Security, Email Security

Fraude en spear-phishing op directieniveau internationaal bekeken

These long-standing cyberattack types are more prevalent than ever.   Cave drawing found in southern France showing early spear-fishing have been dated back 16,000 years, and whaling has been practiced as an organized industry as early as 8…

Meer informatie
Security, Email Security

Reële aanvallen op toeleveringsketens: de cyberkloof overbruggen

Cyberattackers attempted to take down the US electric grid—through companies like yours. Any business in the B2B space is part of a supply chain, whether you feed into larger businesses or those larger businesses feed into you. If you find you…

Meer informatie
Security, Cyber Resilience for Email, Email Security

Trends in cyberbeveiliging: onze meest gelezen blogs van 2019 Q1

See what caught the eyes of Cyber Resilience Insights readers this quarter. With the first quarter of 2019 drawing to a close, we wanted to provide you a one-stop shop for the most-read new content we've posted on Cyber Resilience Inights so far. Be…

Meer informatie
Security, Email Security

Informatiebeveiliging door de jaren heen

Some aspects of info security haven't changed much in theory. You may be interested to know that most every modern cybersecurity technique used today is based on methodologies developed and used thousands of years ago. So, in the spirit of those who…

Meer informatie
Security, Office-365, Email Security

Uw e-mailverkeer overbrengen naar de cloud? Cyber Resilience is een must

Prevent cyber risks by not putting your eggs in everyone else’s basket. Microsoft's announcement that it has launched its first cloud data centers in Africa—one in Cape Town, another in Johannesburg—is a cause for celebration among…

Meer informatie
Archiving, Data Protection

Uw succes is ons succes: de drievoudige kroon van archivering

Customer success in archiving has produced fruitful results for all. It’s springtime in the US, and for many aficionados, the beginning of another season of horse racing. The Triple Crown is a rare accomplishment for the horse that wins the Ke…

Meer informatie
Security, Email Security

De evolutie van CISO-strategieën

How has the CISO role changed through the years? Charles Darwin wrote “On the Origin of Species” in 1859 and introduced the concept that organisms arise and develop through the natural selection of small, inherited variations that increa…

Meer informatie
Security, Awareness Training

Ga discreet te werk: de training cyberbewustwording voor werknemers

Make a plan for educating employees. Employees are usually left to use their discretion with corporate-owned technology on your networks pretty much all the time. As such, a lot of power is in their hands when it comes to what emails to open, what f…

Meer informatie
Security, Email Security

Cyberveiligheid ontsluierd

Show season is upon us. Chief Information Security Officers, IT security professionals and hackers alike will be converging on cities around the globe to learn the latest and greatest cybersecurity trends, technologies and issues, while meeting thei…

Meer informatie
Security, Email Security

Verslaving of preventie

Have we become addicted to passwords? In today’s technology age, there are creeping addictions that many have but few acknowledge. The worst pandemic of which we suffer today may actually be an addiction to passwords as the primary security pe…

Meer informatie
Security, Email Security

ESRA Rapport van maart: focus op Office 365

What Office 365 misses may surprise you. With this blog I am happy to bring our 8th consecutive quarterly release of the Mimecast Email Security Risk Assessment (ESRA) aggregate report to your attention (also with an associated infographic). We now …

Meer informatie
Security, Threat Center

Inzicht in dreigingsinformatie: verder kijken dan het eerstvolgende compromis

Threat intelligence doesn’t mean subscribing to multiple data feeds. There is a lot of confusion and misunderstanding about what constitutes threat intelligence. Too often, threat intelligence gets misaligned with tracking a bunch of Indicator…

Meer informatie
Security, Threat Center

De terugkeer van de Equation Editor Exploit – DIFAT Overflow

The latest from Mimecast Research Labs. Summary In the last few months, the Mimecast Research Labs team has seen several unique variants of Microsoft Office Word exploits, more specifically combining the previously-patched memory corruption issue CV…

Meer informatie
Security, Email Security

Sextortion, Bomb Threats en GoDaddy

The lurid details of a new kind of email scam. An award-winning film from 1989 titled “Sex, Lies and Videotape” introduced the world to the power of uncomfortable private data coming to public attention and now cybercriminals are taking …

Meer informatie