Archiving, Archive and Data Protection

Warum Archivierungslösungen zum Schutz vor Ransomware unerlässlich sind

The Pressure to get proactive about Backup in Office 365 The promise of Office 365 may be productivity, but today’s ransomware threat promotes the exact opposite. The malicious software holds end users hostage, preventing them from accessing f…

Lesen Sie mehr dazu
Security, Email Security

13 Tipps für eine gute Cyberhygiene bei Black Hat und DEF CON 2019 aus dem Mimecast Threat Center

Black Hat and DEF CON are two seminal cybersecurity and hacker events that showcase the latest devices and capabilities in the field each year. Of course, their notoriety has led to each show becoming a prime target for attackers. Before attending t…

Lesen Sie mehr dazu
Security, Email Security

Phishing-Angriffe auf File-Sharing-Dienste zeigen, dass Teilen auch Gefahren birgt

How we can combat phishing attacks on Dropbox, OneDrive, Google Drive and more.  There are multiple ways in which attackers abuse the convenience of cloud-based services in our current cyber landscape. In my latest research, which I will be pres…

Lesen Sie mehr dazu
Security, Email Security, Threat Intelligence Hub

Drei Faktoren für einen umfassenden Bedrohungsschutz

How should your organization deal with Advanced Threat Protection?  Every IT security professional and their Chief Information Security Officer, understands Advanced Threat Protection is a key competent to a successful security infrastructure. C…

Lesen Sie mehr dazu
Security, Email Security, Threat Intelligence Hub

Neuer Phishing-Angriff mit SHTML-Dateianhängen

New phishing tactic identified in latest threat intelligence research from Mimecast’s Threat Center In early April, the Mimecast Threat Center team was alerted to a rare type of server-parsed HTML (SHTML) based phishing attack emerging from the…

Lesen Sie mehr dazu
Continuity, Security, Cyber Resilience for Email, Awareness Training, Email Security, Security Awareness Training

Interne Sicherheitsbedrohungen: Ein Problem, das sich weiter verschlimmert

Mimecast’s “The State of Email Security 2019” report shows continued challenges from compromised and careless users Most organizations are heavily focused on protecting their organizations from inbound attacks coming directly from c…

Lesen Sie mehr dazu
Security, Cyber Resilience for Email, Awareness Training, Email Security

E-Mail-Angriffe in der echten Welt: Beispiele für Ihre Resilience-Strategie

Take lessons from the past in building your organization's cyber resilience strategy.  The 2019 State of Email Security report highlights some of the most alarming trends in the world of email security, but also examines how organizations are us…

Lesen Sie mehr dazu
Security, Email Security

Zero-Day-Exploits erklärt

There are literally hundreds, if not thousands or approaches cyber criminals can use to exploit your IT infrastructure and access sensitive data.  Once an exploit is discovered it can be dealt with using signature-based technologies that scan …

Lesen Sie mehr dazu
Security, Email Security

Ransomware-as-a-Service: Was Sie wissen müssen und wie Sie dagegen vorgehen

Here's what to know about a growing scourge. You may be surprised to know that Hollywood has created over 88 films centered on hacking and/or the Dark Web between 1969 and 2017. If you are interested in the entire list check it out at a Cybersecurit…

Lesen Sie mehr dazu
Security, Email Security, Web Security

Webbasierte Social-Engineering-Angriffe nehmen immer populärere Formen an

These techniques include web site spoofing and web-based file sharing service exploits. Organizations and their security professionals must be prepared for nearly anything when it comes to how attackers will attempt to exploit them. A new report hig…

Lesen Sie mehr dazu
Security, Email Security

Cybersicherheitstrends: Unsere meistgelesenen Blog-Beiträge des zweiten Quartals 2019

See what caught the eyes of Cyber Resilience Insights readers last quarter. With the second quarter of 2019 in the books, we wanted to provide you a one-stop shop for the most-read new content we posted on Cyber Resilience Insights during that time. …

Lesen Sie mehr dazu