Sicherheit

Threat Intelligence Best Practices for Lean IT Organizations - Part 1

Here’s why looking at indicators of compromise isn’t enough. Editor’s note: For cybersecurity professionals, threat intelligence isn’t just about reacting to indicators of compromise after they've already impacted an organiza…

Lesen Sie mehr dazu
Sicherheit

Phishing for Selfies? New Scam Targets Chase Bank Customers

Highlighting the importance of extra care no matter the device. Yes, we live in the age of the selfie. Admit it, you’ve taken them yourself. But, did you ever think selfies could be part of a phishing scam? The attackers have really outdone th…

Lesen Sie mehr dazu
Sicherheit

Active Versus Passive Versus Host-Based Cyberattack Vectors

Know the difference and how you can prevent cyberattacks. Budding authors and journalist are taught the difference between active and passive voice in first year writing classes. They understand that active is about “doing” and passive i…

Lesen Sie mehr dazu
Sicherheit

Risks and Consequences of Legacy Web Security Solutions

Counting the cost of on-premises web security systems. Shopping, researching, downloading, gaming, finding new friends and seeing what’s happening in the world: these are just some of the ways we use the web every day. Unfortunately, threat ac…

Lesen Sie mehr dazu
Sicherheit

Social Media is a Cybersecurity Backdoor to Your Enterprise

The amount of time your employees spend on social media will shock you. Facebook, Instagram, LinkedIn, Twitter, YouTube or the latest online game. Yes, these are the new temptations facing employees on a daily basis. It starts with just a peek; mayb…

Lesen Sie mehr dazu
Sicherheit

New Cyber Espionage Campaign Features Never-Before-Seen Malware Tools

The key to defending against new attack types is a multi-layered security strategy. Attackers are always looking to get the upper hand on their targets. Many of the methods and tactics attackers use are tried-and-true. But sometimes we see things we…

Lesen Sie mehr dazu
Sicherheit

Web Security Controls Are Rapidly Transitioning to the Cloud

Following the lead of secure email gateways, web security systems are moving quickly to the cloud. No big secret, but IT services in general and IT security controls in particular are rapidly transitioning to the cloud. There are many reasons for th…

Lesen Sie mehr dazu
Sicherheit

DNSpionage Demystified

Espionage is the subject of more novels and Hollywood films than can even be accounted for. It seems intriguing on the written page or the silver screen to the average consumer, but when espionage starts to become a reality that affects the identit…

Lesen Sie mehr dazu
Sicherheit

SMBs, Midmarket Continue to Be Massive Cyberthreat Targets

More data points are available to make your resilience case. If you’re making the case for cyber resilience at your small to medium-sized organization, there is a whole slew of new data out there to help make your argument. Our ongoing blog s…

Lesen Sie mehr dazu
Sicherheit

Dealing With Cybersecurity Stress

Stress seems to be something that comes up daily in at least one conversation with someone else. You may be feeling stress at this very moment, but do you really understand what it is and where it comes from, especially as an IT Security profession…

Lesen Sie mehr dazu
Sicherheit

Insider Threat Protection: How Organizations Address the Inevitable

Keeping Connected to Our 33K+ Customers, One Customer at a Time. At Mimecast we are blessed to have more than 33,000 customers for our email security, archiving, web security and security awareness training services. And staying connected and e…

Lesen Sie mehr dazu
Sicherheit

Phisher Pleads Guilty in Scam Targeting High-Profile Celebrities, Athletes

A reminder: phishing and brand-spoofing works best against the unsecured and unaware. A phishing scam perpetrated by a man stealing sensitive personal information from high-profile individuals should provide a warning sign to organizations of all si…

Lesen Sie mehr dazu