Security, Email Security, Security Awareness Training

Änderung der Cybersicherheitsstrategien – besser heute als morgen!

Malware can stick around for years. Wine, whiskey and cheese are all things we know and love but take notoriously long to achieve their optimal performance (read taste/cost). Malware on the other hand that is active for years inside your infrastruct…

Lesen Sie mehr dazu
Security, Email Security

Was wird sich in der Cybersicherheit im Jahr 2019 ändern (und was nicht)

Many things in cybersecurity that should happen in 2019 won’t. Learn why. Every year, we reach December and industry experts share their predictions and tell the world what the biggest trends will be for the following year. In the security ind…

Lesen Sie mehr dazu
Security, Email Security

Neue Phishing-E-Mails, getarnt als Unzustellbarkeitsnachrichten von Office 365

You can fight back with a cyber resilience approach. Cyberattackers will try anything to get into enterprise networks. With the movement of many applications to the cloud, new creative techniques seem to appear every day. Users of Microsoft Office 3…

Lesen Sie mehr dazu
Security, Email Security

Sandboxing Technology: Gut gegen Böse reicht nicht mehr

Here’s the backstory on Mimecast’s new acquisition, Solebit. Editor's note: Earlier this year, Mimecast acquired Solebit, a company with technology geared toward static file analysis malware detection. As explained here, Mimecast had alr…

Lesen Sie mehr dazu
Security, Email Security

ESRA-Bericht Dezember: Die aggregierte False-Negative-Quote der etablierten E-Mail-Sicherheitssysteme beträgt 12 %

Learn more in Mimecast’s latest Email Security Risk Assessment Report Is a false negative rate of 12% a large number or a small one? I suppose it depends on your perspective. If your email security system lets in 12 unwanted emails—wheth…

Lesen Sie mehr dazu
Security, Security Awareness Training

Personifizierte Insider-Bedrohungen – Mitarbeiter ohne böse Absicht

Do you know your insider threat personas? In this this edition of Insider Threats Personified we’ll see how employees, no matter how well-meaning, can inadvertently aid in the lateral movement of threats through the distribution of malicious U…

Lesen Sie mehr dazu
Security, Email Security

Die neuesten Malware-Techniken erklärt

Here's the lowdown on how attackers may be going after you. Trillions of dollars are spent on cybersecurity, but it seems malware breaches continue to grow in part thanks to ransomware, rootkits, persistent malware and firmware malware. I’m su…

Lesen Sie mehr dazu
Security, Security Awareness Training

Aufschlüsselung Cybersicherheit: Verbesserung des Bewusstseins am Arbeitsplatz

How are your employees using work-issued devices? The holiday shopping rush is in full swing, and employees are increasingly using company-issued devices to complete their gift purchases while at work. In fact, recent research from Robert Half Techn…

Lesen Sie mehr dazu
Security, Security Awareness Training

Für interne E-Mail-Bedrohungen spielt das Mitarbeiterverhalten eine wichtige Rolle

Security without factoring in employee behavior is bad security. Editor’s Note: Internal email threats of all kinds are increasing, with Mimecast research showing that threats caused by careless users, compromised accounts and malicious inside…

Lesen Sie mehr dazu
Security, Brand Protection

Warum Zero-Day-Exploits für jedes Unternehmen relevant sind

No one wants to be the first to face a new cyberattack. Let’s face it, the potential for being the first organization to be hit with the next creative zero-day cyberattack strikes fear into the heart of every CISO and IT security professional.…

Lesen Sie mehr dazu
Security, Cyber Resilience for Email, Email Security

Bedrohungserkennung und -abwehr verbessern mit SIEM-Integration

Add email security data into SIEM solutions for improved threat intelligence and response. Email is a catch 22. It’s the number one business communication tool and the number one cyberattack vector. As the lifeblood that keeps business running…

Lesen Sie mehr dazu
Security, Email Security

Überwindung der Cyber-Kluft: Sie sind das schwächste Glied in der Lieferkette

Cyberattackers are going after you to get to your biggest customers. Welcome to the latest installment of Bridging the Cyber Divide, our blog series focused on helping IT professionals at small-to-medium sized organizations make the case for enhance…

Lesen Sie mehr dazu
Security, Brand Protection

Bedrohungsanalyse in Ihrem Unternehmen: 5 Möglichkeiten, einen Mehrwert zu belegen

You can do threat intelligence—even with a small budget. Editor’s Note: As part of an ongoing series, Threat Intelligence for You, we’re asking thought leaders in the Cyber Resilience Think Tank their thoughts about threat intellig…

Lesen Sie mehr dazu
Security, Email Security

Cyber-Bedrohungen kosten mehr als Sie denken

The costs of attacks are rising at an alarming rate. We've talked about how “Ignoring Cybersecurity Can Cost Millions” and highlighted how one US power company was fined $2.7 million over data exposure. This was just one of hun…

Lesen Sie mehr dazu
Archiving, Office-365, Archive and Data Protection, Office-365

Backup und Wiederherstellung für Office 365 im Zeitalter der Ransomware

The Old World Meets the New When It Comes to Backup and Recovery Many of us have the made the journey to Microsoft Office 365™ or are planning to do so soon. Many questions await us: how secure is it, who’s responsible for managing our d…

Lesen Sie mehr dazu
Office-365, Email Security, Office-365

Multifaktor-Authentifizierungsfehler führt zu Ausfällen von Office 365/Azure

“@Microsoft: please don’t ruin Thanksgiving.” Ah, Thanksgiving. Typically, a week full of family travels, exercising booked vacation time and in some cases, thinking ahead to bargain deals on Friday. But now, it’s perhaps not…

Lesen Sie mehr dazu
Security, Email Security

Innovative Prävention von Cyber-Bedrohungen

You've heard it all. Until now. By now, you have probably been exposed to every promise, sales pitch, marketing hype and yes, even technological wonder when it comes to new security solutions to old (and very pervasive) problems. However, disruptin…

Lesen Sie mehr dazu
Security, Email Security

Effektive Sicherheit in der E-Mail-Sandbox

You need the best security technology in today’s market. It’s no secret that kids love to get dirty and especially while playing in a sandbox, so much so that there are dozens of videos showing how to build the best sandbox for just this…

Lesen Sie mehr dazu
Security, Threat Intelligence Hub

Bedrohungsanalyse in Ihrem Unternehmen: Herausforderungen und Chancen

What can threat intelligence mean for your organization? Editor’s note: Threat intelligence. It’s been one of the most talked-about themes in the cybersecurity space for years now. But what does it mean to you, and what can it mean for y…

Lesen Sie mehr dazu
Security, Cyber Resilience for Email, Email Security

Überwindung der Cyber-Kluft: Warum robuste Resilience-Lösungen so wichtig sind

How do you make the case for cyber resilience? We know you’ve been there before. You’re an IT director or CIO without a large staff or budget. You find just the right solution that’ll make your company safer and more productive and…

Lesen Sie mehr dazu
Security, Cyber Resilience for Email, Email Security, Web Security

7 Tipps für die sichere Nutzung öffentlicher WLANs

With Cybersecurity Awareness Month here, we’re ready to help. Human error is one of the leading barriers to effective cybersecurity. Casual security mistakes can lead to career-threatening results. Putting the right technology in place to impr…

Lesen Sie mehr dazu
Security, Security Awareness Training

Schluss mit erfolglosen Cyber-Sicherheitsschulungen

It's depressing but true: failure is baked right into the DNA of most cybersecurity awareness training. How Cybersecurity Awareness Training is Taught Today Consider how cybersecurity awareness training is usually administered. During onboarding or …

Lesen Sie mehr dazu
Security, Cyber Resilience for Email, Email Security

4 einfache Tipps gegen Vishing

With Cybersecurity Awareness Month here, we’re ready to help. Human error is one of the leading barriers to effective cybersecurity. Casual security mistakes can lead to career-threatening results. Putting the right technology in place to impr…

Lesen Sie mehr dazu
Archiving, Archive and Data Protection

Warum Strategien für das Informationsmanagement der Vergangenheit versagen

Yesterday’s archive is old news. Here’s what you need to know now. The information management landscape is changing. New and stricter legal and regulatory requirements coupled with ongoing accumulation of electronic information are creat…

Lesen Sie mehr dazu
Security, Cyber Resilience for Email, Email Security

Sieben Möglichkeiten zum Schutz vor Überweisungsbetrug

With Cybersecurity Awareness Month here, we’re ready to help. Human error is one of the leading barriers to effective cybersecurity. Casual security mistakes can lead to career-threatening results. Putting the right technology in place to impr…

Lesen Sie mehr dazu
Security, Email Security, Brand Protection

Warum Angriffe mit Look-Alike-Domains immer häufiger werden

Here’s what to know about look-alike domain attacks. There are many kinds of attacks in the arsenal of your typical cybercriminal. One that has proven itself to be especially effective and thus increasingly popular comes down to tricking users…

Lesen Sie mehr dazu
Security, Cyber Resilience for Email, Email Security

Auf Ransomware reagieren – eine grundlegende Checkliste

With Cybersecurity Awareness Month here, we’re ready to help. Human error is one of the leading barriers to effective cybersecurity. Casual mistakes can lead to career-threatening results. Putting the right technology in place to improve your …

Lesen Sie mehr dazu
Cyber Resilience for Email, Email Security

Anstieg der Ransomware-Angriffe (in Zahlen)

Ransomware attacks aren’t going away. It’s a fact. Among the advanced email threats targeting organizations across the globe, ransomware has proven to be among the costliest. By 2019, global losses from ransomware attacks are expected to…

Lesen Sie mehr dazu
Security, Cyber Resilience for Email, Email Security, Archive and Data Protection

Großzahl der Datenlücken im Gesundheitswesen verursacht durch E-Mail-Verkehr

Email security at healthcare companies is trending in the wrong direction. Email has been the top source of data breaches in the healthcare industry three of the last four quarters, according to HHS Breach Portal. Unfortunately, this trend does not …

Lesen Sie mehr dazu
Cyber Resilience for Email, Email Security

Neue Phishing-Attacke nimmt Online-Gehaltsabrechnungssysteme ins Visier

Using advanced cybersecurity technology and user education can help stem the flow of money into the wrong hands. Stealing money has been the obvious focus for cybercriminals for as long as cyberattacks have taken place, and this shows no signs of ch…

Lesen Sie mehr dazu
Cyber Resilience for Email, Email Security, Office-365

„PhishPoint“: So begegnen Sie der neuesten Bedrohung in Office 365

There’s a new phishing attack targeting Office 365/SharePoint users. Cybersecurity is a lot like an ongoing, worldwide game of chess. One side—those defending critical information, IP, money, etc.—put up defenses against attackers—those who want to …

Lesen Sie mehr dazu
Security, Email Security

Nichts gewagt, nichts gewonnen: Bewältigung geschlechtsspezifischer Klischees im Technologiebereich

With a rising skills gap in technology, girls need more female role models to understand what’s achievable and what’s possible. (Phindi Mazibuko, left, and Nomso Kana, right) South Africa recently celebrated Women’s Month and throughout August we ac…

Lesen Sie mehr dazu
Continuity, Security, Office-365, Email Security, Office-365

Ausfälle von Azure / Office 365: Der Leitfaden zum Thema Kontinuität für IT-Administratoren

A major outage in the US takes down a key Microsoft datacenter and a host of cloud services in the process.  What to do when the “cloud” goes down?    Every vendor offering a cloud-based solution pours ungodly amounts of money into re…

Lesen Sie mehr dazu
Office-365, Email Security, Office-365

So schließen Sie die Sicherheitslücken in Office 365™

The email features in Office 365 may not be all you need. Businesses continue moving their productivity platforms to Microsoft Office 365™ in droves. As of their April 2018 earnings announcement, Microsoft said over 135 million business users worldwi…

Lesen Sie mehr dazu
Security, Cyber Resilience for Email, Email Security

ESRA-Bericht August: Vorhandenen E-Mail-Sicherheitssystemen entgingen 200.000 bösartige URLs

Learn more in Mimecast’s latest Email Security Risk Assessment Report. I am happy to report that Mimecast’s Email Security Risk Assessment (ESRA) testing and reporting continues to chug along, now in its 6th quarterly iteration! For those of you who…

Lesen Sie mehr dazu
Cyber Resilience für E-Mail

Neuigkeiten zum Thema Cyber Resilience – 21. August 2018

Catch up on the latest Cybersecurity news. Email security best practices to help you reel in the threat of phishing, Security Intelligence Email is still one of the top attack vectors when it comes to security breaches. According to a 2017 report,…

Lesen Sie mehr dazu
Cyber Resilience for Email, Email Security

Mimecast & Solebit: Kampf gegen Malware auf ganz neuem Niveau

Mimecast has acquired Solebit. Here’s why. Just like there is no one way to catch a thief, there is no one way to catch malware. There are just so many ways to build, compile, pack, and otherwise obfuscate malicious files to get past specific …

Lesen Sie mehr dazu
Cyber Resilience for Email, Email Security

Sind alle sicheren E-Mail-Gateways gleich?

Is the security efficacy of secure email gateways basically the same? This is a question a lot of email administrators and security professionals have asked for years. For many of these folks there is presumption that the answer is “yes.” How do the…

Lesen Sie mehr dazu
Cyber Resilience for Email, Email Security

Internal Cyber Threats – How to Protect Against the Enemy Within

Get the truth about malicious insiders. In general, organizations devote most of their prevention-focused email security controls on inbound security threats, as opposed to internal-to-internal or outbound threats. In their minds, they are primarily…

Lesen Sie mehr dazu
Archiving, Archive and Data Protection

3 Tipps für Ihren E-Discovery-Aktionsplan

E-discovery is key in building your “perfect world” archive. Ever think about what would happen if you challenged the status quo of legacy compliance and e-discovery solutions and thought about your readiness plans more proactively? Woul…

Lesen Sie mehr dazu
Cyber Resilience for Email, Email Security

Zwei Hauptgründe, warum der Einsatz von Cybersecurity scheitert

Good enough security is good enough no longer. You use email constantly. It’s the lifeblood of communication, commerce and exchange of ideas across your organization. Imagine trying to do your job in 2018 without it. It’s impossible, isn…

Lesen Sie mehr dazu
Office-365, Email Security, Office-365

Drei Schritte bei der Migration von E-Mails zu Office 365™

Migrate email to the cloud without pain—or compromise. For the better part of the last 20 years, organizations have been content to keep their email services and solutions on-premises, as opposed to migrating those services to hosted solutions. But M…

Lesen Sie mehr dazu
Security, Security Awareness Training

Lektionen zum Thema Cyber Awareness, die ich während einer Zugfahrt gelernt habe.

Users: here’s how not to handle an email security incident. Around a month ago I was catching the train home after work. For those of you who don’t know Melbourne, my office is around the corner from Flinders Street Station which means I…

Lesen Sie mehr dazu
Security, Security Awareness Training

Mimecast + Awareness Training: Sicherheit kann auch Spaß machen

It's the cybersecurity awareness training platform you've been waiting for. I am excited to announce that last week, Mimecast acquired Ataata. Together we can dramatically improve the employee cyber security awareness training globally. Ask any secu…

Lesen Sie mehr dazu
Security, Email Security

Blockieren von Identitätsmissbrauch, Phishing und Malware-Angriffe mit DMARC

Combine DMARC Analyzer’s email channel visibility and reporting with Mimecast DMARC enforcement and Targeted Threat Protection.  Email impersonation attacks, or email fraud, continues to grow, with Mimecast’s latest Email Security R…

Lesen Sie mehr dazu

Cyber Resilience News July 10, 2018

Catch up on the past week’s cyber security news. We’re now mid-way through 2018, so as part of this week’s news we take a look at the worst cybersecurity breaches of the year so far via a roundup from Wired. In that same vein, we&r…

Lesen Sie mehr dazu
GDPR, Email Security, Archive and Data Protection

DSGVO und das Recht auf Vergessenwerden: Wie funktioniert es?

Upon request, be ready to delete EU resident data—forever. The European Union General Data Protection Regulation (GDPR) is now in effect and is fundamentally changing the way organizations approach their handling of customer data. One of the bi…

Lesen Sie mehr dazu
Cyber Resilience für E-Mail

Neuigkeiten zum Thema Cyber Resilience – 13. Juni 2018

Catch up on the past week’s cybersecurity news. This week’s news covered the gambit of issues that continue to crop up in the cybersecurity world, no matter how much some try to educate. There are still internet scams people fall for and…

Lesen Sie mehr dazu
GDPR, Email Security, Archive and Data Protection

DSGVO: So funktioniert die Meldepflicht im Falle von Datenschutzverletzungen

The way you prevented data breaches has changed forever. The European Union General Data Protection Regulation (GDPR) is fundamentally changing the way organizations must approach their handling of customer data. One of the biggest shifts is the new …

Lesen Sie mehr dazu
Cyber Resilience für E-Mail

Neuigkeiten zum Thema Cyber Resilience – 29. Mai 2018

Catch up on the past week’s cybersecurity news. Well, we made it.  May 25th was Friday and GDPR is now in effect, and we’re already seeing headlines about violations. Google and Facebook are already on the radar.  That didn&rsq…

Lesen Sie mehr dazu
Cyber Resilience für E-Mail

Cyber Resilience News May 23, 2018

Catch up on the past week’s news in cybersecurity. The deadline for GDPR compliance kicks off Friday! Can you believe it? It’s been a hot topic for months and of course, in the weeks leading up to the deadline, there was news everywhere …

Lesen Sie mehr dazu
Cyber Resilience für E-Mail

Neuigkeiten zum Thema Cyber Resilience – 8. Mai 2018

Catch up on the past week’s cybersecurity news A lot of headlines this week swirled around what might be lurking in your social media account. This week Facebook warned of similar domain phishing and “punycode” scams that are landi…

Lesen Sie mehr dazu
GDPR, Email Security, Archive and Data Protection

DSGVO: Sicherheit vs. Datenschutz

Top 4 Tips for a Post-GDPR World This is the third installment of our 5 Things to Know for 5/25 blog series, and we’re talking about the differences between security and privacy and how this impacts GDPR preparations. Many see privacy and secu…

Lesen Sie mehr dazu
GDPR, Archive and Data Protection

Prioritizing GDPR Hurdles

4 GDPR Hurdles to Prepare For In the second installment of our 5 Things to Know for 5/25 blog series, we’re talking about how to prepare for, prioritize and tackle your GDPR hurdles. Compliance with GDPR means taking a long look at procedures and …

Lesen Sie mehr dazu
Security, Cyber Resilience for Email, Email Security

E-Mail-Angriffe haben sich weiterentwickelt – Ihre Sicherheitsmaßnahmen auch?

Email continues to be the number one threat to organizations around the world Why? Because it’s easy for attackers and hard for you. According to the latest Verizon Data Breach Report, email breaches have increased to account for 96% of incidents or…

Lesen Sie mehr dazu
Security, Email Security

Bestehenden Sicherheitssystemen entgehen Millionen von E-Mail-Bedrohungen

April ESRA Report Shows Continued Vulnerabilities to Email-Borne Threats We recently announced the fifth in our series of quarterly reports aggregated from our Email Security Risk Assessment (ESRA) testing program.  For those new to these tests,…

Lesen Sie mehr dazu
Cyber Resilience for Email, Email Security

Build Powerful Integrations with the Mimecast API

Mimecast launches new API Developer Portal What processes millions of requests a day and has been around for years? That’s right, the Mimecast API (Application Programming Interface). Now we’re opening the goodness of our API to customers, partners …

Lesen Sie mehr dazu
Sicherheit

Neuigkeiten zum Thema Cyber Resilience – 3. April 2018

Catch up on the past week’s cybersecurity news. Attacks on local governments made headlines this week from Atlanta and Baltimore. And states like South Dakota are stepping up their data breach laws.  With the GDPR clock ticking down to the May …

Lesen Sie mehr dazu
Finance, Banking, Financial Advising, Insurance, IT, Telecommunications, Media, Legal, Accounting, Marketing, PR, Advertising, Design, Engineering, Recruitment, Manufacturing, Retail, Estate Agents, Hospitality, Wholesale, Transportation, Construction, Utilities, Oil & Gas, Health, Government, Pharmaceutical, Education, Non Profit/Charities, Property Development, Sports & Entertainment, Travel & Leisure, Food, Healthcare Manufacturer, Continuity, Security, Email Security

Wie schnell kann ich mich von einem Cyber-Angriff erholen?

Bei Cyber-Resilience geht es nicht einfach nur um die Vermeidung von Angriffen, sondern in erster Linie auch darum, was danach passiert. Ihre geschäftlichen E-Mails zu schützen bedeutet wesentlich mehr, als nur Spam, Malware und Business E-Mail Compromise (BEC)-E-Mails herauszufiltern. Im Kontext einer Migration zu Microsoft …

Lesen Sie mehr dazu
Security, Email Security

E-Mail-Sicherheit und Best Practices für Mitarbeiter

Get posts like this delivered to your inbox. Subscribe to Cyber Resilience Insights today. Even the best cloud-based email security solution can’t catch every malicious email missive. Here’s a list of do’s and don’ts f…

Lesen Sie mehr dazu
GDPR, Email Security, Archive and Data Protection

Das sollten Sie über die DSGVO wissen

Breaking Down GDPR: What it means for your business GDPR, the European Union’s General Data Protection Regulation, goes into full effect in May 2018. Yet many organizations aren’t ready to comply – or even thinking they need to comply. We gathered t…

Lesen Sie mehr dazu
Security, Archive and Data Protection, Email Security

Auf die Plätze, fertig, Compliance. Sind australische Unternehmen bereit für das „Notifiable Data Breach (NDB)“-System?

NDB kicks off next week and more than half of organizations say they’re not ready. With just days to go until Australia’s Notifiable Data Breaches (NDB) scheme takes effect, new research suggests that nearly half of Australian companies haven’t yet …

Lesen Sie mehr dazu
Security, Email Security

Cybersicherheit vs. Cyber Resilience

What’s the difference between Cybersecurity and Cyber Resilience? While the term “cybersecurity” is as old as the hills in the security world, the term “cyber resilience” has been gaining momentum. This is a good thing. Cybersecurity management is c…

Lesen Sie mehr dazu