Security, Email Security, Security Awareness Training

Wanneer is het te lang wachten om uw cybersecurity-strategieën te veranderen?

Malware can stick around for years. Wine, whiskey and cheese are all things we know and love but take notoriously long to achieve their optimal performance (read taste/cost). Malware on the other hand that is active for years inside your infrastruct…

Meer informatie
Security, Email Security

Wat zal er veranderen in cyberbeveiliging in 2019 (en wat niet)

Many things in cybersecurity that should happen in 2019 won’t. Learn why. Every year, we reach December and industry experts share their predictions and tell the world what the biggest trends will be for the following year. In the security ind…

Meer informatie
Security, Email Security

Nieuwe phishing-e-mails die worden weergegeven als niet-afgeleverde Office 365-berichten

You can fight back with a cyber resilience approach. Cyberattackers will try anything to get into enterprise networks. With the movement of many applications to the cloud, new creative techniques seem to appear every day. Users of Microsoft Office 3…

Meer informatie
Security, Email Security

Sandboxing-technologie: Waarom goed versus slecht niet volstaat.

Here’s the backstory on Mimecast’s new acquisition, Solebit. Editor's note: Earlier this year, Mimecast acquired Solebit, a company with technology geared toward static file analysis malware detection. As explained here, Mimecast had alr…

Meer informatie
Security, Email Security

Het ESRA-rapport van december: het totale vals-negatieve percentage van bestaande e-mailbeveiligingssystemen bedraagt 12%

Learn more in Mimecast’s latest Email Security Risk Assessment Report Is a false negative rate of 12% a large number or a small one? I suppose it depends on your perspective. If your email security system lets in 12 unwanted emails—wheth…

Meer informatie
Security, Security Awareness Training

Interne dreigingen – de goedbedoelende werknemer

Do you know your insider threat personas? In this this edition of Insider Threats Personified we’ll see how employees, no matter how well-meaning, can inadvertently aid in the lateral movement of threats through the distribution of malicious U…

Meer informatie
Security, Email Security

Inzicht in de meest recente malwaretechnieken

Here's the lowdown on how attackers may be going after you. Trillions of dollars are spent on cybersecurity, but it seems malware breaches continue to grow in part thanks to ransomware, rootkits, persistent malware and firmware malware. I’m su…

Meer informatie
Security, Security Awareness Training

Cybersecurity Breakdown: Verbetering van het bewustzijn op de werkplek

How are your employees using work-issued devices? The holiday shopping rush is in full swing, and employees are increasingly using company-issued devices to complete their gift purchases while at work. In fact, recent research from Robert Half Techn…

Meer informatie
Security, Security Awareness Training

Houd rekening met het gedrag van medewerkers bij interne e-maildreigingen

Security without factoring in employee behavior is bad security. Editor’s Note: Internal email threats of all kinds are increasing, with Mimecast research showing that threats caused by careless users, compromised accounts and malicious inside…

Meer informatie
Security, Brand Protection

Waarom het begrip Zero-Day van belang is

No one wants to be the first to face a new cyberattack. Let’s face it, the potential for being the first organization to be hit with the next creative zero-day cyberattack strikes fear into the heart of every CISO and IT security professional.…

Meer informatie
Security, Cyber Resilience for Email, Email Security

Verbeter de dreigingsdetectie en -respons met SIEM Integration

Add email security data into SIEM solutions for improved threat intelligence and response. Email is a catch 22. It’s the number one business communication tool and the number one cyberattack vector. As the lifeblood that keeps business running…

Meer informatie
Security, Email Security

De cyberkloof overbruggen – U bent de zwakste schakel in de keten

Cyberattackers are going after you to get to your biggest customers. Welcome to the latest installment of Bridging the Cyber Divide, our blog series focused on helping IT professionals at small-to-medium sized organizations make the case for enhance…

Meer informatie
Security, Brand Protection

Threat Intelligence: 5 manieren om waarde te bewijzen

You can do threat intelligence—even with a small budget. Editor’s Note: As part of an ongoing series, Threat Intelligence for You, we’re asking thought leaders in the Cyber Resilience Think Tank their thoughts about threat intellig…

Meer informatie
Security, Email Security

Cyberdreigingen kosten meer dan u zich kunt indenken

The costs of attacks are rising at an alarming rate. We've talked about how “Ignoring Cybersecurity Can Cost Millions” and highlighted how one US power company was fined $2.7 million over data exposure. This was just one of hun…

Meer informatie
Archive and Data Protection, Microsoft 365

Back-up en herstel van Office 365 in het Ransomware-tijdperk

The Old World Meets the New When It Comes to Backup and Recovery Many of us have the made the journey to Microsoft Office 365™ or are planning to do so soon. Many questions await us: how secure is it, who’s responsible for managing our d…

Meer informatie
Email Security, Microsoft 365

De problemen met multi-factorauthenticatie van Office 365/Azure resulteren in downtime

“@Microsoft: please don’t ruin Thanksgiving.” Ah, Thanksgiving. Typically, a week full of family travels, exercising booked vacation time and in some cases, thinking ahead to bargain deals on Friday. But now, it’s perhaps not…

Meer informatie
Security, Email Security

De definitie van innovatieve cyberbedreigingspreventie

You've heard it all. Until now. By now, you have probably been exposed to every promise, sales pitch, marketing hype and yes, even technological wonder when it comes to new security solutions to old (and very pervasive) problems. However, disruptin…

Meer informatie
Security, Email Security

Een betere sandbox voor e-mailbeveiliging

You need the best security technology in today’s market. It’s no secret that kids love to get dirty and especially while playing in a sandbox, so much so that there are dozens of videos showing how to build the best sandbox for just this…

Meer informatie
Security, Threat Intelligence Hub

Threat Intelligence: uitdagingen en voordelen

What can threat intelligence mean for your organization? Editor’s note: Threat intelligence. It’s been one of the most talked-about themes in the cybersecurity space for years now. But what does it mean to you, and what can it mean for y…

Meer informatie
Security, Cyber Resilience for Email, Email Security

De cyberkloof overwinnen: Omgaan met resilience

How do you make the case for cyber resilience? We know you’ve been there before. You’re an IT director or CIO without a large staff or budget. You find just the right solution that’ll make your company safer and more productive and…

Meer informatie
Security, Cyber Resilience for Email, Email Security, Web Security

7 tips om het gebruik van openbare wifi-netwerken te beveiligen

With Cybersecurity Awareness Month here, we’re ready to help. Human error is one of the leading barriers to effective cybersecurity. Casual security mistakes can lead to career-threatening results. Putting the right technology in place to impr…

Meer informatie
Security, Security Awareness Training

Negeer die bewustwordingstraining in cyberbeveiliging niet langer

It's depressing but true: failure is baked right into the DNA of most cybersecurity awareness training. How Cybersecurity Awareness Training is Taught Today Consider how cybersecurity awareness training is usually administered. During onboarding or …

Meer informatie
Security, Cyber Resilience for Email, Email Security

4 eenvoudige tips om vishing te stoppen

With Cybersecurity Awareness Month here, we’re ready to help. Human error is one of the leading barriers to effective cybersecurity. Casual security mistakes can lead to career-threatening results. Putting the right technology in place to impr…

Meer informatie
Archiving, Archive and Data Protection

Waarom oude strategieën voor informatiebeheer niet langer voldoende zijn

Yesterday’s archive is old news. Here’s what you need to know now. The information management landscape is changing. New and stricter legal and regulatory requirements coupled with ongoing accumulation of electronic information are creat…

Meer informatie
Security, Cyber Resilience for Email, Email Security

7 manieren om u in te dekken tegen fraude met overboekingen

With Cybersecurity Awareness Month here, we’re ready to help. Human error is one of the leading barriers to effective cybersecurity. Casual security mistakes can lead to career-threatening results. Putting the right technology in place to impr…

Meer informatie
Security, Email Security, Brand Protection

Waarom aanvallen op gelijkaardige domeinen toenemen

Here’s what to know about look-alike domain attacks. There are many kinds of attacks in the arsenal of your typical cybercriminal. One that has proven itself to be especially effective and thus increasingly popular comes down to tricking users…

Meer informatie
Security, Cyber Resilience for Email, Email Security

Omgaan met ransomware: een eenvoudige checklist

With Cybersecurity Awareness Month here, we’re ready to help. Human error is one of the leading barriers to effective cybersecurity. Casual mistakes can lead to career-threatening results. Putting the right technology in place to improve your …

Meer informatie
Cyber Resilience for Email, Email Security

Ransomware aanvallen nemen steeds toe – in hoge aantallen

Ransomware attacks aren’t going away. It’s a fact. Among the advanced email threats targeting organizations across the globe, ransomware has proven to be among the costliest. By 2019, global losses from ransomware attacks are expected to…

Meer informatie
Security, Cyber Resilience for Email, Email Security, Archive and Data Protection

De meeste datalekken in de gezondheidszorg worden tegenwoordig veroorzaakt door e-mailverkeer

Email security at healthcare companies is trending in the wrong direction. Email has been the top source of data breaches in the healthcare industry three of the last four quarters, according to HHS Breach Portal. Unfortunately, this trend does not …

Meer informatie
Cyber Resilience for Email, Email Security

Nieuwe phishingaanval gericht op online uitbetalingssystemen

Using advanced cybersecurity technology and user education can help stem the flow of money into the wrong hands. Stealing money has been the obvious focus for cybercriminals for as long as cyberattacks have taken place, and this shows no signs of ch…

Meer informatie
Email Security, Microsoft 365

'PhishPoint': de nieuwste Office 365-dreiging aanpakken

There’s a new phishing attack targeting Office 365/SharePoint users. Cybersecurity is a lot like an ongoing, worldwide game of chess. One side—those defending critical information, IP, money, etc.—put up defenses against attackers—those who want to …

Meer informatie
Security, Email Security

Niets gewaagd, niets gewonnen: genderstereotypen in de technische wereld overwinnen

With a rising skills gap in technology, girls need more female role models to understand what’s achievable and what’s possible. (Phindi Mazibuko, left, and Nomso Kana, right) South Africa recently celebrated Women’s Month and throughout August we ac…

Meer informatie
Email Security, Microsoft 365

Onderbrekingen van Azure/Office 365: de gids tot continuïteit voor IT-beheerders

A major outage in the US takes down a key Microsoft datacenter and a host of cloud services in the process.  What to do when the “cloud” goes down?    Every vendor offering a cloud-based solution pours ungodly amounts of money into re…

Meer informatie
Email Security, Microsoft 365

Hoe kunt u de tekortkomingen van Office 365™ aanpakken?

The email features in Office 365 may not be all you need. Businesses continue moving their productivity platforms to Microsoft Office 365™ in droves. As of their April 2018 earnings announcement, Microsoft said over 135 million business users worldwi…

Meer informatie
Security, Cyber Resilience for Email, Email Security

ESRA-rapport - augustus: gevestigde e-mailbeveiligingssystemen laten 200.000 schadelijke URL's ongemoeid

Learn more in Mimecast’s latest Email Security Risk Assessment Report. I am happy to report that Mimecast’s Email Security Risk Assessment (ESRA) testing and reporting continues to chug along, now in its 6th quarterly iteration! For those of you who…

Meer informatie
Cyber resilience voor e-mail

Nieuws over cyber resilience, 21 augustus 2018

Catch up on the latest Cybersecurity news. Email security best practices to help you reel in the threat of phishing, Security Intelligence Email is still one of the top attack vectors when it comes to security breaches. According to a 2017 report,…

Meer informatie
Cyber Resilience for Email, Email Security

Mimecast & Solebit: Daadkrachtig optreden tegen malware

Mimecast has acquired Solebit. Here’s why. Just like there is no one way to catch a thief, there is no one way to catch malware. There are just so many ways to build, compile, pack, and otherwise obfuscate malicious files to get past specific …

Meer informatie
Cyber Resilience for Email, Email Security

Zijn alle beveiligde e-mailgateways gelijkwaardig?

Is the security efficacy of secure email gateways basically the same? This is a question a lot of email administrators and security professionals have asked for years. For many of these folks there is presumption that the answer is “yes.” How do the…

Meer informatie
Cyber Resilience for Email, Email Security

Internal Cyber Threats – How to Protect Against the Enemy Within

Get the truth about malicious insiders. In general, organizations devote most of their prevention-focused email security controls on inbound security threats, as opposed to internal-to-internal or outbound threats. In their minds, they are primarily…

Meer informatie
Archiving, Archive and Data Protection

3 tips voor uw E-Discovery-actieplan

E-discovery is key in building your “perfect world” archive. Ever think about what would happen if you challenged the status quo of legacy compliance and e-discovery solutions and thought about your readiness plans more proactively? Woul…

Meer informatie
Cyber Resilience for Email, Email Security

De twee belangrijkste redenen waarom we tekortschieten in cyberbeveiliging

Good enough security is good enough no longer. You use email constantly. It’s the lifeblood of communication, commerce and exchange of ideas across your organization. Imagine trying to do your job in 2018 without it. It’s impossible, isn…

Meer informatie
Microsoft 365, Email Security, Microsoft 365

Drie stappen om uw e-mailverkeer te migreren naar Office 365™

Migrate email to the cloud without pain—or compromise. For the better part of the last 20 years, organizations have been content to keep their email services and solutions on-premises, as opposed to migrating those services to hosted solutions. But M…

Meer informatie
Security, Security Awareness Training

Lessen over cyberbewustzijn tijdens een treinrit

Users: here’s how not to handle an email security incident. Around a month ago I was catching the train home after work. For those of you who don’t know Melbourne, my office is around the corner from Flinders Street Station which means I…

Meer informatie
Security, Security Awareness Training

Mimecast + Ataata: de meest coole beveiligingsoplossingen op de markt

It's the cybersecurity awareness training platform you've been waiting for. I am excited to announce that last week, Mimecast acquired Ataata. Together we can dramatically improve the employee cyber security awareness training globally. Ask any secu…

Meer informatie
Security, Email Security

Impersonisatie-, phishing- en malware-aanvallen blokkeren met DMARC

Combine DMARC Analyzer’s email channel visibility and reporting with Mimecast DMARC enforcement and Targeted Threat Protection.  Email impersonation attacks, or email fraud, continues to grow, with Mimecast’s latest Email Security R…

Meer informatie

Cyber Resilience News July 10, 2018

Catch up on the past week’s cyber security news. We’re now mid-way through 2018, so as part of this week’s news we take a look at the worst cybersecurity breaches of the year so far via a roundup from Wired. In that same vein, we&r…

Meer informatie
GDPR, Email Security, Archive and Data Protection

Het AVG-recht om te worden vergeten: Hoe werkt het?

Upon request, be ready to delete EU resident data—forever. The European Union General Data Protection Regulation (GDPR) is now in effect and is fundamentally changing the way organizations approach their handling of customer data. One of the bi…

Meer informatie
Cyber resilience voor e-mail

Nieuws over cyber resilience, 13 juni 2018

Catch up on the past week’s cybersecurity news. This week’s news covered the gambit of issues that continue to crop up in the cybersecurity world, no matter how much some try to educate. There are still internet scams people fall for and…

Meer informatie
GDPR, Email Security, Archive and Data Protection

Hoe werken de meldingen voor AVG-gegevensinbreuken?

The way you prevented data breaches has changed forever. The European Union General Data Protection Regulation (GDPR) is fundamentally changing the way organizations must approach their handling of customer data. One of the biggest shifts is the new …

Meer informatie
Cyber resilience voor e-mail

Nieuws over cyber resilience, 29 mei 2018

Catch up on the past week’s cybersecurity news. Well, we made it.  May 25th was Friday and GDPR is now in effect, and we’re already seeing headlines about violations. Google and Facebook are already on the radar.  That didn&rsq…

Meer informatie
Cyber resilience voor e-mail

Cyber Resilience News May 23, 2018

Catch up on the past week’s news in cybersecurity. The deadline for GDPR compliance kicks off Friday! Can you believe it? It’s been a hot topic for months and of course, in the weeks leading up to the deadline, there was news everywhere …

Meer informatie
Cyber resilience voor e-mail

Nieuws over cyberresilience, 8 mei 2018

Catch up on the past week’s cybersecurity news A lot of headlines this week swirled around what might be lurking in your social media account. This week Facebook warned of similar domain phishing and “punycode” scams that are landi…

Meer informatie
GDPR, Email Security, Archive and Data Protection

AVG: Beveiliging versus privacy

Top 4 Tips for a Post-GDPR World This is the third installment of our 5 Things to Know for 5/25 blog series, and we’re talking about the differences between security and privacy and how this impacts GDPR preparations. Many see privacy and secu…

Meer informatie
GDPR, Archive and Data Protection

AVG-obstakels prioriteren

4 AVG-obstakels om u op voor te bereiden In de tweede aflevering van onze blogserie '5 dingen om te weten voor 25 mei' praten we over het voorbereiden, prioriteren en aanpakken van uw AVG-obstakels. Naleving van de GDPR betekent uitgebreid kijken naar procedures en…

Meer informatie
Security, Cyber Resilience for Email, Email Security

E-mailaanvallen zijn geëvolueerd – is uw beveiliging mee geëvolueerd?

Email continues to be the number one threat to organizations around the world Why? Because it’s easy for attackers and hard for you. According to the latest Verizon Data Breach Report, email breaches have increased to account for 96% of incidents or…

Meer informatie
Security, Email Security

Traditionele beveiligingssystemen missen miljoenen e-maildreigingen

April ESRA Report Shows Continued Vulnerabilities to Email-Borne Threats We recently announced the fifth in our series of quarterly reports aggregated from our Email Security Risk Assessment (ESRA) testing program.  For those new to these tests,…

Meer informatie
Cyber Resilience for Email, Email Security

Build Powerful Integrations with the Mimecast API

Mimecast launches new API Developer Portal What processes millions of requests a day and has been around for years? That’s right, the Mimecast API (Application Programming Interface). Now we’re opening the goodness of our API to customers, partners …

Meer informatie
Beveiliging

Nieuws over cyber resilience, 3 april 2018

Catch up on the past week’s cybersecurity news. Attacks on local governments made headlines this week from Atlanta and Baltimore. And states like South Dakota are stepping up their data breach laws.  With the GDPR clock ticking down to the May …

Meer informatie
Finance, Banking, Financial Advising, Insurance, IT, Telecommunications, Media, Legal, Accounting, Marketing, PR, Advertising, Design, Engineering, Recruitment, Manufacturing, Retail, Estate Agents, Hospitality, Wholesale, Transportation, Construction, Utilities, Oil and Gas, Health, Government, Pharmaceutical, Education, Non Profit/Charities, Property Development, Sports and Entertainment, Travel and Leisure, Food, Healthcare Manufacturer, Continuity, Security, Email Security

Hoe snel kunt u zich herstellen na een cyberaanval?

Cyber resilience verschuift de focus van het voorkomen van een aanval naar de opvolging na een aanval. Het beschermen van uw zakelijke e-mails gaat over meer dan alleen het filteren van spam, malware en zakelijke gecompromiteerde e-mails. In het kader van een migratie naar Microsoft ...

Meer informatie
Security, Email Security

De beste methodes voor e-mailbeveiliging voor werknemers

Get posts like this delivered to your inbox. Subscribe to Cyber Resilience Insights today. Even the best cloud-based email security solution can’t catch every malicious email missive. Here’s a list of do’s and don’ts f…

Meer informatie
GDPR, Email Security, Archive and Data Protection

Alles wat u moet weten over AVG

Breaking Down GDPR: What it means for your business GDPR, the European Union’s General Data Protection Regulation, goes into full effect in May 2018. Yet many organizations aren’t ready to comply – or even thinking they need to comply. We gathered t…

Meer informatie
Security, Archive and Data Protection, Email Security

Voorbereid en ingesteld op naleving. Zijn Australische bedrijven klaar voor de meldingsplicht van gegevensinbreuken?

NDB kicks off next week and more than half of organizations say they’re not ready. With just days to go until Australia’s Notifiable Data Breaches (NDB) scheme takes effect, new research suggests that nearly half of Australian companies haven’t yet …

Meer informatie
Security, Email Security

Cyberbeveiliging vs. Cyber Resilience

What’s the difference between Cybersecurity and Cyber Resilience? While the term “cybersecurity” is as old as the hills in the security world, the term “cyber resilience” has been gaining momentum. This is a good thing. Cybersecurity management is c…

Meer informatie