Five Years Of Survey Data Shows Small Gains In Cyber Preparedness Five Years Of Mimecast’s State Of Email Security Survey Data Reveals Mounting Cybersecurity Challenges And Important Trends In How Companies Are Responding. Key Points: During the past five years, the number of cyberattacks has continued to rise, and the attacks themselves have grown more pernicious.
Your Business Was Hit By Ransomware. Should You Pay To Get Your Data Back? Whether Or Not To Pay Ransom Is A Top-Of-Mind Question Among Businesses. Cybersecurity Experts Offer Their Advice On Which Way To Go. Key Points: More than half of all companies that experience a ransomware attack decide to pay the ransom, even
The 2017 WannaCry Ransomware Attack Was One Of The Most Widespread Computer Infections Ever, And WannaCry Attacks Continue Today. Key Points: The WannaCry ransomware epidemic of 2017 disrupted hospitals, banks and communications companies worldwide. Four years later, cybercriminals renewed efforts to deploy WannaCry ransomware during the COVID-19 pandemic. Companies can take steps to prevent infection,
Ransomware Is Hitting More Companies Harder Than Ever, According To Mimecast’s State Of Email Security Report. Key Points: Six out of 10 companies say they were disrupted by ransomware in the past year. Companies hit by ransomware experienced six days of downtime, on average. A third of companies that paid ransom didn’t even get their data back.
Email Is The Backbone Of A Company’s Communications Network. It’s Also The Most Common Way In For Attackers. Here’s How Different Types Of Email Security Defend Your Network. Key Points: Email security threats are becoming more sophisticated and targeted, from ransomware to spear phishing attacks on C-suite executives. A comprehensive defense has never been more
Email Security Policies Help Protect Against Your Company’s Biggest Vulnerability To Cyberattacks. Here’s What Goes Into A Good Policy. Key Points: Email is the No. 1 cybersecurity threat vector. Organizations should have an email security policy to protect against data loss, downtime, regulatory fines and reputational damage. Your email security policy should not exist in
Research Finds That Too Little Exposure To Phishing Emails Can Make Users More Susceptible To Them. The Key Is Finding The Right Cadence Of Simulated Phishing Campaigns. Key Points: Humans require occasional exposure to maintain vigilance against social engineering threats. Automated spam filtering reduces exposure to these threats and may inadvertently cause us to be
False Positive Security Alerts Will Keep Draining Cybersecurity Team Resources And Performance Until Automation Is Fully Implemented And Tightly Integrated. Key Points: In the midst of an “alert overload,” cybersecurity professionals face a particularly acute problem of managing the deluge of false positive alerts. New survey data underscores the impact on sustainable security as well
The Value Of Cybersecurity Tools Can Be Greater Than The Sum Of Its Parts — But Only When They Are Used Collectively In An Integrated Manner. Key Points: Comprehensive threat intelligence requires a diverse set of cybersecurity tools to keep up with the ever-changing threat landscape. But using multiple solutions generates troves of fragmented data
The Recent AWS Outage Is A Strong Reminder Of The Risks That Come With Overdependence On A Single Cloud Service. Key Points: Amazon Web Services (AWS) recently experienced a wide outage that impacted thousands of customer sites and services. As organizations move IT workloads to the cloud, they need to consider the level of required
5 Ways Cybercriminals Can Exploit AI The Bad News Is Cybercriminals Are Leveraging AI To Supercharge Their Attacks. Learn How They Do It In Order To Build Better Cybersecurity Defenses. Key Points: AI is emerging as a driver of new, more advanced cybersecurity threats. Bad actors can harness AI to deliver more intelligent, adaptable malware,
The COVID-19 Pandemic Has Created New Legal Risks That Make E-Discovery More Valuable Than Ever. Key Points: COVID-19 has led to many new data sources and heightened legal risks, which are likely to remain in force even after the pandemic has ended. This has made the need for a robust e-discovery process more