Security, Email Security

Grenzüberschreitender C-Level-Betrug und Spear-Phishing

These long-standing cyberattack types are more prevalent than ever.   Cave drawing found in southern France showing early spear-fishing have been dated back 16,000 years, and whaling has been practiced as an organized industry as early as 8…

Lesen Sie mehr dazu
Security, Email Security

Supply-Chain-Angriffe in der realen Welt: Überbrückung der Cyber-Kluft

Cyberattackers attempted to take down the US electric grid—through companies like yours. Any business in the B2B space is part of a supply chain, whether you feed into larger businesses or those larger businesses feed into you. If you find you…

Lesen Sie mehr dazu
Security, Cyber Resilience for Email, Email Security

Cybersicherheitstrends: Unsere meistgelesenen Blog-Beiträge des ersten Quartals 2019

See what caught the eyes of Cyber Resilience Insights readers this quarter. With the first quarter of 2019 drawing to a close, we wanted to provide you a one-stop shop for the most-read new content we've posted on Cyber Resilience Inights so far. Be…

Lesen Sie mehr dazu
Security, Email Security

Informationssicherheit im Laufe der Jahre

Some aspects of info security haven't changed much in theory. You may be interested to know that most every modern cybersecurity technique used today is based on methodologies developed and used thousands of years ago. So, in the spirit of those who…

Lesen Sie mehr dazu
Security, Office-365, Email Security

E-Mails in die Cloud verschieben? Cyber Resilience ist ein Muss!

Prevent cyber risks by not putting your eggs in everyone else’s basket. Microsoft's announcement that it has launched its first cloud data centers in Africa—one in Cape Town, another in Johannesburg—is a cause for celebration among…

Lesen Sie mehr dazu
Archiving, Data Protection

Ihr Erfolg ist unser Erfolg: Dreifache Auszeichnung im Bereich Archivierung

Customer success in archiving has produced fruitful results for all. It’s springtime in the US, and for many aficionados, the beginning of another season of horse racing. The Triple Crown is a rare accomplishment for the horse that wins the Ke…

Lesen Sie mehr dazu
Security, Email Security

Die Entwicklung von CISO-Strategien

How has the CISO role changed through the years? Charles Darwin wrote “On the Origin of Species” in 1859 and introduced the concept that organisms arise and develop through the natural selection of small, inherited variations that increa…

Lesen Sie mehr dazu
Security, Awareness Training

Nach eigenem Ermessen: Cyber-Awareness-Schulungen für Mitarbeiter

Make a plan for educating employees. Employees are usually left to use their discretion with corporate-owned technology on your networks pretty much all the time. As such, a lot of power is in their hands when it comes to what emails to open, what f…

Lesen Sie mehr dazu
Security, Email Security

Cybersicherheitsmessen entmystifiziert

Show season is upon us. Chief Information Security Officers, IT security professionals and hackers alike will be converging on cities around the globe to learn the latest and greatest cybersecurity trends, technologies and issues, while meeting thei…

Lesen Sie mehr dazu
Security, Email Security

Sucht oder Prävention

Have we become addicted to passwords? In today’s technology age, there are creeping addictions that many have but few acknowledge. The worst pandemic of which we suffer today may actually be an addiction to passwords as the primary security pe…

Lesen Sie mehr dazu
Security, Email Security

Bericht zur Bewertung des E-Mail-Sicherheitsrisikos: Schwerpunkt Office 365

What Office 365 misses may surprise you. With this blog I am happy to bring our 8th consecutive quarterly release of the Mimecast Email Security Risk Assessment (ESRA) aggregate report to your attention (also with an associated infographic). We now …

Lesen Sie mehr dazu
Security, Threat Center

Verständnis der Bedrohungsanalyse: Jenseits von Gefährdungsindikatoren

Threat intelligence doesn’t mean subscribing to multiple data feeds. There is a lot of confusion and misunderstanding about what constitutes threat intelligence. Too often, threat intelligence gets misaligned with tracking a bunch of Indicator…

Lesen Sie mehr dazu
Security, Threat Center

Die Rückkehr des Equation Editor Exploits – DIFAT Overflow

The latest from Mimecast Research Labs. Summary In the last few months, the Mimecast Research Labs team has seen several unique variants of Microsoft Office Word exploits, more specifically combining the previously-patched memory corruption issue CV…

Lesen Sie mehr dazu
Security, Email Security

Erpressung, Bombenangriffe und GoDaddy

The lurid details of a new kind of email scam. An award-winning film from 1989 titled “Sex, Lies and Videotape” introduced the world to the power of uncomfortable private data coming to public attention and now cybercriminals are taking …

Lesen Sie mehr dazu