Sicherheit

March Email Security Risk Assessment Report: A Focus on Office 365

What Office 365 misses may surprise you. With this blog I am happy to bring our 8th consecutive quarterly release of the Mimecast Email Security Risk Assessment (ESRA) aggregate report to your attention (also with an associated infographic). We now …

Lesen Sie mehr dazu
Sicherheit

Understanding Threat Intelligence: Seeing Beyond Indicators of Compromise

Threat intelligence doesn’t mean subscribing to multiple data feeds. There is a lot of confusion and misunderstanding about what constitutes threat intelligence. Too often, threat intelligence gets misaligned with tracking a bunch of Indicator…

Lesen Sie mehr dazu
Sicherheit

The Return of the Equation Editor Exploit – DIFAT Overflow

The latest from Mimecast Research Labs. Summary In the last few months, the Mimecast Research Labs team has seen several unique variants of Microsoft Office Word exploits, more specifically combining the previously-patched memory corruption issue CV…

Lesen Sie mehr dazu
Sicherheit

Sextortion, Bomb Threats and GoDaddy

The lurid details of a new kind of email scam. An award-winning film from 1989 titled “Sex, Lies and Videotape” introduced the world to the power of uncomfortable private data coming to public attention and now cybercriminals are taking …

Lesen Sie mehr dazu
Sicherheit

3 Things to See at RSA Conference USA 2019

Here is what to look for at this year’s big cybersecurity show. The upcoming RSA Conference USA 2019 taking place from March 4-8 at the Moscone Center in San Francisco will mark my 17th consecutive year of attendance! It seems like my first ye…

Lesen Sie mehr dazu
Sicherheit

CISO at 25

How has the CISO function changed through the years? Having an executive team to manage specific functions of an organization goes back to the introduction of formalized businesses. In the United States it recorded that the oldest corporation is Har…

Lesen Sie mehr dazu
Sicherheit

Global Attacks Abound

No government is safe. There seems to be a resurgence of interest in the belief that the world is flat despite all evidence to the contrary. Cybercriminals on the other hand, understand all too well that the Earth is actually boundaryless in cybersp…

Lesen Sie mehr dazu
Sicherheit

Threat Intelligence for the 99 Percent - Part 8: Final Thoughts & Takeaways

Here’s what you need to know on your threat intelligence journey. Welcome to the 8th and final edition of our blog series, Threat Intelligence for the 99%. We’ve reached the end of the road for these blogs, but hopefully your road to thr…

Lesen Sie mehr dazu
Archivierung

Zero-Down, End-to-End Migrations: Simple, Easy to Remember

Email migrations don’t have to be painful. It seems, since the beginning of email, customers have endured the pain of migrating from version-to-version, vendor-to-vendor and now on-premises-to-cloud. While most of the version migrations were p…

Lesen Sie mehr dazu
Sicherheit

Phishing for Outlook

There seems to be a kit available for everything nowadays. The web is inundated with advertisements for kits to help with daily meal planning, weekly work planners, or even month wardrobe assistance. You can even now find phishing kits targeted to …

Lesen Sie mehr dazu
Sicherheit

GandCrab Ransomware Attacks Exploit Valentine’s Day Weaknesses

This Valentine’s Day, your big heart could get you in trouble. When you think Valentine’s Day, candy hearts, roses and chocolate are probably the first things that come to mind. Perhaps the last thing would be insidious email attacks, bu…

Lesen Sie mehr dazu
Archivierung

Feeling the Archive Love: TechValidate Survey Results

This Valentine’s Day, we’re offering thanks to our customers.   Developing a modern archiving strategy isn’t easy. IT departments are increasingly plagued by data growth and service requirements back to internal customers.…

Lesen Sie mehr dazu
Sicherheit

Threat Intelligence for the 99 Percent - Part 7: Stitching It Together

How do you put all the threat intelligence components together? Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. In the last two editions of our series, we’ve looked at cyber threat intelligence (CTI) …

Lesen Sie mehr dazu
Sicherheit

Insider Threats Personified – Infected, User Should Beware

When it comes to cybersecurity, human error can’t be discounted. We live in a mobile world where cyber attackers target employees who work in the office, at home or from the road. In parallel, threats can also be introduced onto an employee&rs…

Lesen Sie mehr dazu
Sicherheit

Email Security for the Healthcare Industry: Time for a Checkup?

See where healthcare cybersecurity is falling short. Any regular reader of Mimecast’s Cyber Resilience Insights blog site has likely come across my quarterly Email Security Risk Assessment (ESRA) blogs. These blogs summarize and draw conclusio…

Lesen Sie mehr dazu
Sicherheit

Preventing Attack-for-Hire Services

It's a real thing. Here's how to fight back. The concept of a mercenary dates back to ancient Egypt and has been a long-standing method for governments (or other groups) to supplement their military might. So, it should not come as a surprise that …

Lesen Sie mehr dazu
Sicherheit

Threat Intelligence for the 99 Percent - Part 6: Building Your Own - Tools

Selecting the right threat intelligence tools is critical. Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. Last time, we examined the types of cyber threat intelligence (CTI) feeds you need to consider when…

Lesen Sie mehr dazu
Sicherheit

5 Ways to Ingrain Cybersecurity Awareness into Your Business

Here’s how you can lower risk by changing attitudes from top to bottom. When it comes to defining an organization’s mission and vision, a lot of time is spent refining and getting it right. However, when it comes to making security aware…

Lesen Sie mehr dazu
Sicherheit

Coffee, Donuts or Stolen Credentials?

Even the big chains aren't immune from attacks. Water, tea and coffee are the most consumed beverages in the world, so it should not be a complete surprise that there are hundreds of large chains with thousands of storefronts that provide the two st…

Lesen Sie mehr dazu
Sicherheit

New Year, New Prices: Bridging the Cyber Divide

You’re “rebuying” technology services every year. Make them earn it. Welcome to the latest edition of Bridging the Cyber Divide, where we provide technical professionals in small-to-medium sized organizations the know-how to a…

Lesen Sie mehr dazu
Sicherheit

Threat Intelligence for the 99 Percent - Part 5: Building Your Own - Feeds

Selecting the right feeds for threat intelligence can’t be overlooked for your program. Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. We’ve already taken deep dives on what cyber threat intell…

Lesen Sie mehr dazu
Archivierung

How to Be an Enterprise Information Archive Leader

What strengths and innovations does your archive have? Last month we shared the news that for the 4th straight year, Mimecast was named a Leader in the Gartner Enterprise Information Archiving Magic Quadrant (MQ). In addition, we examined the trends…

Lesen Sie mehr dazu
Sicherheit

Hackers Targeting Entire Countries

The world is fighting back. In Hollywood movies, when the individual underdog prevails against monolithic corporations or corrupt government entities, we celebrate their success. When that individual underdog is actually a cybe-criminal intent on ca…

Lesen Sie mehr dazu
Sicherheit

Threat Intelligence for the 99 Percent - Part 4: What Approach Do You Take?

You have options for threat intelligence. But how do you decide? Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. We’ve already looked at several aspects of cyber threat intelligence (CTI) programs, in…

Lesen Sie mehr dazu
Sicherheit

How Do You Roll Out a Threat Intelligence Program?

You can do this. When you think of implementing a cyber threat intelligence program at your organization, you may believe it will take millions in resources to have the right technology, the right people and the right strategy in place. But the trut…

Lesen Sie mehr dazu
Sicherheit

Cybercriminals Love Healthcare

Here's why this industry is now a top attack target. In general, cybercriminals will target the most vulnerable of organizations that can provide the biggest payoff. In the early days of internet-based computing, this meant primarily the finance ind…

Lesen Sie mehr dazu
Sicherheit

Threat Intelligence for the 99 Percent - Part 3: When Is It Needed?

Are you tall enough to ride the ride for threat intelligence? Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. This week, we’re looking at the indicators for when you need to implement a cyber threat i…

Lesen Sie mehr dazu
Sicherheit

Insider Threats Personified – Patient Zero Un-Hero

Sometimes, bad things happen to people with the best intentions. This week in ‘Insider Threats Personified’ we’ll see how the actions of your employees can inadvertently launch a threat against your customers and partners and resul…

Lesen Sie mehr dazu
Sicherheit

Survey: Cybersecurity at Work, By the Numbers

Findings of our survey show that cyber awareness training is badly needed for organizations. Employees are the weakest link in your security chain. Studies have found that over 90% of all cyber breaches happen because of human error. Even with the b…

Lesen Sie mehr dazu
Sicherheit

Cryptojackers Strike Again

No organization is exempt from cryptojackers. It doesn’t even matter if your organization does amazing things for people in unfortunate circumstance. Just look at what happened to the Make A Wish Foundation and use it as a cautionary tale. Cr…

Lesen Sie mehr dazu
Sicherheit

Mimecast Discovers Microsoft Office Product Vulnerability CVE-2019-0560

Understand the security implications of the latest patched Microsoft Office product memory leak vulnerability What happens when you combine sophisticated anti-phishing attachment inspection, static file analysis, machine executable code in data file…

Lesen Sie mehr dazu
Sicherheit

Threat Intelligence for the 99 Percent - Part 2: Why is it Important?

The need for threat intelligence comes down to defense, and confidence. Welcome to the second installment of our blog series, Threat Intelligence for the 99%. In this series we’ll dive deep into all topics surrounding threat intelligence, what …

Lesen Sie mehr dazu
Sicherheit

2019 Cybersecurity Trends to Watch

Here are some predictions for the new year. Happy New Year! As we finish singing “Auld Lang Syne” with a champagne toast to close out 2018, it is time to look to 2019 with excitement. But, before you make a few New Year’s resolutio…

Lesen Sie mehr dazu
Sicherheit

Threat Intelligence for the 99 Percent - Part 1: Explaining the Issue

Cyber threat intelligence isn’t just for the 1%. If you’re in cybersecurity, odds are you’ve heard a lot about threat intelligence these last few years. But unless you’re part of an organization with a massive budget for cybe…

Lesen Sie mehr dazu
Sicherheit

Why Employees Habits are Cyber Risks

Why awareness training should be part of every cyber resilience strategy. Editor’s note: Human error is involved in over 90% of today’s cybersecurity breaches. Sometimes is carelessness, sometimes it’s maliciousness and sometimes i…

Lesen Sie mehr dazu