Security, Threat Center

Dreigingsintelligentie; de beste methodes voor slimme IT-afdelingen - Deel 1

Here’s why looking at indicators of compromise isn’t enough. Editor’s note: For cybersecurity professionals, threat intelligence isn’t just about reacting to indicators of compromise after they've already impacted an organiza…

Meer informatie
Security, Email Security

Phishing naar Selfies? Een nieuwe scam gericht op klanten van Chase Bank

Highlighting the importance of extra care no matter the device. Yes, we live in the age of the selfie. Admit it, you’ve taken them yourself. But, did you ever think selfies could be part of a phishing scam? The attackers have really outdone th…

Meer informatie
Security, Email Security

Actieve versus passieve versus hostgebaseerde vectoren voor cyberaanvallen

Know the difference and how you can prevent cyberattacks. Budding authors and journalist are taught the difference between active and passive voice in first year writing classes. They understand that active is about “doing” and passive i…

Meer informatie
Security, Email Security

Risico's en gevolgen van verouderde oplossingen voor online beveiliging

Counting the cost of on-premises web security systems. Shopping, researching, downloading, gaming, finding new friends and seeing what’s happening in the world: these are just some of the ways we use the web every day. Unfortunately, threat ac…

Meer informatie
Security, Email Security

Sociale media vormt een achterdeurtje in de cyberbeveiligingsstructuur van uw onderneming

The amount of time your employees spend on social media will shock you. Facebook, Instagram, LinkedIn, Twitter, YouTube or the latest online game. Yes, these are the new temptations facing employees on a daily basis. It starts with just a peek; mayb…

Meer informatie
Security, Email Security

Nieuwe campagne Cyber Spionage met nooit eerder vertoonde malware-tools

The key to defending against new attack types is a multi-layered security strategy. Attackers are always looking to get the upper hand on their targets. Many of the methods and tactics attackers use are tried-and-true. But sometimes we see things we…

Meer informatie
Security, Web Security

Webbeveiligingscontroles worden in sneltempo overgezet naar de cloud

Following the lead of secure email gateways, web security systems are moving quickly to the cloud. No big secret, but IT services in general and IT security controls in particular are rapidly transitioning to the cloud. There are many reasons for th…

Meer informatie
Security, Email Security

DNSpionage ontsluierd

Espionage is the subject of more novels and Hollywood films than can even be accounted for. It seems intriguing on the written page or the silver screen to the average consumer, but when espionage starts to become a reality that affects the identit…

Meer informatie
Security, Email Security

MKB's en midmarket blijven enorme cyberdoelwitten

More data points are available to make your resilience case. If you’re making the case for cyber resilience at your small to medium-sized organization, there is a whole slew of new data out there to help make your argument. Our ongoing blog s…

Meer informatie
Security, Email Security

Omgaan met cyberbeveiligingsstress

Stress seems to be something that comes up daily in at least one conversation with someone else. You may be feeling stress at this very moment, but do you really understand what it is and where it comes from, especially as an IT Security profession…

Meer informatie
Security, Email Security

Bescherming tegen insiders: hoe organisaties omgaan met het onvermijdelijke

Keeping Connected to Our 33K+ Customers, One Customer at a Time. At Mimecast we are blessed to have more than 33,000 customers for our email security, archiving, web security and security awareness training services. And staying connected and e…

Meer informatie
Security, Email Security

Phisher pleit schuldig in scam die gericht was op beroemdheden en bekende sporters

A reminder: phishing and brand-spoofing works best against the unsecured and unaware. A phishing scam perpetrated by a man stealing sensitive personal information from high-profile individuals should provide a warning sign to organizations of all si…

Meer informatie