Archiving

Cloud Archiving: The Benefits of Super-Fast Email Searches

How fast search improves email discovery and law firm productivity You may think seconds count only in sports, medical emergencies or other crisis situations. But the fact is, seconds count at work, too. When you consider that the average user sends…

Read More
Security

Year in Review: Email Security in 2017

Security lessons learned from 2017 The headlines were filled with news of various types of big cyber attacks in 2017: WannaCry. In early 2017, this crypto ransomware impacted more than 200,000 computer systems at small businesses, multinational cor…

Read More
Security

What the Change in UK Government Email Domains Means for Email Security

All Change Please. Updating UK Government Email Domains The UK Government has recently announced the end to email domains with ‘.gsi’ in them. This move will also see the Government move away from the proprietary legacy infrastructure (Government Se…

Read More
Security

Trending in Email Security: December 2017

Missed the latest news in today’s email security world?  Having trouble keeping up with all the various news stories on email attacks? No problem! Mimecast has got you covered. Our Trending News blog series will bring you up to speed on recent …

Read More
Security

Cyber resilience: A foundation for digital transformation

Cyberattacks are inevitable. Close the cyber resilience loop. Security protection has long hinged on the idea of detecting and blocking threats. This approach has been so common that many companies focus on malware detection while neglecting the pol…

Read More
Security

The Mimecast Email Security Risk Assessment – December Release

December ESRA reports show a rise in impersonation attacks. We recently announced the 4th in a series of quarterly reports aggregated from our Email Security Risk Assessment (ESRA) testing program.  For those new to the Mimecast ESRA program, i…

Read More
Security

Mime Wars: Rogue User

A long time ago in an office far, far away… *horns – Ba-da-da-da-da duh-duh-dun dun dun dah* MimeWars7   Castor, a young Rebel officer toils away at his desk counting the parsecs *true fan only joke* until he can escape the monotony of labor. It…

Read More
Security

Getting Ready for Australia’s NDB

Australia’s Notifiable Data Breach regime is just weeks away. Are you ready? It may seem like there is a lot of time until Australia’s Notifiable Data Breach (NDB) regime kicks off – but there isn’t. As the festive season leads you to one Christmas …

Read More
Security

Healthcare Provider Survey Finds Email Most Likely Source of Data Breach

Security in the healthcare industry is receiving a great deal of attention and for good reason. From the fear of medical devices being taken over, to operational disruptions that impede patient care, the impact of a cyberattack can be far-reaching wi…

Read More
Security

‘Tis the season for email fraud – so don’t open the wrong package

Everyone loves a gift, but many appealing-looking emails turn out to be lumps of coal Like clockwork, the end of the year marks the winding down of the Australian business year and the start of the silly season. Black Friday and Cyber Monday shoppin…

Read More
Archiving

Migrating to a new archive data solution doesn’t have to be hard

Data Archiving Myth #5: “Migrating Legacy Archive Data Must Be a Royal Pain, Right?” I’ve been putting this off because I think it’s going be such a pain. If you’ve heard this little voice inside your head, you’re not alone. Many IT pros loathe the …

Read More
Continuity

Office 365 Email Outage Protection

All clouds have bad days. Are you prepared?  You’ve migrated your company to Office 365™ for the benefits that come with moving to the cloud. But even with the cost savings and agility that can come from a cloud-based email solution, there’s on…

Read More
Archiving

Cloud Archiving Solutions for Compliance And E-discovery

Cloud archiving saves money and takes the sting out of e-discovery and compliance. Most organizations have a lean IT team.  Some might say that they “spread their peanut butter too thin.” Running e-discovery queries and chasing compliance requi…

Read More
Office-365

Office 365 Email Security – How to Face the Challenges

Mitigate risk while moving to the cloud. If there’s one thing IT professionals can agree on, it’s that the cloud is impacting every aspect of their business. As a result, email is undergoing a fundamental shift as organizations transition from on-pr…

Read More
Security

Be Prepared: Cyber Security for Higher Education

Cyber Security for Higher Education: What Colleges & Universities Need to Know Institutions of higher learning don’t just disseminate knowledge, they store it. Extensive data repositories hold proprietary information about vital scientific and a…

Read More
Archiving

How Enterprise Archiving Improves E-Discovery

Power Up Your E-Discovery Search by Migrating Your Legacy Archive Data “Migrating legacy archive data to the cloud and additional platforms that are properly secured can provide quick and easy access to important data necessary for the operation of …

Read More
Security

Find Your Weakest Link to Protect Against Malware

Malware everywhere. With 40,000 employees in 140 countries and 1200 staff in Australia alone, “You don’t have to look too far to find examples” of the methods email fraudsters are using today, Grant Thornton information security manager Gavin Townse…

Read More
Security

Defend Against Malicious Email Attachments and Malware

Think your users would never fall for an email scam? Think again. According to Verizon’s Data Breach Investigation Report for 2017, two-thirds of cybersecurity breaches are caused by malware installed by malicious email attachments, and 43 percent o…

Read More
Archiving

Leading Today with Tomorrow’s Archive

Mimecast Named a Leader in EIA Magic Quadrant for 3rd Year in a Row. As data grows, compliance challenges evolve and organizations demand more value from their data, the importance, and use of enterprise information archiving (EIA) technology is per…

Read More
Archiving, GDPR

5 Reasons Your Archive Data Solution Will Do You Wrong

The Bitter Truth: Why your legacy data archiving solution is bound to let you down You’ve put a lot of trust in your legacy file archiving solution. And back in the day, it was worthy of it. But your old system isn’t trustworthy in a changing landsc…

Read More
Office-365

Choosing the Right Remedy for Office 365 Security Gaps

There’s more than just security concerns when it comes to Office 365 In a global survey of 600 IT professionals, nearly half characterized themselves as “highly concerned” about email security gaps in Microsoft Office 365TM. Not surprisingly, 9…

Read More
Archiving

When Good Chains of Custody Go Bad: 3 Data Governance Horror Stories

Ensure your email chain of custody against both outside and inside attacks Maintaining a secure chain of custody of your email archives is an essential element of effective data governance. Chain of custody ensures that all archived data is handled …

Read More
Security

Protecting the Healthcare System from Cyberattacks

Healthcare Cybersecurity Task Force Recommends New Ways to Protect from Cyberattacks. Last year HHS established the Health Care Industry Cybersecurity Task Force following the passage of the Cybersecurity Act of 2015. The Task Force was composed of …

Read More
Archiving, Continuity, GDPR

Not Just a Nice to Have. 7 Reasons an All-in-One Cloud Archive Is a Business Necessity

An all-in-one cloud archive is a difference-maker for your business. There is one answer to all the email archiving problems you have: the cloud. And there are seven reasons why: 1. Simplicity: My business is complex enough. Data: 59% of businesses …

Read More
Security

KnockKnock Cyberattack Exposes Key Security Concerns with Office 365

KnockKnock. Who’s There?  The latest attack on Office 365 The recently disclosed Knockknock attack brings up a few key lessons on Office 365 security. Broadly used platforms make easy targets for attackers As the popularity of a platform rises,…

Read More
Security

Cyberattacks on K-12 School Systems: Are you Ready?

What You Can Learn from Recent Cyber Attacks Targeting School Systems  Just after the school year commenced, Steve Bradshaw, superintendent of the Columbia Falls, Montana, schools got a menacing text from a number he didn’t recognize. The cyber…

Read More
Security

AEHIS 2017 Fall Summit: The “Inside Track”

Bringing Healthcare CISOs Together to Discuss Security Risk Management As a strategic advisor to Mimecast and planning committee member of the 2017 AEHIS/CHIME event in San Antonio, I see firsthand how healthcare IT security leaders are challenged d…

Read More
Office-365

Making Office 365 Safer for Business

For the past 20 years, every time you deployed an Exchange environment, you surrounded it with an ecosystem of third-party solutions to bolster its capabilities and enhance the overall solution.  You added a secure gateway solution, a backup/rec…

Read More
Security

The Real Advantage of Moving Your Security Controls to the Cloud

The “Network Effect” It is not exactly news that most security controls, particularly those that are traditionally thought of as network-centric ones (versus endpoint centric ones), are moving to the cloud.  Many think that this is occurring b…

Read More
Archiving

Don't Rush Legacy Archive Migration – Two Big Reasons Why

Why You Don’t Want to Rush the Migration of Legacy Archive Data Everybody’s hopping on the cloud bandwagon. Data from Gartner, Inc., estimates the global market for public cloud services will increase 18% percent in 2017 to $246.8 billion. And a lot…

Read More
Security, GDPR

Equifax Breach: Tips for email security and GDPR compliance

What Your Business Can Learn from the Equifax Breach With some 145.5 million people around the globe victimized by the Equifax breach, it’s easy to focus on that enormous number. But there’s another figure looming out there: regulatory fines. These …

Read More
Security

An Effective Cyber Resilience Strategy for Healthcare

HELPING HEALTHCARE PROVIDERS UNDER CYBER ATTACK The healthcare industry is under cyber attack. It is the victim of high-profile ransomware attacks - in some cases, such as the recent WannaCry outbreak, entire hospital operations have been shut down.…

Read More
Archiving

Archiving Today - Your Digital Memory

Get Ready to Think Differently About Archiving What does the word “archive” mean to you? Something that is old, musty and boring? Or maybe a necessary evil required to maintain compliance and e-discovery requirements? Perhaps archive means expensive…

Read More
Archiving

Mimecast Behind the Scenes - From Silicon Valley to the Cloud

Amanda Crew makes working with Hollywood A-listers awesome. To help take our upcoming virtual event to new heights, Mimecast enlisted Amanda Crew from the hit HBO® show Silicon Valley to present typical archive fails that organizations deal with on…

Read More
Archiving

Office 365™ Isn’t the Archiving Powerhouse You Think It Is

Office 365 doesn’t actually provide all the archiving capabilities you need. No Joke: Office 365™ Isn’t Really an Archiving Solution Perception: I’m good. I’ve got Office 365. Reality: Not so fast. Literally. Office 365 is hamstrung by a legacy Exch…

Read More
Archiving

Myth Busted: I Don’t Need Archiving, I’ve Got the Cloud

News Flash: Cloud storage and cloud email archiving aren’t the same thing Cloud storage is great, but it’s not the same thing as cloud archiving. Perception: My business won’t need archiving once we move to the cloud. Reality: Um, no. Storage just h…

Read More
Archiving

Only Legal & Risk Pros Use Email Archiving. Wrong!

Why you might be wrong about the enterprise-wide value of email archives. How One Myth about Email Archiving Can Hamstring Your Entire Company Perception: Archiving only benefits our Legal and Risk Management Officers Reality: The right email archiv…

Read More
Archiving, GDPR

Why E-discovery & Compliance Matter for Every Business

You’re Wrong. Your Business *Does* Need to Worry About E-Discovery & Compliance Every business needs an email archive software, even yours. Perception: My business doesn’t need to worry about e-discovery or compliance Reality: Oh, yes it does. S…

Read More
Archiving

Cloud Archiving: Perception vs. Reality

Perception vs. Reality: Get the facts about cloud archiving Are misconceptions about cloud email archiving holding you and your organization back? Don't be that guy or gal basing your success on alternative facts. We tackled four of the biggest misp…

Read More
Archiving

How to Accelerate E-Discovery

Be more productive during e-discovery with faster access to archive data Speed is essential for enabling efficient e-discovery. The longer it takes, the more at risk you are of missing deadlines or running afoul of court-ordered requests. “The most …

Read More
Security

Yahoo Breach: Don’t let a Good Crisis go to Waste

The Key Takeaway from the Yahoo Breach Breaches are now material to the survival of an organization With every breach, heavily publicized or not, there are always takeaways available to those that are interested in learning from them.  Yahoo an…

Read More
Archiving, GDPR

Streamline Workflows with Cloud Archiving

Super-Charge Productivity & Efficiency with Email Archive Solutions If you’re looking for a way to make your entire organization more productive and efficient – and who isn’t? – look to the cloud. Cloud email archive solutions enable you to strea…

Read More
Security

The Challenge of Keeping Patient Data Secure

6 Takeaways from the Becker’s Hospital Review 3rd Annual Health IT and Revenue Cycle Conference The Becker's Hospital Review 3rd Annual Health IT + Revenue Cycle Conference, held recently in Chicago, brings together hospital and health system chief …

Read More
Archiving

How to Revolutionize Email with Cloud Archiving

Email Archivers: How to Stop Worrying and Love the Cloud Sick of the endless hunt for data in your email archives? Tired of wasting time with slow search for email? Confounded by the spiraling cost and complexity of archive data solutions? Concerned…

Read More
Archiving

Automate E-discovery with an Enterprise Information Archiving Solution

Improve archiving speed and security for e-discovery and compliance Enterprise Information Archiving Automates e-Discovery We’re all striving to accomplish more in less time. Automated solutions relieve us from important-but-tedious, repetitive or b…

Read More
Security, Office-365

Email Security Shouldn’t Be an Afterthought When Moving to Cloud-Based Email

When moving to cloud-based email, security fears are at the forefront.  The move to Microsoft Office 365TM is driven by the benefits of transitioning to a cloud-based solution, including reduced hardware and maintenance costs. At the same time,…

Read More
Security

A Must Have Cyber Resilience Strategy for Kenya

Why Kenya needs to adopt a cyber resilience strategy right away   Kenya is enjoying a tech boom, which is clearly aiding the growth of its economy. However, with digital maturity comes increased risk, and industries often don’t realise that as …

Read More
Security, GDPR

National Health Service Cyber Security Fears and Resilience Strategy

NHS IT Leaders losing sleep over GDPR and cybersecurity fears  Makes you WannaCry Cyber-attacks like the WannaCry incident which crippled many National Health Service (NHS) trusts in May this year brought into sharp focus the aging IT infrastru…

Read More
Continuity

Office 365 Is Down, Again

Monday Blues for Office 365 Users  Office 365 down Employees logging on to Office 365 on Monday found that they were unable to send or receive emails - not the start of the week that many were expecting. Microsoft confirmed that some Office 36…

Read More
Security

Improving Care for Protected Health Information

The nature of the critical care that healthcare provides necessitates that providers be custodians of highly sensitive patient data. It’s just impossible to imagine a scenario where highly skilled medical staff wouldn’t have access to personal and m…

Read More
Archiving

Why a Single-Pane View is Critical in Hybrid Mail Environments

When Visibility into Your Mail Archive Is Cloudy, So Is Your Business Outlook The “single pane of glass” concept isn’t new, but it has new importance in the age of cybersecurity. If you can’t see what’s in your data center archive and the actions be…

Read More
Archiving

Archived Email Data Governance: 4 Things You Need to Know

An effective data governance solution offers a strategic advantage Data governance is often thought of as a “check-the-box kind of thing”, according to Achmad Chadran, an archiving product marketing manager for Mimecast. It’s required, but, generall…

Read More
Archiving

The 5 Biggest Challenges of Mobile Email Management

Cloud archiving addresses The many CHALLENGES of mobile email management  It’s hard to imagine getting through the day without using a cloud email service. Just keeping up with our own accounts is the tip of the iceberg. Mobile email management…

Read More
Archiving

The 7 Worst Outcomes When Your Legacy Archive Solution Goes Down

What happens when your archive data solution has an #epicfail? Despite the popularity of the Worst Case Scenario franchise, few of us want to consider all the things that can go wrong when our legacy archiving solution is offline. Sure, we have rapi…

Read More
Security

How to Prepare for and Respond to an Email-Based Attack

This is not a drill.  Your email is under attack. Is your organization prepared? How will they respond?   No matter how well you prepare technically for and educate and train your team on cyber resilience, at some point you’re going to e…

Read More
Security

3 Tips for Expanding your Organization’s Advanced Security Strategy

With a leadership team in place and a set of known and likely email security threats identified, you’re ready to build out your advanced security strategy. 1. Engage all departments and levels. Make cybersecurity relevant for employees up and down t…

Read More
Security

5 Steps for Launching an Advanced Security Awareness and Training Initiative

  “Ultimately, the security chain is as strong as its weakest link and once a cybercriminal has compromised one account – even a junior employee – they can then leverage that account and move upwards through the organization, eventually getting…

Read More
Security

Advanced Security, Know the Data

Key Data on Why Cybersecurity is Everyone’s Business Cybersecurity is an emotional issue even for the toughest business executive – so much so that the fear of getting hacked may not be enough to override the fear of borrowing trouble. It can be eas…

Read More
Security

Introducing the ROPEMAKER Email Exploit

ROPEMAKER Email Security Weakness - Vulnerability or Application Misuse? Most people live under the assumption that email is immutable once delivered, like a physical letter.  A new email exploit, dubbed ROPEMAKER by Mimecast’s research te…

Read More
Archiving

Cloud Archiving for E-Discovery: Important Factors

How to Choose the Right File Archiving Solution  Choosing the right archiving software is critical to improving e-discovery and compliance. “If archiving is poorly performed, organizations can find themselves spending tens of thousands of dolla…

Read More
Archiving

Tips for Improving Enterprise Archiving

A Few Important Steps on the Path to Better Data Governance Properly archived data is essential for effective data governance Let’s talk data governance here – and let’s start with a definition of the term. According to the Data Governance Institute…

Read More
Security

One Internet Minute, Millions of Opportunities for Cybercrime

High volumes of email and social media posts increase the risk of cybercrime Every minute, we’re handing hackers and other cybercriminals everything they need to take advantage of us. According to data published in the Business Insider, there’s a lo…

Read More
Security, GDPR

UK Data Protection Laws Update: How it affects US business

What you need to know about proposed updates to UK data protection bill. The UK Government recently announced its intent to install a set of sweeping updates to existing data protection law to “reflect the changing nature and scope of the digital eco…

Read More
Security

Prioritizing Cyber Resilience Preparedness

Cyber Resilience Preparedness:   Why it Needs to be a Priority Email-borne threats are on the rise. Surely, you haven’t forgotten about the recent Petya and WannaCry global malware outbreaks? According to new data from Vanson Bourne and Mi…

Read More
Security

Transforming your Organization into a Cyber Resilience Team

Educating your entire organization on advanced security.  Cybersecurity isn’t just a concern for your IT department. In fact, every employee who accesses the cloud interacts with the Internet of Things or opens an email is an important member o…

Read More
Security

Take 3: Email Security Risk Assessment Program

As promised in my last ESRA update blog, we are now ready to drop our third quarterly release on you. But before I get into the details of this ESRA report let me explain what the Mimecast Email Security Risk Assessment program is all about.  In…

Read More
Security

Dear Modern Business: Sincerely Future Hacker

    Dear Modern Business: Sincerely Future Hackers In Mimecast’s SlideShare presentation, we want to share with you a view from a hacker into the modern day cadence, and help you understand how their minds work so you can be prepared for a…

Read More
Archiving, Security, Office-365

5 Reasons Why You Need Sync & Recover for Exchange and Office 365

  Sync & Recover intro   We at Mimecast are announcing a new archiving feature. It’s called Sync & Recover for Exchange and Office 365. Sync & Recover is designed to simplify the process of recovering email and other Exchange da…

Read More
Archiving, Continuity

Introducing Mimecast Sync & Recover. A new approach to Office 365 Data Protection

Email Data Recovery from Mimecast: Solving an Industry Disconnect According to new data from Vanson Bourne, commissioned by Mimecast, nearly 80 percent of respondents said the ability to back up and recover email data is “very important.” However, o…

Read More
Security

Data Protection Regulation is Coming to Australia

Preparing for new Australian data protection regulations Embarrassing data breaches and crippling cyberattacks During 2016, Australia recorded the highest number of data breaches in the Asia-Pacific region, which included some high profile organisati…

Read More
Security

Countdown to a Ransomware Breach

Countdown to a Breach: Time, the Luxury no business can afford. In this SlideShare presentation Mimecast experts, Bob Adams and Matthew Gardiner, demonstrate to you just how precious your time really is. Having a ransomware protecti…

Read More
Security

Email Protection Tips: Training, Technology, Good Sense

Email Security Requires a Multi-Front Approach “It was a dark and stormy night, on a lonely stretch of road …” Thus begins your stereotypical crime novel. But let’s discuss an entirely different crime – fact, not fiction – that most commonly transpi…

Read More
Security

5 Types of Ransomware Scams to Monitor

Top 5 Ransomware Scams to Watch Out For To combat the ransomware epidemic, everyone at your organization needs a “general understanding of what cyber threats look like, how we can follow best practices, and that it’s really up to all of us to help ke…

Read More
Security

Cybercrime Crisis Management: Communications Plans

Cybercrime Response: Why you need a crisis communications plan Before you brush me off, let’s take a quick look at some sobering numbers related to poor cybercrime crisis communications management, shall we? 46% of companies have experienced reputati…

Read More
Security

Trending in Cybersecurity: June 2017

Missed the latest news in today’s cybersecurity world? Having trouble keeping up with all the various news stories on ransomware? No problem! Mimecast has got you covered. Our Trending News blog series will bring you up to speed on recent i…

Read More
Archiving, Security, GDPR

GDPR Compliance – The Final Stretch

Tooling up for GDPR, the clock is ticking In less than 12 months the new EU-wide General Data Protection Regulation (GDPR) comes into force. Organizations around the globe will need to introduce privacy policies and security controls to protect the …

Read More
Europe, Continuity, Office-365

Office 365 Goes Down for Third Summer in a Row

For the second consecutive June 30th, Office 365 has had a disruption to the service. As reported in The Inquirer, users across Europe were having difficulty logging into services. Have you ever wondered what’s going on with the Office 365 services y…

Read More
Continuity, Security

Petya Ransomware – An Action Plan To Improve Your Cyber Resilience Against This Latest Mass Outbreak

Ransomware deja vu  The global reach and considerable impact of the current Petya ransomware outbreak bears a remarkable similarity to the WannaCry attack of just a few weeks ago.  This outbreak should serve a…

Read More
Security

How to Get Everyone Involved in Cybersecurity

Security professionals have a saying: “The attacker only has to be right once, we have to be right every time.” Translation? According to Jamie Winterton, director of strategy, ASU’s Global Security Initiative, it’s a call to action across the organi…

Read More
Archiving, Security, GDPR

5 Cybersecurity Challenges for Law Firms

A new report published by Legal Week Intelligence, in association with Mimecast, Cybersecurity – The Race to Protect, sheds new light on the myriad technology challenges law firms currently face. The report, a product of a series of interviews with I…

Read More
Security

It’s Your Business: Email Wire Transfer Fraud

Your Guide to Business Email Wire Transfer Scams In March 2017, the U.S. Department of Justice charged a Lithuanian national with bilking two American tech companies out of $100 million, which they willingly wired to offshore bank accounts. He faked…

Read More
Productivity, Security

Are Your Privileged Credentials Compromised?

5 More Ways Hackers Try To Steal Your Organization’s Privileged Credentials Hackers have a large portfolio of tactics to get their mitts on your organization’s privileged credentials, and they’re creating more every day. In addition to the big 3 Ways…

Read More
Security

Your Privileged Credentials Are at Risk

3 Ways Hackers Try to Steal Your Organization’s Privileged Credentials A whopping 80% of security breaches involve privileged credentials, according to The Forrester Wave: Privileged Identity Management, Q3 2016.  Let’s look at the three most d…

Read More
Security

Updated Email Security Risk Assessment

The Mimecast Email Security Risk Assessment – Take 2 As promised at the time of our first release of our ESRA results, we are now dropping the 2nd release of our aggregated ESRA test results.  And if you are pessimistic about the efficacy of mos…

Read More
Archiving, Security, GDPR

Mimecast Case Review App for GDPR

Simplify GDPR queries with Mimecast Case Review App  Email remains the vital hub of business communications and continues to grow with over 225 billion business emails sent and received every day. Huge amounts of personal information are stored…

Read More
Security

Why It's Time To Do Away With Tradition

Email security against advanced threats. It’s time to ditch the old-fashioned defenses against today's highly sophisticated threats. Stay safe with Mimecast.  The latest cyberattacks demand the most up-to-date defenses. Ransomware , imperso…

Read More
Security

Cyberattack Protection For Small Businesses

Cyberattack Protection For Small Businesses It seems as of late the IT security professionals of the world are becoming increasingly unhappy with the security products and services they are using.  I have the pleasure of speaking at conferences …

Read More
Security

Mimecast Culture: Behind the Scenes with Email Security Experts in Our Newest Promo Trailer for InfoSec2017

This past week I had the pleasure of shooting a promo trailer for InfoSecurity Europe 2017 with Mimecast security experts  Bob Adams and Steve Malone. As I got these two crazy guys up and running, I knew we were on to something great. They had a…

Read More
Security

Trending in Cybersecurity: May 2017

Missed the latest news in today’s cybersecurity world? Having trouble keeping up with all the various news stories on ransomware? No problem! Mimecast has got you covered. Our Trending News blog series will bring you up to speed on recent industry n…

Read More
Productivity, Security

WannaCry Ransomware Outbreak

WannaCry? – Yes, I do! The general media, the Web, the Twitterverse, and my email has been alight over the past few days regarding the WannaCry ransomware outbreak.  And to answer the question in the name, yes I do wannacry!  Lit…

Read More
Security

WannaCrypt Ransomware – An Action Plan to Improve Your Cyber Resilience Defenses

WannaCry ransomware is a wake-up call for organizations and governments around the world. This on-going cyber threat will continue to adapt to take advantage of weaknesses in IT systems and procedures. New variants of this malware may cause even more…

Read More
Security

Should Recent Cyberattacks Concern You?

If You Don’t Like This Minute's Newsworthy Cyberattack, Wait a Few There Will be Another One In the last few days there has been no shortage of notable cyberattacks.  The so called Google Docs attack, the Gannet phi…

Read More
Security, GDPR

Four Burning Questions on GDPR

Tackling Four Burning Questions on GDPR and the Rise of Email-based Cybercrime  The deadline for compliance with the European Union General Data Protection Regulation (GDPR) is approaching fast. In our recent webinar GDPR and the Rise of E…

Read More
Security

Defining Your Cyber Resilience Philosophy

What does cyber resilience mean to you? The answer will surely vary across industries. And, to some, the term might not mean anything at all. In fact, according to new research from Vanson Bourne, not enough organizations are making cyber resilience …

Read More
Office-365

How to Keep Exchange Online Up and Running During an Outage

What’s Your Contingency Plan for an Exchange Online Outage?   This winter I was sitting in a hotel room in Boston watching a blizzard fall outside my window.  Not the worst situation I could be in (as I sipped my cup of coffee). …

Read More
Archiving

Pain in the Archive: Know the Symptoms

There’s an affliction infecting corporate counsels, compliance officers, and IT teams. It’s called Archivalgia or, more colloquially, “Pain in the Archive.”  Left unchecked, Archivalgia can do a world of damage. As with most diseases, recognizin…

Read More
Archiving, Security, GDPR

Creating a Cyber Resilient GDPR Strategy

 GDPR - An opportunity for positive change Imagine for a moment that you are the “rockstar” IT director of a Top 100 firm. You’ve just presented your plan to the board for major IT initiatives, which include a plan to support General Data Prote…

Read More
Security

Trending in Cybersecurity: April 2017

Missed the latest news in today’s cybersecurity world? Having trouble keeping up with all the various news stories on ransomware? No problem! Mimecast has got you covered. Our Trending News blog series will bring you up to speed on recent industry ne…

Read More
Productivity

Dealing With Email Disruptions

Mimecast recently completed a global survey on Exchange Online and the general importance of email across organizations with between 250 and 10,000 email users. We found that email continues to be the primary communication channel at these compa…

Read More
Office-365

The Benefits of Cloud Migration

The Great Migration Microsoft Office 365 offers a compelling business case to organizations - trade resource intensive on-premises infrastructure and software for services managed by Microsoft and delivered from the cloud. The rate of adoption tells …

Read More
Security

Can DMARC Stop All Business Email Compromise Attacks?

DMARC can only do so much.  If you think DMARC – Domain Message Authentication Reporting & Conformance – is the solution to defend against email spoofing, impersonation or business email compromise attacks, you would be only partially corre…

Read More
Security

Top Moments at RSA Conference 2017

Our promise to the industry was to engage, educate and provide valuable insight into major cybersecurity issues facing organizations around the world.  Here is a small recap of what happened at RSA Conference, so you can feel like you were able …

Read More
Security, GDPR

GDPR + Cybercrime: Is Email Part Of Your Compliance Strategy?

Crippling financial penalties and strict new privacy rules have grabbed most of the EU General Data Protection Act (GDPR) headlines so far. This is no surprise, given the sweeping nature of the act, but ahead of the May 2018 implementation date, it’s…

Read More
Security

The Mimecast Email Security Risk Assessment – Benchmarking Email Security Systems

Would it surprise you to learn that in recent testing Mimecast has seen a 13.2% false negative rate for incumbent email security systems?  Does your current email security system let through an inordinate amount of spam, malware, malicious URLs,…

Read More
Security

Introducing Mimecast Internal Email Protect

Internal threats not just from malicious insiders. When thinking of the people behind internal threats you need to be concerned about three profiles, not just one:   Compromised Insiders: These employees have had their accounts or systems take…

Read More
Security

5 Intriguing RSA Conference Sessions

The RSA Conference whirlwind is only days away.  Are you ready?  Is it possible to be ready?  Don’t forget to pack your Tylenol and your sensible shoes.  Like many of you, even though the conference is for a full week, my free tim…

Read More
Continuity

Mimecast Adds New Continuity Features to Monitor, Alert and Respond More Quickly to Mail Flow Disruptions

In a recent global survey of 600 IT decision makers, Mimecast found that 88% view email as critical to their organization with 55% saying email is mission-critical. This isn’t surprising; email is often the first thing we check in the morning and the…

Read More
Office-365

Mimecast’s 42 Questions with J.Peter Bruzzese

A long time ago, a supercomputer named Deep Thought concluded that the answer to the ultimate question to the meaning of life, the universe, and everything was 42. Although it took Deep Thought 7 and a half million years to&n…

Read More
Archiving

1992 Just Emailed; It Wants Its Archiving Architecture Back

Is your archiving solution out of date? Can we be honest? Most email archiving platforms in use today are obsolete. The way we use email today has completely changed, and these platforms no longer do what you need them to do.  Archiving solutio…

Read More
Security

Is Legally Requiring Good Security Practices a Good Thing?

Recently, the State of New York has taken steps towards passing the nation’s first cybersecurity regulation which explicitly tells financial organizations in New York what they must do in their security program.  You can read an overview of this…

Read More
Security

My 5 New Year’s Resolutions for Your Security Program

I realize it is a bit cheeky for me to make security resolutions for your security program, but I believe you will find these recommendations to be straightforward and highly actionable.  In no particular order: If you can’t do it, outsource i…

Read More
Productivity

MSP 2.0 Update from Mimecast

We recently announced some changes to our MSP program that will be effective from 1 April 2017. We understand that these are disruptive to some of our MSP partners, and we’ve received robust feedback since the announcement. So first I apologize for a…

Read More