Security, Awareness Training

How Long is Too Long to Wait to Change Cybersecurity Strategies?

Malware can stick around for years. Wine, whiskey and cheese are all things we know and love but take notoriously long to achieve their optimal performance (read taste/cost). Malware on the other hand that is active for years inside your infrastruct…

Read More
Security, Email Security

What’s Going to Change in Cybersecurity in 2019 (and What Won’t)

Many things in cybersecurity that should happen in 2019 won’t. Learn why. Every year, we reach December and industry experts share their predictions and tell the world what the biggest trends will be for the following year. In the security ind…

Read More
Security, Email Security

New Phishing Emails Posing as Office 365 Non-Delivery Messages

You can fight back with a cyber resilience approach. Cyberattackers will try anything to get into enterprise networks. With the movement of many applications to the cloud, new creative techniques seem to appear every day. Users of Microsoft Office 3…

Read More
Security, Email Security

Sandboxing Technology: Why Good vs. Bad Isn’t Enough

Here’s the backstory on Mimecast’s new acquisition, Solebit. Editor's note: Earlier this year, Mimecast acquired Solebit, a company with technology geared toward static file analysis malware detection. As explained here, Mimecast had alr…

Read More
Security, Email Security

December ESRA Report: Aggregate False Negative Rate of Incumbent Email Security Systems is 12%

Learn more in Mimecast’s latest Email Security Risk Assessment Report Is a false negative rate of 12% a large number or a small one? I suppose it depends on your perspective. If your email security system lets in 12 unwanted emails—wheth…

Read More
Security, Awareness Training

Insider Threats Personified – The Well-Intentioned Employee

Do you know your insider threat personas? In this this edition of Insider Threats Personified we’ll see how employees, no matter how well-meaning, can inadvertently aid in the lateral movement of threats through the distribution of malicious U…

Read More
Security, Email Security

Understanding the Latest Malware Techniques

Here's the lowdown on how attackers may be going after you. Trillions of dollars are spent on cybersecurity, but it seems malware breaches continue to grow in part thanks to ransomware, rootkits, persistent malware and firmware malware. I’m su…

Read More
Security, Awareness Training

Cybersecurity Breakdown: Improving Workplace Awareness

How are your employees using work-issued devices? The holiday shopping rush is in full swing, and employees are increasingly using company-issued devices to complete their gift purchases while at work. In fact, recent research from Robert Half Techn…

Read More
Security, Awareness Training

For Internal Email Threats, Consider Employee Behavior

Security without factoring in employee behavior is bad security. Editor’s Note: Internal email threats of all kinds are increasing, with Mimecast research showing that threats caused by careless users, compromised accounts and malicious inside…

Read More