Email Security, Security Awareness Training

Why artificial intelligence is key to improving phishing defenses

As attackers constantly evolve their tactics to side-step more traditional defenses, artificial intelligence and machine learning technologies are stepping in to help organizations improve defenses. Technologies like MessageControl offer a critical e…

Meer informatie
Threat Intelligence Hub

Post-Pandemic Cyberattacks Target Vulnerable Industries

Cybercriminals are targeting industries like retail and manufacturing that continued to operate throughout coronavirus shutdowns – and they’re becoming more sophisticated. Key Points: The bulk of cyberattacks during the first half of 202…

Meer informatie
Threat Intelligence Hub

New Threat Intelligence Report: Black Hat USA Edition 2020

The Mimecast Threat Center analyzed 195 billion emails January-June 2020 (rejecting 92 billion or 47%) to compile insights in Mimecast's latest threat intelligence report. With the COVID-19 pandemic, cybercriminals shifted their focus to business ver…

Meer informatie
Bewustwordingstraining voor beveiliging

The Role of Executive Training in Building Cybersecurity Culture

Key Points: A Wall Street Journal survey found that companies that provide cybersecurity training to executives are also more likely to have put other key cybersecurity protections in place.   Executive security awareness training may help non-…

Meer informatie
Internetbeveiliging

Browser Isolation: An Essential New Web Security Layer

Key Points: Browser isolation is an additional security layer that protects people, systems, and networks by completely separating them from dangerous sites and their malicious content. Cloud-based, server-side, containerized browser isolation offer…

Meer informatie
Email Security, Web Security

Integrating Security Products is Vital for Cyber Resilience

The pace of tech innovation combined with the cyber arms race means integrating cybersecurity products is essential to keep up with fast-evolving threats. Open APIs are key. Key points: The ability to rapidly integrate best-of-breed security produc…

Meer informatie
E-mailbeveiliging

Ransomware Outbreak Threatens All Industries

A surge in ransomware attacks increases the challenges for organizations that are already struggling to cope with the COVID-19 pandemic. Key Points: Reports of ransomware attacks rose sharply in the first half of 2020, and the outbreak is considered…

Meer informatie
Email Security, Security Awareness Training

Managing Third-Party Cyber Security Risks

Cyber attacks via third parties pose a huge and often unrecognized security risk to companies of all sizes. Fortunately, there are steps that you can take to minimize the risk. Key Points: Although direct cyberattacks on organizations get most of th…

Meer informatie
Merkbescherming

How Your Brand May Be Exploited Without Your Knowledge

Organizations may not be aware of all the ways that bad actors are impersonating their brand online, even though those online exploitation attacks can defraud an organization’s customers and tarnish its brand. Key Points: Cybercriminals can ex…

Meer informatie
Email Security, Security Awareness Training

Why SMBs Are Under-Prepared for Cyberattacks

Smaller companies are not as well prepared for cyberattacks than bigger enterprises, in part due to budget limitations. Cloud-based security tools and awareness training can help. Key Points: Small and mid-sized businesses (SMBs) are targeted in 43%…

Meer informatie
Internetbeveiliging

Managing Security for a Remote Workforce: Mimecast IT’s Experience

Two Mimecast IT and internal security leaders share what they’ve learned about managing and securing a massive increase in employee remote working since the start of the COVID-19 pandemic. Key Points: The shift to remote working means it&rsquo…

Meer informatie
Bewustwordingstraining voor beveiliging

Twitter Hack Highlights Need for Security Awareness Training

A social engineering attack enabled hackers to penetrate Twitter’s administrative systems and hijack high-profile accounts, illustrating the far-reaching impact of cybersecurity lapses. Key points Authorities are probing a Twitter hack that hi…

Meer informatie
Merkbescherming

Getting to p=Reject, Mimecast’s Internal DMARC Project: Part 1

Creating a DMARC record and setting it to p=Reject would seem to be very easy. It can be – but there are several considerations, such as learning who your “good email spoofers” are and how to keep their delivery high, while stopping…

Meer informatie
E-mailbeveiliging

Hubris Caught the Instagram Star: Business Email Compromise Security Guide

Here are four email security hacks you can learn from the Hushpuppi saga, such as practicing sound social media judgment and ensuring your customers and supply chains are equally secure. Ramon Olorunwa Abbas, a.k.a. “Ray Hushpuppi” is all…

Meer informatie
Threat Intelligence Hub

Mimecast Discovers MPP Bleed, a Microsoft Project Vulnerability

New Mimecast research demonstrates how CVE-2020-1322 potentially impacts Microsoft Project– included in the Microsoft Office suite – that can lead to unintended information disclosure. Editor’s note: Thanks to Mimecast Research Labs…

Meer informatie
Threat Intelligence Hub

Malicious Deepfake Technology: A Growing Cyber Threat

Be aware: Attackers now have the capability to clone real people’s voices to increase the success of business email compromise attacks and sway public opinion. Key Points: Malicious actors are using AI-based deepfake audio impersonations to en…

Meer informatie
Threat Intelligence Hub

Mimecast Discovers “3D Office Exploiter,” a Remote Code Execution Vulnerability in Microsoft Office

New Mimecast research demonstrates how CVE-2020-1321 potentially impacts unpatched versions of Microsoft Office for Windows and Mac. Editor’s note: Thanks to Mimecast Research Labs’ Menahem Breuer and Ariel Koren for this discovery. Mimec…

Meer informatie
E-mailbeveiliging

Why Manufacturers Are Under-Prepared for Cyber Resilience

As manufacturers transition to industry 4.0, they are increasingly vulnerable to cyber threats—but they are less prepared than other sectors. Key Points: Manufacturers are increasingly exposed to cybersecurity risks—but a survey shows th…

Meer informatie
E-mailbeveiliging

Steve Wozniak Opens Up at the Mimecast Cyber Resilience Summit

The Apple co-founder shares his views on innovation, AI, cybersecurity, business ethics and giving back to society in a fascinating Q&A with Mimecast CEO Peter Bauer.    Silicon Valley icon discusses how to instill an ethical approach …

Meer informatie
Bewustwordingstraining voor beveiliging

Cyber Awareness Training Helps Defend Users from Brand Spoofing Attacks

Users may be more likely to fall for phishing emails that appear to come from trusted brands. Regular awareness training can help transform them into eagle-eyed threat detectors. Key Points: Bad actors often send email messages that impersonate bran…

Meer informatie
Archief- en databescherming

Why E-discovery Is Now a Ubiquitous Requirement

Runaway growth in data, together with increasing regulation and workplace litigation, are making e-discovery a universal requirement among all sizes of organization. Key Points: The enormous expansion in business data, combined with the prevalence o…

Meer informatie
Merkbescherming

On Your DMARC: Protecting MS 365 Email Users from Phishing Scams

DMARC is a very effective way to protect Microsoft 365 users from phishing and other email-based scams. However, the protocol can be difficult to implement; third-party tools can help. Key Points: Email is easy to spoof and MS 365’s enormous c…

Meer informatie
E-mailbeveiliging

How Cybersecurity Automation Transformed ZeroFOX’s SOC

Internally sharing info on how the cybersecurity automation software works enables SOC analysts to cut work down from days to hours—or even less. Key Points: Research shows cybersecurity automation is on the rise, despite obstacles like a shor…

Meer informatie
Security Awareness Training, Security Awareness Training

Mimecast Voices: Bryan Vermes

Editor's note: This is the second article in a series of profiles featuring Mimecasters sharing their personal experiences with, and perspectives on, prejudice and marginalization and what actions people can take to better support their colleagues in…

Meer informatie
Security, Email Security, Brand Protection

Using AI to Fight Domain Spoofing for Online Brand Protection

As long as it’s easy for bad actors to spoof brand domains and create fake websites, they’ll keep doing it. But AI-based online brand protection tools can help fight brand exploitation outside the perimeter. Key Points: Domain spoofing i…

Meer informatie
Security, Email Security, Brand Protection

Why Online Brand Protection Is Important for Small Businesses

Small businesses may think they’re unlikely to suffer from online brand impersonation, but no company is immune to the threat. Key Points: Online brand impersonation is a widespread problem that can damage a company’s reputation and caus…

Meer informatie
Security, Web Security

Werken op afstand maakt Web Security van vital belang

As pandemic-spurred remote working becomes a permanent arrangement for many organizations, cloud-based web security gateways help to safeguard a distributed workforce and enforce compliance.   Key Points: Although increases in remote working we…

Meer informatie
Archiving, Archive and Data Protection

Ready or Not, Here Comes California’s Data Privacy Law

Businesses worldwide face a July 1 deadline to comply with the California Consumer Privacy Act (CCPA). If your organization isn’t ready, now is the time to start. Key Points: On July 1, California begins to enforce the strictest data privacy l…

Meer informatie
Security, Web Security

Security’s “New Normal”: Remote Working Supercharges the Shift to Cloud Security

451 Research analyst Scott Crawford describes how IT organizations will increasingly leverage cloud security to safeguard more widely distributed people, assets, and networks. Key Points: The long-term increase in remote working and the growth in co…

Meer informatie
Email Security, Archive and Data Protection, Office-365, Office-365

Critical IT Continuity Planning for a Secure Microsoft 365 National Health Service

As the UK’s National Health Service embraces Microsoft 365 security and productivity services, there are lessons from WannaCry and Exchange Online downtime for protecting critical national infrastructure. In a time when effective healthcare has…

Meer informatie
Archiving, Archive and Data Protection

Get Ready to Play Offense On E-Discovery

The cost and disruption of e-discovery—particularly email discovery—are spiraling up. Play offense on e-discovery to manage those fire drills instead of letting them manage you. Key Points: IT departments are constantly forced to react t…

Meer informatie
Security, Email Security

Why Email Security Never Seems to Improve, and What You Can Do About It

While security organizations spend billions per year to improve email security, the problem seems to be getting worse faster than it is getting better. Learn about the 7 main reasons this is the case and what you can do to improve your organization&r…

Meer informatie
Security, Email Security, Brand Protection

Why DMARC is Essential for Online Brand Protection

DMARC helps stop bad actors delivering malicious emails that appear to come from your brand’s domain. It helps ensure every email received by your brand’s customers, employees, or anyone else, is authentic. Key Points: Email is as vulner…

Meer informatie
Bewustwordingstraining voor beveiliging

Mimecast Voices: Jennifer Odogwu

Editor's note: This is the first in a series of profiles featuring Mimecasters sharing their personal experiences with, and perspectives on prejudice and marginalization, and what actions people can take to better support their colleagues in this era…

Meer informatie
Email Security, Threat Intelligence Hub

Ransomware Attack Leaves Honda Stuck in "Park"

A large-scale ransomware attack on Honda Motor Co. halts manufacturing operations, highlighting the need to better protect business critical systems. Key Points Honda announced a ransomware attack crippled operations in multiple countries, causing …

Meer informatie
Security, Email Security

Ransomware Returns With A New Twist: Pay Up or We’ll Publish

Ransomware attacks have become larger and more sophisticated—and hackers are increasingly stealing sensitive information and threatening to publish it unless the ransom is paid. Key Points: More ransomware attacks are stealing sensitive inform…

Meer informatie
Security, Brand Protection

Companies Wake Up to The Value of DMARC for Online Brand Protection

Backed by DMARC and State of Email Security 2020 data, soaring uptake of DMARC worldwide suggests that organizations are recognizing the value of the standard to combat brand impersonation in phishing emails. Key Points: The number of domains using …

Meer informatie
Security, Email Security, Coronavirus

The Impact of COVID-19 on Cyber Security Insurance

Cyber threats are surging as employees work from home due to the COVID-19 pandemic, prompting cybersecurity insurers to reassess companies’ security measures—and potentially raise premiums. Key Points: Rising threats and an increase in r…

Meer informatie
Continuity, Archive and Data Protection

Are You Overlooking Email Business Continuity in Your Cloud Migration?

It’s easy to take email continuity for granted, especially when using a cloud-based service. But an outage can undermine productivity and security. Here are some tips for maintaining email business continuity. Key Points: When an email system …

Meer informatie
Security, Email Security

Why Cybersecurity Never Seems to Improve, and What You Can Do About It

Security defenses are improving, but cybercriminals move faster than defenders, and the attack surface seems broader than ever. There are five reasons why enterprise security is so challenging. Why does it seem that the security profession is continu…

Meer informatie
Continuity, Archive and Data Protection

Cloud Productivity Platform Security: Re-imagining Your IT Resilience Strategy for a Post-Pandemic Society

Cloud productivity suites are booming in the Covid-19 era while cybercriminals continue to adapt to the new attack surface. Here’s a resilience mindset view on how to securely manage the risks of moving the cloud. Amid the tumult of 2020, there…

Meer informatie
Security, Brand Protection

Understanding Online Brand Exploitation and Its Consequences

Online brand exploitation is a very real—and complex—cybersecurity issue. A multi-faceted online brand protection strategy can help brands protect themselves and their customers. Key Points: Brand exploitation is a highly complex—a…

Meer informatie
Email Security, Security Awareness Training

Creative Hiring Can Help Solve the Cybersecurity Skills Shortage

Hiring people from non-traditional backgrounds may help you solve the chronic shortage of cybersecurity skills, while bringing in fresh perspectives that can enhance cyber resilience. Key Points: A more creative approach to hiring can help address t…

Meer informatie
E-mailbeveiliging

Want Cyber Resilience? Integrate Email Security into Your SIEM

Integrating email security data with Security Information and Event Management (SIEM) systems can help organizations respond faster to attacks and increase cyber resilience. Key Points: Email is an excellent early warning system for cyberattacks, be…

Meer informatie
Email Security, Office-365

Defense in Depth for Microsoft 365

Microsoft Office 365 has some good email security features, but also some significant vulnerabilities. A defense in depth strategy can compensate for these weaknesses, and create a more secure email environment. Key Points: Microsoft offers several …

Meer informatie
E-mailbeveiliging

Credential Theft via Email Phishing: Its Rise, Risks, and Solutions

Credential theft is rampant and dangerous—but you can protect your organization and users by taking steps to stop email phishing attacks and password reuse. Key Points: Credential theft continues at extremely high levels as malicious actors ta…

Meer informatie
Email Security, Brand Protection

Making Sure Your Third-Party Email Services use DMARC

Third-party email services help businesses conduct essential communications. They may also open the door for malicious email impersonation attempts.   Key Points: Many organizations use valuable third-party services to regularly communicate wit…

Meer informatie
Brand Protection, zone-3, ti-ecosystem

Shoring Up Brand Protections in the Age of Domain Spoofing

Cybercriminals leverage the trust and digital reputations that online brands have fostered to further their malicious email spoofing and domain spoofing activities. Which are the most impersonated brands on the internet? While the answer varies a bit…

Meer informatie
Email Security, Brand Protection

Why Government Organizations Need DMARC

Cybercriminals often spoof government email addresses. Enforcing DMARC can help governments protect citizens—and workers—from malicious email impersonation attempts. Key Points: Governments increasingly rely on email to communicate with …

Meer informatie
Threat Intelligence Hub, Coronavirus

Threat Intelligence Briefing: Attackers Target Employees Returning to Work—and Increasingly Turn to Non-Traditional Attack Vectors

Key Points: Attackers are shifting focus to target employees returning to work. Non-traditional attack vectors, including vishing and deepfake audio, are on the rise. Mimecast detected a spike in attacks on healthcare organizations, with malicious …

Meer informatie
Email Security, Threat Intelligence Hub

Sharing Threat Intelligence Among Best-of-Breed Security Tools

Cybersecurity tools need to share threat intelligence, using open Application Programming Interfaces (APIs), to effectively defend against cyberattacks.  Key Points: Even the best security tools cannot adequately defend the organization when th…

Meer informatie
E-mailbeveiliging

The Growing Risk of Gift Card Scams

Business email compromise (BEC) scams that involve gift cards usually aren’t very sophisticated—but employees often still fall for them. Key Points: Gift card scams are a growing form of business email compromise attack that thieves use …

Meer informatie
Threat Intelligence Hub, Coronavirus

Be Aware: Tax Scam Season in the U.S. is Extended This Year

Tax scams appear every spring—but the threats will persist longer this year because the U.S. filing deadline has been extended to July 15, 2020. Key Points: Because tax filing deadlines have been pushed back this year due to the COVID-19 pande…

Meer informatie
Threat Intelligence Hub

New Threat Intelligence Report: 100 Days of Coronavirus

The global spread of COVID-19 has created many new opportunities for threat actors since the novel coronavirus began gathering widespread attention at the end of 2019. To provide a clear picture of how malicious actors are exploiting those opportunit…

Meer informatie
E-mailbeveiliging

Business Email Compromise (BEC) Attacks: The Top Cause of Payment Fraud

Business email compromise was the #1 source of payment fraud attempts on U.S. organizations in 2019, according to the Association for Financial Professionals. Key Points: 75% of organizations suffered business email compromise (BEC) attacks last yea…

Meer informatie
Archive and Data Protection, Coronavirus

Business Continuity in the Age of Novel Coronavirus

Q&A with business continuity expert Ross Jackson, VP, Organizational Resilience, for Mimecast: what’s working well, what’s weak, what’s coming, what needs a rethink. Key Points: Large companies with mature business continuity p…

Meer informatie
Threat Intelligence Hub, Coronavirus

Threat Intelligence: Awareness Training Reduces Unsafe Clicks Amid Coronavirus Cyber Threats

New data demonstrates the power of security awareness training in helping to prevent unsafe behavior. Employees that don’t use awareness training are 5.2x more likely to click on bad links. Key points: Consider refreshing security awareness t…

Meer informatie
Security, Security Awareness Training

Managing Cyber Risk: Shore Up Your Weakest Link with Awareness Training!

No matter how awesome your cyber risk management program is, it can all go to hell in a single click without equally great employee awareness training. Key Points: Clicking bad links and opening infected attachments causes breaches. A combination of…

Meer informatie
Threat Intelligence Hub, Coronavirus

Gezondheidszorgorganisaties aangevallen door Coronavirus-Related Ransomware

Healthcare providers on the front line of the COVID-19 pandemic now also face the threat of catastrophic ransomware attacks delivered via coronavirus-themed emails. Key Points: Hospitals and other medical providers are facing a growing volume of ran…

Meer informatie
Threat Intelligence Hub, Coronavirus

Threat Intelligence Briefing: Surging Spam and Impersonation Attacks Drive Increasing Coronavirus Cyber Threats

Spam and impersonation attacks have surged to the top of the list of cyberattack vectors driving a significant increase in overall malicious activity and unsafe user behavior, based on Mimecast’s analysis of cyberthreats during the first 100 da…

Meer informatie
Coronavirus

The Mental Risks of Working and Learning in Isolation

Technology enables remote work while social distancing. A UK National Health Service (NHS) psychiatrist discusses how technology is redefining her work, people’s lives, and the risks we all face. Key Points: Mental health specialists are emplo…

Meer informatie
Security, Email Security, Coronavirus, Coronavirus

Enhancing VPNs for Secure Remote Work During the Coronavirus Pandemic

To support an increase in remote working due to COVID-19, it may be necessary to scale up your VPN services and take extra steps to ensure all employees have secure network access. Key Points: For many organizations, the dramatic increase in remote …

Meer informatie
Threat Intelligence Hub

Emotet-as-a-Service: A Serious New Cyber Threat

Highly sophisticated cyber criminals are hosting Emotet services, letting far less competent attackers distribute their malware with this powerful tool. Key Points: Malware-as-a-service (MaaS) has emerged as a highly efficient way to distribute mali…

Meer informatie
Threat Intelligence Hub, Coronavirus

Threat Intelligence Briefing: Increasingly Sophisticated Coronavirus Cyberattacks Exploit Lapses in User Awareness

We’re continuing to observe an extraordinary level of coronavirus-related malicious cyber activity exploiting employees’ confusion and fear, with increasingly sophisticated and targeted attacks contributing to a rise in unsafe user behavi…

Meer informatie
Security, Email Security, Coronavirus

Coronavirus Response Disrupts Healthcare Data Privacy and HIPAA Compliance

Healthcare data privacy and security are moving targets amid the coronavirus response, as telehealth use skyrockets and governments relax health privacy and data protection rules. Key Points: The coronavirus pandemic has catalyzed at least three maj…

Meer informatie
Coronavirus, Coronavirus

Why Today’s Remote Workforce May Be Permanent

Malcolm Harkins is a member of the Cyber Resilience Think Tank, and a guest writer for Cyber Resilience Insights.  The changes to work – not just your new home office, but also the constant contraction/expansion of the economy –…

Meer informatie
Security, Email Security, Coronavirus

Zet het toegenomen aantal phishing-aanvallen u ertoe aan om e-mailbeveiliging met multifactor-authenticatie door te voeren?

Multi-factor authentication can play an important role in keeping remote workers—and your corporate network—secure during the COVID-19 crisis, if you let it. Key Points: As employees go home to work by the millions, bad actors see a huge…

Meer informatie
Security, Threat Intelligence Hub, Coronavirus

Threat Intelligence Briefing: Skyrocketing Coronavirus Cyber Attacks

We’re continuing to see an unprecedented level of malicious activity as the COVID-19 pandemic unfolds, with threat actors shifting their focus to prey on the latest evolving anxieties of people who are working at home or self-isolating due to h…

Meer informatie
Security, Threat Intelligence Hub

Microsoft Excel Encryption Vulnerability Paves the Way for Malware

Editor’s note: Thanks to Mimecast Threat Center’s Doron Attias and Tal Dery for this discovery. Microsoft Excel’s standard file encryption capabilities can be used to obfuscate and deliver malware. Mimecast Threat Center researchers…

Meer informatie
Security, Email Security

Beyond OSI Layer 7: Carbon-based Vulnerability and Business Risk

Sam Curry is a member of the Cyber Resilience Think Tank, and a guest writer for Cyber Resilience Insights.  The Open Systems Interconnection model (OSI) for computer communications has roots in the 70s and early 80s and uses a 7-layer ab…

Meer informatie
Security, Email Security, Coronavirus

When Chaotic Systems Collide: The Dance Between Biology and Cybersecurity

Sam Curry is a member of the Cyber Resilience Think Tank, and a guest writer for Cyber Resilience Insights.  Author Yuval Noah Harrari in Sapiens highlights an important distinction between types of chaotic systems: first order systems can be ex…

Meer informatie
Security, Email Security, Threat Intelligence Hub, Coronavirus

Coronavirus Phishing Attacks Speed Up Across the Globe

Unsafe clicks from COVID-19-themed email phishing attacks nearly double in recent weeks; Mimecast blocks up to 5,000 URLs related to the Coronavirus a day—37x what we blocked in January. Security professionals in organizations attempting to per…

Meer informatie
Security, Email Security, Threat Intelligence Hub, Coronavirus

Briefing dreigingsintelligentie: Cybercriminelen bewapen zich met sleutelwoorden voor phishing-aanvallen tijdens de Coronacrisis

Coronavirus Phishing Attacks and Domain Registrations Increase Dramatically This week’s Global Cyber Threat Intelligence Weekly briefing was the first in an ongoing series of interactive web sessions from Mimecast with the mission of helping c…

Meer informatie
Archiving, Archive and Data Protection, Coronavirus

Cloud Collaboration Tools Show Leadership in Business Continuity

After initial business continuity ‘hiccups,’ cloud collaboration tools bounce back with surprising resilience; they focus on core functions, letting peripheral functions lag. Key Points: Millions of new remote workers swarm onto cloud co…

Meer informatie
Security, Email Security

Zakelijke e-mailcompromissen laten Amerikaanse bedrijven $ 1,7 miljard verlies boeken

The FBI says business email compromise is now the biggest cause of cybercrime financial losses for U.S. organizations. But ransomware attacks are also on the rise again.  Key Points: &n…

Meer informatie
Security, Email Security, Threat Intelligence Hub, Coronavirus

Beware of Quickly-Evolving Coronavirus Email Phishing Attacks

Cyber criminals continually morph COVID-19 phishing scams to exploit what people are most anxious about at any given moment. Key Points: As every organization you’ve ever touched emails to let you know their coronavirus plans, email phishers a…

Meer informatie
Coronavirus

Mimecast gaat door met Coronavirus Preparedness and Response

To help prevent the spread of COVID-19 and help keep our communities safe throughout the globe, last week Mimecast suspended all cross-border travel, limited domestic travel and advised employees to postpone events with 15 or more people. At tha…

Meer informatie
Web Security, Coronavirus

10 Stappen om de veiligheid van het web (en de gezondheid) te handhaven tijdens het werken vanuit huis tijdens de Coronacrisis.

Governments across the globe have put extreme measures in place to limit the spread of coronavirus, prohibiting large public gatherings, closing schools and day care facilities, and encouraging “social distancing” to keep new coronavirus…

Meer informatie
Awareness Training, Security Awareness Training, Threat Intelligence Hub, Coronavirus

Cyber Awareness: Top 3 Steps to Combat Cyber Disruption, Chaos and Profiteering

By now, COVID-19, or coronavirus, has likely dominated conversations and elicited new behavior at work, school, and home, given the rapid spread. But while we shift daily life and routines, the threat intelligence landscape is shifting as well: thre…

Meer informatie
Security, Email Security, Coronavirus

Mimecast’s Preparedness and Response to Novel Coronavirus (COVID-19) Pandemic

Our hearts go out to everyone who has been affected by the COVID-19 virus in any way.  The health and safety of our employees, customers and partners and their families is one of our deepest concerns during this time. As the virus continues to s…

Meer informatie
Security, Coronavirus

HIMSS: vormt het coronavirus een bedreiging of een kans voor onze gezondheidszorg?

As many of you know last Thursday HIMSS announced it was “clearly necessary to cancel the 2020 HIMSS Global Health Conference & Exhibition following the many reports from the World Health Organization (WHO) and the Cent…

Meer informatie
Threat Intelligence Hub

New Cyber Threat Intelligence Report Reveals the Rise of Emotet

The Mimecast Threat Center launched the Threat Intelligence Report: RSA Conference Edition today, finding a 145% increase in attack campaigns across the globe from October to December. Researchers believe the increase can be attributed to Emotet&rsq…

Meer informatie
Security, Email Security, Web Security

How to Address Cybersecurity Vendor Acquisitions

How to Address Cybersecurity M&A in Your Security Environment The role of cybersecurity and the overall importance of ensuring CISOs have a seat at the table for the acquisition process in its entirety is well documented; the value of data and t…

Meer informatie
Security, Email Security, Threat Intelligence Hub

De diefstal van fiscale identificatie neemt toe wanneer de belastingsaangiftes moeten worden ingediend

With the 2020 tax season underway, cybersecurity analysts are seeing an increase in the number of impersonation attacks focused on stealing personal information through voice phishing, texts, and email. According to the Daily Mirror and other news s…

Meer informatie
Security, Threat Intelligence Hub

Microsoft Issues Windows CryptoAPI / CVE-2020-0601 Patch

In the first Patch Tuesday of 2020, Microsoft has released a new patch for a serious Windows vulnerability, CVE-2020-0601, or the Windows CryptoAPI Spoofing Vulnerability. The vulnerability has grave implications for machines running 32- or 64-bit W…

Meer informatie
Security, Email Security, Threat Intelligence Hub

Criminals Target American Infrastructure with Phishing and Malware

Enterprise networks throughout the United States are experiencing an escalation of phishing and malware attacks orchestrated by technologically advanced criminal groups around the world. With the intent of stealing data, profitin…

Meer informatie
Security, Threat Intelligence Hub

Mimecast ontdekt MDB-lek: Kwetsbaarheden in Microsoft Access, CVE-2019-1463

The Security Implications of an Apparent Memory Leak in the Microsoft Access Database Editor’s note: Thanks to Mimecast Research Labs’ Ofir Shlomo and Tal Dery for this discovery. In January 2019, Mimecast Research Labs discovered and …

Meer informatie
Security, Brand Protection

De 4 voorwaarden om uw merknaam te beschermen tegen misbruik

The increasingly digital global economy has created a “perfect storm” for cyber attackers. As our reliance on websites and email to interact with organizations has grown, so too has the opportunity for criminals who are increasingly prey…

Meer informatie
Archief- en databescherming

How to Cut the Cost of E-discovery

Many organizations could significantly lower their e-discovery costs with risk-oriented upfront planning, better data management and an automated e-discovery solution. Key Points: Sharp increases in data production, compliance requirements and lawsu…

Meer informatie
Threat Intelligence Hub

Bad Actors Target Media Industry with Impersonation Attacks

Impersonation attacks to spread disinformation through the media rose dramatically during the first half of 2020. Key Points: Email impersonation attacks on news organizations and publishers have been steadily rising throughout 2020. Some of this i…

Meer informatie
Merkbescherming

Getting to p=Reject, Mimecast’s Internal DMARC Project: Part 2

A DMARC project goes well beyond just DNS administration; team structure and proper owned domain discovery, categorization, and prioritization will ensure a smooth journey to p=Reject. In my first blog on Mimecast’s internal DMARC project, I la…

Meer informatie
Bewustwordingstraining voor beveiliging

Better Security Measures May Reduce Cyber Insurance Premiums

Fortifying your security with better controls, greater employee awareness, and a formal security budget could also lower your cyber insurance premium. Key Points: To help outsource their security risk, more companies are purchasing cybersecurity pol…

Meer informatie
Threat Intelligence Hub

Phishing Kits: Saturating the Threat Landscape

High volume spam and phishing attacks are the new normal. Battling the onslaught requires awareness and a strategy. Key Points: Cybercriminals are using sophisticated phishing kits and automation to take cybercrime to a new level. Phishing kits prod…

Meer informatie
Security Awareness Training, Threat Intelligence Hub

Discussing Cybersecurity with the Board

To win support and resources from their corporate board, cybersecurity professionals need to focus more on reducing business risk and less on technical metrics. Key Points: Cybersecurity execs need the backing of the board to secure the resources th…

Meer informatie
Email Security, Web Security

Artificial Intelligence in Cybersecurity: Where are We on the Technology Adoption/Hype Cycle?

You likely have noticed how prevalent artificial intelligence (AI) and its related terms such as machine learning, neural networks, and big data analytics have become in the last several years in the world of cybersecurity. Doesn’t it make sens…

Meer informatie
Bewustwordingstraining voor beveiliging

Mimecast Voices: Gugu Tshangela

Editor's note: This is the third in a series of profiles featuring Mimecasters sharing their personal experiences with, and perspectives on prejudice and marginalization, and what actions people can take to better support their colleagues in this era…

Meer informatie
Threat Intelligence Hub

Microsoft Teams Notification Spam Exposes Phishing Risk

Google Firebase exploit highlights risk of third-party development tools and potential phishing risks of new messaging platforms Reports from around the world today saw Microsoft Teams users receiving unexpected notifications on their devices –…

Meer informatie