Office 365

Office 365™ Extends Lead in Cloud Adoption

A recent survey confirms that Microsoft Office 365 continues to outpace Google’s G Suite in the race to the cloud. Overall it’s clear that more organizations are using cloud or hybrid deployment models over on-premises, but let’s dig into the survey …

Lesen Sie mehr dazu
Archiving, Productivity

Breakaway: Gartner Names Mimecast a Leader in 2016 EIA Magic Quadrant

We’re honored and humbled by Gartner’s recognition of Mimecast Cloud Archiving in its 2016 Magic Quadrant for Enterprise Information Archiving. With this year’s recognition, Mimecast has been named as a Leader for the second year in a row.  More…

Lesen Sie mehr dazu
Sicherheit

Planning for Tomorrow’s Cyberattacks

The end of a year is often a time of reflection as organizations focus on what they might do differently in the year to come, how they might align themselves against their competitors, and up their game. As organizations think through their cybe…

Lesen Sie mehr dazu
Sicherheit

Mimecast Security Services Scoop Industry Awards

We are very pleased to share that Mimecast recently won two industry security awards. Firstly, Mimecast won Security Vendor of the Year at the CRN Channel Awards 2016 held in London at the Battersea Park Events Arena. With Office 365 adoption growing…

Lesen Sie mehr dazu
Sicherheit

Cyber Resilience Planning: Life or Death for the Medium Enterprise

 Nowadays, no one is safe from being the target of a cyberattack, especially as more businesses move to the cloud: The U.S. SMB cloud computing and services market is expected to grow from $43 billion in 2015 to $55 billion in 2016.  This …

Lesen Sie mehr dazu
Sicherheit

Enhancing Security versus Buying Cyber-Insurance – Substitutes or Complements?

Ab und an höre ich ansonsten sehr vernünftige Sicherheitsmitarbeiter in Frage stellen, wieso sie ihre Sicherheitskontrollen verbessern sollten, wo doch eine Erhöhung des Cyber-Versicherungsschutzes viel einfacher und kostengünstiger ist – so als handelte es sich dabei um zwei gleichwertige Alternativen. …

Lesen Sie mehr dazu
Sicherheit

Six Top Moments at Black Hat EU

Letzte Woche auf der Black Hat Europe hatte Mimecast das Vergnügen, Hunderte Menschen aus der ganzen Welt zu treffen.  Es wurden viele Gespräche geführt und mit Sicherheit als Schwerpunkt der Konferenz war Mimecast in der Lage, zu zeigen, wie unsere Produkte ...

Lesen Sie mehr dazu
Archivierung

Our Top 3 Takeaways from The Forrester Wave: Information Archiving Cloud Providers Report

The just-released The Forrester WaveTM: Information Archiving Cloud Providers, Q4 2016 provides a fascinating touchpoint on the rapid evolution of the State of Archiving. We hold Forrester Research in high regard as a global leader in research and ad…

Lesen Sie mehr dazu
Sicherheit

It's Not Just The Ransom You're Losing: Quantifying the Real Cost of Malware Attacks

It takes just half a second to infect a computer with ransomware, but affected companies deal with the fallout for months. The FBI estimates that more than 4,000 ransomware attacks occur each day in the U.S. – representing a 300% …

Lesen Sie mehr dazu
Sicherheit

Why Cyber Resilience in Today's Complex Environment Requires an Integrated Ransomware Solution

More than 50 new types of malware used in ransomware attacks were released in the first half of 2016 alone. The pace of ransomware attacks is escalating. Nearly 40% of companies have been hit with ransomware attacks this year, and the …

Lesen Sie mehr dazu
Security, Office-365

Werden Sie niemals zur Geisel von Ransomware

What often impacts more than 100,000 computers a day, and can cost you thousands of dollars in remediation, downtime, and cleanup cost? Ransomware. In a ransomware attack, you are literally held hostage and denied access to critical productivity…

Lesen Sie mehr dazu
Office 365

What You Need to Know Now About Our Data Logging API & Splunk Application

Mimecast is pleased to announce the general availability of the Data Logging Application Programming Interface (API) and Splunk application. The API allows customers and partners to integrate data to their security information and event management (S…

Lesen Sie mehr dazu
Sicherheit

Key Facts About Ransomware

Have you ever wondered about the key issues with ransomware? How it might affect you or even what to look for? Maybe you're simply curious as to how to react when you get hit? Look no further than this whiteboard session with our in-house security ex…

Lesen Sie mehr dazu
Archivierung

Six Critical Considerations for Exchange Online Archiving

Adoption of Office 365 continues to grow rapidly, adding 50,000 customers a month, with Exchange email remaining the number one workload. At the same time, increasing regulation, litigation, and operational drivers necessitate the need for speedy, a…

Lesen Sie mehr dazu
Produktivität

Roadshow Podcast - Episode 3

Episode 3: ILTACON Event, Washington DC   J Peter Roadshow Podcast - Episode 3   J. Peter, where are you? Greetings!  J .Peter here and this week I’m in Washington DC.  DC is an amazing town with so many historical locat…

Lesen Sie mehr dazu
Sicherheit

Cybersecurity at Microsoft Ignite 2016

When fall rolls around this year you may want to be in Atlanta, GA for Microsoft's Ignite 2016, where cybersecurity will be front and center. The 2015 conference sold-out early, so if you haven't secured your conference passes yet you may be out…

Lesen Sie mehr dazu
Produktivität

Roadshow Podcast- Episode 2

Episode 2: Lunch Event at the Palms - Nashville, TN J Peter Roadshow Podcast - Episode 2   Q: J. Peter, where are you? A: Greetings!  J .Peter here and this week I’m in Nashville Tennessee.  When I think of Nashville I think of country…

Lesen Sie mehr dazu
Sicherheit

Four Tips to Defend Against the Malicious Insider

I am in the middle of my second week here at Mimecast and am excited to focus on all things security. The timing of my arrival is good as we just released  important new data around malicious insiders. Here’s my take on the topic … The…

Lesen Sie mehr dazu
Productivity, Security

Seven Top Moments at Black Hat

This past week Mimecast had the pleasure of attending the Black Hat Event in Las Vegas, NV. The atmosphere was energetic and our booth, although small, was mightier than any other booth on the floor. The Mimecast team varied members from marketing to…

Lesen Sie mehr dazu
Office 365

Road Show Podcast: Episode 1

Episode 1:  Microsoft Worldwide Partner Conference in Toronto, Canada JP-Roadshow-Toronto   Q: J. Peter, where are you? A: Greetings! This week I’m in Toronto Canada. Toronto is an interesting place to visit. Whenever I visit a city I …

Lesen Sie mehr dazu
Office 365

Road Show Podcast 2016

Get ready as Mimecast travels the world in a “Road Show” with J.Peter Bruzzese, a Microsoft MVP. Listen to each episode as he works with us to help share his experiences. He’ll be starting July 11th in Toronto, Canada and ending on December 9th in Or…

Lesen Sie mehr dazu
Sicherheit

Mr. Robot Highlights the Price Point Temptation of Email Ransomware

“5 days for a banking system to be down? That’s a lot of money down the drain… We can’t afford this hack right now… And frankly I think we can find 5.9million in between our couch cushions. It’s nothing.” - Susan Jacobs, general counsel, E Corp …

Lesen Sie mehr dazu
Continuity, Migration

Verbesserte Administrator-Konsole stärkt das Kundenerlebnis

Bei Mimecast steht das beste Kundenerlebnis im Zentrum aller Aktivitäten. Ganz gleich, ob Sie unsere Dienste bereits nutzen oder noch kein Kunde sind, unsere Mission ist es, die Anforderungen unserer Kunden zu erfüllen und zu übertreffen und das Kundenerlebnis leicht und angenehm zu gestalten. Die…

Lesen Sie mehr dazu
Office 365

Office 365 Outage – What’s Your Plan B?

Yesterday, Office 365 suffered hours of service degradation, causing major email and business disruption. The media reported that Exchange Online Protection's filtering infrastructure could have been at fault. Now imagine this: It’s early afternoon …

Lesen Sie mehr dazu
Sicherheit

New Attack Vector Outlined in the FBI’s Business Email Compromise Warning

 The FBI has issued a stark warning about a rapidly-growing and downright brazen new email attack technique: simply asking employees for your critical data. Mimecast is urging organizations to think broadly about expanding new email security tra…

Lesen Sie mehr dazu
Sicherheit

Five Ways to Defend Against Rising Tide of Microsoft Office Macro Malware

In a brief warning alert last week, US-CERT urged individuals and organizations to proactively secure systems against an increase in malware spread via macros. Mimecast is today offering new guidance to help organizations combat this threat…

Lesen Sie mehr dazu
Sicherheit

Evolving Email Security Landscape Puts Cyber Insurance Policies at Risk

Cyber insurance uptake is growing quickly but a lack of employee training on the latest email attacks is leaving organizations at great risk of breaking policy terms. These new social-engineering and impersonation attacks could leave leaving firms of…

Lesen Sie mehr dazu
Continuity, Security

Infosecurity 2016: A New Frontier of Threats and Countermeasures

This will be the second Infosecurity Europe since its return to Olympia last year. We've been regular exhibitors at the premier European security show for years and been part of an era of fundamental changes in the security industry. Let’s …

Lesen Sie mehr dazu
Sicherheit

Mimecast Wins at Protecting Firms of All Sizes Against Whaling

Organizations of all shapes and sizes face a significant threat from cybercriminals. But small- and mid-sized firms may face heightened risk, as they are often targets, not only themselves, but also for those trying to attack their customer base thro…

Lesen Sie mehr dazu
Produktivität

Mimecast Partner Awards 2016 – A Night of Winners

Last week we saw two of the most important occasions in our UK channel world – this year’s UK Mimecast Partner Awards and CRN Fight Night 2016. This time, we were proud to sponsor fight night along with other tech brands such as AMD and Trend Micro.A…

Lesen Sie mehr dazu

The Real Reason LinkedIn 2012 Hack Credentials Are On Sale

Surely everyone changed their LinkedIn credentials in 2012, when the LinkedIn hack was made public right?Furthermore, most users would have doubled down on their credential security - changing their passwords to something complex and perhaps using a …

Lesen Sie mehr dazu
Sicherheit

Do You Know the Five Phases of a Whaling Assault?

It’s no secret that social engineering attacks, like phishing, spear-phishing and domain spoofing have grown from being a nuisance to a colossal problem. But, perhaps the most colossal problem of the moment is Business Email Compromise, otherwise cal…

Lesen Sie mehr dazu
Archivierung

Mimecast Wins Big at MES East

 Stop me if you’ve heard this one: my first week at Mimecast went so well that my manager sent me to Indianapolis for the state’s presidential primary. Full disclosure: Indiana’s presidential primary happened to coincide with the 2016 Midsize E…

Lesen Sie mehr dazu
Produktivität

Mimecast’s Partner Program Gets a 5-Star Rating, ‘Channel Chief’ and ‘Woman of the Channel’ Wins

Mimecast’s U.S. Partner Program has been recognized by CRN in a few different areas for outstanding performance and growth. First, it has given Mimecast a 5-Star rating in its 2016 Partner Program Guide. The guide is the definitive listing of technol…

Lesen Sie mehr dazu
Sicherheit

Predictive Cybersecurity: Out with Garbage, In with Data

The answer to email cybersecurity threats isn't simple. The email threat vector is complex, and your company's on-premises and DIY security solutions aren't always enough against the determined and advanced cybercriminal.Achieving truly proactive pro…

Lesen Sie mehr dazu
Continuity, Office-365

Be Prepared: Top 5 Questions to Ask to Ensure Continuity in the Cloud Email Era

Microsoft® Office 365™ is proving popular and adoption continues to accelerate.  A recent Gartner study found that 78 percent of IT decision makers say their organization is already using or is planning to use Office 365. This is 13 percentage p…

Lesen Sie mehr dazu
Sicherheit

Cybersecurity and Psychology of Whaling

There's a new threat in cybersecurity and it's aimed at the business world's biggest targets. The FBI estimates that Business Email Compromise (BEC) – CEO fraud or "whaling" - increased more than 270%.The FT reports total potential global losses incr…

Lesen Sie mehr dazu
Productivity, Security

Are You a Nervous IT Security Pro or an Equipped Veteran?

You think you’re prepared to deal with cybersecurity threats. But, what if your organization became the target of a whaling attack, spear-phishing or weaponized attachment? These are just a few methods hackers and cybercriminals use to steal confiden…

Lesen Sie mehr dazu
Sicherheit

Mimecast Welcomes Email Privacy Act

Mimecast welcomes a new bill designed to protect emails and other electronic communications.   Can you remember the world in 1986? Aliens, Top Gun and Labyrinth were on at the movies and brick phones weighed the same as a bag of sugar. The …

Lesen Sie mehr dazu
Produktivität

Healthcare Orgs Don’t Have to Fear the Cloud: Mimecast HIPAA Compliance Verified

Cybercriminals use email as a gateway for data breaches. This is not old news. New cyberattacks happen almost daily across all industries. The bad news is, the speed of innovation for email threats has skyrocketed in the last year. If you don’t …

Lesen Sie mehr dazu
Sicherheit

Trust Matters at Mimecast

Mimecast recently announced it has completed two important security tests: the Health Insurance Portability and Accountability Act (HIPAA) Security Compliance Assessment and Service Organization Control 2 Type 1 (SOC 2 Type 1) Independent Servic…

Lesen Sie mehr dazu
Sicherheit

Another Tax Year. A New Email Scam to Watch out For

This time, the threat is not from an African prince but your own CEO or CFO.  The 2016 tax season has been marked again with the expected number of spammy cyberattacks – the bad guys taking advantage of the time of year to target taxpayers by pr…

Lesen Sie mehr dazu
Sicherheit

Today, Technology Can Help Stop Whaling Email Attacks

Today we launched the world’s first service designed specifically to stop whaling (CEO fraud) attacks.Since previewing it at the RSA Conference in March, we’ve had a lot of interest in Impersonation Protect. And, as part our commitment to continuous …

Lesen Sie mehr dazu
Sicherheit

Obama stellt 19 Mrd. US-$ für Cybersicherheit zur Verfügung: Bitte sinnvoll ausgeben

We should welcome the move by Obama’s administration to go after more funding – defending the nation from the growing threat of cyberattacks has to be a priority for any world government. The focus on more money for improving private, public and…

Lesen Sie mehr dazu
Productivity, Security

IT Security Is a Team Sport

It seemed clear to a lot of the speakers and delegates at the recent RSA Conference that protecting organizations from cyberattack is not just the responsibility of the IT security team. Shared responsibility is the expression on everyone's lips.Many…

Lesen Sie mehr dazu
Sicherheit

Your People Are Under Cyber-attack – It Just Makes Economic Sense

 Protecting yourself from cyber-attack used to be about technology. But I have heard it repeated time and time again this week at the industry’s annual go-to security event, RSA Conference in San Francisco, that this is not enough. Spear-ph…

Lesen Sie mehr dazu
Sicherheit

Cyber-Criminals Are Making Hay Exploiting CEOs and CFOs

In recent months we have seen a growth in a new form of targeted attack in email specifically aimed at defrauding CEOs and CFOs, and duping their teams into wiring cash to cyber-criminals and hackers. These Business Email Compromise (BEC) or so-calle…

Lesen Sie mehr dazu
Productivity, Security

Join a Security Team - Be Part of Something Important

I am in San Francisco this week for the annual security event, RSA Conference. This year, aside from the normal discussions about attacks and defense techniques and technology, the industry has returned again to a topic close to my heart:  Skill…

Lesen Sie mehr dazu
Sicherheit

RSA Conference Day One in Words and Phrases

I sat through an interesting first day of keynotes yesterday and a pattern quickly revealed itself in the speeches or comments of the many and varied speakers. So, I thought I would pen my own quick summary. I will resist the temptation to creat…

Lesen Sie mehr dazu
Sicherheit

How to Protect Employees from Whaling Email Attacks

Whaling, CEO-Betrug und Business E-Mail Compromise (BEC) bergen viele Risiken für Unternehmen auf der ganzen Welt. E-Mail-Angriffe dieser Art nutzen einfaches Social Engineering mit eloquenter Vortäuschung, um Mitarbeiter zur Übergabe kritischer Daten oder zu betrügerischen …

Lesen Sie mehr dazu
Sicherheit

RSA 2016: A Seismic Week in Security

 As the RSA Conference team gears up for their 25th  year anniversary gala I’m proud to say that my 16 years  in the information security industry has provided me the opportunity to participate at various levels, including a run as the…

Lesen Sie mehr dazu
Productivity, Continuity, Security

65 Percent of IT Security Experts Feel Unprepared to Defend Against Email-Based Attacks

Today, we launched our new Mimecast Business Email Threat Report 2016. The survey of 600 IT security professionals shows that while 64 percent see email as a major cyber-security threat to their business, 65 percent also feel ill-equipped or too out-…

Lesen Sie mehr dazu
Sicherheit

BlackEnergy – The Trojan We Should be Talking About

Just before Christmas, half of the residents of the Ukrainian Ivano-Frankivsk region were left without electricity for hours. According to the Ukrainian news media outlet TSN, the cause of the blackout was a “hacker attack” utilizing a “virus” t…

Lesen Sie mehr dazu
Kontinuität

When Is an Outage Not a Priority?

When Microsoft Office 365 went down again last month, a painful truth emerged as the outage rolled on for several days – a big deal for your company is not always a big deal for Microsoft.There’s been repeated Office 365 cloud email outages recently,…

Lesen Sie mehr dazu
Archivierung

How the Cloud Has Changed Email Archiving Forever

Organizations of all sizes, across all industries, rely on archiving solutions to preserve critical data for compliance and e-discovery, and email is a primary contributor to these systems. For archiving, we’ve historically relied on tapes, disc…

Lesen Sie mehr dazu

What’s in a Mail?

Email stationery seems to be one of the most valuable, yet under-utilized, pieces of business real estate available. Why is this so? Well, it’s generally a hazy area of responsibility that sits between IT and Marketing and is often given very little …

Lesen Sie mehr dazu
Produktivität

CISO of 2016 – Balancing Prevention and Remediation

If last year’s leaks, hacks and breaches have taught us anything, be they from Fortune 500 companies or our own personal accounts – it is that cyber security, especially concerning email management, is now a top priority. Before we get further into w…

Lesen Sie mehr dazu