Security, Awareness Training

How Long is Too Long to Wait to Change Cybersecurity Strategies?

Malware can stick around for years. Wine, whiskey and cheese are all things we know and love but take notoriously long to achieve their optimal performance (read taste/cost). Malware on the other hand that is active for years inside your infrastruct…

Read More
Security, Email Security

What’s Going to Change in Cybersecurity in 2019 (and What Won’t)

Many things in cybersecurity that should happen in 2019 won’t. Learn why. Every year, we reach December and industry experts share their predictions and tell the world what the biggest trends will be for the following year. In the security ind…

Read More
Security, Email Security

New Phishing Emails Posing as Office 365 Non-Delivery Messages

You can fight back with a cyber resilience approach. Cyberattackers will try anything to get into enterprise networks. With the movement of many applications to the cloud, new creative techniques seem to appear every day. Users of Microsoft Office 3…

Read More
Security, Email Security

Sandboxing Technology: Why Good vs. Bad Isn’t Enough

Here’s the backstory on Mimecast’s new acquisition, Solebit. Editor's note: Earlier this year, Mimecast acquired Solebit, a company with technology geared toward static file analysis malware detection. As explained here, Mimecast had alr…

Read More
Security, Email Security

December ESRA Report: Aggregate False Negative Rate of Incumbent Email Security Systems is 12%

Learn more in Mimecast’s latest Email Security Risk Assessment Report Is a false negative rate of 12% a large number or a small one? I suppose it depends on your perspective. If your email security system lets in 12 unwanted emails—wheth…

Read More
Security, Awareness Training

Insider Threats Personified – The Well-Intentioned Employee

Do you know your insider threat personas? In this this edition of Insider Threats Personified we’ll see how employees, no matter how well-meaning, can inadvertently aid in the lateral movement of threats through the distribution of malicious U…

Read More
Security, Email Security

Understanding the Latest Malware Techniques

Here's the lowdown on how attackers may be going after you. Trillions of dollars are spent on cybersecurity, but it seems malware breaches continue to grow in part thanks to ransomware, rootkits, persistent malware and firmware malware. I’m su…

Read More
Security, Awareness Training

Cybersecurity Breakdown: Improving Workplace Awareness

How are your employees using work-issued devices? The holiday shopping rush is in full swing, and employees are increasingly using company-issued devices to complete their gift purchases while at work. In fact, recent research from Robert Half Techn…

Read More
Security, Awareness Training

For Internal Email Threats, Consider Employee Behavior

Security without factoring in employee behavior is bad security. Editor’s Note: Internal email threats of all kinds are increasing, with Mimecast research showing that threats caused by careless users, compromised accounts and malicious inside…

Read More
Security, Threat Center

Why Understanding Zero-Day Exploits Matter

No one wants to be the first to face a new cyberattack. Let’s face it, the potential for being the first organization to be hit with the next creative zero-day cyberattack strikes fear into the heart of every CISO and IT security professional.…

Read More
Security, Cyber Resilience for Email, Email Security

Improve Threat Detection and Response with SIEM Integration

Add email security data into SIEM solutions for improved threat intelligence and response. Email is a catch 22. It’s the number one business communication tool and the number one cyberattack vector. As the lifeblood that keeps business running…

Read More
Security, Email Security

Bridging the Cyber Divide – You’re the Weak Supply Chain Link

Cyberattackers are going after you to get to your biggest customers. Welcome to the latest installment of Bridging the Cyber Divide, our blog series focused on helping IT professionals at small-to-medium sized organizations make the case for enhance…

Read More
Security, Threat Center

Threat Intelligence for You: 5 Ways to Prove Value

You can do threat intelligence—even with a small budget. Editor’s Note: As part of an ongoing series, Threat Intelligence for You, we’re asking thought leaders in the Cyber Resilience Think Tank their thoughts about threat intellig…

Read More
Security, Email Security

Cyberthreats Cost More Than You Think

The costs of attacks are rising at an alarming rate. We've talked about how “Ignoring Cybersecurity Can Cost Millions” and highlighted how one US power company was fined $2.7 million over data exposure. This was just one of hun…

Read More
Archiving, Office-365, Data Protection

Office 365 Backup and Recovery in the Ransomware Era

The Old World Meets the New When It Comes to Backup and Recovery Many of us have the made the journey to Microsoft Office 365™ or are planning to do so soon. Many questions await us: how secure is it, who’s responsible for managing our d…

Read More
Office-365, Email Security

Office 365/Azure Multi-Factor Authentication Issue Leads to Downtime

“@Microsoft: please don’t ruin Thanksgiving.” Ah, Thanksgiving. Typically, a week full of family travels, exercising booked vacation time and in some cases, thinking ahead to bargain deals on Friday. But now, it’s perhaps not…

Read More
Security, Email Security

The Definition of Innovative Cyber Threat Prevention

You've heard it all. Until now. By now, you have probably been exposed to every promise, sales pitch, marketing hype and yes, even technological wonder when it comes to new security solutions to old (and very pervasive) problems. However, disruptin…

Read More
Security, Email Security

Building a Better Email Security Sandbox

You need the best security technology in today’s market. It’s no secret that kids love to get dirty and especially while playing in a sandbox, so much so that there are dozens of videos showing how to build the best sandbox for just this…

Read More
Security, Threat Center

Threat Intelligence for You: Challenges and Advantages

What can threat intelligence mean for your organization? Editor’s note: Threat intelligence. It’s been one of the most talked-about themes in the cybersecurity space for years now. But what does it mean to you, and what can it mean for y…

Read More
Security, Cyber Resilience for Email, Email Security

Bridging the Cyber Divide: Making the Resilience Case

How do you make the case for cyber resilience? We know you’ve been there before. You’re an IT director or CIO without a large staff or budget. You find just the right solution that’ll make your company safer and more productive and…

Read More
Security, Cyber Resilience for Email, Email Security

7 Tips to Safeguard Public WiFi Use

With Cybersecurity Awareness Month here, we’re ready to help. Human error is one of the leading barriers to effective cybersecurity. Casual security mistakes can lead to career-threatening results. Putting the right technology in place to impr…

Read More
Security, Awareness Training

Stop Failing at Cybersecurity Awareness Training

It's depressing but true: failure is baked right into the DNA of most cybersecurity awareness training. How Cybersecurity Awareness Training is Taught Today Consider how cybersecurity awareness training is usually administered. During onboarding or …

Read More
Security, Cyber Resilience for Email

4 Simple Tips for Stopping Vishing

With Cybersecurity Awareness Month here, we’re ready to help. Human error is one of the leading barriers to effective cybersecurity. Casual security mistakes can lead to career-threatening results. Putting the right technology in place to impr…

Read More
Archiving, Data Protection

Why Information Management Strategies of the Past are Failing

Yesterday’s archive is old news. Here’s what you need to know now. The information management landscape is changing. New and stricter legal and regulatory requirements coupled with ongoing accumulation of electronic information are creat…

Read More
Security, Cyber Resilience for Email, Email Security

7 Ways to Protect Against Wire Transfer Fraud

With Cybersecurity Awareness Month here, we’re ready to help. Human error is one of the leading barriers to effective cybersecurity. Casual security mistakes can lead to career-threatening results. Putting the right technology in place to impr…

Read More
Security, Email Security

Why Look-Alike Domain Attacks Are Rising

Here’s what to know about look-alike domain attacks. There are many kinds of attacks in the arsenal of your typical cybercriminal. One that has proven itself to be especially effective and thus increasingly popular comes down to tricking users…

Read More
Security, Cyber Resilience for Email, Email Security

Dealing with Ransomware - A Simple Checklist

With Cybersecurity Awareness Month here, we’re ready to help. Human error is one of the leading barriers to effective cybersecurity. Casual mistakes can lead to career-threatening results. Putting the right technology in place to improve your …

Read More
Cyber Resilience for Email, Email Security

Ransomware Attacks on the Rise – By the Numbers

Ransomware attacks aren’t going away. It’s a fact. Among the advanced email threats targeting organizations across the globe, ransomware has proven to be among the costliest. By 2019, global losses from ransomware attacks are expected to hit $11.5 b…

Read More
Security, Cyber Resilience for Email, Email Security

Most Healthcare Data Breaches Now Caused by Email

Email security at healthcare companies is trending in the wrong direction. Email has been the top source of data breaches in the healthcare industry three of the last four quarters, according to HHS Breach Portal. Unfortunately, this trend does not …

Read More
Cyber Resilience for Email, Email Security

New Phishing Attack Targets Online Payroll Systems

Using advanced cybersecurity technology and user education can help stem the flow of money into the wrong hands. Stealing money has been the obvious focus for cybercriminals for as long as cyberattacks have taken place, and this shows no signs of ch…

Read More
Cyber Resilience for Email, Email Security

'PhishPoint': How to Tackle the Latest Office 365 Threat

There’s a new phishing attack targeting Office 365/SharePoint users. Cybersecurity is a lot like an ongoing, worldwide game of chess. One side—those defending critical information, IP, money, etc.—put up defenses against attackers—those who want to …

Read More
Security, Email Security

Nothing Ventured, Nothing Gained: Overcoming Gender Stereotypes in the Tech World

With a rising skills gap in technology, girls need more female role models to understand what’s achievable and what’s possible. (Phindi Mazibuko, left, and Nomso Kana, right) South Africa recently celebrated Women’s Month and throughout August we ac…

Read More
Continuity, Security, Office-365, Email Security

Azure/Office 365 Outages: The IT Admin's Guide to Continuity

A major outage in the US takes down a key Microsoft datacenter and a host of cloud services in the process.  What to do when the “cloud” goes down?    Every vendor offering a cloud-based solution pours ungodly amounts of money into re…

Read More
Office-365, Email Security

How Should You Address the Gaps in Office 365™?

The email features in Office 365 may not be all you need. Businesses continue moving their productivity platforms to Microsoft Office 365™ in droves. As of their April 2018 earnings announcement, Microsoft said over 135 million business users worldwi…

Read More
Security, Cyber Resilience for Email, Email Security

August ESRA Report: Incumbent Email Security Systems Missed 200,000 Malicious URLs

Learn more in Mimecast’s latest Email Security Risk Assessment Report. I am happy to report that Mimecast’s Email Security Risk Assessment (ESRA) testing and reporting continues to chug along, now in its 6th quarterly iteration! For those of you who…

Read More
Cyber Resilience for Email

Cyber Resilience News August 21, 2018

Catch up on the latest Cybersecurity news. Email security best practices to help you reel in the threat of phishing, Security Intelligence Email is still one of the top attack vectors when it comes to security breaches. According to a 2017 report,…

Read More
Cyber Resilience for Email, Email Security

Mimecast & Solebit: Changing the Malware Protection Game

Mimecast has acquired Solebit. Here’s why. Just like there is no one way to catch a thief, there is no one way to catch malware. There are just so many ways to build, compile, pack, and otherwise obfuscate malicious files to get past specific …

Read More
Cyber Resilience for Email, Email Security

Are All Secure Email Gateways Created Equal?

Is the security efficacy of secure email gateways basically the same? This is a question a lot of email administrators and security professionals have asked for years. For many of these folks there is presumption that the answer is “yes.” How do the…

Read More
Cyber Resilience for Email, Email Security

Internal Cyber Threats – How to Protect Against the Enemy Within

Get the truth about malicious insiders. In general, organizations devote most of their prevention-focused email security controls on inbound security threats, as opposed to internal-to-internal or outbound threats. In their minds, they are primarily…

Read More
Archiving, Data Protection

3 Tips For Your E-Discovery Action Plan

E-discovery is key in building your “perfect world” archive. Ever think about what would happen if you challenged the status quo of legacy compliance and e-discovery solutions and thought about your readiness plans more proactively? Woul…

Read More
Cyber Resilience for Email, Email Security

Two Major Reasons We’re Failing at Cybersecurity

Good enough security is good enough no longer. You use email constantly. It’s the lifeblood of communication, commerce and exchange of ideas across your organization. Imagine trying to do your job in 2018 without it. It’s impossible, isn…

Read More
Office-365, Email Security

Three Steps to Take When Migrating Email to Office 365™

Migrate email to the cloud without pain—or compromise. For the better part of the last 20 years, organizations have been content to keep their email services and solutions on-premises, as opposed to migrating those services to hosted solutions. But M…

Read More
Security, Awareness Training

Cyber Awareness Lessons Learned on a Train Ride

Users: here’s how not to handle an email security incident. Around a month ago I was catching the train home after work. For those of you who don’t know Melbourne, my office is around the corner from Flinders Street Station which means I…

Read More
Security, Awareness Training

Mimecast + Ataata: The Coolest Security Solutions on the Block

It's the cybersecurity awareness training platform you've been waiting for. I am excited to announce that last week, Mimecast acquired Ataata. Together we can dramatically improve the employee cyber security awareness training globally. Ask any secu…

Read More
Security, Email Security

Blocking Impersonation, Phishing and Malware Attacks with DMARC

Combine DMARC Analyzer’s email channel visibility and reporting with Mimecast DMARC enforcement and Targeted Threat Protection.  Email impersonation attacks, or email fraud, continues to grow, with Mimecast’s latest Email Security R…

Read More

Cyber Resilience News July 10, 2018

Catch up on the past week’s cyber security news. We’re now mid-way through 2018, so as part of this week’s news we take a look at the worst cybersecurity breaches of the year so far via a roundup from Wired. In that same vein, we&r…

Read More
GDPR, Email Security

GDPR Right to Be Forgotten: How Does It Work?

Upon request, be ready to delete EU resident data—forever. The European Union General Data Protection Regulation (GDPR) is now in effect and is fundamentally changing the way organizations approach their handling of customer data. One of the bi…

Read More
Cyber Resilience for Email

Cyber Resilience News June 13, 2018

Catch up on the past week’s cybersecurity news. This week’s news covered the gambit of issues that continue to crop up in the cybersecurity world, no matter how much some try to educate. There are still internet scams people fall for and…

Read More
GDPR, Email Security

How Does the GDPR Data Breach Notification Work?

The way you prevented data breaches has changed forever. The European Union General Data Protection Regulation (GDPR) is fundamentally changing the way organizations must approach their handling of customer data. One of the biggest shifts is the new …

Read More
Cyber Resilience for Email

Cyber Resilience News May 29, 2018

Catch up on the past week’s cybersecurity news. Well, we made it.  May 25th was Friday and GDPR is now in effect, and we’re already seeing headlines about violations. Google and Facebook are already on the radar.  That didn&rsq…

Read More
Cyber Resilience for Email

Cyber Resilience News May 23, 2018

Catch up on the past week’s news in cybersecurity. The deadline for GDPR compliance kicks off Friday! Can you believe it? It’s been a hot topic for months and of course, in the weeks leading up to the deadline, there was news everywhere …

Read More
Cyber Resilience for Email

Cyber Resilience News May 8, 2018

Catch up on the past week’s cybersecurity news A lot of headlines this week swirled around what might be lurking in your social media account. This week Facebook warned of similar domain phishing and “punycode” scams that are landi…

Read More
GDPR, Email Security

GDPR: Security VS Privacy

Top 4 Tips for a Post-GDPR World This is the third installment of our 5 Things to Know for 5/25 blog series, and we’re talking about the differences between security and privacy and how this impacts GDPR preparations. Many see privacy and secu…

Read More
GDPR

Prioritizing GDPR Hurdles

4 GDPR Hurdles to Prepare For In the second installment of our 5 Things to Know for 5/25 blog series, we’re talking about how to prepare for, prioritize and tackle your GDPR hurdles. Compliance with GDPR means taking a long look at procedures and …

Read More
Security, Cyber Resilience for Email, Email Security

Email-Borne Attacks Have Evolved – Has Your Security?

Email continues to be the number one threat to organizations around the world Why? Because it’s easy for attackers and hard for you. According to the latest Verizon Data Breach Report, email breaches have increased to account for 96% of incidents or…

Read More
Security

Incumbent Security Systems Missing Millions of Email Threats

April ESRA Report Shows Continued Vulnerabilities to Email-Borne Threats We recently announced the fifth in our series of quarterly reports aggregated from our Email Security Risk Assessment (ESRA) testing program.  For those new to these tests,…

Read More
Cyber Resilience for Email, Email Security

Build Powerful Integrations with the Mimecast API

Mimecast launches new API Developer Portal What processes millions of requests a day and has been around for years? That’s right, the Mimecast API (Application Programming Interface). Now we’re opening the goodness of our API to customers, partners …

Read More
Security

Cyber Resilience News April 3, 2018

Catch up on the past week’s cybersecurity news. Attacks on local governments made headlines this week from Atlanta and Baltimore. And states like South Dakota are stepping up their data breach laws.  With the GDPR clock ticking down to the May …

Read More
Finance, Banking, Financial Advising, Insurance, IT, Telecommunications, Media, Legal, Accounting, Marketing, PR, Advertising, Design, Engineering, Recruitment, Manufacturing, Retail, Estate Agents, Hospitality, Wholesale, Transportation, Construction, Utilities, Oil & Gas, Health, Government, Pharmaceutical, Education, Non Profit/Charities, Property Development, Sports & Entertainment, Travel & Leisure, Food, Healthcare Manufacturer, Continuity, Security, Email Security

How Quickly Will You Recover from A Cyber Attack?

Cyber resilience shifts focus from just preventing an attack to what happens after. Protecting your business emails is about more than just filtering out spam, malware, and business e-mail compromise emails. In the context of migrating to Microsoft …

Read More
Security, Email Security

Email Security Best Practices for Employees

Get posts like this delivered to your inbox. Subscribe to Cyber Resilience Insights today. Even the best cloud-based email security solution can’t catch every malicious email missive. Here’s a list of do’s and don’ts f…

Read More
GDPR, Email Security

What You Need to Know about GDPR

Breaking Down GDPR: What it means for your business GDPR, the European Union’s General Data Protection Regulation, goes into full effect in May 2018. Yet many organizations aren’t ready to comply – or even thinking they need to comply. We gathered t…

Read More
Security

Ready, Set, Comply. Are Australian Companies Ready for the Notifiable Data Breach Scheme?

NDB kicks off next week and more than half of organizations say they’re not ready. With just days to go until Australia’s Notifiable Data Breaches (NDB) scheme takes effect, new research suggests that nearly half of Australian companies haven’t yet …

Read More
Security, Email Security

Cybersecurity vs. Cyber Resilience

What’s the difference between Cybersecurity and Cyber Resilience? While the term “cybersecurity” is as old as the hills in the security world, the term “cyber resilience” has been gaining momentum. This is a good thing. Cybersecurity management is c…

Read More