I sat through an interesting first day of keynotes yesterday and a pattern quickly revealed itself in the speeches or comments of the many and varied speakers.
So, I thought I would pen my own quick summary. I will resist the temptation to create a word cloud, but if I had, it would read like this:
Partnership – everyone is in it together when it comes to fighting the bad guys. The private and the public sector. So, a constructive conversation is critical to tackle the growing threat to national and international security.
Encryption matters – putting aside the many discussions of the merits (or otherwise) of the FBI and Apple case for a moment, encryption was identified as a vital tool in the protection armory of private and public sector organizations. Critical to protecting data and communications. And part of building the next word…
Trust – people need to trust the integrity of the technology they use or they will stop and find something else. They entrust technology with things that really matter to them. Hacks and breaches erode that trust. Erodes their confidence in the organizations that are victims. So effective defenses and prompt action are vital.
It’s not if, but when – you will be breached or attacked. Assume it is happening and prepare accordingly.
Prevention – adequate defense is not just about detection, monitoring and responding. It is about testing your defenses and thinking ahead to the next likely attack before it happens. And learning from your last experience.
Attack proliferation – attack numbers are growing rapidly. The nature of the attacks is changing. The bad guys are finding new ways to make money from their attacks. And…
Everyone is a target – big and small business, alike. Public and private sector. This is no longer a problem only those with big IT teams need to worry about.
Front page news – attacks make headlines. As we have seen with cases like Sony Pictures, what might have been limited to the technology community before is now the subject of presidential press conferences and news bulletins.
Data – there is growing value to be had by targeting data. A whole dark economy exists and not just for PII. Ransomware attacks show how attacks on data can cripple an organization. Also if data is stolen or manipulated it undermines our confidence in it and harms our ability to make the decisions we rely on it to make.
Humans – defense is part technology and part education and training. The human element of effective defense against cyber crime is a vital consideration.
Teamwork – a successful defense strategy can’t be limited to the CISO and the security team. It requires a strong commitment of people and resources across an organization. Cyber security is a board level consideration and the sooner that is realized and acted on the better.
Anyway, that’s it for day one. I’m off now to trawl the booths to see if another pattern presents itself.
Update January 2015: Mimecast does not support web browser access over SSLv3 and we use an implementation of TLS that properly validates TLS padding. This prevents both the SSLv3 and TLS version of the POODLE vulnerability from being exploited on our platform.
Latest information on Mimecast services and why they are not affected by the POODLE vulnerability can be found on our Knowledge Base here.
I was intrigued to see that someone named the fourth week in January, 'Clean Out Your Inbox Week'. This was an initiative aimed at helping employees take control of their inbox and reduce email overload. Ever expanding inboxes are something we all have to deal with at work and home, and many people struggle to manage their inbox effectively…often cited as a major cause of workplace stress.
From our point of view, this is not just an issue for individuals but also a situation impacting corporates and their IT departments. As email inboxes get bigger and data storage costs rise, more and more management resources become sucked into looking after this growing email infrastructure and its mass of unstructured data.
But happily there are solutions to these problems.
Even the most hardened hoarder of emails can be helped. Firstly, if your organization uses a cloud email security service like Mimecast you can significantly cut the spam cluttering inboxes and clogging up costly data storage on the network. The vast majority of email that hits your network is unwanted spam (estimates vary in excess of 70%) and our service stops this even reaching your organization. If you don’t do this, checking and filtering this email wastes valuable IT time and resources unnecessarily.
Once you’re sure what’s in the inbox is ‘real’, next stop is effective filing and archiving. The problem is that for many people storing their emails into an archive is a concern – they are sending the email and its attachments off to a dusty, never to be seen again archive out of their control. Once it’s there, it’s simply too difficult to recover– so these emails stay languishing in the inbox and squatting on the enterprise’s network just in case they need them.
With a cloud archive service like Mimecast’s, we help you get round that problem. The archive is bottomless and sits securely in the cloud, and off the corporate network. So IT managers can reduce their storage burden. For the user, the archive is interactive – they can search, access and re-use all their archived emails forever safe in the knowledge it’s being securely and safely stored indefinitely if they want. When we show IT managers and their users this, we see a major shift in attitude about the archive. The concern about using them proactively to help manage the burden on their inbox goes away. If this archive is then paired with end user productivity tools like our mobile apps, the archive can become invaluable – available to users where and when they want, on their device of choice.
So you can have the best of both worlds. A zero mail inbox and easy, searchable access to every mail you ever received or sent if that is what you want or need. This will be good news to those emailers who made a New Year resolution to finally get off their IT manager’s naughty list.
Please excuse the sound of us blowing our own trumpet but I thought we should highlight a few press articles from around the world we’ve received in the last few months that we thought our blog readers might find interesting. Hope you enjoy.
We talked about this on the blog but we recently launched Mimecast Large File Send for Outlook and our support for Office 365. Here are just a few of the press articles on these products - CBR; V3; IT Online and Comms Business; MSP Mentor and IT Online.
We were delighted too when Harvard Business Review covered our research into how we all use email.
In July, Neil Murray, our CTO spoke with the UK’s Computer Weekly about our vision for information banking. In addition, Matt Ravden, our CSO talked about the risks of Shadow IT and data fragmentation with Computer Business Review and IT Pro portal. This came after we released our research into this issue with FreeForm Dynamics covered in IDG Connect and IT Web. Nathaniel Borenstein, our Chief Scientist has also been sharing his views on the future of technology and email with AllThingsD.
Our CEO has been out and about too of course. Peter Bauer has been talking about our plans with Real Business, The Guardian and Director; commenting on entrepreneurship in Redmond Channel Partner and the potential of London as a market for tech IPOs in City A.M.
The news that we’re expanding in the U.S. with a bigger HQ in Boston and office in San Francisco as well as new offices in Chicago and Dallas also grabbed attention in: Watertown Patch; Boston.com; Boston Business Journal and Texas TechPulse.
Also we opened our first office in APJ in Melbourne, Australia and aside from getting some good support from the local government, the press were welcoming too: ARN; CSO and Herald Sun (subscription only sadly).
Finally, it was great to appear for the fourth consecutive year in The Sunday Times Tech Track 100 – its ranking of the UK’s fastest growing firms. This year we secured 79th place.