Your Team Needs to Get It Right 100% Of the Time

    All it takes is one successful cyber attack to expose citizen data, take services offline, and cause devastating financial damage.

    Safeguard the communities you serve. Implement a multi-layered cyber-security strategy that provides the most sophisticated advanced threat protection your organization can get, delivered in the simplest way possible.

    Ready to choose Mimecast?

    Schedule a demo

    We Understand the Unique
    Challenges of State and Local Government

    Ransomware

    Governemnt3.jpg

    Victim: Jenni

    Role: Employee for City of Grentsville.

    Mistake: Opens an attachment in an email that seems to come from a city vendor.

    Result: The malicious attachment unleashes a ransomware attack that infiltrates the city’s network and brings down its technology systems.

    Consequences:

    • City services are shut down until city workers can resolve the crisis
    • Residents cannot pay bills or start/stop services.
    • Negative financial impact due to delayed revenue and costs to restore systems.

    Jenni’s Options:

    1. Pay the Ransom - No Guarantees

    • Files still encrypted? Not fully accessible?
    • Stolen data sold or exploited?

    2. Rebuild Servers from Data Backups

    Ransomware By The Numbers:

    • case-study-circle.png

      $7.5B+

      US ransomware attacks, 2019 costs

    • case-study-circle.png

      $8.1M

      Average cost of a ransomware incident

    • case-study-circle.png

      287 days

      Average time to recover from an attack

    Easy to Perform and A High Probability of Success

    Phishing For Dollars

    Governemnt1.jpg

    Victim: Andy

    Role: Payroll Administrator for the City of Hopskips.

    Mistake: Receives an email ‘from a vendor’ with a detailed invoice and instructions to use an updated account/routing number; initiates the wire transfer for the balance owed.

    Result: Transfers money directly to the hacker.

    Consequences:

    • Money that was meant to pay for services rendered is lost; the City cannot recover it.
    • An already tight city budget requires programs to be cut to offset the financial loss.



    Phishing Attacks Are Becoming More Sophisticated

    • Public records enable hackers to launch ‘realistic’ attacks.
    • Untrained employees are more likely to fall for such scams.

    Data Breaches By The Numbers:

    • case-study-circle.png

      $8.1M

      Average cost of a data breach for Education (U.S.)

    • case-study-circle.png

      $3,533

      Average cost of a data breach per employee

    • case-study-circle.png

      $142

      Average cost per record breached for Education

    94% of Organizations Experiences a Phishing Attack

    Human Error

    Governemnt2.jpg

    Victim: Connor

    Role: Employee at a state agency.

    Mistake:

    Receives an email ‘from IT’ to update his log-in credentials; clicks on the link and enters his information on a website that looks legit.

    Result: The hacker uses stolen credentials to access the state’s network.

    Consequences:

    • Hackers steal usernames and passwords used to access other government servers.
    • Hackers access/leak government secrets.
    • Hackers steal employee and state resident personal identifiable information (PII).


    User account information from government employees can be:

    • Sold on black market for significant financial gain
    • Leveraged by nation-state hackers for espionage or sabotage

    Data Breaches By The Numbers:

    • case-study-circle.png

      86%

      Threats and data leaks that start with an employee

    • case-study-circle.png

      59%

      Organizations suffer negative impacts from an email-borne attack

    • case-study-circle.png

      97%

      People can’t identify a sophisticated phishing attack

    90%+ of security incidents involve human error

    Mimecast Can Help

    468x458_Ring_14(2).png

    Email Security 3.0

    Prevents Phishing Attacks and Malware from getting to users’ inboxes.

    Reduces Risk of malicious attachments and URLs.

    Applies Best-practice Inspections to all email, including inbound, internal, and outbound.

    Learn more
    468x458_Ring_14(2).png

    Awareness Training

    Easy And Quick video-based modules delivered monthly that take less than 5 minutes to complete.

    Engaging laugh-out-loud funny security awareness training that your employees enjoy rather than dread.

    Effective micro-learning approach improves cyber awareness, sharpens cyber security reflexes, and reduces the risk of an innocent but devastating mistake.

    Learn more
    468x458_Ring_14(2).png

    Web Security

    Protects Online Activity without impacting productivity.

    Reduces “Shadow IT” by limiting the use of risky sites and unsanctioned applications.

    Keeps Users Safe On Any Device whether they are using a PC, tablet or smart phone.

    Learn more
    468x458_Ring_14(2).png

    Sync & Recover

    Prevents Loss of Critical Data as a last line of defense against ransomware.

    Supports Rapid Recovery of data and service restoration after an attack.

    Provides Point in Time Data Recovery of emails, files, and contacts.

    Learn more

    Expert Insight

    Resources You Might Be Interested In

    DATA BRIEF

    Mimecast Advanced Security

    Read Now

    SOLUTION BRIEF

    Solution Brief: Mimecast Awareness Training

    Read Now

    BLOG

    How Hackable Are You? Four Ways to Improve Your Cyber Awareness

    Read Now

    BLOG

    Survey Says: Ransomware is Still a Top Threat for Most Orgs

    Read Now