Europe, Continuity, Office-365

Office 365 Goes Down for Third Summer in a Row

For the second consecutive June 30th, Office 365 has had a disruption to the service. As reported in The Inquirer, users across Europe were having difficulty logging into services. Have you ever wondered what’s going on with the Office 365 services y…

Read More
Continuity, Security

Petya Ransomware – An Action Plan To Improve Your Cyber Resilience Against This Latest Mass Outbreak

Ransomware deja vu  The global reach and considerable impact of the current Petya ransomware outbreak bears a remarkable similarity to the WannaCry attack of just a few weeks ago.  This outbreak should serve a…

Read More
Security

How to Get Everyone Involved in Cybersecurity

Security professionals have a saying: “The attacker only has to be right once, we have to be right every time.” Translation? According to Jamie Winterton, director of strategy, ASU’s Global Security Initiative, it’s a call to action across the organi…

Read More
Archiving, Security, GDPR

5 Cybersecurity Challenges for Law Firms

A new report published by Legal Week Intelligence, in association with Mimecast, Cybersecurity – The Race to Protect, sheds new light on the myriad technology challenges law firms currently face. The report, a product of a series of interviews with I…

Read More
Security

It’s Your Business: Email Wire Transfer Fraud

Your Guide to Business Email Wire Transfer Scams In March 2017, the U.S. Department of Justice charged a Lithuanian national with bilking two American tech companies out of $100 million, which they willingly wired to offshore bank accounts. He faked…

Read More
Productivity, Security

Are Your Privileged Credentials Compromised?

5 More Ways Hackers Try To Steal Your Organization’s Privileged Credentials Hackers have a large portfolio of tactics to get their mitts on your organization’s privileged credentials, and they’re creating more every day. In addition to the big 3 Ways…

Read More
Security

Your Privileged Credentials Are at Risk

3 Ways Hackers Try to Steal Your Organization’s Privileged Credentials A whopping 80% of security breaches involve privileged credentials, according to The Forrester Wave: Privileged Identity Management, Q3 2016.  Let’s look at the three most d…

Read More
Security

Updated Email Security Risk Assessment

The Mimecast Email Security Risk Assessment – Take 2 As promised at the time of our first release of our ESRA results, we are now dropping the 2nd release of our aggregated ESRA test results.  And if you are pessimistic about the efficacy of mos…

Read More
Archiving, Security, GDPR

Mimecast Case Review App for GDPR

Simplify GDPR queries with Mimecast Case Review App  Email remains the vital hub of business communications and continues to grow with over 225 billion business emails sent and received every day. Huge amounts of personal information are stored…

Read More
Security

Why It's Time To Do Away With Tradition

Email security against advanced threats. It’s time to ditch the old-fashioned defenses against today's highly sophisticated threats. Stay safe with Mimecast.  The latest cyberattacks demand the most up-to-date defenses. Ransomware , imperso…

Read More
Security

Cyberattack Protection For Small Businesses

Cyberattack Protection For Small Businesses It seems as of late the IT security professionals of the world are becoming increasingly unhappy with the security products and services they are using.  I have the pleasure of speaking at conferences …

Read More