Mimecast Blog

Security
Mime Wars: Rogue User

A long time ago in an office far, far away… *horns – Ba-da-da-da-da duh-duh-dun dun dun da… Read More >

A long time ago in an office far, far away… *horns – Ba-da-da-da-da duh-duh-dun dun dun dah* MimeWars7   Castor, a young Rebel officer toils away at his desk counting the parsecs *true fan only joke* until he can escape the monotony of labor. It has been an exhaustive holiday season and he’s be… Read More >

Bob Adams

by Bob Adams

Sr. Sales Engineer at Mimecast

Posted Dec 13, 2017

Security
Getting Ready for Australia’s NDB

Australia’s Notifiable Data Br… Read More >

Australia’s Notifiable Data Breach regime is just weeks away. Are you ready? It may seem like there is a lot of time un… Read More >

Garrett O'Hara

by Garrett O'Hara

Principal Technical Consultant

Posted Dec 08, 2017

Security
Healthcare Provider Survey Finds Email Most Likely Sour…

Security in the healthcare ind… Read More >

Security in the healthcare industry is receiving a great deal of attention and for good reason. From the fear of medical… Read More >

David Hood

by David Hood

Director, Technology Marketing, Mimecast

Posted Dec 11, 2017

Security
‘Tis the season for email fraud – so don’t open the wrong package

Everyone loves a gift, but many appealing-looking emails turn out to be lumps of coal Lik… Read More >

Everyone loves a gift, but many appealing-looking emails turn out to be lumps of coal Like clockwork, the end of the year marks the winding down of the Australian business year and the start of the silly season. Black Friday and Cyber Monday shopping events are encouraging Australians to get their … Read More >

Garrett O'Hara

by Garrett O'Hara

Principal Technical Consultant

Posted Dec 10, 2017

Security
Be Prepared: Cyber Security for Higher Education

Cyber Security for Higher Education: What Colleges & Universities Need to Know Instit… Read More >

Cyber Security for Higher Education: What Colleges & Universities Need to Know Institutions of higher learning don’t just disseminate knowledge, they store it. Extensive data repositories hold proprietary information about vital scientific and academic research (some of it under contract to bus… Read More >

Margot Carmichael Lester

by Margot Carmichael Lester

Mimecast Contributing Writer

Posted Nov 21, 2017

Security
Find Your Weakest Link to Protect Against Malware

Malware everywhere. With 40,0… Read More >

Malware everywhere. With 40,000 employees in 140 countries and 1200 staff in Australia alone, “You don’t have to look t… Read More >

Alison  O'Hare

by Alison O'Hare

Technical Director

Posted Nov 16, 2017

Popular Posts

Older Posts

Security

Defend Against Malicious Email Attachments and Malware

Think your users would never fall for an email scam? Think again. According to Verizon’s Data Breach Investigation Report for 2017, two-thirds of cybersecurity breaches are caused by malware installed by malicious email attachments, and 43 percent o…

Read More >

Security

Protecting the Healthcare System from Cyberattacks

Healthcare Cybersecurity Task Force Recommends New Ways to Protect from Cyberattacks. Last year HHS established the Health Care Industry Cybersecurity Task Force following the passage of the Cybersecurity Act of 2015. The Task Force was composed of …

Read More >

Security

KnockKnock Cyberattack Exposes Key Security Concerns with Office 365

KnockKnock. Who’s There?  The latest attack on Office 365 The recently disclosed Knockknock attack brings up a few key lessons on Office 365 security. Broadly used platforms make easy targets for attackers As the popularity of a platform rises,…

Read More >

Security

Cyberattacks on K-12 School Systems: Are you Ready?

What You Can Learn from Recent Cyber Attacks Targeting School Systems  Just after the school year commenced, Steve Bradshaw, superintendent of the Columbia Falls, Montana, schools got a menacing text from a number he didn’t recognize. The cyber…

Read More >

categories

Read More >

View More

Popular Posts