Security, Email Security

Koffie, donuts of gestolen inloggegevens?

Even the big chains aren't immune from attacks. Water, tea and coffee are the most consumed beverages in the world, so it should not be a complete surprise that there are hundreds of large chains with thousands of storefronts that provide the two st…

Meer informatie
Security, Email Security

Een nieuw jaar, nieuwe prijzen: de cyberkloof overbruggen

You’re “rebuying” technology services every year. Make them earn it. Welcome to the latest edition of Bridging the Cyber Divide, where we provide technical professionals in small-to-medium sized organizations the know-how to a…

Meer informatie
Security, Threat Center

Threat Intelligence voor de 99% - Deel 5: Werk uw eigen strategie uit - Feeds

Selecting the right feeds for threat intelligence can’t be overlooked for your program. Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. We’ve already taken deep dives on what cyber threat intell…

Meer informatie
Archiving, Data Protection

Hoe kan ik een expert worden op het gebied van zakelijke informatiearchivering?

What strengths and innovations does your archive have? Last month we shared the news that for the 4th straight year, Mimecast was named a Leader in the Gartner Enterprise Information Archiving Magic Quadrant (MQ). In addition, we examined the trends…

Meer informatie
Security, Email Security

Hackers richten zich op volledige landen

The world is fighting back. In Hollywood movies, when the individual underdog prevails against monolithic corporations or corrupt government entities, we celebrate their success. When that individual underdog is actually a cybe-criminal intent on ca…

Meer informatie
Security, Threat Center

Dreigingsintelligentie voor de 99 procent - Deel 4: Welke aanpak geniet uw voorkeur?

You have options for threat intelligence. But how do you decide? Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. We’ve already looked at several aspects of cyber threat intelligence (CTI) programs, in…

Meer informatie
Security, Threat Center

Hoe rol je een programma voor informatie over dreigingen uit?

You can do this. When you think of implementing a cyber threat intelligence program at your organization, you may believe it will take millions in resources to have the right technology, the right people and the right strategy in place. But the trut…

Meer informatie
Security, Email Security

Cybercriminelen hebben een voorkeur voor de gezondheidszorg

Here's why this industry is now a top attack target. In general, cybercriminals will target the most vulnerable of organizations that can provide the biggest payoff. In the early days of internet-based computing, this meant primarily the finance ind…

Meer informatie
Security, Threat Center

Dreigingsintelligentie voor de 99 % - Deel 3: Wanneer moet dat doorgevoerd worden?

Are you tall enough to ride the ride for threat intelligence? Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. This week, we’re looking at the indicators for when you need to implement a cyber threat i…

Meer informatie
Security, Awareness Training

Insider Threats Personified – Patient Zero Un-Hero

Sometimes, bad things happen to people with the best intentions. This week in ‘Insider Threats Personified’ we’ll see how the actions of your employees can inadvertently launch a threat against your customers and partners and resul…

Meer informatie
Security, Email Security

Enquête: Cyberveiligheid op de werkvloer, de cijfers

Findings of our survey show that cyber awareness training is badly needed for organizations. Employees are the weakest link in your security chain. Studies have found that over 90% of all cyber breaches happen because of human error. Even with the b…

Meer informatie
Security, Email Security

Cryptojackers slaan opnieuw toe

No organization is exempt from cryptojackers. It doesn’t even matter if your organization does amazing things for people in unfortunate circumstance. Just look at what happened to the Make A Wish Foundation and use it as a cautionary tale. Cr…

Meer informatie
Security, Threat Center, Threat Intelligence Hub

Mimecast ontdekt kwetsbaarheden in Microsoft Office, waaronder CVE-2019-0560

Understand the security implications of the latest patched Microsoft Office product memory leak vulnerability What happens when you combine sophisticated anti-phishing attachment inspection, static file analysis, machine executable code in data file…

Meer informatie
Security, Threat Center

Dreigingsintelligentie voor de 99% - Deel 2: Het belang ervan

The need for threat intelligence comes down to defense, and confidence. Welcome to the second installment of our blog series, Threat Intelligence for the 99%. In this series we’ll dive deep into all topics surrounding threat intelligence, what …

Meer informatie
Security, Email Security

De cyberbeveiligingstrends van 2019 om in de gaten te houden

Here are some predictions for the new year. Happy New Year! As we finish singing “Auld Lang Syne” with a champagne toast to close out 2018, it is time to look to 2019 with excitement. But, before you make a few New Year’s resolutio…

Meer informatie
Security, Threat Center

Dreigingsintelligentie voor de 99% - Deel 1: Het probleem

Cyber threat intelligence isn’t just for the 1%. If you’re in cybersecurity, odds are you’ve heard a lot about threat intelligence these last few years. But unless you’re part of an organization with a massive budget for cybe…

Meer informatie
Security, Awareness Training

Waarom de gewoonten van werknemers vaak cyberrisico's vormen

Why awareness training should be part of every cyber resilience strategy. Editor’s note: Human error is involved in over 90% of today’s cybersecurity breaches. Sometimes is carelessness, sometimes it’s maliciousness and sometimes i…

Meer informatie