Security

5 Steps for Launching an Advanced Security Awareness and Training Initiative

  “Ultimately, the security chain is as strong as its weakest link and once a cybercriminal has compromised one account – even a junior employee – they can then leverage that account and move upwards through the organization, eventually getting…

Read More
Security

Advanced Security, Know the Data

Key Data on Why Cybersecurity is Everyone’s Business Cybersecurity is an emotional issue even for the toughest business executive – so much so that the fear of getting hacked may not be enough to override the fear of borrowing trouble. It can be eas…

Read More
Security

Introducing the ROPEMAKER Email Exploit

ROPEMAKER Email Security Weakness - Vulnerability or Application Misuse? Most people live under the assumption that email is immutable once delivered, like a physical letter.  A new email exploit, dubbed ROPEMAKER by Mimecast’s research te…

Read More
Archiving

Cloud Archiving for E-Discovery: Important Factors

How to Choose the Right File Archiving Solution  Choosing the right archiving software is critical to improving e-discovery and compliance. “If archiving is poorly performed, organizations can find themselves spending tens of thousands of dolla…

Read More
Archiving

Tips for Improving Enterprise Archiving

A Few Important Steps on the Path to Better Data Governance Properly archived data is essential for effective data governance Let’s talk data governance here – and let’s start with a definition of the term. According to the Data Governance Institute…

Read More
Security

One Internet Minute, Millions of Opportunities for Cybercrime

High volumes of email and social media posts increase the risk of cybercrime Every minute, we’re handing hackers and other cybercriminals everything they need to take advantage of us. According to data published in the Business Insider, there’s a lo…

Read More
Security, GDPR

UK Data Protection Laws Update: How it affects US business

What you need to know about proposed updates to UK data protection bill. The UK Government recently announced its intent to install a set of sweeping updates to existing data protection law to “reflect the changing nature and scope of the digital eco…

Read More
Security

Prioritizing Cyber Resilience Preparedness

Cyber Resilience Preparedness:   Why it Needs to be a Priority Email-borne threats are on the rise. Surely, you haven’t forgotten about the recent Petya and WannaCry global malware outbreaks? According to new data from Vanson Bourne and Mi…

Read More
Security

Transforming your Organization into a Cyber Resilience Team

Educating your entire organization on advanced security.  Cybersecurity isn’t just a concern for your IT department. In fact, every employee who accesses the cloud interacts with the Internet of Things or opens an email is an important member o…

Read More
Security

Take 3: Email Security Risk Assessment Program

As promised in my last ESRA update blog, we are now ready to drop our third quarterly release on you. But before I get into the details of this ESRA report let me explain what the Mimecast Email Security Risk Assessment program is all about.  In…

Read More