Julian Martin

Never Be a Ransomware Hostage

by Julian Martin - VP, Product Marketing

What often impacts more than 100,000 computers a day, and can cost you thousands of dollars in remediation, downtime, and cleanup cost? Ransomware.

In a ransomware attack, you are literally held hostage and denied access to critical productivity tools and data like file servers, email, databases and more.

How’s an organization supposed to cope? Start with protecting the most prevalent ransomware delivery system - your email. Download this infographic to learn about the only cloud solution that combines prevention, business continuity and replication for email in a single solution.

Don’t wait. Protect your organization from ransomware now.


Yesterday, Office 365 suffered hours of service degradation, causing major email and business disruption. The media reported that Exchange Online Protection's filtering infrastructure could have been at fault.

Now imagine this: It’s early afternoon on a work day, and your company’s email server goes down. Every last mailbox is affected, unable to send or receive messages. This could cripple employee productivity and ultimately cost you customer relationships, partnerships, and financial loss. But, you have Microsoft Office 365, so this won’t happen to you, right? This is where you’re wrong. This line of thinking could have major implications not only productivity but on the security of your organization’s data. After all, this very scenario just happened.

Microsoft explained the issue in an update, saying, “We identified that a recent update to the environment caused an EOP process that analyzes email to perform below acceptable thresholds, causing email messages to queue from both inbound and outbound sources.”

Thanks for the explanation, guys. But this doesn’t mean that you’re off the hook. Ironically, yesterday was the last day in Microsoft’s financial year, and for most businesses, the last day of the quarter. If you suffered downtime during such a critical time in your fiscal year, how would this affect your business?

This isn’t the first time Office 365 has experienced an issue and it certainly won’t be the last. If you are an Office 365 customer and still don’t have a Plan B for continuity in the cloud, are you exposing your business to failure?

Office 365 delivers efficiencies around time and cost, in fact, we’re on it here at Mimecast. But, this is your business and you need to start to plan for the worst. IT teams build disaster recovery plans for on-premises systems. But you need the same level of planning in a cloud-first world. You could be missing out on valuable and attainable services built to keep email running in the cloud, and your business could suffer during the next outage.

Find out more about how we can help keep your business running during an Office 365 outage here.


Related Content:

Webinar: Cloud Outages Happen – Be Prepared 

Be Prepared: Top 5 Questions to Ask to Ensure Continuity in the Cloud Email Era


Organizations of all shapes and sizes face a significant threat from cybercriminals. But small- and mid-sized firms may face heightened risk, as they are often targets, not only themselves, but also for those trying to attack their customer base through their perceived weaknesses in the supply chain. 

Indeed, the cyber threat is growing fast, with new and sophisticated attacks proving ever more difficult to defend against.  Whaling email scams, for instance are up 270% from January 2015, according to the FBI – while law enforcement received reports from 17,642 victims, amounting to more than $2.3 billion in losses from October 2013 through February 2016. The FBI also reported that law enforcement globally has received complaints from victims in every U.S. state and in at least 79 countries.

But, midmarket firms need more than technology solutions. Limited by internal resource constraints, they also need rapid access to expert support and advice – and that is exactly what they get from Mimecast.

This combination of innovative solutions and expert support has once again been recognized by two leading midmarket IT organizations. Most recently, Mimecast won two XCellence Awards at the Channel Company’s 2016 Midsize Summit East: “Best of Show” and “Best Boardroom Case Study Presentation.”XCellence

In addition, Mimecast was named "Best Vendor, Service" at the Spring 2016 Midmarket CIO Forum. Selected by a panel of CIOs, the award recognizes Mimecast as a leader in the IT Vendor Excellence category for providing an “established service that has been exemplary in specifically meeting the needs of the midmarket.”

It’s fair to say that the contribution that mid- and smaller-companies make to the economy does not always get the recognition it deserves – and, in truth, it’s often the most exciting frontier in terms of new business practice and technology adoption. However, it’s also the front line in a security arms race of evolving threats and security response. It’s the responsibility of technology providers like Mimecast to help midmarket businesses stay one step ahead, for instance with the recent addition of whaling protection to our Targeted Threat Protection service.

Watch this video to learn how Mimecast Targeted Threat Protection can help defend your business against email-based attacks.



Organizations of all sizes, across all industries, rely on archiving solutions to preserve critical data for compliance and e-discovery, and email is a primary contributor to these systems. 

For archiving, we’ve historically relied on tapes, discs and third-party storage services, but now, it’s the cloud. That most recent change has driven the biggest shift as companies look to take advantage of cloud-based technology that reduces costs, improves scalability and provides anywhere, anytime access.

For archiving, we’ve historically relied on tapes, discs and third-party storage services, but now, it’s the cloud.
For archiving, we’ve historically relied on tapes, discs and third-party storage services, but now, it’s the cloud.

Consider the following:

  • Over 112 billion business emails are sent each day. The number of emails continues to increase, straining archives not designed to scale efficiently. A related problem is that many email archiving solutions do not provide an easy way to search and find important messages. This dramatically limits the value to end users.
  • The number of cloud services actually being used by organizations is about 15 times larger than IT departments assumed. The problem of Shadow IT and monitoring the information flow for adherence to compliance and regulations is getting larger.
  • How employees access information has changed dramatically in the last five years. In 2011, only 8 percent of email was opened on a mobile device. Fast forward to 2015 and nearly 50 percent of email is opened on either a smartphone or a tablet. This growth of over 500 percent  demonstrates the need for employees to have instant access to archived information.
  • A leading analyst firm recommends deploying enterprise information archiving as software-as-a-service (SaaS). They estimate per-seat costs of SaaS solutions are approximately four to six times less expensive.

Arguably the legal industry has the most stringent requirements for archiving based on the need to rapidly search and find critical communication.  With nine offices in the US and Europe and over 230 lawyers, the law firm Brown Rudnick certainly has a unique perspective on the archiving needs of any organization. In fact, the firm receives in excess of 300,000 emails each week!

Join Brown Rudnick CIO Jim Darsigny and David Hood from Mimecast as we look at 'Archives at Risk – The Fundamental Flaws of On-premises Storage'. Reserve your spot today for this informative webinar.