Sicherheit

5 Schritte, um eine erweiterte Initiative für Sicherheitsbewusstsein und -schulungen auf den Weg zu bringen

  “Ultimately, the security chain is as strong as its weakest link and once a cybercriminal has compromised one account – even a junior employee – they can then leverage that account and move upwards through the organization, …

Lesen Sie mehr dazu
Sicherheit

Für eine effektive Aufklärungsarbeit zu realen Bedrohungen brauchen Sie überzeugende Daten

Key Data on Why Cybersecurity is Everyone’s Business Cybersecurity is an emotional issue even for the toughest business executive – so much so that the fear of getting hacked may not be enough to override the fear of borrowing trouble. It can be eas…

Lesen Sie mehr dazu
Sicherheit, Threat Intelligence Hub

Eine Übersicht zur E-Mail-Sicherheitslücke ROPEMAKER

ROPEMAKER Email Security Weakness - Vulnerability or Application Misuse? Most people live under the assumption that email is immutable once delivered, like a physical letter.  A new email exploit, dubbed ROPEMAKER by Mimecast’s resea…

Lesen Sie mehr dazu
Archivierung

Cloud-Archivierung für die E-Discovery: wichtige Faktoren

How to Choose the Right File Archiving Solution  Choosing the right archiving software is critical to improving e-discovery and compliance. “If archiving is poorly performed, organizations can find themselves spending tens of thousands of dolla…

Lesen Sie mehr dazu
Archivierung

Tipps zur Verbesserung der Unternehmensarchivierung

A Few Important Steps on the Path to Better Data Governance Properly archived data is essential for effective data governance Let’s talk data governance here – and let’s start with a definition of the term. According to the Data Governance Institute…

Lesen Sie mehr dazu
Sicherheit

Eine Internetminute, Millionen von Möglichkeiten für Cyberkriminalität

High volumes of email and social media posts increase the risk of cybercrime Every minute, we’re handing hackers and other cybercriminals everything they need to take advantage of us. According to data published in the Business Insider, there’s a lo…

Lesen Sie mehr dazu
Sicherheit

Wie Sie aus Ihrer Organisation ein Cyber Resilience Team machen

Educating your entire organization on advanced security.  Cybersecurity isn’t just a concern for your IT department. In fact, every employee who accesses the cloud interacts with the Internet of Things or opens an email is an important member o…

Lesen Sie mehr dazu
Security, GDPR

Aktualisierung der britischen Datenschutzgesetze: Auswirkungen auf das US-Geschäft

What you need to know about proposed updates to UK data protection bill. The UK Government recently announced its intent to install a set of sweeping updates to existing data protection law to “reflect the changing nature and scope of the digital eco…

Lesen Sie mehr dazu
Sicherheit

Priorisierung der Widerstandsfähigkeit gegenüber Cyberangriffen

Cyber Resilience Preparedness:   Why it Needs to be a Priority Email-borne threats are on the rise. Surely, you haven’t forgotten about the recent Petya and WannaCry global malware outbreaks? According to new data from Vanson Bourne …

Lesen Sie mehr dazu
Sicherheit

Mimecasts drittes Risk Assessment für E-Mail-Sicherheit

As promised in my last ESRA update blog, we are now ready to drop our third quarterly release on you. But before I get into the details of this ESRA report let me explain what the Mimecast Email Security Risk Assessment program is all about.  In…

Lesen Sie mehr dazu