Our Blog

State of Email Security, Part 2: Data Breach Costs and Keys to Prevention

In Part 1 of this summary of the Mimecast State of Email Security Report 2019, we discussed the data indicating that IT teams are struggling to keep up with email-based threats. Because the primary email attack methods – business email compromise…

State of Email Security, Part 1: IT Teams Struggling to Keep Up with New Threats

Email-based attacks, particularly business email compromise (BEC) and ransomware, are up. Confidence in security defenses is down. Internal threats and data leaks are more prevalent. Better protection, threat intelligence and awareness training…

Modern Cybercrime Groups Adopt Businesslike Organizational Structure

The stereotypical image of a cybercriminal is that of a brilliant but socially awkward individual, usually wearing a hoodie, operating out of a basement and surviving on energy drinks and Hot Pockets. The reality is far more … corporate. While…

Are Your Executives Taking Cybersecurity Too Lightly?

A quick search of data breaches in 2019 will reinforce the fact that cybersecurity is directly tied to a company’s brand reputation. Facebook, LabCorp and Marriott are just three well-known brands that have been forced to deal with the fallout…

New Mobile Phone Scams Steal SIMs and Drains Financial Accounts

According to a recent news report, a San Francisco man lost $1 million — 90 percent of his life savings — in a matter of minutes when a hacker took over the victim’s mobile phone. This is just one of thousands of SIM swap scam incidents,…

Cryptojacking Attacks Spike as Hackers Prioritize ROI

Although cryptocurrency is somewhat of a mystery to the general public, large sums of money are changing hands through cryptocurrency transactions. However, people can also profit by mining cryptocurrency, verifying and authorizing transactions,…

Physical Security Plays an Important Role in Protecting Sensitive Data

Physical security is often an afterthought when it comes to protecting IT assets and data. However, theft and unauthorized access of computer hardware happens all too frequently, and the threat is increasing as devices become more portable. Mainframe…

How IT Standardization Reduces Complexity, Cost and Risk

An employee requests a new app, a new device, or a quick configuration change to help them complete certain tasks or projects. Maybe they want a Mac even though all employees have Windows machines. Hoping to keep the employee happy, IT comes…

Why Sloppy Password Practices Are the Main Ingredient in Credential Stuffing Attacks

Citrix. Dunkin Donuts. Reddit. AdGuard. Nest. TurboTax. These are just a few of the major brands that have been compromised in credential stuffing attacks in the past few months. These attacks show no signs of slowing down, according to Akamai’s…

Remote Work Security Challenges and How to Overcome Them

In a recent report from Buffer, 99 percent of survey respondents said they would like to work remotely at least part of the time for the rest of their careers. People like to have the flexibility to work from home if a child is sick or there’s…