Archiving, Archive and Data Protection

Why Archive Solutions Are Essential to Protect Against Ransomware

The Pressure to get proactive about Backup in Office 365 The promise of Office 365 may be productivity, but today’s ransomware threat promotes the exact opposite. The malicious software holds end users hostage, preventing them from accessing f…

Read More
Security, Email Security

13 Tips for Good Cyber Hygiene at Black Hat and DEF CON 2019 from the Mimecast Threat Center

Black Hat and DEF CON are two seminal cybersecurity and hacker events that showcase the latest devices and capabilities in the field each year. Of course, their notoriety has led to each show becoming a prime target for attackers. Before attending t…

Read More
Security, Email Security

Phishing Attacks on File-Sharing Services Show Sharing Isn’t Always Caring

How we can combat phishing attacks on Dropbox, OneDrive, Google Drive and more.  There are multiple ways in which attackers abuse the convenience of cloud-based services in our current cyber landscape. In my latest research, which I will be pres…

Read More
Security, Email Security, Threat Intelligence Hub

3 Keys to Advanced Threat Protection

How should your organization deal with Advanced Threat Protection?  Every IT security professional and their Chief Information Security Officer, understands Advanced Threat Protection is a key competent to a successful security infrastructure. C…

Read More
Security, Email Security, Threat Intelligence Hub

New Phishing Attack Emerges using SHTML file attachments

New phishing tactic identified in latest threat intelligence research from Mimecast’s Threat Center In early April, the Mimecast Threat Center team was alerted to a rare type of server-parsed HTML (SHTML) based phishing attack emerging from the…

Read More
Continuity, Security, Cyber Resilience for Email, Awareness Training, Email Security, Security Awareness Training

Internal Security Threats: A Problem that Continues to Get Worse

Mimecast’s “The State of Email Security 2019” report shows continued challenges from compromised and careless users Most organizations are heavily focused on protecting their organizations from inbound attacks coming directly from c…

Read More
Security, Cyber Resilience for Email, Awareness Training, Email Security

Email Attacks in the Real World: Examples For Your Resilience Strategy

Take lessons from the past in building your organization's cyber resilience strategy.  The 2019 State of Email Security report highlights some of the most alarming trends in the world of email security, but also examines how organizations are us…

Read More
Security, Email Security

Zero-Day Exploits Explained

There are literally hundreds, if not thousands or approaches cyber criminals can use to exploit your IT infrastructure and access sensitive data.  Once an exploit is discovered it can be dealt with using signature-based technologies that scan …

Read More
Security, Email Security

Ransomware as a Service: What to Know and How to Combat It

Here's what to know about a growing scourge. You may be surprised to know that Hollywood has created over 88 films centered on hacking and/or the Dark Web between 1969 and 2017. If you are interested in the entire list check it out at a Cybersecurit…

Read More
Security, Email Security, Web Security

Web-Based Social Engineering Attacks Taking Increasingly Popular Forms

These techniques include web site spoofing and web-based file sharing service exploits. Organizations and their security professionals must be prepared for nearly anything when it comes to how attackers will attempt to exploit them. A new report hig…

Read More
Security, Email Security

Cybersecurity Trends: Our Most Read Blogs of 2019 Q2

See what caught the eyes of Cyber Resilience Insights readers last quarter. With the second quarter of 2019 in the books, we wanted to provide you a one-stop shop for the most-read new content we posted on Cyber Resilience Insights during that time. …

Read More