Security Awareness Training, Security Awareness Training

Mimecast Voices: Bryan Vermes

Editor's note: This is the second article in a series of profiles featuring Mimecasters sharing their personal experiences with, and perspectives on, prejudice and marginalization and what actions people can take to better support their colleagues in…

Read More
Security, Email Security, Brand Protection

Using AI to Fight Domain Spoofing for Online Brand Protection

As long as it’s easy for bad actors to spoof brand domains and create fake websites, they’ll keep doing it. But AI-based online brand protection tools can help fight brand exploitation outside the perimeter. Key Points: Domain spoofing i…

Read More
Security, Email Security, Brand Protection

Why Online Brand Protection Is Important for Small Businesses

Small businesses may think they’re unlikely to suffer from online brand impersonation, but no company is immune to the threat. Key Points: Online brand impersonation is a widespread problem that can damage a company’s reputation and caus…

Read More
Security, Web Security

Remote Working Makes Web Security Vital

As pandemic-spurred remote working becomes a permanent arrangement for many organizations, cloud-based web security gateways help to safeguard a distributed workforce and enforce compliance.   Key Points: Although increases in remote working we…

Read More
Archiving, Archive and Data Protection

Ready or Not, Here Comes California’s Data Privacy Law

Businesses worldwide face a July 1 deadline to comply with the California Consumer Privacy Act (CCPA). If your organization isn’t ready, now is the time to start. Key Points: On July 1, California begins to enforce the strictest data privacy l…

Read More
Security, Web Security

Security’s “New Normal”: Remote Working Supercharges the Shift to Cloud Security

451 Research analyst Scott Crawford describes how IT organizations will increasingly leverage cloud security to safeguard more widely distributed people, assets, and networks. Key Points: The long-term increase in remote working and the growth in co…

Read More
Email Security, Archive and Data Protection, Office-365, Office-365

Critical IT Continuity Planning for a Secure Microsoft 365 National Health Service

As the UK’s National Health Service embraces Microsoft 365 security and productivity services, there are lessons from WannaCry and Exchange Online downtime for protecting critical national infrastructure. In a time when effective healthcare has…

Read More
Archiving, Archive and Data Protection

Get Ready to Play Offense On E-Discovery

The cost and disruption of e-discovery—particularly email discovery—are spiraling up. Play offense on e-discovery to manage those fire drills instead of letting them manage you. Key Points: IT departments are constantly forced to react t…

Read More
Security, Email Security

Why Email Security Never Seems to Improve, and What You Can Do About It

While security organizations spend billions per year to improve email security, the problem seems to be getting worse faster than it is getting better. Learn about the 7 main reasons this is the case and what you can do to improve your organization&r…

Read More
Security, Email Security, Brand Protection

Why DMARC is Essential for Online Brand Protection

DMARC helps stop bad actors delivering malicious emails that appear to come from your brand’s domain. It helps ensure every email received by your brand’s customers, employees, or anyone else, is authentic. Key Points: Email is as vulner…

Read More
Security Awareness Training

Mimecast Voices: Jennifer Odogwu

Editor's note: This is the first in a series of profiles featuring Mimecasters sharing their personal experiences with, and perspectives on prejudice and marginalization, and what actions people can take to better support their colleagues in this era…

Read More
Email Security, Threat Intelligence Hub

Ransomware Attack Leaves Honda Stuck in "Park"

A large-scale ransomware attack on Honda Motor Co. halts manufacturing operations, highlighting the need to better protect business critical systems. Key Points Honda announced a ransomware attack crippled operations in multiple countries, causing …

Read More
Security, Email Security

Ransomware Returns With A New Twist: Pay Up or We’ll Publish

Ransomware attacks have become larger and more sophisticated—and hackers are increasingly stealing sensitive information and threatening to publish it unless the ransom is paid. Key Points: More ransomware attacks are stealing sensitive inform…

Read More
Security, Brand Protection

Companies Wake Up to The Value of DMARC for Online Brand Protection

Backed by DMARC and State of Email Security 2020 data, soaring uptake of DMARC worldwide suggests that organizations are recognizing the value of the standard to combat brand impersonation in phishing emails. Key Points: The number of domains using …

Read More
Security, Email Security, Coronavirus

The Impact of COVID-19 on Cyber Security Insurance

Cyber threats are surging as employees work from home due to the COVID-19 pandemic, prompting cybersecurity insurers to reassess companies’ security measures—and potentially raise premiums. Key Points: Rising threats and an increase in r…

Read More
Security, Email Security

Why Cybersecurity Never Seems to Improve, and What You Can Do About It

Security defenses are improving, but cybercriminals move faster than defenders, and the attack surface seems broader than ever. There are five reasons why enterprise security is so challenging. Why does it seem that the security profession is continu…

Read More
Continuity, Archive and Data Protection

Are You Overlooking Email Business Continuity in Your Cloud Migration?

It’s easy to take email continuity for granted, especially when using a cloud-based service. But an outage can undermine productivity and security. Here are some tips for maintaining email business continuity. Key Points: When an email system …

Read More
Continuity, Archive and Data Protection

Cloud Productivity Platform Security: Re-imagining Your IT Resilience Strategy for a Post-Pandemic Society

Cloud productivity suites are booming in the Covid-19 era while cybercriminals continue to adapt to the new attack surface. Here’s a resilience mindset view on how to securely manage the risks of moving the cloud. Amid the tumult of 2020, there…

Read More
Security, Brand Protection

Understanding Online Brand Exploitation and Its Consequences

Online brand exploitation is a very real—and complex—cybersecurity issue. A multi-faceted online brand protection strategy can help brands protect themselves and their customers. Key Points: Brand exploitation is a highly complex—a…

Read More