Archivierung

Cloud Archiving: The Benefits of Super-Fast Email Searches

How fast search improves email discovery and law firm productivity You may think seconds count only in sports, medical emergencies or other crisis situations. But the fact is, seconds count at work, too. When you consider that the average user sends…

Lesen Sie mehr dazu
Sicherheit

Jahresrückblick: E-Mail-Sicherheit 2017

Das haben wir im Jahr 2017 zum Thema Sicherheit gelernt. 2017 waren die Schlagzeilen voll von Nachrichten zu verschiedenen großangelegten Cyberangriffen: WannaCry. Zu Jahresbeginn 2017 beeinträchtigte diese Crypto-Ransomware mehr als 200.000 Computersysteme bei kleinen und mittelständischen Unternehmen, multinationalen …

Lesen Sie mehr dazu
Sicherheit

What the Change in UK Government Email Domains Means for Email Security

All Change Please. Updating UK Government Email Domains The UK Government has recently announced the end to email domains with ‘.gsi’ in them. This move will also see the Government move away from the proprietary legacy infrastructure (Government Se…

Lesen Sie mehr dazu
Sicherheit

Trends im Bereich E-Mail-Sicherheit 2017

Haben Sie das Neueste aus der Welt der E-Mail-Sicherheit verpasst?  Haben Sie Probleme, mit all den verschiedenen Neuigkeiten über E-Mail-Angriffe mitzuhalten? Kein Problem! Mimecast hat die Lösung für Sie. Unsere Blog-Serie „Trending News“ wird Sie schnell auf den neuesten Stand bringen was ...

Lesen Sie mehr dazu
Sicherheit

Cyber resilience: A foundation for digital transformation

Cyberattacks are inevitable. Close the cyber resilience loop. Security protection has long hinged on the idea of detecting and blocking threats. This approach has been so common that many companies focus on malware detection while neglecting the pol…

Lesen Sie mehr dazu
Sicherheit

The Mimecast Email Security Risk Assessment – December Release

December ESRA reports show a rise in impersonation attacks. We recently announced the 4th in a series of quarterly reports aggregated from our Email Security Risk Assessment (ESRA) testing program.  For those new to the Mimecast ESRA program, i…

Lesen Sie mehr dazu
Sicherheit

Mime Wars: Rogue User

A long time ago in an office far, far away… *horns – Ba-da-da-da-da duh-duh-dun dun dun dah* MimeWars7   Castor, a young Rebel officer toils away at his desk counting the parsecs *true fan only joke* until he can escape the monotony of labor. It…

Lesen Sie mehr dazu
Sicherheit

Getting Ready for Australia’s NDB

Australia’s Notifiable Data Breach regime is just weeks away. Are you ready? It may seem like there is a lot of time until Australia’s Notifiable Data Breach (NDB) regime kicks off – but there isn’t. As the festive season leads you to one Christmas …

Lesen Sie mehr dazu
Sicherheit

Healthcare Provider Survey Finds Email Most Likely Source of Data Breach

Security in the healthcare industry is receiving a great deal of attention and for good reason. From the fear of medical devices being taken over, to operational disruptions that impede patient care, the impact of a cyberattack can be far-reaching wi…

Lesen Sie mehr dazu
Sicherheit

‘Tis the season for email fraud – so don’t open the wrong package

Everyone loves a gift, but many appealing-looking emails turn out to be lumps of coal Like clockwork, the end of the year marks the winding down of the Australian business year and the start of the silly season. Black Friday and Cyber Monday shoppin…

Lesen Sie mehr dazu
Archivierung

Migrating to a new archive data solution doesn’t have to be hard

Data Archiving Myth #5: “Migrating Legacy Archive Data Must Be a Royal Pain, Right?” I’ve been putting this off because I think it’s going be such a pain. If you’ve heard this little voice inside your head, you’re not alone. Many IT pros loathe the …

Lesen Sie mehr dazu
Kontinuität

Schutz vor E-Mail-Ausfällen bei Office 365

Jede Cloud hat mal einen schlechten Tag. Sind Sie darauf vorbereitet?  Ihr Unternehmen hat sich aufgrund der Vorteile eines Wechsels in die Cloud für eine Migration zu Office 365™ entschieden. Doch trotz der Kosteneinsparungen und Flexibilität, die eine cloud-basierte E-Mail-Lösung bietet, gibt es …

Lesen Sie mehr dazu
Archivierung

Cloud Archiving Solutions for Compliance And E-discovery

Cloud archiving saves money and takes the sting out of e-discovery and compliance. Most organizations have a lean IT team.  Some might say that they “spread their peanut butter too thin.” Running e-discovery queries and chasing compliance requi…

Lesen Sie mehr dazu
Office 365

Office 365 Email Security – How to Face the Challenges

Mitigate risk while moving to the cloud. If there’s one thing IT professionals can agree on, it’s that the cloud is impacting every aspect of their business. As a result, email is undergoing a fundamental shift as organizations transition from on-pr…

Lesen Sie mehr dazu
Sicherheit

Be Prepared: Cyber Security for Higher Education

Cyber Security for Higher Education: What Colleges & Universities Need to Know Institutions of higher learning don’t just disseminate knowledge, they store it. Extensive data repositories hold proprietary information about vital scientific and a…

Lesen Sie mehr dazu
Archivierung

So verbessert Unternehmensarchivierung die E-Discovery

Erhöhen Sie die Schlagkraft Ihrer E-Discovery-Suche durch die Migration Ihrer Legacy-Archivdaten. „Die Migration von Legacy-Archivdaten in die Cloud sowie zu weiteren, ordnungsgemäß gesicherten Plattformen kann einen raschen, einfachen Zugang zu wichtigen Daten ermöglichen, die für den Betrieb von …

Lesen Sie mehr dazu
Sicherheit

Find Your Weakest Link to Protect Against Malware

Malware everywhere. With 40,000 employees in 140 countries and 1200 staff in Australia alone, “You don’t have to look too far to find examples” of the methods email fraudsters are using today, Grant Thornton information security manager Gavin Townse…

Lesen Sie mehr dazu
Sicherheit

Defend Against Malicious Email Attachments and Malware

Think your users would never fall for an email scam? Think again. According to Verizon’s Data Breach Investigation Report for 2017, two-thirds of cybersecurity breaches are caused by malware installed by malicious email attachments, and 43 percent o…

Lesen Sie mehr dazu
Archivierung

Leading Today with Tomorrow’s Archive

Mimecast Named a Leader in EIA Magic Quadrant for 3rd Year in a Row. As data grows, compliance challenges evolve and organizations demand more value from their data, the importance, and use of enterprise information archiving (EIA) technology is per…

Lesen Sie mehr dazu
Archiving, GDPR

5 Reasons Your Archive Data Solution Will Do You Wrong

The Bitter Truth: Why your legacy data archiving solution is bound to let you down You’ve put a lot of trust in your legacy file archiving solution. And back in the day, it was worthy of it. But your old system isn’t trustworthy in a changing landsc…

Lesen Sie mehr dazu
Office 365

Choosing the Right Remedy for Office 365 Security Gaps

There’s more than just security concerns when it comes to Office 365 In a global survey of 600 IT professionals, nearly half characterized themselves as “highly concerned” about email security gaps in Microsoft Office 365TM. Not surprisingly, 9…

Lesen Sie mehr dazu
Archivierung

When Good Chains of Custody Go Bad: 3 Data Governance Horror Stories

Ensure your email chain of custody against both outside and inside attacks Maintaining a secure chain of custody of your email archives is an essential element of effective data governance. Chain of custody ensures that all archived data is handled …

Lesen Sie mehr dazu
Sicherheit

Protecting the Healthcare System from Cyberattacks

Healthcare Cybersecurity Task Force Recommends New Ways to Protect from Cyberattacks. Last year HHS established the Health Care Industry Cybersecurity Task Force following the passage of the Cybersecurity Act of 2015. The Task Force was composed of …

Lesen Sie mehr dazu
Archiving, Continuity, GDPR

Not Just a Nice to Have. 7 Reasons an All-in-One Cloud Archive Is a Business Necessity

An all-in-one cloud archive is a difference-maker for your business. There is one answer to all the email archiving problems you have: the cloud. And there are seven reasons why: 1. Simplicity: My business is complex enough. Data: 59% of businesses …

Lesen Sie mehr dazu
Sicherheit

KnockKnock Cyberattack Exposes Key Security Concerns with Office 365

KnockKnock. Who’s There?  The latest attack on Office 365 The recently disclosed Knockknock attack brings up a few key lessons on Office 365 security. Broadly used platforms make easy targets for attackers As the popularity of a platform rises,…

Lesen Sie mehr dazu
Sicherheit

Cyberattacks on K-12 School Systems: Are you Ready?

What You Can Learn from Recent Cyber Attacks Targeting School Systems  Just after the school year commenced, Steve Bradshaw, superintendent of the Columbia Falls, Montana, schools got a menacing text from a number he didn’t recognize. The cyber…

Lesen Sie mehr dazu
Sicherheit

AEHIS 2017 Fall Summit: The “Inside Track”

Bringing Healthcare CISOs Together to Discuss Security Risk Management As a strategic advisor to Mimecast and planning committee member of the 2017 AEHIS/CHIME event in San Antonio, I see firsthand how healthcare IT security leaders are challenged d…

Lesen Sie mehr dazu
Office 365

Making Office 365 Safer for Business

For the past 20 years, every time you deployed an Exchange environment, you surrounded it with an ecosystem of third-party solutions to bolster its capabilities and enhance the overall solution.  You added a secure gateway solution, a backup/rec…

Lesen Sie mehr dazu
Sicherheit

Der wirkliche Vorteil davon, Ihre Sicherheitskontrollen in die Cloud zu verschieben

Der „Netzwerk-Effekt“. Die meisten Sicherheitskontrollen, insbesondere traditionell als netzwerk-orientiert aufgefasste Kontrollen (d. h. nicht endpunkt-orientierte Kontrollen), werden in die Cloud verschoben – das ist allseits bekannt.  Viele sind der Meinung, dass dies daran liegt, dass …

Lesen Sie mehr dazu
Archivierung

Zwei gute Gründe, warum Sie die Migration von Legacy-Archivdaten nicht überstürzen sollten

Warum Sie die Migration von Legacy-Archivdaten nicht überstürzen sollten. Derzeit ist ein Wechsel in die Cloud in aller Munde. Daten von Gartner, Inc. zufolge wird geschätzt, dass der globale Markt für Public-Cloud-Dienste 2017 um 18 % auf 246,8 Milliarden US-$ wachsen wird. Und viele …

Lesen Sie mehr dazu
Security, GDPR

Equifax Breach: Tips for email security and GDPR compliance

What Your Business Can Learn from the Equifax Breach With some 145.5 million people around the globe victimized by the Equifax breach, it’s easy to focus on that enormous number. But there’s another figure looming out there: regulatory fines. These …

Lesen Sie mehr dazu
Sicherheit

An Effective Cyber Resilience Strategy for Healthcare

HELPING HEALTHCARE PROVIDERS UNDER CYBER ATTACK The healthcare industry is under cyber attack. It is the victim of high-profile ransomware attacks - in some cases, such as the recent WannaCry outbreak, entire hospital operations have been shut down.…

Lesen Sie mehr dazu
Archivierung

Archiving Today - Your Digital Memory

Get Ready to Think Differently About Archiving What does the word “archive” mean to you? Something that is old, musty and boring? Or maybe a necessary evil required to maintain compliance and e-discovery requirements? Perhaps archive means expensive…

Lesen Sie mehr dazu
Archivierung

Mimecast hinter den Kulissen – von Silicon Valley bis hin zur Cloud

Amanda Crew macht die Arbeit mit der Crème de la Crème von Hollywood zum Kinderspiel. Um unser bevorstehendes virtuelles Event noch interessanter zu machen, hat sich Mimecast Hilfe von Amanda Crew aus dem HBO®-Serienhit „Silicon Valley“ geholt: Sie präsentiert typische Archivfehler, mit denen sich Unternehmen …

Lesen Sie mehr dazu
Archivierung

Office 365™ Isn’t the Archiving Powerhouse You Think It Is

Office 365 doesn’t actually provide all the archiving capabilities you need. No Joke: Office 365™ Isn’t Really an Archiving Solution Perception: I’m good. I’ve got Office 365. Reality: Not so fast. Literally. Office 365 is hamstrung by a legacy Exch…

Lesen Sie mehr dazu
Archivierung

Myth Busted: I Don’t Need Archiving, I’ve Got the Cloud

News Flash: Cloud storage and cloud email archiving aren’t the same thing Cloud storage is great, but it’s not the same thing as cloud archiving. Perception: My business won’t need archiving once we move to the cloud. Reality: Um, no. Storage just h…

Lesen Sie mehr dazu
Archivierung

Sie glauben, dass E-Mail-Archivierung nur Rechts- und Risikoexperten etwas angeht? Falsch gedacht!

Warum es sein kann, dass Sie im Hinblick auf den unternehmensweiten Wert von E-Mail-Archiven falsch liegen. Wie ein Mythos in Bezug auf E-Mail-Archivierung Ihr gesamtes Unternehmen lahmlegen kann. Wahrnehmung: Archivierung bietet nur Vorteile für unsere Rechts- und Risikomanagement-Abteilung. Realität: Eine sinnvolle E-Mail-Archivierung …

Lesen Sie mehr dazu
Archiving, GDPR

Why E-discovery & Compliance Matter for Every Business

You’re Wrong. Your Business *Does* Need to Worry About E-Discovery & Compliance Every business needs an email archive software, even yours. Perception: My business doesn’t need to worry about e-discovery or compliance Reality: Oh, yes it does. S…

Lesen Sie mehr dazu
Archivierung

Cloud Archiving: Perception vs. Reality

Perception vs. Reality: Get the facts about cloud archiving Are misconceptions about cloud email archiving holding you and your organization back? Don't be that guy or gal basing your success on alternative facts. We tackled four of the biggest misp…

Lesen Sie mehr dazu
Finance, Banking, Financial Advising, Insurance, IT, Telecommunications, Media, Legal, Accounting, Marketing, PR, Advertising, Design, Engineering, Recruitment, Manufacturing, Retail, Estate Agents, Hospitality, Wholesale, Transportation, Construction, Utilities, Oil & Gas, Health, Government, Pharmaceutical, Education, Non Profit/Charities, Property Development, Sports & Entertainment, Travel & Leisure, Food, Healthcare Manufacturer, Archiving

How to Accelerate E-Discovery

Erhöhen Sie Ihre Produktivität bei der E-Discovery durch einen rascheren Zugriff auf Archivdaten. Schnelligkeit ist für eine effiziente E-Discovery unerlässlich. Je länger dieser Vorgang dauert, desto mehr laufen Sie Gefahr, Fristen zu verpassen oder gerichtlichen Anforderungen nicht entsprechen zu können. „Die …

Lesen Sie mehr dazu
Sicherheit

Yahoo Breach: Don’t let a Good Crisis go to Waste

The Key Takeaway from the Yahoo Breach Breaches are now material to the survival of an organization With every breach, heavily publicized or not, there are always takeaways available to those that are interested in learning from them.  Yahoo an…

Lesen Sie mehr dazu
Archiving, GDPR

Streamline Workflows with Cloud Archiving

Super-Charge Productivity & Efficiency with Email Archive Solutions If you’re looking for a way to make your entire organization more productive and efficient – and who isn’t? – look to the cloud. Cloud email archive solutions enable you to strea…

Lesen Sie mehr dazu
Sicherheit

The Challenge of Keeping Patient Data Secure

6 Takeaways from the Becker’s Hospital Review 3rd Annual Health IT and Revenue Cycle Conference The Becker's Hospital Review 3rd Annual Health IT + Revenue Cycle Conference, held recently in Chicago, brings together hospital and health system chief …

Lesen Sie mehr dazu
Archivierung

How to Revolutionize Email with Cloud Archiving

Email Archivers: How to Stop Worrying and Love the Cloud Sick of the endless hunt for data in your email archives? Tired of wasting time with slow search for email? Confounded by the spiraling cost and complexity of archive data solutions? Concerned…

Lesen Sie mehr dazu
Archivierung

Automate E-discovery with an Enterprise Information Archiving Solution

Improve archiving speed and security for e-discovery and compliance Enterprise Information Archiving Automates e-Discovery We’re all striving to accomplish more in less time. Automated solutions relieve us from important-but-tedious, repetitive or b…

Lesen Sie mehr dazu
Security, Office-365

Email Security Shouldn’t Be an Afterthought When Moving to Cloud-Based Email

When moving to cloud-based email, security fears are at the forefront.  The move to Microsoft Office 365TM is driven by the benefits of transitioning to a cloud-based solution, including reduced hardware and maintenance costs. At the same time,…

Lesen Sie mehr dazu
Sicherheit

A Must Have Cyber Resilience Strategy for Kenya

Why Kenya needs to adopt a cyber resilience strategy right away   Kenya is enjoying a tech boom, which is clearly aiding the growth of its economy. However, with digital maturity comes increased risk, and industries often don’t realise that as …

Lesen Sie mehr dazu
Security, GDPR

National Health Service Cyber Security Fears and Resilience Strategy

NHS IT Leaders losing sleep over GDPR and cybersecurity fears  Makes you WannaCry Cyber-attacks like the WannaCry incident which crippled many National Health Service (NHS) trusts in May this year brought into sharp focus the aging IT infrastru…

Lesen Sie mehr dazu
Kontinuität

Office 365 Is Down, Again

Böses Erwachen für Office 365-Nutzer am Montag. Office 365 ist offline. Mitarbeiter, die sich am Montag bei Office 365 angemeldet haben, mussten feststellen, dass sie weder E-Mails senden noch abrufen konnten – nicht gerade das, was man sich vom Start in eine neue Woche erhofft. Microsoft hat bestätigt, dass einige Office 365 …

Lesen Sie mehr dazu
Sicherheit

Improving Care for Protected Health Information

The nature of the critical care that healthcare provides necessitates that providers be custodians of highly sensitive patient data. It’s just impossible to imagine a scenario where highly skilled medical staff wouldn’t have access to personal and m…

Lesen Sie mehr dazu
Archivierung

Why a Single-Pane View is Critical in Hybrid Mail Environments

When Visibility into Your Mail Archive Is Cloudy, So Is Your Business Outlook The “single pane of glass” concept isn’t new, but it has new importance in the age of cybersecurity. If you can’t see what’s in your data center archive and the actions be…

Lesen Sie mehr dazu
Archivierung

Archived Email Data Governance: 4 Things You Need to Know

An effective data governance solution offers a strategic advantage Data governance is often thought of as a “check-the-box kind of thing”, according to Achmad Chadran, an archiving product marketing manager for Mimecast. It’s required, but, generall…

Lesen Sie mehr dazu
Archivierung

The 5 Biggest Challenges of Mobile Email Management

Cloud archiving addresses The many CHALLENGES of mobile email management  It’s hard to imagine getting through the day without using a cloud email service. Just keeping up with our own accounts is the tip of the iceberg. Mobile email management…

Lesen Sie mehr dazu
Archivierung

The 7 Worst Outcomes When Your Legacy Archive Solution Goes Down

What happens when your archive data solution has an #epicfail? Despite the popularity of the Worst Case Scenario franchise, few of us want to consider all the things that can go wrong when our legacy archiving solution is offline. Sure, we have rapi…

Lesen Sie mehr dazu
Sicherheit

How to Prepare for and Respond to an Email-Based Attack

This is not a drill.  Your email is under attack. Is your organization prepared? How will they respond?   No matter how well you prepare technically for and educate and train your team on cyber resilience, at some point you’re going to e…

Lesen Sie mehr dazu
Sicherheit

3 Tips for Expanding your Organization’s Advanced Security Strategy

With a leadership team in place and a set of known and likely email security threats identified, you’re ready to build out your advanced security strategy. 1. Engage all departments and levels. Make cybersecurity relevant for employees up and down t…

Lesen Sie mehr dazu
Sicherheit

5 Steps for Launching an Advanced Security Awareness and Training Initiative

  “Ultimately, the security chain is as strong as its weakest link and once a cybercriminal has compromised one account – even a junior employee – they can then leverage that account and move upwards through the organization, eventually getting…

Lesen Sie mehr dazu
Sicherheit

Advanced Security, Know the Data

Key Data on Why Cybersecurity is Everyone’s Business Cybersecurity is an emotional issue even for the toughest business executive – so much so that the fear of getting hacked may not be enough to override the fear of borrowing trouble. It can be eas…

Lesen Sie mehr dazu
Sicherheit

Introducing the ROPEMAKER Email Exploit

ROPEMAKER Email Security Weakness - Vulnerability or Application Misuse? Most people live under the assumption that email is immutable once delivered, like a physical letter.  A new email exploit, dubbed ROPEMAKER by Mimecast’s research te…

Lesen Sie mehr dazu
Archivierung

Cloud-Archivierung für die E-Discovery: wichtige Faktoren

How to Choose the Right File Archiving Solution  Choosing the right archiving software is critical to improving e-discovery and compliance. “If archiving is poorly performed, organizations can find themselves spending tens of thousands of dolla…

Lesen Sie mehr dazu
Archivierung

Tipps zur Verbesserung der Unternehmensarchivierung

A Few Important Steps on the Path to Better Data Governance Properly archived data is essential for effective data governance Let’s talk data governance here – and let’s start with a definition of the term. According to the Data Governance Institute…

Lesen Sie mehr dazu
Sicherheit

One Internet Minute, Millions of Opportunities for Cybercrime

High volumes of email and social media posts increase the risk of cybercrime Every minute, we’re handing hackers and other cybercriminals everything they need to take advantage of us. According to data published in the Business Insider, there’s a lo…

Lesen Sie mehr dazu
Security, GDPR

UK Data Protection Laws Update: How it affects US business

What you need to know about proposed updates to UK data protection bill. The UK Government recently announced its intent to install a set of sweeping updates to existing data protection law to “reflect the changing nature and scope of the digital eco…

Lesen Sie mehr dazu
Sicherheit

Prioritizing Cyber Resilience Preparedness

Cyber Resilience Preparedness:   Why it Needs to be a Priority Email-borne threats are on the rise. Surely, you haven’t forgotten about the recent Petya and WannaCry global malware outbreaks? According to new data from Vanson Bourne and Mi…

Lesen Sie mehr dazu
Sicherheit

Transforming your Organization into a Cyber Resilience Team

Educating your entire organization on advanced security.  Cybersecurity isn’t just a concern for your IT department. In fact, every employee who accesses the cloud interacts with the Internet of Things or opens an email is an important member o…

Lesen Sie mehr dazu
Sicherheit

Take 3: Email Security Risk Assessment Program

As promised in my last ESRA update blog, we are now ready to drop our third quarterly release on you. But before I get into the details of this ESRA report let me explain what the Mimecast Email Security Risk Assessment program is all about.  In…

Lesen Sie mehr dazu
Sicherheit

Dear Modern Business: Sincerely Future Hacker

    Dear Modern Business: Sincerely Future Hackers In Mimecast’s SlideShare presentation, we want to share with you a view from a hacker into the modern day cadence, and help you understand how their minds work so you can be prepared for a…

Lesen Sie mehr dazu
Archiving, Security, Office-365

5 Gründe, warum Sie Sync & Recover für Exchange und Office 365 brauchen

  Einführung Sync & Recover   Mimecast kündigt gerade eine neue Archivierungsfunktionalität an. Sie heißt Sync & Recover für Exchange und Office 365. Sync & Recover wurde entwickelt, um den Prozess der Wiederherstellung von E-Mails und sonstigen Exchange-Daten ...

Lesen Sie mehr dazu
Archiving, Continuity

Wir stellen vor: Mimecast Sync & Recover. Eine neue Lösung für den Schutz von Office 365-Daten.

Email Data Recovery from Mimecast: Solving an Industry Disconnect According to new data from Vanson Bourne, commissioned by Mimecast, nearly 80 percent of respondents said the ability to back up and recover email data is “very important.” However, o…

Lesen Sie mehr dazu
Sicherheit

Data Protection Regulation is Coming to Australia

Preparing for new Australian data protection regulations Embarrassing data breaches and crippling cyberattacks During 2016, Australia recorded the highest number of data breaches in the Asia-Pacific region, which included some high profile organisati…

Lesen Sie mehr dazu
Sicherheit

Countdown to a Ransomware Breach

Countdown to a Breach: Time, the Luxury no business can afford. In this SlideShare presentation Mimecast experts, Bob Adams and Matthew Gardiner, demonstrate to you just how precious your time really is. Having a ransomware protecti…

Lesen Sie mehr dazu
Sicherheit

Email Protection Tips: Training, Technology, Good Sense

Email Security Requires a Multi-Front Approach “It was a dark and stormy night, on a lonely stretch of road …” Thus begins your stereotypical crime novel. But let’s discuss an entirely different crime – fact, not fiction – that most commonly transpi…

Lesen Sie mehr dazu
Finance, Banking, Financial Advising, Insurance, IT, Legal, Manufacturing, Construction, Health, Government, Pharmaceutical, Healthcare Manufacturer, Security

5 Types of Ransomware Scams to Monitor

Top 5 Ransomware Scams to Watch Out For To combat the ransomware epidemic, everyone at your organization needs a “general understanding of what cyber threats look like, how we can follow best practices, and that it’s really up to all of us to help ke…

Lesen Sie mehr dazu
Sicherheit

Cybercrime Crisis Management: Communications Plans

Cybercrime Response: Why you need a crisis communications plan Before you brush me off, let’s take a quick look at some sobering numbers related to poor cybercrime crisis communications management, shall we? 46% of companies have experienced reputati…

Lesen Sie mehr dazu
Sicherheit

Cybersicherheits-Trends: Juni 2017

Missed the latest news in today’s cybersecurity world? Having trouble keeping up with all the various news stories on ransomware? No problem! Mimecast has got you covered. Our Trending News blog series will bring you up to speed on recent i…

Lesen Sie mehr dazu
Archiving, Security, GDPR

DSGVO Compliance – die Zielgerade

Die Uhren für die DSGVO ticken. In weniger als 12 Monaten tritt die neue EU-weite Datenschutz-Grundverordnung (DSGVO) in Kraft. Organisationen rund um den Globus müssen Datenschutzrichtlinien und Sicherheitskontrollen zum Schutz der ...

Lesen Sie mehr dazu
Europe, Continuity, Office-365

Office 365 Goes Down for Third Summer in a Row

For the second consecutive June 30th, Office 365 has had a disruption to the service. As reported in The Inquirer, users across Europe were having difficulty logging into services. Have you ever wondered what’s going on with the Office 365 services y…

Lesen Sie mehr dazu
Continuity, Security

Petya Ransomware – An Action Plan To Improve Your Cyber Resilience Against This Latest Mass Outbreak

Ransomware deja vu  The global reach and considerable impact of the current Petya ransomware outbreak bears a remarkable similarity to the WannaCry attack of just a few weeks ago.  This outbreak should serve a…

Lesen Sie mehr dazu
Sicherheit

How to Get Everyone Involved in Cybersecurity

Security professionals have a saying: “The attacker only has to be right once, we have to be right every time.” Translation? According to Jamie Winterton, director of strategy, ASU’s Global Security Initiative, it’s a call to action across the organi…

Lesen Sie mehr dazu
Archiving, Security, GDPR

5 Cybersecurity Challenges for Law Firms

A new report published by Legal Week Intelligence, in association with Mimecast, Cybersecurity – The Race to Protect, sheds new light on the myriad technology challenges law firms currently face. The report, a product of a series of interviews with I…

Lesen Sie mehr dazu
Sicherheit

It’s Your Business: Email Wire Transfer Fraud

Ihr Leitfaden zum Scam bei Banküberweisungen mittels geschäftlicher E-Mails. Im März 2017 verklagte das US-amerikanische Justizministerium (U.S. Department of Justice) einen litauischen Staatsbürger, zwei amerikanische Technologie-Unternehmen um einen Betrag von 100 Millionen US-$ gebracht zu haben, die diese freiwillig an Offshore-Bankkonten überwiesen hatten. Er täuschte …

Lesen Sie mehr dazu
Productivity, Security

Are Your Privileged Credentials Compromised?

5 More Ways Hackers Try To Steal Your Organization’s Privileged Credentials Hackers have a large portfolio of tactics to get their mitts on your organization’s privileged credentials, and they’re creating more every day. In addition to the big 3 Ways…

Lesen Sie mehr dazu
Sicherheit

Ihre vertraulichen Anmeldedaten sind in Gefahr

3 Möglichkeiten, wie Hacker versuchen, die vertraulichen Anmeldedaten Ihres Unternehmens zu stehlen. Laut „The Forrester Wave: Privileged Identity Management, Q3 2016“ sind bei stolzen 80 % aller Sicherheitsverstöße vertrauliche Anmeldedaten im Spiel.  Sehen wir uns die drei am häufigsten …

Lesen Sie mehr dazu
Sicherheit

Updated Email Security Risk Assessment

The Mimecast Email Security Risk Assessment – Take 2 As promised at the time of our first release of our ESRA results, we are now dropping the 2nd release of our aggregated ESRA test results.  And if you are pessimistic about the efficacy of mos…

Lesen Sie mehr dazu
Archiving, Security, GDPR

Mimecast Case Review App für die DSGVO

Simplify GDPR queries with Mimecast Case Review App  Email remains the vital hub of business communications and continues to grow with over 225 billion business emails sent and received every day. Huge amounts of personal information are stored…

Lesen Sie mehr dazu
Sicherheit

Why It's Time To Do Away With Tradition

Email security against advanced threats. It’s time to ditch the old-fashioned defenses against today's highly sophisticated threats. Stay safe with Mimecast.  The latest cyberattacks demand the most up-to-date defenses. Ransomware , imperso…

Lesen Sie mehr dazu
Sicherheit

Cyberattack Protection For Small Businesses

Cyberattack Protection For Small Businesses It seems as of late the IT security professionals of the world are becoming increasingly unhappy with the security products and services they are using.  I have the pleasure of speaking at conferences …

Lesen Sie mehr dazu
Sicherheit

Mimecast Culture: Behind the Scenes with Email Security Experts in Our Newest Promo Trailer for InfoSec2017

This past week I had the pleasure of shooting a promo trailer for InfoSecurity Europe 2017 with Mimecast security experts  Bob Adams and Steve Malone. As I got these two crazy guys up and running, I knew we were on to something great. They had a…

Lesen Sie mehr dazu
Sicherheit

Trending in Cybersecurity: May 2017

Missed the latest news in today’s cybersecurity world? Having trouble keeping up with all the various news stories on ransomware? No problem! Mimecast has got you covered. Our Trending News blog series will bring you up to speed on recent industry n…

Lesen Sie mehr dazu
Finance, Banking, Financial Advising, Insurance, IT, Telecommunications, Media, Legal, Accounting, Marketing, PR, Advertising, Design, Engineering, Recruitment, Manufacturing, Retail, Estate Agents, Hospitality, Wholesale, Transportation, Construction, Utilities, Oil & Gas, Health, Government, Pharmaceutical, Education, Non Profit/Charities, Property Development, Sports & Entertainment, Travel & Leisure, Food, Healthcare Manufacturer, Productivity, Security

WannaCry Ransomware-Ausbruch

WannaCry? – Yes, I do! The general media, the Web, the Twitterverse, and my email has been alight over the past few days regarding the WannaCry ransomware outbreak.  And to answer the question in the name, yes I do wannacry!  Lit…

Lesen Sie mehr dazu
Finance, Banking, Financial Advising, Insurance, IT, Legal, Manufacturing, Health, Government, Pharmaceutical, Non Profit/Charities, Healthcare Manufacturer, Security

WannaCrypt Ransomware – An Action Plan to Improve Your Cyber Resilience Defenses

WannaCry ransomware is a wake-up call for organizations and governments around the world. This on-going cyber threat will continue to adapt to take advantage of weaknesses in IT systems and procedures. New variants of this malware may cause even more…

Lesen Sie mehr dazu
Sicherheit

Should Recent Cyberattacks Concern You?

If You Don’t Like This Minute's Newsworthy Cyberattack, Wait a Few There Will be Another One In the last few days there has been no shortage of notable cyberattacks.  The so called Google Docs attack, the Gannet phi…

Lesen Sie mehr dazu
Security, GDPR

Four Burning Questions on GDPR

Tackling Four Burning Questions on GDPR and the Rise of Email-based Cybercrime  The deadline for compliance with the European Union General Data Protection Regulation (GDPR) is approaching fast. In our recent webinar GDPR and the Rise of E…

Lesen Sie mehr dazu
Sicherheit

Defining Your Cyber Resilience Philosophy

What does cyber resilience mean to you? The answer will surely vary across industries. And, to some, the term might not mean anything at all. In fact, according to new research from Vanson Bourne, not enough organizations are making cyber resilience …

Lesen Sie mehr dazu
Office 365

How to Keep Exchange Online Up and Running During an Outage

What’s Your Contingency Plan for an Exchange Online Outage?   This winter I was sitting in a hotel room in Boston watching a blizzard fall outside my window.  Not the worst situation I could be in (as I sipped my cup of coffee). …

Lesen Sie mehr dazu
Archivierung

Pain in the Archive: Know the Symptoms

There’s an affliction infecting corporate counsels, compliance officers, and IT teams. It’s called Archivalgia or, more colloquially, “Pain in the Archive.”  Left unchecked, Archivalgia can do a world of damage. As with most diseases, recognizin…

Lesen Sie mehr dazu
Finance, Banking, Financial Advising, Insurance, IT, Telecommunications, Media, Legal, Accounting, Marketing, PR, Advertising, Design, Engineering, Recruitment, Manufacturing, Retail, Estate Agents, Hospitality, Wholesale, Transportation, Construction, Utilities, Oil & Gas, Health, Government, Pharmaceutical, Education, Non Profit/Charities, Property Development, Sports & Entertainment, Travel & Leisure, Food, Healthcare Manufacturer, Archiving, Security, GDPR

Creating a Cyber Resilient GDPR Strategy

 GDPR - An opportunity for positive change Imagine for a moment that you are the “rockstar” IT director of a Top 100 firm. You’ve just presented your plan to the board for major IT initiatives, which include a plan to support General Data Prote…

Lesen Sie mehr dazu
Sicherheit

Trending in Cybersecurity: April 2017

Missed the latest news in today’s cybersecurity world? Having trouble keeping up with all the various news stories on ransomware? No problem! Mimecast has got you covered. Our Trending News blog series will bring you up to speed on recent industry ne…

Lesen Sie mehr dazu
Produktivität

Dealing With Email Disruptions

Mimecast recently completed a global survey on Exchange Online and the general importance of email across organizations with between 250 and 10,000 email users. We found that email continues to be the primary communication channel at these compa…

Lesen Sie mehr dazu
Office 365

The Benefits of Cloud Migration

The Great Migration Microsoft Office 365 offers a compelling business case to organizations - trade resource intensive on-premises infrastructure and software for services managed by Microsoft and delivered from the cloud. The rate of adoption tells …

Lesen Sie mehr dazu
Sicherheit

Can DMARC Stop All Business Email Compromise Attacks?

DMARC can only do so much.  If you think DMARC – Domain Message Authentication Reporting & Conformance – is the solution to defend against email spoofing, impersonation or business email compromise attacks, you would be only partially corre…

Lesen Sie mehr dazu
Sicherheit

Top Moments at RSA Conference 2017

Our promise to the industry was to engage, educate and provide valuable insight into major cybersecurity issues facing organizations around the world.  Here is a small recap of what happened at RSA Conference, so you can feel like you were able …

Lesen Sie mehr dazu
Security, GDPR

GDPR + Cybercrime: Is Email Part Of Your Compliance Strategy?

Crippling financial penalties and strict new privacy rules have grabbed most of the EU General Data Protection Act (GDPR) headlines so far. This is no surprise, given the sweeping nature of the act, but ahead of the May 2018 implementation date, it’s…

Lesen Sie mehr dazu
Sicherheit

The Mimecast Email Security Risk Assessment – Benchmarking Email Security Systems

Would it surprise you to learn that in recent testing Mimecast has seen a 13.2% false negative rate for incumbent email security systems?  Does your current email security system let through an inordinate amount of spam, malware, malicious URLs,…

Lesen Sie mehr dazu
Sicherheit

Introducing Mimecast Internal Email Protect

Internal threats not just from malicious insiders. When thinking of the people behind internal threats you need to be concerned about three profiles, not just one:   Compromised Insiders: These employees have had their accounts or systems take…

Lesen Sie mehr dazu
Sicherheit

5 Intriguing RSA Conference Sessions

The RSA Conference whirlwind is only days away.  Are you ready?  Is it possible to be ready?  Don’t forget to pack your Tylenol and your sensible shoes.  Like many of you, even though the conference is for a full week, my free tim…

Lesen Sie mehr dazu
Kontinuität

Mimecast ergänzt neue Continuity Features zur Überwachung des E-Mail-Flusses und zur schnelleren Alarmierung und Reaktion im Fall von Störungen

Eine aktuelle, weltweite Umfrage von Mimecast unter 600 IT-Entscheidern hat gezeigt, dass 88 % der Befragten E-Mails als kritischen Faktor für ihr Unternehmen betrachten und 55 % E-Mails sogar für unternehmenskritisch halten. Überraschend ist dies nicht. Mit einem Blick in die Inbox starten viele in ihren Tag ...

Lesen Sie mehr dazu
Office 365

Mimecast’s 42 Questions with J.Peter Bruzzese

A long time ago, a supercomputer named Deep Thought concluded that the answer to the ultimate question to the meaning of life, the universe, and everything was 42. Although it took Deep Thought 7 and a half million years to&n…

Lesen Sie mehr dazu
Archivierung

Das Jahr 1992 hat eine E-Mail geschickt: Es will seine Archivierungsarchitektur zurück

Ist Ihre Archivierungslösung noch zeitgemäß? Dürfen wir ehrlich sein? Die meisten heute eingesetzten Plattformen zur E-Mail-Archivierung sind veraltet. Wir nutzen E-Mails heute ganz anders als früher und diese Plattformen bieten längst nicht mehr das, was Sie brauchen.  Archivierungslös…

Lesen Sie mehr dazu
Sicherheit

Is Legally Requiring Good Security Practices a Good Thing?

Recently, the State of New York has taken steps towards passing the nation’s first cybersecurity regulation which explicitly tells financial organizations in New York what they must do in their security program.  You can read an overview of this…

Lesen Sie mehr dazu
Sicherheit

My 5 New Year’s Resolutions for Your Security Program

I realize it is a bit cheeky for me to make security resolutions for your security program, but I believe you will find these recommendations to be straightforward and highly actionable.  In no particular order: If you can’t do it, outsource i…

Lesen Sie mehr dazu
Produktivität

MSP 2.0 Update from Mimecast

We recently announced some changes to our MSP program that will be effective from 1 April 2017. We understand that these are disruptive to some of our MSP partners, and we’ve received robust feedback since the announcement. So first I apologize for a…

Lesen Sie mehr dazu