Security

2018 Year in Review

It is amazing how fast it feels as if 2018 has flown past us. Despite the fact that every year is the same number of months, weeks, days and hours, it feels as if somehow 2018 disappeared in a wink. This is due in large part to the amazing this tha…

Read More
Cyber Resilience for Email

The 10 Most-Read Cyber Resilience Insights Blogs of 2018

A look back at the year in cyber resilience. Before we turn the corner to 2019, we wanted to take a moment to look back at the most-read blogs on Cyber Resilience Insights in 2018. Thanks so much for reading Cyber Resilience Insights in 2018. A remi…

Read More
Security

How Long is Too Long to Wait to Change Cybersecurity Strategies?

Malware can stick around for years. Wine, whiskey and cheese are all things we know and love but take notoriously long to achieve their optimal performance (read taste/cost). Malware on the other hand that is active for years inside your infrastruct…

Read More
Security

Don’t Be Held For Holiday Ransom

See why cybercriminals love the holidays. As 2018 winds down and we all celebrate this holiday season with family, friends and loved ones we can’t lose sight of our year-end work priorities as well. To say that sometimes we may get distracted …

Read More
Security

What’s Going to Change in Cybersecurity in 2019 (and What Won’t)

Many things in cybersecurity that should happen in 2019 won’t. Learn why. Every year, we reach December and industry experts share their predictions and tell the world what the biggest trends will be for the following year. In the security ind…

Read More
Security

‘Tis the Season for Hacking – Bridging the Cyber Divide

No user awareness training? Prepare for coal in your stocking. There’s no time of year where your employees are more susceptible to attacks than the holidays. They’ll be inundated with emails from retailers offering the best deals. But n…

Read More
Security

New Phishing Emails Posing as Office 365 Non-Delivery Messages

You can fight back with a cyber resilience approach. Cyberattackers will try anything to get into enterprise networks. With the movement of many applications to the cloud, new creative techniques seem to appear every day. Users of Microsoft Office 3…

Read More
Security

Even the US Post Office Isn’t Immune to Cyber Vulnerabilities

A flaw in their system could have been bad news for 60 million users. You may have heard the United States Post Office has a motto that goes: “Neither snow nor rain nor heat nor gloom of night stays these couriers from the swift completion of …

Read More
Security

What the Size of the Marriott Breach Means

It didn't take long for the lawsuits to start rolling in. Most people are impressed by size. Specifically, large manmade or natural wonders, large statues or artwork, large bank accounts or net worth, large customer bases or revenues will all make t…

Read More
Security

Sandboxing Technology: Why Good vs. Bad Isn’t Enough

Here’s the backstory on Mimecast’s new acquisition, Solebit. Editor's note: Earlier this year, Mimecast acquired Solebit, a company with technology geared toward static file analysis malware detection. As explained here, Mimecast had alr…

Read More
Security

December ESRA Report: Aggregate False Negative Rate of Incumbent Email Security Systems is 12%

Learn more in Mimecast’s latest Email Security Risk Assessment Report Is a false negative rate of 12% a large number or a small one? I suppose it depends on your perspective. If your email security system lets in 12 unwanted emails—wheth…

Read More
Security

Insider Threats Personified – The Well-Intentioned Employee

Do you know your insider threat personas? In this this edition of Insider Threats Personified we’ll see how employees, no matter how well-meaning, can inadvertently aid in the lateral movement of threats through the distribution of malicious U…

Read More
Security

Understanding the Latest Malware Techniques

Here's the lowdown on how attackers may be going after you. Trillions of dollars are spent on cybersecurity, but it seems malware breaches continue to grow in part thanks to ransomware, rootkits, persistent malware and firmware malware. I’m su…

Read More
Security

‘Tis The Season for Stolen Data

The holiday shopping season is upon us. ‘Tis the season to exercise our rights as consumers to spur the economy while satisfying innate needs to acquires goods and services. Unfortunately, cyber thieves are also counting on this and the inevi…

Read More
Archiving

What the Enterprise Information Archive of Tomorrow Needs to Be

Mimecast named a Gartner EIA MQ Leader for the 4th year in a row. The annual Gartner Enterprise Information Archiving (EIA) Magic Quadrant (MQ) was released this week. As always, it’s a big deal for our industry. Enterprises of all types&mdash…

Read More
Security

Cybersecurity Breakdown: Improving Workplace Awareness

How are your employees using work-issued devices? The holiday shopping rush is in full swing, and employees are increasingly using company-issued devices to complete their gift purchases while at work. In fact, recent research from Robert Half Techn…

Read More
Security

For Internal Email Threats, Consider Employee Behavior

Security without factoring in employee behavior is bad security. Editor’s Note: Internal email threats of all kinds are increasing, with Mimecast research showing that threats caused by careless users, compromised accounts and malicious inside…

Read More