Mimecast Blog

Security
A Must Have Cyber Resilience Strategy for Kenya

Why Kenya needs to adopt a cyber resilience strategy right away   Kenya is enjoying … Read More >

Why Kenya needs to adopt a cyber resilience strategy right away   Kenya is enjoying a tech boom, which is clearly aiding the growth of its economy. However, with digital maturity comes increased risk, and industries often don’t realise that as they digitally transform, cyber threats become mor… Read More >

Brian Pinnock

by Brian Pinnock

Manager, Sales Engineering

Posted Sep 22, 2017

Security
National Health Service Cyber Security Fears and Resili…

NHS IT Leaders losing sleep ov… Read More >

NHS IT Leaders losing sleep over GDPR and cybersecurity fears  Makes you WannaCry Cyber-attacks like the WannaCry … Read More >

Mayur  Pitamber

by Mayur Pitamber

Product Marketing Manager

Posted Sep 21, 2017

Continuity
Office 365 Is Down, Again

Monday Blues for Office 365 Us… Read More >

Monday Blues for Office 365 Users  Office 365 down Employees logging on to Office 365 on Monday found that they w… Read More >

Mayur  Pitamber

by Mayur Pitamber

Product Marketing Manager

Posted Sep 19, 2017

Security
Improving Care for Protected Health Information

The nature of the critical care that healthcare provides necessitates that providers be c… Read More >

The nature of the critical care that healthcare provides necessitates that providers be custodians of highly sensitive patient data. It’s just impossible to imagine a scenario where highly skilled medical staff wouldn’t have access to personal and medical details, as well as the staff that handles … Read More >

David Hood

by David Hood

Director, Technology Marketing, Mimecast

Posted Sep 19, 2017

Archiving
Archived Email Data Governance: 4 Things You Need to Know

An effective data governance solution offers a strategic advantage Data governance is oft… Read More >

An effective data governance solution offers a strategic advantage Data governance is often thought of as a “check-the-box kind of thing”, according to Achmad Chadran, an archiving product marketing manager for Mimecast. It’s required, but, generally speaking, considered a hassle. He prefers we see… Read More >

Taylor  Sisk

by Taylor Sisk

Mimecast Contributing Writer

Posted Sep 13, 2017

Archiving
The 5 Biggest Challenges of Mobile Email Management

Cloud archiving addresses The … Read More >

Cloud archiving addresses The many CHALLENGES of mobile email management  It’s hard to imagine getting through the… Read More >

Margot Carmichael Lester

by Margot Carmichael Lester

Mimecast Contributing Writer

Posted Sep 12, 2017

Popular Posts

Older Posts

Archiving

The 7 Worst Outcomes When Your Legacy Archive Solution Goes Down

What happens when your archive data solution has an #epicfail? Despite the popularity of the Worst Case Scenario franchise, few of us want to consider all the things that can go wrong when our legacy archiving solution is offline. Sure, we have rapi…

Read More >

Security

How to Prepare for and Respond to an Email-Based Attack

This is not a drill.  Your email is under attack. Is your organization prepared? How will they respond?   No matter how well you prepare technically for and educate and train your team on cyber resilience, at some point you’re going to e…

Read More >

Security

3 Tips for Expanding your Organization’s Advanced Security Strategy

With a leadership team in place and a set of known and likely email security threats identified, you’re ready to build out your advanced security strategy. 1. Engage all departments and levels. Make cybersecurity relevant for employees up and down t…

Read More >

Security

5 Steps for Launching an Advanced Security Awareness and Training Initiative

  “Ultimately, the security chain is as strong as its weakest link and once a cybercriminal has compromised one account – even a junior employee – they can then leverage that account and move upwards through the organization, eventually getting…

Read More >

categories

Read More >

View More

Popular Posts