Security

Threat Intelligence Best Practices for Lean IT Organizations - Part 1

Here’s why looking at indicators of compromise isn’t enough. Editor’s note: For cybersecurity professionals, threat intelligence isn’t just about reacting to indicators of compromise after they've already impacted an organiza…

Read More
Security

Phishing for Selfies? New Scam Targets Chase Bank Customers

Highlighting the importance of extra care no matter the device. Yes, we live in the age of the selfie. Admit it, you’ve taken them yourself. But, did you ever think selfies could be part of a phishing scam? The attackers have really outdone th…

Read More
Security

Active Versus Passive Versus Host-Based Cyberattack Vectors

Know the difference and how you can prevent cyberattacks. Budding authors and journalist are taught the difference between active and passive voice in first year writing classes. They understand that active is about “doing” and passive i…

Read More
Security

Risks and Consequences of Legacy Web Security Solutions

Counting the cost of on-premises web security systems. Shopping, researching, downloading, gaming, finding new friends and seeing what’s happening in the world: these are just some of the ways we use the web every day. Unfortunately, threat ac…

Read More
Security

Social Media is a Cybersecurity Backdoor to Your Enterprise

The amount of time your employees spend on social media will shock you. Facebook, Instagram, LinkedIn, Twitter, YouTube or the latest online game. Yes, these are the new temptations facing employees on a daily basis. It starts with just a peek; mayb…

Read More
Security

New Cyber Espionage Campaign Features Never-Before-Seen Malware Tools

The key to defending against new attack types is a multi-layered security strategy. Attackers are always looking to get the upper hand on their targets. Many of the methods and tactics attackers use are tried-and-true. But sometimes we see things we…

Read More
Security

Web Security Controls Are Rapidly Transitioning to the Cloud

Following the lead of secure email gateways, web security systems are moving quickly to the cloud. No big secret, but IT services in general and IT security controls in particular are rapidly transitioning to the cloud. There are many reasons for th…

Read More
Security

DNSpionage Demystified

Espionage is the subject of more novels and Hollywood films than can even be accounted for. It seems intriguing on the written page or the silver screen to the average consumer, but when espionage starts to become a reality that affects the identit…

Read More
Security

SMBs, Midmarket Continue to Be Massive Cyberthreat Targets

More data points are available to make your resilience case. If you’re making the case for cyber resilience at your small to medium-sized organization, there is a whole slew of new data out there to help make your argument. Our ongoing blog s…

Read More
Security

Dealing With Cybersecurity Stress

Stress seems to be something that comes up daily in at least one conversation with someone else. You may be feeling stress at this very moment, but do you really understand what it is and where it comes from, especially as an IT Security profession…

Read More
Security

Insider Threat Protection: How Organizations Address the Inevitable

Keeping Connected to Our 33K+ Customers, One Customer at a Time. At Mimecast we are blessed to have more than 33,000 customers for our email security, archiving, web security and security awareness training services. And staying connected and e…

Read More
Security

Phisher Pleads Guilty in Scam Targeting High-Profile Celebrities, Athletes

A reminder: phishing and brand-spoofing works best against the unsecured and unaware. A phishing scam perpetrated by a man stealing sensitive personal information from high-profile individuals should provide a warning sign to organizations of all si…

Read More