Beveiliging

2018 Year in Review

It is amazing how fast it feels as if 2018 has flown past us. Despite the fact that every year is the same number of months, weeks, days and hours, it feels as if somehow 2018 disappeared in a wink. This is due in large part to the amazing this tha…

Meer informatie
Cyber resilience voor e-mail

The 10 Most-Read Cyber Resilience Insights Blogs of 2018

A look back at the year in cyber resilience. Before we turn the corner to 2019, we wanted to take a moment to look back at the most-read blogs on Cyber Resilience Insights in 2018. Thanks so much for reading Cyber Resilience Insights in 2018. A remi…

Meer informatie
Beveiliging

How Long is Too Long to Wait to Change Cybersecurity Strategies?

Malware can stick around for years. Wine, whiskey and cheese are all things we know and love but take notoriously long to achieve their optimal performance (read taste/cost). Malware on the other hand that is active for years inside your infrastruct…

Meer informatie
Beveiliging

Don’t Be Held For Holiday Ransom

See why cybercriminals love the holidays. As 2018 winds down and we all celebrate this holiday season with family, friends and loved ones we can’t lose sight of our year-end work priorities as well. To say that sometimes we may get distracted …

Meer informatie
Beveiliging

What’s Going to Change in Cybersecurity in 2019 (and What Won’t)

Many things in cybersecurity that should happen in 2019 won’t. Learn why. Every year, we reach December and industry experts share their predictions and tell the world what the biggest trends will be for the following year. In the security ind…

Meer informatie
Beveiliging

‘Tis the Season for Hacking – Bridging the Cyber Divide

No user awareness training? Prepare for coal in your stocking. There’s no time of year where your employees are more susceptible to attacks than the holidays. They’ll be inundated with emails from retailers offering the best deals. But n…

Meer informatie
Beveiliging

New Phishing Emails Posing as Office 365 Non-Delivery Messages

You can fight back with a cyber resilience approach. Cyberattackers will try anything to get into enterprise networks. With the movement of many applications to the cloud, new creative techniques seem to appear every day. Users of Microsoft Office 3…

Meer informatie
Beveiliging

Even the US Post Office Isn’t Immune to Cyber Vulnerabilities

A flaw in their system could have been bad news for 60 million users. You may have heard the United States Post Office has a motto that goes: “Neither snow nor rain nor heat nor gloom of night stays these couriers from the swift completion of …

Meer informatie
Beveiliging

What the Size of the Marriott Breach Means

It didn't take long for the lawsuits to start rolling in. Most people are impressed by size. Specifically, large manmade or natural wonders, large statues or artwork, large bank accounts or net worth, large customer bases or revenues will all make t…

Meer informatie
Beveiliging

Sandboxing Technology: Why Good vs. Bad Isn’t Enough

Here’s the backstory on Mimecast’s new acquisition, Solebit. Editor's note: Earlier this year, Mimecast acquired Solebit, a company with technology geared toward static file analysis malware detection. As explained here, Mimecast had alr…

Meer informatie
Beveiliging

December ESRA Report: Aggregate False Negative Rate of Incumbent Email Security Systems is 12%

Learn more in Mimecast’s latest Email Security Risk Assessment Report Is a false negative rate of 12% a large number or a small one? I suppose it depends on your perspective. If your email security system lets in 12 unwanted emails—wheth…

Meer informatie
Beveiliging

Insider Threats Personified – The Well-Intentioned Employee

Do you know your insider threat personas? In this this edition of Insider Threats Personified we’ll see how employees, no matter how well-meaning, can inadvertently aid in the lateral movement of threats through the distribution of malicious U…

Meer informatie
Beveiliging

Understanding the Latest Malware Techniques

Here's the lowdown on how attackers may be going after you. Trillions of dollars are spent on cybersecurity, but it seems malware breaches continue to grow in part thanks to ransomware, rootkits, persistent malware and firmware malware. I’m su…

Meer informatie
Beveiliging

‘Tis The Season for Stolen Data

The holiday shopping season is upon us. ‘Tis the season to exercise our rights as consumers to spur the economy while satisfying innate needs to acquires goods and services. Unfortunately, cyber thieves are also counting on this and the inevi…

Meer informatie
Archivering

What the Enterprise Information Archive of Tomorrow Needs to Be

Mimecast named a Gartner EIA MQ Leader for the 4th year in a row. The annual Gartner Enterprise Information Archiving (EIA) Magic Quadrant (MQ) was released this week. As always, it’s a big deal for our industry. Enterprises of all types&mdash…

Meer informatie
Beveiliging

Cybersecurity Breakdown: Improving Workplace Awareness

How are your employees using work-issued devices? The holiday shopping rush is in full swing, and employees are increasingly using company-issued devices to complete their gift purchases while at work. In fact, recent research from Robert Half Techn…

Meer informatie
Beveiliging

For Internal Email Threats, Consider Employee Behavior

Security without factoring in employee behavior is bad security. Editor’s Note: Internal email threats of all kinds are increasing, with Mimecast research showing that threats caused by careless users, compromised accounts and malicious inside…

Meer informatie