Continuity

Office 365 Email Outage Protection

All clouds have bad days. Are you prepared?  You’ve migrated your company to Office 365™ for the benefits that come with moving to the cloud. But even with the cost savings and agility that can come from a cloud-based email solution, there’s on…

Read More
Archiving

Cloud Archiving Solutions for Compliance And E-discovery

Cloud archiving saves money and takes the sting out of e-discovery and compliance. Most organizations have a lean IT team.  Some might say that they “spread their peanut butter too thin.” Running e-discovery queries and chasing compliance requi…

Read More
Office-365

Office 365 Email Security – How to Face the Challenges

Mitigate risk while moving to the cloud. If there’s one thing IT professionals can agree on, it’s that the cloud is impacting every aspect of their business. As a result, email is undergoing a fundamental shift as organizations transition from on-pr…

Read More
Security

Be Prepared: Cyber Security for Higher Education

Cyber Security for Higher Education: What Colleges & Universities Need to Know Institutions of higher learning don’t just disseminate knowledge, they store it. Extensive data repositories hold proprietary information about vital scientific and a…

Read More
Archiving

How Enterprise Archiving Improves E-Discovery

Power Up Your E-Discovery Search by Migrating Your Legacy Archive Data “Migrating legacy archive data to the cloud and additional platforms that are properly secured can provide quick and easy access to important data necessary for the operation of …

Read More
Security

Find Your Weakest Link to Protect Against Malware

Malware everywhere. With 40,000 employees in 140 countries and 1200 staff in Australia alone, “You don’t have to look too far to find examples” of the methods email fraudsters are using today, Grant Thornton information security manager Gavin Townse…

Read More
Security

Defend Against Malicious Email Attachments and Malware

Think your users would never fall for an email scam? Think again. According to Verizon’s Data Breach Investigation Report for 2017, two-thirds of cybersecurity breaches are caused by malware installed by malicious email attachments, and 43 percent o…

Read More
Archiving

Leading Today with Tomorrow’s Archive

Mimecast Named a Leader in EIA Magic Quadrant for 3rd Year in a Row. As data grows, compliance challenges evolve and organizations demand more value from their data, the importance, and use of enterprise information archiving (EIA) technology is per…

Read More
Archiving, GDPR

5 Reasons Your Archive Data Solution Will Do You Wrong

The Bitter Truth: Why your legacy data archiving solution is bound to let you down You’ve put a lot of trust in your legacy file archiving solution. And back in the day, it was worthy of it. But your old system isn’t trustworthy in a changing landsc…

Read More
Office-365

Choosing the Right Remedy for Office 365 Security Gaps

There’s more than just security concerns when it comes to Office 365 In a global survey of 600 IT professionals, nearly half characterized themselves as “highly concerned” about email security gaps in Microsoft Office 365TM. Not surprisingly, 9…

Read More
Archiving

When Good Chains of Custody Go Bad: 3 Data Governance Horror Stories

Ensure your email chain of custody against both outside and inside attacks Maintaining a secure chain of custody of your email archives is an essential element of effective data governance. Chain of custody ensures that all archived data is handled …

Read More
Security

Protecting the Healthcare System from Cyberattacks

Healthcare Cybersecurity Task Force Recommends New Ways to Protect from Cyberattacks. Last year HHS established the Health Care Industry Cybersecurity Task Force following the passage of the Cybersecurity Act of 2015. The Task Force was composed of …

Read More