVP. Listen to each episode as he works with us to help share his experiences. He’ll be starting July 11th in Toronto, Canada and ending on December 9th in Or…

Read More
Security

Mr. Robot Highlights the Price Point Temptation of Email Ransomware

“5 days for a banking system to be down? That’s a lot of money down the drain… We can’t afford this hack right now… And frankly I think we can find 5.9million in between our couch cushions. It’s nothing.” - Susan Jacobs, general counsel, E Corp …

Read More
Continuity, Migration

Administration Console Improvements to Boost Customer Experience

At Mimecast, delivering the best customer experience is at the heart of everything we do. Whether before becoming a customer or when using our services, our mission is to meet and exceed customers’ needs and make the experience easy and enjoyable. Th…

Read More
Office-365

Office 365 Outage – What’s Your Plan B?

Yesterday, Office 365 suffered hours of service degradation, causing major email and business disruption. The media reported that Exchange Online Protection's filtering infrastructure could have been at fault. Now imagine this: It’s early afternoon …

Read More
Security

New Attack Vector Outlined in the FBI’s Business Email Compromise Warning

 The FBI has issued a stark warning about a rapidly-growing and downright brazen new email attack technique: simply asking employees for your critical data. Mimecast is urging organizations to think broadly about expanding new email security tra…

Read More
Security

Five Ways to Defend Against Rising Tide of Microsoft Office Macro Malware

In a brief warning alert last week, US-CERT urged individuals and organizations to proactively secure systems against an increase in malware spread via macros. Mimecast is today offering new guidance to help organizations combat this threat…

Read More
Security

Evolving Email Security Landscape Puts Cyber Insurance Policies at Risk

Cyber insurance uptake is growing quickly but a lack of employee training on the latest email attacks is leaving organizations at great risk of breaking policy terms. These new social-engineering and impersonation attacks could leave leaving firms of…

Read More
Continuity, Security

Infosecurity 2016: A New Frontier of Threats and Countermeasures

This will be the second Infosecurity Europe since its return to Olympia last year. We've been regular exhibitors at the premier European security show for years and been part of an era of fundamental changes in the security industry. Let’s …

Read More
Security

Mimecast Wins at Protecting Firms of All Sizes Against Whaling

Organizations of all shapes and sizes face a significant threat from cybercriminals. But small- and mid-sized firms may face heightened risk, as they are often targets, not only themselves, but also for those trying to attack their customer base thro…

Read More
Productivity

Mimecast Partner Awards 2016 – A Night of Winners

Last week we saw two of the most important occasions in our UK channel world – this year’s UK Mimecast Partner Awards and CRN Fight Night 2016. This time, we were proud to sponsor fight night along with other tech brands such as AMD and Trend Micro.A…

Read More

The Real Reason LinkedIn 2012 Hack Credentials Are On Sale

Surely everyone changed their LinkedIn credentials in 2012, when the LinkedIn hack was made public right?Furthermore, most users would have doubled down on their credential security - changing their passwords to something complex and perhaps using a …

Read More
Security

Do You Know the Five Phases of a Whaling Assault?

It’s no secret that social engineering attacks, like phishing, spear-phishing and domain spoofing have grown from being a nuisance to a colossal problem. But, perhaps the most colossal problem of the moment is Business Email Compromise, otherwise cal…

Read More
Archiving

Mimecast Wins Big at MES East

 Stop me if you’ve heard this one: my first week at Mimecast went so well that my manager sent me to Indianapolis for the state’s presidential primary. Full disclosure: Indiana’s presidential primary happened to coincide with the 2016 Midsize E…

Read More
Productivity

Mimecast’s Partner Program Gets a 5-Star Rating, ‘Channel Chief’ and ‘Woman of the Channel’ Wins

Mimecast’s U.S. Partner Program has been recognized by CRN in a few different areas for outstanding performance and growth. First, it has given Mimecast a 5-Star rating in its 2016 Partner Program Guide. The guide is the definitive listing of technol…

Read More
Security

Predictive Cybersecurity: Out with Garbage, In with Data

The answer to email cybersecurity threats isn't simple. The email threat vector is complex, and your company's on-premises and DIY security solutions aren't always enough against the determined and advanced cybercriminal.Achieving truly proactive pro…

Read More
Continuity, Office-365

Be Prepared: Top 5 Questions to Ask to Ensure Continuity in the Cloud Email Era

Microsoft® Office 365™ is proving popular and adoption continues to accelerate. A recent Gartner study found that 78 percent of IT decision makers say their organization is already using or is planning to use Office 365. This is 13 percentage po…

Read More
Security

Cybersecurity and Psychology of Whaling

There's a new threat in cybersecurity and it's aimed at the business world's biggest targets. The FBI estimates that Business Email Compromise (BEC) – CEO fraud or "whaling" - increased more than 270%.The FT reports total potential global losses incr…

Read More
Productivity, Security

Are You a Nervous IT Security Pro or an Equipped Veteran?

You think you’re prepared to deal with cybersecurity threats. But, what if your organization became the target of a whaling attack, spear-phishing or weaponized attachment? These are just a few methods hackers and cybercriminals use to steal confiden…

Read More
Security

Mimecast Welcomes Email Privacy Act

Mimecast welcomes a new bill designed to protect emails and other electronic communications.   Can you remember the world in 1986? Aliens, Top Gun and Labyrinth were on at the movies and brick phones weighed the same as a bag of sugar. The …

Read More
Productivity

Healthcare Orgs Don’t Have to Fear the Cloud: Mimecast HIPAA Compliance Verified

Cybercriminals use email as a gateway for data breaches. This is not old news. New cyberattacks happen almost daily across all industries. The bad news is, the speed of innovation for email threats has skyrocketed in the last year. If you don’t …

Read More
Security

Trust Matters at Mimecast

Mimecast recently announced it has completed two important security tests: the Health Insurance Portability and Accountability Act (HIPAA) Security Compliance Assessment and Service Organization Control 2 Type 1 (SOC 2 Type 1) Independent Servic…

Read More
Security

Another Tax Year. A New Email Scam to Watch out For

This time, the threat is not from an African prince but your own CEO or CFO.  The 2016 tax season has been marked again with the expected number of spammy cyberattacks – the bad guys taking advantage of the time of year to target taxpayers by pr…

Read More
Security

Today, Technology Can Help Stop Whaling Email Attacks

Today we launched the world’s first service designed specifically to stop whaling (CEO fraud) attacks.Since previewing it at the RSA Conference in March, we’ve had a lot of interest in Impersonation Protect. And, as part our commitment to continuous …

Read More
Security

Obama’s $19B for Cybersecurity: Please Spend Wisely

We should welcome the move by Obama’s administration to go after more funding – defending the nation from the growing threat of cyberattacks has to be a priority for any world government. The focus on more money for improving private, public and…

Read More
Productivity, Security

IT Security Is a Team Sport

It seemed clear to a lot of the speakers and delegates at the recent RSA Conference that protecting organizations from cyberattack is not just the responsibility of the IT security team. Shared responsibility is the expression on everyone's lips.Many…

Read More
Security

Your People Are Under Cyber-attack – It Just Makes Economic Sense

 Protecting yourself from cyber-attack used to be about technology. But I have heard it repeated time and time again this week at the industry’s annual go-to security event, RSA Conference in San Francisco, that this is not enough. Spear-ph…

Read More
Security

Cyber-Criminals Are Making Hay Exploiting CEOs and CFOs

In recent months we have seen a growth in a new form of targeted attack in email specifically aimed at defrauding CEOs and CFOs, and duping their teams into wiring cash to cyber-criminals and hackers. These Business Email Compromise (BEC) or so-calle…

Read More
Productivity, Security

Join a Security Team - Be Part of Something Important

I am in San Francisco this week for the annual security event, RSA Conference. This year, aside from the normal discussions about attacks and defense techniques and technology, the industry has returned again to a topic close to my heart:  Skill…

Read More
Security

RSA Conference Day One in Words and Phrases

I sat through an interesting first day of keynotes yesterday and a pattern quickly revealed itself in the speeches or comments of the many and varied speakers. So, I thought I would pen my own quick summary. I will resist the temptation to creat…

Read More
Security

How to Protect Employees from Whaling Email Attacks

Whaling, CEO Fraud and Business Email Compromise pose many risks to organizations around the world.These email attacks use simple social engineering with eloquent affect to trick employees into handing over critical data or into making fraudulent fin…

Read More
Security

RSA 2016: A Seismic Week in Security

 As the RSA Conference team gears up for their 25th  year anniversary gala I’m proud to say that my 16 years  in the information security industry has provided me the opportunity to participate at various levels, including a run as the…

Read More
Productivity, Continuity, Security

65 Percent of IT Security Experts Feel Unprepared to Defend Against Email-Based Attacks

Today, we launched our new Mimecast Business Email Threat Report 2016. The survey of 600 IT security professionals shows that while 64 percent see email as a major cyber-security threat to their business, 65 percent also feel ill-equipped or too out-…

Read More
Security

BlackEnergy – The Trojan We Should be Talking About

Just before Christmas, half of the residents of the Ukrainian Ivano-Frankivsk region were left without electricity for hours. According to the Ukrainian news media outlet TSN, the cause of the blackout was a “hacker attack” utilizing a “virus” t…

Read More
Continuity

When Is an Outage Not a Priority?

When Microsoft Office 365 went down again last month, a painful truth emerged as the outage rolled on for several days – a big deal for your company is not always a big deal for Microsoft.There’s been repeated Office 365 cloud email outages recently,…

Read More
Archiving

How the Cloud Has Changed Email Archiving Forever

Organizations of all sizes, across all industries, rely on archiving solutions to preserve critical data for compliance and e-discovery, and email is a primary contributor to these systems. For archiving, we’ve historically relied on tapes, disc…

Read More

What’s in a Mail?

Email stationery seems to be one of the most valuable, yet under-utilized, pieces of business real estate available. Why is this so? Well, it’s generally a hazy area of responsibility that sits between IT and Marketing and is often given very little …

Read More
Productivity

CISO of 2016 – Balancing Prevention and Remediation

If last year’s leaks, hacks and breaches have taught us anything, be they from Fortune 500 companies or our own personal accounts – it is that cyber security, especially concerning email management, is now a top priority. Before we get further into w…

Read More