Beveiliging

SECURITY CAMERA CYBER RISKS FOR KIDS & FAMILIES

Home security cameras have recently fielded a spate of attacks affecting users across the U.S.; a particularly frightening recent news story describes how a Ring camera installed in a child’s bedroom was hacked and used to scare the eight-year-…

Meer informatie
Archivering

Why Email Compliance Is Critical for Financial Firms’ Cybersecurity

Maintaining compliance has always been a top-of-mind concern for highly regulated industries. In the face of increasing regulatory frameworks and evolving security threats, it’s no surprise that compliance is becoming more critical universall…

Meer informatie

As email archive evolves, so do the market leaders

In IT terms, five years is a lifetime. In the last five years I’ve gone from covering enterprise archiving as an analyst at Gartner to archive product marketing at Mimecast. During that time, Mimecast has continued its five-year streak as a Le…

Meer informatie
Archivering

In 2020, data privacy laws will blanket the U.S. from coast to coast

On January 1, 2020, the state of California’s new regulatory requirement for data privacy - the California Consumer Privacy Act (CCPA), enacted in 2018 – will take effect. The CCPA follows GDPR as a new public sector attempt to address i…

Meer informatie
Beveiliging

Hoe hackbaar bent u? Vier manieren om uw cyberbewustzijn te verbeteren

Why data over-sharing is making you an easier phishing target We live in a world where sharing too much data – or the wrong data – is like asking to be hacked. It’s bad online security practice, particularly as phishing is on the ri…

Meer informatie
Office-365

Top 5 Reasons to Build Cyber Resilience into Office 365 Email

Threat intelligence teams know that cyberattacks are most frequently conducted via email, and they know many simple attacks can be successful with the right blend of human error and obfuscated malware in compressed file formats. On top of this indus…

Meer informatie
Archivering

Why You Need Scary Good Archiving

Reducing compliance nightmares, data loss horror stories and other terrifying cyberthreats to avoid   Developing a modern archiving strategy and maintaining compliance can be scary. No doubt, IT departments are incr…

Meer informatie
Beveiliging

Let op voor tekortkomingen: Hoe u cyberbewustzijn kunt aanmoedigen

Editor’s note: Elad Schulman is the co-founder and CEO of Segasec, and a speaker at the Cyber Resilience Summit in Dallas, October 28-30.  Awareness of the cyber skills gap has grown in lockstep with the gap itself in recent…

Meer informatie
Beveiliging

Cyber Resilience Summit: V&A met James Chappell van Digital Shadows

“I really like the concept of cyber resilience because it genuinely helps explain what businesses need to do: detect, respond, and recover in the shortest possible amount of time.”  Next week, cybersecurity experts from all around th…

Meer informatie
Security, Awareness Training

Why Deepfakes are Revolutionizing the World of Phishing

Since the dawn of social engineering, attack methodology has remained largely unchanged. But the rise in electronic communications and the departure from in-person interaction has changed this dynamic. BEC attacks rose in prominence, using email frau…

Meer informatie
Beveiliging

Cyber Resilience Summit: V&A met Elad Schulman van Segasec

The Cyber Resilience Summit in Dallas on October 28-30 is just around the corner, and the speakers have been hard at work preparing sessions on how to get the most of Mimecast, how to build true company-wide resilience against information risk and cy…

Meer informatie
Beveiliging

De invloed van malware uit 2007 op uw e-mailbeveiliging in 2019

Recent Mimecast threat intelligence research has highlighted the increased use of the CVE-2017-11882 vulnerability in MS Office 2007. First published in 2017, NIST states, “Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pa…

Meer informatie
Continuïteit

Cyberrisico's, cyberverzekeringen en de kostprijs van onderbrekingen

Here's the deal with cyber insurance.  Companies evaluating cyber insurance sometimes complain that they don't know what they're buying, what it does and doesn't cover, how it compares to competitive offerings, and what it's really worth. An Ov…

Meer informatie
Archivering

Cyber Resilience Summit: Let's Build Information Mindfulness Together

Cyber Resilience Comes from CISOs, IT Pros, and Compliance Need a reason to attend the inaugural Mimecast Cyber Resilience Summit this October in Dallas?  We have plenty! Among them are the amazing set of speakers and industry experts on the ho…

Meer informatie
Beveiliging

Recente arrestaties omtrent zakelijke e-mailcompromissen benadrukken de waarde van e-mailbeveiliging

Operation reWired Leads to 281 Arrests In BEC Sting A four-month worldwide investigation into business email compromise (BEC) scams dubbed Operation reWired has led to 281 arrests by the FBI. According to a press release on Sept. 11 from the United …

Meer informatie
Productiviteit

Verbeter uw Cyber Resilience-strategie: werk slimmer, niet harder

Managing your organization’s IT security environment is about as easy as herding cats. But, imagine what it might be like having the systems in that environment working together and complementing each other in a way that makes your job less ch…

Meer informatie

Cyber Resilience Summit - Getting the most out of Mimecast

A guide to your priority: maximizing value When it comes to security technology, understanding how to continuously optimize your solutions and get the most out of your investment is critical. Doing so is – first and foremost – essential t…

Meer informatie
Archivering

Cyber Resilience Summit – Verkennen van de uitdagingen van archivering en gegevensbescherming

Learn new ways to optimize existing data protection technologies to make data migration easy in Dallas Cyber Resilience.  Certainly, a broad topic and the pinnacle of everything we do here at Mimecast. Resiliency can mean many things.  Of …

Meer informatie
Beveiliging

Op-ed: Symantec & Carbon Black - twee belangrijke overnames in cyberbeveiliging

From a CISO’s perspective: Why the Carbon Black acquisition is potentially good news and the Symantec one is not. The following is an op-ed from Matthew Gardiner, Director, Enterprise Security Campaigns The recently announced acquisitions of S…

Meer informatie
Beveiliging

Zal de Broadcom-Symantec Deal Cyberbeveiligingsklanten in de kou laten staan?

Cybersecurity industry consolidation creates potential risk for organizations Cybersecurity experts have spoken – Broadcom’s pending $10.7 billion acquisition of Symantec’s enterprise security business doesn’t bode well for S…

Meer informatie
Beveiliging

Cyber Resilience Summit met vijf trainingstrajecten, waaronder Geavanceerde Beveiliging

Practical Advice for Advancing Your Security Programs What do threat intelligence, securing Office 365, brand spoofing, internal threats, human error, employee risk scoring, cyber insurance, web security, and cybercrime investigations have in common…

Meer informatie
Beveiliging

Phishingaanvallen in de gezondheidszorg leiden tot toenemende verstoringen en financieel verlies voor zowel organisaties als patiënten

74% of healthcare institutions experienced a security incident last year; More than 30 million patient records compromised thus far in 2019.  Data breaches in the healthcare sector are skyrocketing. According to the Protenus Breach Barometer, 2…

Meer informatie
Beveiliging

Threat Intelligence Report: Cybercriminal Go-to-Market-strategieën

Mass market vs. targeted marketing: Techniques and technology behind these two strategies Do cybercriminals have different go-to-market strategies? Does this strike you as a weird question to ask? Don’t only legitimate organizations have marke…

Meer informatie
Beveiliging

"De stand van e-mailbeveiliging 2019" - Bedreigingen via e-mail leiden zonder omwegen tot gegevensverlies

The Real Cost of Data Loss and Why it Hurts so Much When digital data or sensitive content falls into the wrong hands, it really is lost for good. The role of email in such loss events are a key part of the recently released "The State of Email Secu…

Meer informatie
Archiving, Data Protection

Waarom archiefoplossingen van essentieel belang zijn om u tegen ransomware te beschermen

The Pressure to get proactive about Backup in Office 365 The promise of Office 365 may be productivity, but today’s ransomware threat promotes the exact opposite. The malicious software holds end users hostage, preventing them from accessing f…

Meer informatie
Security, Email Security

13 tips voor goede cyberhygiëne van het Mimecast Threat Center op Black Hat en DEF CON 2019

Black Hat and DEF CON are two seminal cybersecurity and hacker events that showcase the latest devices and capabilities in the field each year. Of course, their notoriety has led to each show becoming a prime target for attackers. Before attending t…

Meer informatie
Security, Email Security

Phishingaanvallen tonen de gevaren van het delen van bestanden aan

How we can combat phishing attacks on Dropbox, OneDrive, Google Drive and more.  There are multiple ways in which attackers abuse the convenience of cloud-based services in our current cyber landscape. In my latest research, which I will be pres…

Meer informatie
Security, Email Security

3 sleutels tot geavanceerde bescherming tegen dreigingen

How should your organization deal with Advanced Threat Protection?  Every IT security professional and their Chief Information Security Officer, understands Advanced Threat Protection is a key competent to a successful security infrastructure. C…

Meer informatie
Security, Email Security

Nieuwe Phishing-aanval gebasserd op SHTML-bestandsbijlagen

New phishing tactic identified in latest threat intelligence research from Mimecast’s Threat Center In early April, the Mimecast Threat Center team was alerted to a rare type of server-parsed HTML (SHTML) based phishing attack emerging from the…

Meer informatie
Continuity, Security, Cyber Resilience for Email, Awareness Training, Email Security

Interne beveiligingsdreigingen: een toenemend probleem

Mimecast’s “The State of Email Security 2019” report shows continued challenges from compromised and careless users Most organizations are heavily focused on protecting their organizations from inbound attacks coming directly from c…

Meer informatie
Security, Cyber Resilience for Email, Awareness Training, Email Security

E-mailaanvallen in het echte leven: Voorbeelden voor uw weerstandsstrategie

Take lessons from the past in building your organization's cyber resilience strategy.  The 2019 State of Email Security report highlights some of the most alarming trends in the world of email security, but also examines how organizations are us…

Meer informatie
Security, Threat Center

Exploit met behulp van Microsoft Excel Power Query voor externe DDE-uitvoering ontdekt

Mimecast Threat Center discovered a weakness in the Microsoft Excel tool that allows embedding malicious payloads remotely. Summary (Editor’s note: The Mimecast Threat Center team would like to acknowledge the contributions of team member Doro…

Meer informatie
Security, Email Security

Zero-Day-oplichting uitgelegd

There are literally hundreds, if not thousands or approaches cyber criminals can use to exploit your IT infrastructure and access sensitive data.  Once an exploit is discovered it can be dealt with using signature-based technologies that scan …

Meer informatie
Security, Email Security

Ransomware as a Service: wat u moet weten en hoe u het kunt tegengaan

Here's what to know about a growing scourge. You may be surprised to know that Hollywood has created over 88 films centered on hacking and/or the Dark Web between 1969 and 2017. If you are interested in the entire list check it out at a Cybersecurit…

Meer informatie
Security, Email Security

Webgebaseerde social engineering-aanvallen met steeds populairder wordende variaties

These techniques include web site spoofing and web-based file sharing service exploits. Organizations and their security professionals must be prepared for nearly anything when it comes to how attackers will attempt to exploit them. A new report hig…

Meer informatie
Security, Email Security

Trends in cyberbeveiliging: onze meest gelezen blogs van 2019 Q2

See what caught the eyes of Cyber Resilience Insights readers last quarter. With the second quarter of 2019 in the books, we wanted to provide you a one-stop shop for the most-read new content we posted on Cyber Resilience Insights during that time. …

Meer informatie
Security, Email Security

Ransomware raakt een toeleverancier van vliegtuigonderdelen

High-profile attacks highlight the need for advanced protection for all. It’s been a bad month for big ransomware attacks globally, and now another huge one has crippled a manufacturer in one of the world’s most critical industries. As r…

Meer informatie
Security, Email Security

Wat is de nettowaarde van uw cyberbeveiliging?

Calculating your cybersecurity net worth doesn't have to be complex.  Every public and private company maintains a set of financial documents to keep track of their assets and liabilities in order to determine their net worth. These reports inc…

Meer informatie
Security, Email Security

Uit het onderzoek blijkt: Ransomware staat voor de meeste organisaties nog steeds aan de top van de dreigingslijst

Mimecast’s State of Email Security Report shows ransomware attacks aren’t slowing down. Don’t be lulled by crypto-mining (or cryptojacking) alarmists into thinking that crypto-mining is replacing ransomware as a major new security …

Meer informatie
Archiving, Data Protection

Hoe financiële ondernemingen de kosten voor naleving bepalen

Is your firm ready to face today's business and regulatory needs? Financial services firms face some of the world’s toughest regulatory pressures. And yet, most compliance programs have not scaled with the needs of the business or evolving reg…

Meer informatie
Security, Email Security

Voorkomen, niet verhelpen: drie vereisten voor cyberbeveiliging

It’s never a bad time to pause and reflect on the vision for your IT security strategy. Is your IT security strategy based on “protecting your information assets from malicious code and cyber terrorists” or is it “preventing…

Meer informatie
Security, Awareness Training

De opkomst van cyberbewustzijnstrainingen voor hedendaagse ondernemingen

Adoption is rising, but is it happening fast enough? Here’s a stark reality: no matter how good your employees are at their jobs they still usually pose your biggest security risk. Human error ranks even higher for cyber risk than software fla…

Meer informatie
Security, Email Security

Hoeveel IT-beveiligingstools heeft u nodig?

How many IT Security tools are you currently using to keep your IT environment secure? Odds are, it’s too many. There’s a big, big problem taking hold in the IT world today: IT/security teams are constantly expanding tooling and architec…

Meer informatie
Security, Email Security

Ontoereikende maatregelen op het gebied van cyberveiligheid

Good enough security isn't good enough. Just checking the cybersecurity box with a few well know measures is not enough with today’s extremely sophisticated cybercriminals and even Ransomware as a Service offerings. It is the equivalent of an …

Meer informatie
Security, Email Security

Echte voorbeelden van dreigingen gemist door allerhande e-mailbeveiligingssystemen

A new view of the Mimecast Email Security Risk Assessment. With this blog I am happy to bring you the 9th consecutive quarterly release of our Mimecast Email Security Risk Assessment (ESRA) aggregate report, also with its associated funnel infograph…

Meer informatie
Security, Email Security

Nader bekeken: Verdoezelde bestandsloze malware in de toolkits van cyberaanvallers

The latest from Mimecast Research Labs includes a malware technique never observed previously. Introduction Fileless malware has become an increasingly popular technique among cyberattackers because it reduces the defender’s ability to detect …

Meer informatie
Security, Email Security

De Baltimore ransomware-aanval markeert kwetsbaarheden in gemeentelijke IT-beveiliging

Resource-thin IT departments need a plan for cyber resilience. A high-profile ransomware attack against the government of a major American city has brought new light on an ongoing cybersecurity quandary: how can those with the least resources defend…

Meer informatie
Security, Email Security

Gemak en eenvoud om de beveiligingsrace te winnen

How can we build smarter security systems? The arms race between attackers and defenders is constructive. It should lead to the detection of inefficient parts and production of more robust solutions help to improve systems. It is an unfortunate fact…

Meer informatie
Security, Email Security

Wat is de huidige stand van zaken met betrekking tot e-mailbeveiliging?

Our third annual State of Email Security report is here. What is the current state of email security globally? Excellent question. The short answer, per the results of the Mimecast State of Email Security Report 2019 – is not good. Sorry to st…

Meer informatie
Security, Email Security

Elke organisatie heeft behoefte aan veilige informatie

Content theft remains a huge problem for all organizations. It seems that the only thing scarier for a Chief Information Security Officer, IT security professional or Security Operations Center than a marathon of Freddy Kruger movies is the theft or…

Meer informatie
Security, Email Security

Bijna de helft van alle inbreuken treffen kleine en middelgrote ondernemingen

Convince the cybersecurity skeptics with this and other data points. When you're making your case for cybersecurity solutions back to your business/finance colleagues at your small-to-medium sized organization, it's helpful to have cold, hard facts …

Meer informatie
Security, Email Security

Hoe kunnen we inschatten of de cyberinbreuken zullen toenemen?

The more things change, the more they seem to stay the same. It seems that in cybersecurity, the more we attempt to stop or mitigate the damage of cybersecurity breaches, the more they occur. And why should we expect anything different when the rewa…

Meer informatie
Security, Email Security

Is dynamische analyse voldoende om hardnekkige malware-aanvallen te stoppen?

Malware authors are evolving as quickly as the AV and security vendors are. If you've been following industry news, you often hear about major malware infections and their impact, but rarely do you learn why these attacks were successful in the firs…

Meer informatie
Security, Threat Center

Luchtvaartmaatschappijen kampen met schendingen

It may be safer to fly in an airplane than to book your travel. While there is a very remote chance you will come to harm while flying, it seems that based on the news lately you can come to cyber-theft harm just through booking your flights. Cyber…

Meer informatie
Security, Email Security

Beveiliging van het Department of Homeland Security Way

Learn how the DHS recommends you approach cybersecurity. Homeland security was not a thing much on the minds of anyone prior to Sept. 11, 2001. That changed with the successful terrorist attacks and shined a rather large spotlight on an ever-growing…

Meer informatie
Archiving, Data Protection

Toezicht op naleving: Meer dan het aanvinken van vakjes

Compliance supervision reviewers face big challenges. It doesn’t have to be so complicated. Compliance supervision is one of the most important areas of investment for archiving buyers today but is also unfortunately one of the stagnant areas …

Meer informatie
Security, Threat Center

Dreigingsintelligentie de beste methodes voor slimme IT-afdelingen - Deel 2

Make your organization a harder target for adversaries to crack. Editor’s note: For cybersecurity professionals, threat intelligence isn’t just about reacting to indicators of compromise after they've already impacted an organization. In…

Meer informatie
Security, Email Security

Beveiligen zoals het NSA

What can you learn from NSA cybersecurity strategies? The United States National Security Agency originated as a unit to decipher coded communications in World War II and was officially formed as the NSA by President Harry S. Truman in 1952. Since …

Meer informatie
Security, Threat Center

Dreigingsintelligentie; de beste methodes voor slimme IT-afdelingen - Deel 1

Here’s why looking at indicators of compromise isn’t enough. Editor’s note: For cybersecurity professionals, threat intelligence isn’t just about reacting to indicators of compromise after they've already impacted an organiza…

Meer informatie
Security, Email Security

Phishing naar Selfies? Een nieuwe scam gericht op klanten van Chase Bank

Highlighting the importance of extra care no matter the device. Yes, we live in the age of the selfie. Admit it, you’ve taken them yourself. But, did you ever think selfies could be part of a phishing scam? The attackers have really outdone th…

Meer informatie
Security, Email Security

Actieve versus passieve versus hostgebaseerde vectoren voor cyberaanvallen

Know the difference and how you can prevent cyberattacks. Budding authors and journalist are taught the difference between active and passive voice in first year writing classes. They understand that active is about “doing” and passive i…

Meer informatie
Security, Email Security

Risico's en gevolgen van verouderde oplossingen voor online beveiliging

Counting the cost of on-premises web security systems. Shopping, researching, downloading, gaming, finding new friends and seeing what’s happening in the world: these are just some of the ways we use the web every day. Unfortunately, threat ac…

Meer informatie
Security, Email Security

Sociale media vormt een achterdeurtje in de cyberbeveiligingsstructuur van uw onderneming

The amount of time your employees spend on social media will shock you. Facebook, Instagram, LinkedIn, Twitter, YouTube or the latest online game. Yes, these are the new temptations facing employees on a daily basis. It starts with just a peek; mayb…

Meer informatie
Security, Email Security

Nieuwe campagne Cyber Spionage met nooit eerder vertoonde malware-tools

The key to defending against new attack types is a multi-layered security strategy. Attackers are always looking to get the upper hand on their targets. Many of the methods and tactics attackers use are tried-and-true. But sometimes we see things we…

Meer informatie
Security, Web Security

Webbeveiligingscontroles worden in sneltempo overgezet naar de cloud

Following the lead of secure email gateways, web security systems are moving quickly to the cloud. No big secret, but IT services in general and IT security controls in particular are rapidly transitioning to the cloud. There are many reasons for th…

Meer informatie
Security, Email Security

DNSpionage ontsluierd

Espionage is the subject of more novels and Hollywood films than can even be accounted for. It seems intriguing on the written page or the silver screen to the average consumer, but when espionage starts to become a reality that affects the identit…

Meer informatie
Security, Email Security

MKB's en midmarket blijven enorme cyberdoelwitten

More data points are available to make your resilience case. If you’re making the case for cyber resilience at your small to medium-sized organization, there is a whole slew of new data out there to help make your argument. Our ongoing blog s…

Meer informatie
Security, Email Security

Omgaan met cyberbeveiligingsstress

Stress seems to be something that comes up daily in at least one conversation with someone else. You may be feeling stress at this very moment, but do you really understand what it is and where it comes from, especially as an IT Security profession…

Meer informatie
Security, Email Security

Bescherming tegen insiders: hoe organisaties omgaan met het onvermijdelijke

Keeping Connected to Our 33K+ Customers, One Customer at a Time. At Mimecast we are blessed to have more than 33,000 customers for our email security, archiving, web security and security awareness training services. And staying connected and e…

Meer informatie
Security, Email Security

Phisher pleit schuldig in scam die gericht was op beroemdheden en bekende sporters

A reminder: phishing and brand-spoofing works best against the unsecured and unaware. A phishing scam perpetrated by a man stealing sensitive personal information from high-profile individuals should provide a warning sign to organizations of all si…

Meer informatie
Security, Email Security

Fraude en spear-phishing op directieniveau internationaal bekeken

These long-standing cyberattack types are more prevalent than ever.   Cave drawing found in southern France showing early spear-fishing have been dated back 16,000 years, and whaling has been practiced as an organized industry as early as 8…

Meer informatie
Security, Email Security

Reële aanvallen op toeleveringsketens: de cyberkloof overbruggen

Cyberattackers attempted to take down the US electric grid—through companies like yours. Any business in the B2B space is part of a supply chain, whether you feed into larger businesses or those larger businesses feed into you. If you find you…

Meer informatie
Security, Cyber Resilience for Email, Email Security

Trends in cyberbeveiliging: onze meest gelezen blogs van 2019 Q1

See what caught the eyes of Cyber Resilience Insights readers this quarter. With the first quarter of 2019 drawing to a close, we wanted to provide you a one-stop shop for the most-read new content we've posted on Cyber Resilience Inights so far. Be…

Meer informatie
Security, Email Security

Informatiebeveiliging door de jaren heen

Some aspects of info security haven't changed much in theory. You may be interested to know that most every modern cybersecurity technique used today is based on methodologies developed and used thousands of years ago. So, in the spirit of those who…

Meer informatie
Security, Office-365, Email Security

Uw e-mailverkeer overbrengen naar de cloud? Cyber Resilience is een must

Prevent cyber risks by not putting your eggs in everyone else’s basket. Microsoft's announcement that it has launched its first cloud data centers in Africa—one in Cape Town, another in Johannesburg—is a cause for celebration among…

Meer informatie
Archiving, Data Protection

Uw succes is ons succes: de drievoudige kroon van archivering

Customer success in archiving has produced fruitful results for all. It’s springtime in the US, and for many aficionados, the beginning of another season of horse racing. The Triple Crown is a rare accomplishment for the horse that wins the Ke…

Meer informatie
Security, Email Security

De evolutie van CISO-strategieën

How has the CISO role changed through the years? Charles Darwin wrote “On the Origin of Species” in 1859 and introduced the concept that organisms arise and develop through the natural selection of small, inherited variations that increa…

Meer informatie
Security, Awareness Training

Ga discreet te werk: de training cyberbewustwording voor werknemers

Make a plan for educating employees. Employees are usually left to use their discretion with corporate-owned technology on your networks pretty much all the time. As such, a lot of power is in their hands when it comes to what emails to open, what f…

Meer informatie
Security, Email Security

Cyberveiligheid ontsluierd

Show season is upon us. Chief Information Security Officers, IT security professionals and hackers alike will be converging on cities around the globe to learn the latest and greatest cybersecurity trends, technologies and issues, while meeting thei…

Meer informatie
Security, Email Security

Verslaving of preventie

Have we become addicted to passwords? In today’s technology age, there are creeping addictions that many have but few acknowledge. The worst pandemic of which we suffer today may actually be an addiction to passwords as the primary security pe…

Meer informatie
Security, Email Security

ESRA Rapport van maart: focus op Office 365

What Office 365 misses may surprise you. With this blog I am happy to bring our 8th consecutive quarterly release of the Mimecast Email Security Risk Assessment (ESRA) aggregate report to your attention (also with an associated infographic). We now …

Meer informatie
Security, Threat Center

Inzicht in dreigingsinformatie: verder kijken dan het eerstvolgende compromis

Threat intelligence doesn’t mean subscribing to multiple data feeds. There is a lot of confusion and misunderstanding about what constitutes threat intelligence. Too often, threat intelligence gets misaligned with tracking a bunch of Indicator…

Meer informatie
Security, Threat Center

De terugkeer van de Equation Editor Exploit – DIFAT Overflow

The latest from Mimecast Research Labs. Summary In the last few months, the Mimecast Research Labs team has seen several unique variants of Microsoft Office Word exploits, more specifically combining the previously-patched memory corruption issue CV…

Meer informatie
Security, Email Security

Sextortion, Bomb Threats en GoDaddy

The lurid details of a new kind of email scam. An award-winning film from 1989 titled “Sex, Lies and Videotape” introduced the world to the power of uncomfortable private data coming to public attention and now cybercriminals are taking …

Meer informatie
Security, Email Security

3 niet te missen dingen op de RSA Conference USA 2019

Here is what to look for at this year’s big cybersecurity show. The upcoming RSA Conference USA 2019 taking place from March 4-8 at the Moscone Center in San Francisco will mark my 17th consecutive year of attendance! It seems like my first ye…

Meer informatie
Security, Email Security

CISO op 25

How has the CISO function changed through the years? Having an executive team to manage specific functions of an organization goes back to the introduction of formalized businesses. In the United States it recorded that the oldest corporation is Har…

Meer informatie
Security, Threat Center

Wereldwijde aanvallen doen zich dagelijks voor

No government is safe. There seems to be a resurgence of interest in the belief that the world is flat despite all evidence to the contrary. Cybercriminals on the other hand, understand all too well that the Earth is actually boundaryless in cybersp…

Meer informatie
Security, Threat Center

Dreigingsinformatie voor de 99 procent - Deel 8: Laatste overwegingen & tips

Here’s what you need to know on your threat intelligence journey. Welcome to the 8th and final edition of our blog series, Threat Intelligence for the 99%. We’ve reached the end of the road for these blogs, but hopefully your road to thr…

Meer informatie
Archiving, Data Protection

Zero-Down, End-to-End-migraties: eenvoudig te onthouden

Email migrations don’t have to be painful. It seems, since the beginning of email, customers have endured the pain of migrating from version-to-version, vendor-to-vendor and now on-premises-to-cloud. While most of the version migrations were p…

Meer informatie
Security, Email Security

Phishing voor Outlook

There seems to be a kit available for everything nowadays. The web is inundated with advertisements for kits to help with daily meal planning, weekly work planners, or even month wardrobe assistance. You can even now find phishing kits targeted to …

Meer informatie
Security, Threat Center

GandCrab Ransomware Attacks Exploit Valentine’s Day Weaknesses

This Valentine’s Day, your big heart could get you in trouble. When you think Valentine’s Day, candy hearts, roses and chocolate are probably the first things that come to mind. Perhaps the last thing would be insidious email attacks, bu…

Meer informatie
Archiving, Data Protection

Met aandacht voor archivering: de onderzoeksresultaten van TechValidate

This Valentine’s Day, we’re offering thanks to our customers.   Developing a modern archiving strategy isn’t easy. IT departments are increasingly plagued by data growth and service requirements back to internal customers.…

Meer informatie
Security, Threat Center

Dreigingsintelligentie voor de 99% - Deel 7: Het volledige plaatje

How do you put all the threat intelligence components together? Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. In the last two editions of our series, we’ve looked at cyber threat intelligence (CTI) …

Meer informatie
Security, Awareness Training

Gepersonaliseerde bedreigingen van insiders – geïnfecteerd, de gebruiker moet opletten

When it comes to cybersecurity, human error can’t be discounted. We live in a mobile world where cyber attackers target employees who work in the office, at home or from the road. In parallel, threats can also be introduced onto an employee&rs…

Meer informatie
Security, Email Security

E-mailbeveiliging voor de gezondheidszorg: is het tijd voor een controle?

See where healthcare cybersecurity is falling short. Any regular reader of Mimecast’s Cyber Resilience Insights blog site has likely come across my quarterly Email Security Risk Assessment (ESRA) blogs. These blogs summarize and draw conclusio…

Meer informatie
Security, Email Security

Voorkom Attack-for-Hire-diensten

It's a real thing. Here's how to fight back. The concept of a mercenary dates back to ancient Egypt and has been a long-standing method for governments (or other groups) to supplement their military might. So, it should not come as a surprise that …

Meer informatie
Security, Threat Center

Threat Intelligence voor de 99% - Deel 6: Bepaal uw eigen hulpmiddelen

Selecting the right threat intelligence tools is critical. Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. Last time, we examined the types of cyber threat intelligence (CTI) feeds you need to consider when…

Meer informatie
Beveiliging

Dreigingsintelligentie voor de 99% - Deel 6: Werk uw eigen strategie uit - Hulpmiddelen

Selecting the right threat intelligence tools is critical. Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. Last time, we examined the types of cyber threat intelligence (CTI) feeds you need to consider when…

Meer informatie
Security, Awareness Training

5 manieren om bewustzijn rond cyberveiligheid in uw bedrijf te introduceren

Here’s how you can lower risk by changing attitudes from top to bottom. When it comes to defining an organization’s mission and vision, a lot of time is spent refining and getting it right. However, when it comes to making security aware…

Meer informatie
Security, Email Security

Koffie, donuts of gestolen inloggegevens?

Even the big chains aren't immune from attacks. Water, tea and coffee are the most consumed beverages in the world, so it should not be a complete surprise that there are hundreds of large chains with thousands of storefronts that provide the two st…

Meer informatie
Security, Email Security

Een nieuw jaar, nieuwe prijzen: de cyberkloof overbruggen

You’re “rebuying” technology services every year. Make them earn it. Welcome to the latest edition of Bridging the Cyber Divide, where we provide technical professionals in small-to-medium sized organizations the know-how to a…

Meer informatie
Security, Threat Center

Threat Intelligence voor de 99% - Deel 5: Werk uw eigen strategie uit - Feeds

Selecting the right feeds for threat intelligence can’t be overlooked for your program. Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. We’ve already taken deep dives on what cyber threat intell…

Meer informatie
Archiving, Data Protection

Hoe kan ik een expert worden op het gebied van zakelijke informatiearchivering?

What strengths and innovations does your archive have? Last month we shared the news that for the 4th straight year, Mimecast was named a Leader in the Gartner Enterprise Information Archiving Magic Quadrant (MQ). In addition, we examined the trends…

Meer informatie
Security, Email Security

Hackers richten zich op volledige landen

The world is fighting back. In Hollywood movies, when the individual underdog prevails against monolithic corporations or corrupt government entities, we celebrate their success. When that individual underdog is actually a cybe-criminal intent on ca…

Meer informatie
Security, Threat Center

Dreigingsintelligentie voor de 99 procent - Deel 4: Welke aanpak geniet uw voorkeur?

You have options for threat intelligence. But how do you decide? Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. We’ve already looked at several aspects of cyber threat intelligence (CTI) programs, in…

Meer informatie
Security, Threat Center

Hoe rol je een programma voor informatie over dreigingen uit?

You can do this. When you think of implementing a cyber threat intelligence program at your organization, you may believe it will take millions in resources to have the right technology, the right people and the right strategy in place. But the trut…

Meer informatie
Security, Email Security

Cybercriminelen hebben een voorkeur voor de gezondheidszorg

Here's why this industry is now a top attack target. In general, cybercriminals will target the most vulnerable of organizations that can provide the biggest payoff. In the early days of internet-based computing, this meant primarily the finance ind…

Meer informatie
Security, Threat Center

Dreigingsintelligentie voor de 99 % - Deel 3: Wanneer moet dat doorgevoerd worden?

Are you tall enough to ride the ride for threat intelligence? Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. This week, we’re looking at the indicators for when you need to implement a cyber threat i…

Meer informatie
Security, Awareness Training

Insider Threats Personified – Patient Zero Un-Hero

Sometimes, bad things happen to people with the best intentions. This week in ‘Insider Threats Personified’ we’ll see how the actions of your employees can inadvertently launch a threat against your customers and partners and resul…

Meer informatie
Security, Email Security

Enquête: Cyberveiligheid op de werkvloer, de cijfers

Findings of our survey show that cyber awareness training is badly needed for organizations. Employees are the weakest link in your security chain. Studies have found that over 90% of all cyber breaches happen because of human error. Even with the b…

Meer informatie
Security, Email Security

Cryptojackers slaan opnieuw toe

No organization is exempt from cryptojackers. It doesn’t even matter if your organization does amazing things for people in unfortunate circumstance. Just look at what happened to the Make A Wish Foundation and use it as a cautionary tale. Cr…

Meer informatie
Security, Threat Center

Mimecast ontdekt kwetsbaarheden in Microsoft Office, waaronder CVE-2019-0560

Understand the security implications of the latest patched Microsoft Office product memory leak vulnerability What happens when you combine sophisticated anti-phishing attachment inspection, static file analysis, machine executable code in data file…

Meer informatie
Security, Threat Center

Dreigingsintelligentie voor de 99% - Deel 2: Het belang ervan

The need for threat intelligence comes down to defense, and confidence. Welcome to the second installment of our blog series, Threat Intelligence for the 99%. In this series we’ll dive deep into all topics surrounding threat intelligence, what …

Meer informatie
Security, Email Security

De cyberbeveiligingstrends van 2019 om in de gaten te houden

Here are some predictions for the new year. Happy New Year! As we finish singing “Auld Lang Syne” with a champagne toast to close out 2018, it is time to look to 2019 with excitement. But, before you make a few New Year’s resolutio…

Meer informatie
Security, Threat Center

Dreigingsintelligentie voor de 99% - Deel 1: Het probleem

Cyber threat intelligence isn’t just for the 1%. If you’re in cybersecurity, odds are you’ve heard a lot about threat intelligence these last few years. But unless you’re part of an organization with a massive budget for cybe…

Meer informatie
Security, Awareness Training

Waarom de gewoonten van werknemers vaak cyberrisico's vormen

Why awareness training should be part of every cyber resilience strategy. Editor’s note: Human error is involved in over 90% of today’s cybersecurity breaches. Sometimes is carelessness, sometimes it’s maliciousness and sometimes i…

Meer informatie