Produktivität

Mimecast Partner Awards 2016 – A Night of Winners

Last week we saw two of the most important occasions in our UK channel world – this year’s UK Mimecast Partner Awards and CRN Fight Night 2016. This time, we were proud to sponsor fight night along with other tech brands such as AMD and Trend Micro.A…

Lesen Sie mehr dazu

The Real Reason LinkedIn 2012 Hack Credentials Are On Sale

Surely everyone changed their LinkedIn credentials in 2012, when the LinkedIn hack was made public right?Furthermore, most users would have doubled down on their credential security - changing their passwords to something complex and perhaps using a …

Lesen Sie mehr dazu
Sicherheit

Do You Know the Five Phases of a Whaling Assault?

It’s no secret that social engineering attacks, like phishing, spear-phishing and domain spoofing have grown from being a nuisance to a colossal problem. But, perhaps the most colossal problem of the moment is Business Email Compromise, otherwise cal…

Lesen Sie mehr dazu
Archivierung

Mimecast Wins Big at MES East

 Stop me if you’ve heard this one: my first week at Mimecast went so well that my manager sent me to Indianapolis for the state’s presidential primary. Full disclosure: Indiana’s presidential primary happened to coincide with the 2016 Midsize E…

Lesen Sie mehr dazu
Produktivität

Mimecast’s Partner Program Gets a 5-Star Rating, ‘Channel Chief’ and ‘Woman of the Channel’ Wins

Mimecast’s U.S. Partner Program has been recognized by CRN in a few different areas for outstanding performance and growth. First, it has given Mimecast a 5-Star rating in its 2016 Partner Program Guide. The guide is the definitive listing of technol…

Lesen Sie mehr dazu
Sicherheit

Predictive Cybersecurity: Out with Garbage, In with Data

The answer to email cybersecurity threats isn't simple. The email threat vector is complex, and your company's on-premises and DIY security solutions aren't always enough against the determined and advanced cybercriminal.Achieving truly proactive pro…

Lesen Sie mehr dazu
Continuity, Office-365

Be Prepared: Top 5 Questions to Ask to Ensure Continuity in the Cloud Email Era

Microsoft® Office 365™ is proving popular and adoption continues to accelerate.  A recent Gartner study found that 78 percent of IT decision makers say their organization is already using or is planning to use Office 365. This is 13 percentage p…

Lesen Sie mehr dazu
Sicherheit

Cybersecurity and Psychology of Whaling

There's a new threat in cybersecurity and it's aimed at the business world's biggest targets. The FBI estimates that Business Email Compromise (BEC) – CEO fraud or "whaling" - increased more than 270%.The FT reports total potential global losses incr…

Lesen Sie mehr dazu
Productivity, Security

Are You a Nervous IT Security Pro or an Equipped Veteran?

You think you’re prepared to deal with cybersecurity threats. But, what if your organization became the target of a whaling attack, spear-phishing or weaponized attachment? These are just a few methods hackers and cybercriminals use to steal confiden…

Lesen Sie mehr dazu