Sicherheit

Coffee, Donuts or Stolen Credentials?

Even the big chains aren't immune from attacks. Water, tea and coffee are the most consumed beverages in the world, so it should not be a complete surprise that there are hundreds of large chains with thousands of storefronts that provide the two st…

Lesen Sie mehr dazu
Sicherheit

New Year, New Prices: Bridging the Cyber Divide

You’re “rebuying” technology services every year. Make them earn it. Welcome to the latest edition of Bridging the Cyber Divide, where we provide technical professionals in small-to-medium sized organizations the know-how to a…

Lesen Sie mehr dazu
Sicherheit

Threat Intelligence for the 99 Percent - Part 5: Building Your Own - Feeds

Selecting the right feeds for threat intelligence can’t be overlooked for your program. Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. We’ve already taken deep dives on what cyber threat intell…

Lesen Sie mehr dazu
Archivierung

How to Be an Enterprise Information Archive Leader

What strengths and innovations does your archive have? Last month we shared the news that for the 4th straight year, Mimecast was named a Leader in the Gartner Enterprise Information Archiving Magic Quadrant (MQ). In addition, we examined the trends…

Lesen Sie mehr dazu
Sicherheit

Hackers Targeting Entire Countries

The world is fighting back. In Hollywood movies, when the individual underdog prevails against monolithic corporations or corrupt government entities, we celebrate their success. When that individual underdog is actually a cybe-criminal intent on ca…

Lesen Sie mehr dazu
Sicherheit

Threat Intelligence for the 99 Percent - Part 4: What Approach Do You Take?

You have options for threat intelligence. But how do you decide? Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. We’ve already looked at several aspects of cyber threat intelligence (CTI) programs, in…

Lesen Sie mehr dazu
Sicherheit

How Do You Roll Out a Threat Intelligence Program?

You can do this. When you think of implementing a cyber threat intelligence program at your organization, you may believe it will take millions in resources to have the right technology, the right people and the right strategy in place. But the trut…

Lesen Sie mehr dazu
Sicherheit

Cybercriminals Love Healthcare

Here's why this industry is now a top attack target. In general, cybercriminals will target the most vulnerable of organizations that can provide the biggest payoff. In the early days of internet-based computing, this meant primarily the finance ind…

Lesen Sie mehr dazu
Sicherheit

Threat Intelligence for the 99 Percent - Part 3: When Is It Needed?

Are you tall enough to ride the ride for threat intelligence? Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. This week, we’re looking at the indicators for when you need to implement a cyber threat i…

Lesen Sie mehr dazu
Sicherheit

Insider Threats Personified – Patient Zero Un-Hero

Sometimes, bad things happen to people with the best intentions. This week in ‘Insider Threats Personified’ we’ll see how the actions of your employees can inadvertently launch a threat against your customers and partners and resul…

Lesen Sie mehr dazu
Sicherheit

Survey: Cybersecurity at Work, By the Numbers

Findings of our survey show that cyber awareness training is badly needed for organizations. Employees are the weakest link in your security chain. Studies have found that over 90% of all cyber breaches happen because of human error. Even with the b…

Lesen Sie mehr dazu
Sicherheit

Cryptojackers Strike Again

No organization is exempt from cryptojackers. It doesn’t even matter if your organization does amazing things for people in unfortunate circumstance. Just look at what happened to the Make A Wish Foundation and use it as a cautionary tale. Cr…

Lesen Sie mehr dazu
Sicherheit

Mimecast Discovers Microsoft Office Product Vulnerability CVE-2019-0560

Understand the security implications of the latest patched Microsoft Office product memory leak vulnerability What happens when you combine sophisticated anti-phishing attachment inspection, static file analysis, machine executable code in data file…

Lesen Sie mehr dazu
Sicherheit

Threat Intelligence for the 99 Percent - Part 2: Why is it Important?

The need for threat intelligence comes down to defense, and confidence. Welcome to the second installment of our blog series, Threat Intelligence for the 99%. In this series we’ll dive deep into all topics surrounding threat intelligence, what …

Lesen Sie mehr dazu
Sicherheit

2019 Cybersecurity Trends to Watch

Here are some predictions for the new year. Happy New Year! As we finish singing “Auld Lang Syne” with a champagne toast to close out 2018, it is time to look to 2019 with excitement. But, before you make a few New Year’s resolutio…

Lesen Sie mehr dazu
Sicherheit

Threat Intelligence for the 99 Percent - Part 1: Explaining the Issue

Cyber threat intelligence isn’t just for the 1%. If you’re in cybersecurity, odds are you’ve heard a lot about threat intelligence these last few years. But unless you’re part of an organization with a massive budget for cybe…

Lesen Sie mehr dazu
Sicherheit

Why Employees Habits are Cyber Risks

Why awareness training should be part of every cyber resilience strategy. Editor’s note: Human error is involved in over 90% of today’s cybersecurity breaches. Sometimes is carelessness, sometimes it’s maliciousness and sometimes i…

Lesen Sie mehr dazu