Internal Email Threats

The Challenge

The focus of most cybercriminals is to get in and around your network, with the goal of stealing your sensitive information or locking your systems and ransoming access back to you. Email has proven to be a very effective system for them to accomplish this. But what about internal email threats, those dangerous emails generated from within your organization? In many cases, mostly without their knowledge or understanding, your employees play an integral role in these attacks. Think a threat cannot spread via email once it is inside your organization? Think again. And what about your careless or malicious employees? Do they ever email information or documents where they shouldn’t?

The Solution

To combat internal email threats, Mimecast provides Internal Email Protect, a threat monitoring and remediation service for internally generated email. Internal Email Protect enables organizations to monitor, detect and remediate threats that originate from within your email system, whether the emails are destined to other internal users or to external recipients. Internal Email Protect scans attachments and URLs for malware and malicious links, as well as content inspection enabled by Data Leak Prevention. Internal Email  Protect can automatically delete infected or sensitive emails and attachments from employees’ inboxes increasing efficacy of protection.

Internal Email Protect:

  • Detects the lateral movement of threats via email from one internal user to another.
  • Identifies and blocks threats or sensitive data attempting to leave an organization.
  • Automates the removal of internal emails which are determined to contain threats or sensitive data.
  • Is an integrated part of the Mimecast administration console for reporting, configuration and management.
Analyst Report

Mimecast Named a Top Player In Radicati Group Secure Email Gateway Market Quadrant 2017

For the second consecutive year, Mimecast has been placed in the coveted upper right quadrant in the Radicati …


Infographic

Never Be a Ransomware Hostage

Ransomware can creep into your organization via email, drain productivity and cost you millions. How’s a …


Blog Post

Phishing - the Speculative Long Con

There’s been a spate of phishing attacks this month seeking to uncover the user credentials for users of various hosted email services. Gmail, Outlook, Yahoo and AOL have all been targeted. While some reports of the Outlook.com phish seem to have inc…