Security

Exploit Using Microsoft Excel Power Query for Remote DDE Execution Discovered

Mimecast Threat Center discovered a weakness in the Microsoft Excel tool that allows embedding malicious payloads remotely. Summary (Editor’s note: The Mimecast Threat Center team would like to acknowledge the contributions of team member Doro…

Read More
Security

Zero-Day Exploits Explained

There are literally hundreds, if not thousands or approaches cyber criminals can use to exploit your IT infrastructure and access sensitive data.  Once an exploit is discovered it can be dealt with using signature-based technologies that scan …

Read More
Security

Ransomware as a Service: What to Know and How to Combat It

Here's what to know about a growing scourge. You may be surprised to know that Hollywood has created over 88 films centered on hacking and/or the Dark Web between 1969 and 2017. If you are interested in the entire list check it out at a Cybersecurit…

Read More
Security

Web-Based Social Engineering Attacks Taking Increasingly Popular Forms

These techniques include web site spoofing and web-based file sharing service exploits. Organizations and their security professionals must be prepared for nearly anything when it comes to how attackers will attempt to exploit them. A new report hig…

Read More
Security

Cybersecurity Trends: Our Most Read Blogs of 2019 Q2

See what caught the eyes of Cyber Resilience Insights readers last quarter. With the second quarter of 2019 in the books, we wanted to provide you a one-stop shop for the most-read new content we posted on Cyber Resilience Insights during that time. …

Read More
Security

Ransomware Strikes Airline Parts Supplier

High-profile attacks highlight the need for advanced protection for all. It’s been a bad month for big ransomware attacks globally, and now another huge one has crippled a manufacturer in one of the world’s most critical industries. As r…

Read More
Security

What's Your Cybersecurity Net Worth?

Calculating your cybersecurity net worth doesn't have to be complex.  Every public and private company maintains a set of financial documents to keep track of their assets and liabilities in order to determine their net worth. These reports inc…

Read More
Security

Survey Says: Ransomware is Still a Top Threat for Most Organizations

Mimecast’s State of Email Security Report shows ransomware attacks aren’t slowing down. Don’t be lulled by crypto-mining (or cryptojacking) alarmists into thinking that crypto-mining is replacing ransomware as a major new security …

Read More
Archiving, Data Protection

How Financial Firms Control Compliance Costs

Is your firm ready to face today's business and regulatory needs? Financial services firms face some of the world’s toughest regulatory pressures. And yet, most compliance programs have not scaled with the needs of the business or evolving reg…

Read More
Security

Prevent, Don’t Remediate: Three Cybersecurity Requirements

It’s never a bad time to pause and reflect on the vision for your IT security strategy. Is your IT security strategy based on “protecting your information assets from malicious code and cyber terrorists” or is it “preventing…

Read More
Security

The Rising Tide of Cyber Awareness Training in Today’s Enterprise

Adoption is rising, but is it happening fast enough? Here’s a stark reality: no matter how good your employees are at their jobs they still usually pose your biggest security risk. Human error ranks even higher for cyber risk than software fla…

Read More
Security

How Many IT Security Tools Do You Need?

How many IT Security tools are you currently using to keep your IT environment secure? Odds are, it’s too many. There’s a big, big problem taking hold in the IT world today: IT/security teams are constantly expanding tooling and architec…

Read More
Security

Inadequate Cybersecurity Measures

Good enough security isn't good enough. Just checking the cybersecurity box with a few well know measures is not enough with today’s extremely sophisticated cybercriminals and even Ransomware as a Service offerings. It is the equivalent of an …

Read More
Security

Real Examples of Threats Missed by Email Security Systems

A new view of the Mimecast Email Security Risk Assessment. With this blog I am happy to bring you the 9th consecutive quarterly release of our Mimecast Email Security Risk Assessment (ESRA) aggregate report, also with its associated funnel infograph…

Read More