Security, Email Security

Neue Betrugsmasche erbeutet Selfies von Kunden der Chase Bank

Highlighting the importance of extra care no matter the device. Yes, we live in the age of the selfie. Admit it, you’ve taken them yourself. But, did you ever think selfies could be part of a phishing scam? The attackers have really outdone th…

Lesen Sie mehr dazu
Security, Email Security

Umgang mit aktiven, passiven und Host-basierten Cyber-Angriffs-Vektoren

Know the difference and how you can prevent cyberattacks. Budding authors and journalist are taught the difference between active and passive voice in first year writing classes. They understand that active is about “doing” and passive i…

Lesen Sie mehr dazu
Security, Email Security, Web Security

Risiken und Konsequenzen älterer Web-Sicherheitslösungen

Counting the cost of on-premises web security systems. Shopping, researching, downloading, gaming, finding new friends and seeing what’s happening in the world: these are just some of the ways we use the web every day. Unfortunately, threat ac…

Lesen Sie mehr dazu
Security, Email Security

Social Media als Cybersicherheits-Risiko für Ihr Unternehmen

The amount of time your employees spend on social media will shock you. Facebook, Instagram, LinkedIn, Twitter, YouTube or the latest online game. Yes, these are the new temptations facing employees on a daily basis. It starts with just a peek; mayb…

Lesen Sie mehr dazu
Security, Email Security

Neue Cyberspionage-Kampagne mit noch nie dagewesenen Malware-Tools

The key to defending against new attack types is a multi-layered security strategy. Attackers are always looking to get the upper hand on their targets. Many of the methods and tactics attackers use are tried-and-true. But sometimes we see things we…

Lesen Sie mehr dazu
Security, Web Security

Web-Sicherheitskontrollen werden schnell auf die Cloud umgestellt

Following the lead of secure email gateways, web security systems are moving quickly to the cloud. No big secret, but IT services in general and IT security controls in particular are rapidly transitioning to the cloud. There are many reasons for th…

Lesen Sie mehr dazu
Security, Email Security

DNSpionage entmystifiziert

Espionage is the subject of more novels and Hollywood films than can even be accounted for. It seems intriguing on the written page or the silver screen to the average consumer, but when espionage starts to become a reality that affects the identit…

Lesen Sie mehr dazu
Security, Email Security

Mittelständler weiterhin bevorzugtes Ziel für Cyber-Bedrohungen

More data points are available to make your resilience case. If you’re making the case for cyber resilience at your small to medium-sized organization, there is a whole slew of new data out there to help make your argument. Our ongoing blog s…

Lesen Sie mehr dazu
Security, Email Security

Über den richtigen Umgang mit Stress bei Cyber-Bedrohungen

Stress seems to be something that comes up daily in at least one conversation with someone else. You may be feeling stress at this very moment, but do you really understand what it is and where it comes from, especially as an IT Security profession…

Lesen Sie mehr dazu
Security, Email Security, Security Awareness Training

Insider Threat Protection: Wie Unternehmen mit dem Unvermeidlichen umgehen

Keeping Connected to Our 33K+ Customers, One Customer at a Time. At Mimecast we are blessed to have more than 33,000 customers for our email security, archiving, web security and security awareness training services. And staying connected and e…

Lesen Sie mehr dazu
Security, Email Security

Phisher plädiert im Betrugsfall gegen hochkarätige Prominente und Sportler für schuldig

A reminder: phishing and brand-spoofing works best against the unsecured and unaware. A phishing scam perpetrated by a man stealing sensitive personal information from high-profile individuals should provide a warning sign to organizations of all si…

Lesen Sie mehr dazu
Security, Email Security

Grenzüberschreitender C-Level-Betrug und Spear-Phishing

These long-standing cyberattack types are more prevalent than ever.   Cave drawing found in southern France showing early spear-fishing have been dated back 16,000 years, and whaling has been practiced as an organized industry as early as 8…

Lesen Sie mehr dazu