Security

Mimecast Goes Mainstream Series: Jeremy Piven Talks Advanced Phishing Attacks

Telling the story of who your company is, and what you do is a consistent struggle for any business. As the nature of cyberattacks continues to evolve and get more interest beyond IT and Infosec, we here at Mimecast took an approach to…

Read More
Security

Planning for Tomorrow’s Cyberattacks

The end of a year is often a time of reflection as organizations focus on what they might do differently in the year to come, how they might align themselves against their competitors, and up their game. As organizations think through their cybe…

Read More
Security

Why Cyber Resilience in Today's Complex Environment Requires an Integrated Ransomware Solution

More than 50 new types of malware used in ransomware attacks were released in the first half of 2016 alone. The pace of ransomware attacks is escalating. Nearly 40% of companies have been hit with ransomware attacks this year, and the …

Read More
Security, Office-365

Never Be a Ransomware Hostage

What often impacts more than 100,000 computers a day, and can cost you thousands of dollars in remediation, downtime, and cleanup cost? Ransomware. In a ransomware attack, you are literally held hostage and denied access to critical productivit…

Read More
Archiving, Data Protection

Six Critical Considerations for Exchange Online Archiving

Adoption of Office 365 continues to grow rapidly, adding 50,000 customers a month, with Exchange email remaining the number one workload. At the same time, increasing regulation, litigation, and operational drivers necessitate the need for speedy, a…

Read More
Productivity

Roadshow Podcast- Episode 2

Episode 2: Lunch Event at the Palms - Nashville, TN J Peter Roadshow Podcast - Episode 2   Q: J. Peter, where are you? A: Greetings!  J .Peter here and this week I’m in Nashville Tennessee.  When I think of Nashville I think of c…

Read More
Security

Four Tips to Defend Against the Malicious Insider

I am in the middle of my second week here at Mimecast and am excited to focus on all things security. The timing of my arrival is good as we just released  important new data around malicious insiders. Here’s my take on the topic … The…

Read More
Office-365

Road Show Podcast: Episode 1

Episode 1:  Microsoft Worldwide Partner Conference in Toronto, Canada JP-Roadshow-Toronto   Q: J. Peter, where are you? A: Greetings! This week I’m in Toronto Canada. Toronto is an interesting place to visit. Whenever I visit a city I …

Read More
Office-365

Road Show Podcast 2016

Get ready as Mimecast travels the world in a “Road Show” with J.Peter Bruzzese, a Microsoft MVP. Listen to each episode as he works with us to help share his experiences. He’ll be starting July 11th in Toronto, Canada and ending on December 9th in Or…

Read More
Security

Mr. Robot Highlights the Price Point Temptation of Email Ransomware

“5 days for a banking system to be down? That’s a lot of money down the drain… We can’t afford this hack right now… And frankly I think we can find 5.9million in between our couch cushions. It’s nothing.” -…

Read More
Continuity, Office-365

Be Prepared: Top 5 Questions to Ask to Ensure Continuity in the Cloud Email Era

Microsoft® Office 365™ is proving popular and adoption continues to accelerate.  A recent Gartner study found that 78 percent of IT decision makers say their organization is already using or is planning to use Office 365. This is 13 percentage p…

Read More
Security

Cybersecurity and Psychology of Whaling

There's a new threat in cybersecurity and it's aimed at the business world's biggest targets. The FBI estimates that Business Email Compromise (BEC) – CEO fraud or "whaling" - increased more than 270%.The FT reports total potential global losses incr…

Read More
Security

Mimecast Welcomes Email Privacy Act

Mimecast welcomes a new bill designed to protect emails and other electronic communications.   Can you remember the world in 1986? Aliens, Top Gun and Labyrinth were on at the movies and brick phones weighed the same as a bag of sugar. The …

Read More
Security

Obama’s $19B for Cybersecurity: Please Spend Wisely

We should welcome the move by Obama’s administration to go after more funding – defending the nation from the growing threat of cyberattacks has to be a priority for any world government. The focus on more money for improving private, public and…

Read More
Security

RSA Conference Day One in Words and Phrases

I sat through an interesting first day of keynotes yesterday and a pattern quickly revealed itself in the speeches or comments of the many and varied speakers.  So, I thought I would pen my own quick summary. I will resist the temptation to crea…

Read More
Security

How to Protect Employees from Whaling Email Attacks

Whaling, CEO Fraud and Business Email Compromise pose many risks to organizations around the world.These email attacks use simple social engineering with eloquent affect to trick employees into handing over critical data or into making fraudulent fin…

Read More
Security

RSA 2016: A Seismic Week in Security

 As the RSA Conference team gears up for their 25th  year anniversary gala I’m proud to say that my 16 years  in the information security industry has provided me the opportunity to participate at various levels, including a run as the…

Read More
Productivity

CISO of 2016 – Balancing Prevention and Remediation

If last year’s leaks, hacks and breaches have taught us anything, be they from Fortune 500 companies or our own personal accounts – it is that cyber security, especially concerning email management, is now a top priority. Before we get fu…

Read More