Europe, Continuity, Office-365

Office 365 Goes Down for Third Summer in a Row

For the second consecutive June 30th, Office 365 has had a disruption to the service. As reported in The Inquirer, users across Europe were having difficulty logging into services. Have you ever wondered what’s going on with the Office 365 services y…

Lesen Sie mehr dazu
Continuity, Security

Petya Ransomware – An Action Plan To Improve Your Cyber Resilience Against This Latest Mass Outbreak

Ransomware deja vu  The global reach and considerable impact of the current Petya ransomware outbreak bears a remarkable similarity to the WannaCry attack of just a few weeks ago.  This outbreak should serve a…

Lesen Sie mehr dazu
Sicherheit

How to Get Everyone Involved in Cybersecurity

Security professionals have a saying: “The attacker only has to be right once, we have to be right every time.” Translation? According to Jamie Winterton, director of strategy, ASU’s Global Security Initiative, it’s a call to action across the organi…

Lesen Sie mehr dazu
Archiving, Security, GDPR

5 Cybersecurity Challenges for Law Firms

A new report published by Legal Week Intelligence, in association with Mimecast, Cybersecurity – The Race to Protect, sheds new light on the myriad technology challenges law firms currently face. The report, a product of a series of interviews with I…

Lesen Sie mehr dazu
Sicherheit

It’s Your Business: Email Wire Transfer Fraud

Ihr Leitfaden zum Scam bei Banküberweisungen mittels geschäftlicher E-Mails. Im März 2017 verklagte das US-amerikanische Justizministerium (U.S. Department of Justice) einen litauischen Staatsbürger, zwei amerikanische Technologie-Unternehmen um einen Betrag von 100 Millionen US-$ gebracht zu haben, die diese freiwillig an Offshore-Bankkonten überwiesen hatten. Er täuschte …

Lesen Sie mehr dazu
Productivity, Security

Are Your Privileged Credentials Compromised?

5 More Ways Hackers Try To Steal Your Organization’s Privileged Credentials Hackers have a large portfolio of tactics to get their mitts on your organization’s privileged credentials, and they’re creating more every day. In addition to the big 3 Ways…

Lesen Sie mehr dazu
Sicherheit

Ihre vertraulichen Anmeldedaten sind in Gefahr

3 Möglichkeiten, wie Hacker versuchen, die vertraulichen Anmeldedaten Ihres Unternehmens zu stehlen. Laut „The Forrester Wave: Privileged Identity Management, Q3 2016“ sind bei stolzen 80 % aller Sicherheitsverstöße vertrauliche Anmeldedaten im Spiel.  Sehen wir uns die drei am häufigsten …

Lesen Sie mehr dazu
Sicherheit

Updated Email Security Risk Assessment

The Mimecast Email Security Risk Assessment – Take 2 As promised at the time of our first release of our ESRA results, we are now dropping the 2nd release of our aggregated ESRA test results.  And if you are pessimistic about the efficacy of mos…

Lesen Sie mehr dazu
Archiving, Security, GDPR

Mimecast Case Review App für die DSGVO

Simplify GDPR queries with Mimecast Case Review App  Email remains the vital hub of business communications and continues to grow with over 225 billion business emails sent and received every day. Huge amounts of personal information are stored…

Lesen Sie mehr dazu
Sicherheit

Why It's Time To Do Away With Tradition

Email security against advanced threats. It’s time to ditch the old-fashioned defenses against today's highly sophisticated threats. Stay safe with Mimecast.  The latest cyberattacks demand the most up-to-date defenses. Ransomware , imperso…

Lesen Sie mehr dazu
Sicherheit

Cyberattack Protection For Small Businesses

Cyberattack Protection For Small Businesses It seems as of late the IT security professionals of the world are becoming increasingly unhappy with the security products and services they are using.  I have the pleasure of speaking at conferences …

Lesen Sie mehr dazu