Security, Email Security

Kaffee, Gebäck oder gestohlene Anmeldedaten?

Even the big chains aren't immune from attacks. Water, tea and coffee are the most consumed beverages in the world, so it should not be a complete surprise that there are hundreds of large chains with thousands of storefronts that provide the two st…

Lesen Sie mehr dazu
Security, Email Security

Neues Jahr, neue Preise: Überwindung der Cyber-Kluft

You’re “rebuying” technology services every year. Make them earn it. Welcome to the latest edition of Bridging the Cyber Divide, where we provide technical professionals in small-to-medium sized organizations the know-how to a…

Lesen Sie mehr dazu
Security, Threat Center

Threat Intelligence für die 99 Prozent - Teil 5: Bauen Sie Ihre eigenen - Feeds

Selecting the right feeds for threat intelligence can’t be overlooked for your program. Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. We’ve already taken deep dives on what cyber threat intell…

Lesen Sie mehr dazu
Archiving, Data Protection

So wird man zu einem Leader bei der Archivierung von Unternehmensinformationen

What strengths and innovations does your archive have? Last month we shared the news that for the 4th straight year, Mimecast was named a Leader in the Gartner Enterprise Information Archiving Magic Quadrant (MQ). In addition, we examined the trends…

Lesen Sie mehr dazu
Security, Email Security

Hacker, die es auf ganze Länder absehen

The world is fighting back. In Hollywood movies, when the individual underdog prevails against monolithic corporations or corrupt government entities, we celebrate their success. When that individual underdog is actually a cybe-criminal intent on ca…

Lesen Sie mehr dazu
Security, Threat Center

Threat Intelligence für die 99 % – Teil 4: Wie sollten Sie vorgehen?

You have options for threat intelligence. But how do you decide? Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. We’ve already looked at several aspects of cyber threat intelligence (CTI) programs, in…

Lesen Sie mehr dazu
Security, Threat Center

Wie führt man ein Bedrohungsanalyseprogramm ein?

You can do this. When you think of implementing a cyber threat intelligence program at your organization, you may believe it will take millions in resources to have the right technology, the right people and the right strategy in place. But the trut…

Lesen Sie mehr dazu
Security, Email Security

Cyberkriminelle lieben das Gesundheitswesen

Here's why this industry is now a top attack target. In general, cybercriminals will target the most vulnerable of organizations that can provide the biggest payoff. In the early days of internet-based computing, this meant primarily the finance ind…

Lesen Sie mehr dazu
Security, Threat Center

Threat Intelligence für die restlichen 99 % – Teil 3: Wann wird sie benötigt?

Are you tall enough to ride the ride for threat intelligence? Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. This week, we’re looking at the indicators for when you need to implement a cyber threat i…

Lesen Sie mehr dazu
Security, Awareness Training

Personifizierte Insider-Bedrohungen – Übeltäter mit guter Absicht

Sometimes, bad things happen to people with the best intentions. This week in ‘Insider Threats Personified’ we’ll see how the actions of your employees can inadvertently launch a threat against your customers and partners and resul…

Lesen Sie mehr dazu
Security, Email Security

Umfrage: Cybersicherheit am Arbeitsplatz in Zahlen

Findings of our survey show that cyber awareness training is badly needed for organizations. Employees are the weakest link in your security chain. Studies have found that over 90% of all cyber breaches happen because of human error. Even with the b…

Lesen Sie mehr dazu
Security, Email Security

Cryptojacker schlagen erneut zu

No organization is exempt from cryptojackers. It doesn’t even matter if your organization does amazing things for people in unfortunate circumstance. Just look at what happened to the Make A Wish Foundation and use it as a cautionary tale. Cr…

Lesen Sie mehr dazu
Security, Threat Center, Threat Intelligence Hub

Mimecast entdeckt die Microsoft Office-Sicherheitsanfälligkeit CVE-2019-0560

Understand the security implications of the latest patched Microsoft Office product memory leak vulnerability What happens when you combine sophisticated anti-phishing attachment inspection, static file analysis, machine executable code in data file…

Lesen Sie mehr dazu
Security, Threat Center

Threat Intelligence für die restlichen 99 % – Teil 2: Warum ist das wichtig?

The need for threat intelligence comes down to defense, and confidence. Welcome to the second installment of our blog series, Threat Intelligence for the 99%. In this series we’ll dive deep into all topics surrounding threat intelligence, what …

Lesen Sie mehr dazu
Security, Email Security

Cybersicherheitsbedrohungen, die Sie 2019 im Blick haben sollten

Here are some predictions for the new year. Happy New Year! As we finish singing “Auld Lang Syne” with a champagne toast to close out 2018, it is time to look to 2019 with excitement. But, before you make a few New Year’s resolutio…

Lesen Sie mehr dazu
Security, Threat Center

Threat Intelligence für die restlichen 99 % – Teil 1: Erläuterung des Problems

Cyber threat intelligence isn’t just for the 1%. If you’re in cybersecurity, odds are you’ve heard a lot about threat intelligence these last few years. But unless you’re part of an organization with a massive budget for cybe…

Lesen Sie mehr dazu
Security, Awareness Training

Warum die Gewohnheiten der Mitarbeiter Cyber-Risiken sind

Why awareness training should be part of every cyber resilience strategy. Editor’s note: Human error is involved in over 90% of today’s cybersecurity breaches. Sometimes is carelessness, sometimes it’s maliciousness and sometimes i…

Lesen Sie mehr dazu