Here's a quick checklist of things you should do when your email has been compromised.
Even though email is as ubiquitous at law firms as it is in other industries, few legal professionals pay adequate attention to the importance of effectively managing their emails. In a series of blog posts, we will look at the importance of classifying emails, archiving emails, mailbox management, getting legal professionals to comply with email management policies, data security practices, handling emails for departing attorneys or matter release and email retention and destruction.
Topics: Email Security, Office 365, Document Management, Microsoft, Email Management, DMS, Outlook
Posted by William Pate
May 7, 2018 3:28 PM
Read our CTO Mike Paul's new article, "Mimecast and Microsoft Office Play Nice Together for Law Firm Email Management," in Law Technology Today!
Topics: Mimecast, Office 365, Email Management
Posted by William Pate
March 28, 2018 3:13 PM
We thank our partners at DocsCorp for sharing this blog post about the new release of cleanDocs 2.1. cleanDocs is a breakthrough technology that removes metadata from Microsoft Office, PDF and ZIP files at sub-second speeds.
Topics: Partner Series, cleanDocs, DocsCorp, Email Management, Email Security, Recipient Checking
Hackers' methods continue to evolve. That means your security must evolve.
To adequately protect your firm, you need:
Topics: firewall, Penetration Testing, Information Security, 2FA, Email Security, Mobile, Enterprise Mobility Management, Antivirus, Advanced Persistent Threats, Cybercrime, Vulnerability Testing, Hacking, Ransomware, Dual Factor Authentication, Two Factor Authentication, Biometric Authentication, Passwords, cybersecurity, phishing, whaling, Mimecast, Information Governance, Access Control, Network, Email Management, Malware, Training, Security
Posted by William Pate
February 28, 2018 2:09 PM
We have recently been made aware of a sophisticated email phishing campaign targeting law firms and other businesses.
Topics: Identity Theft, Information Security, Email Security, Cybercrime, Hacking, cybersecurity, Email Management, Alerts, Security, phishing
Has your password been stolen? Are you worried one of your firms' email addresses has been compromised?
There's an easy way to find out.
Topics: Passwords, 2FA, Two Factor Authentication, Email Management, Email Security
We're very appreciative to our partners at Mimecast for sharing this report from Forrester. We hope it will help you prepare for the GPDR.
Topics: cybersecurity, Email Management, Email Security, GPDR
Topics: Two Factor Authentication, 2FA, Passwords, cybersecurity, firewall, Email Management, Information Security, Email Security
Posted by William Pate
September 6, 2016 2:43 PM
Does your organization think email archiving is a nice-to-have? Think again.
Topics: Email Management, Email Security, cybersecurity, Infographic, Cloud Infographic
It's happened. You've done everything you can to defend your law firm from this day, but the hacker successfully breached your walls. Now, you're faced with encrypted files, lost confidential data, demands for money, the insertion of other forms of malware on your network or, even worse, some combination of these and/or more malicious activities or demands.
What do you do now? Who needs to know? Who are you gonna call?
Topics: Security, Training, Malware, IT Tips, Email Management, whaling, cybersecurity, Hashcat, Passwords, Hacking, phishing, Virus, Antivirus, FBI Internet Crime Complaint Center, US-CERT, IC3, Secret Service, PII, Federal Trade Commission, APTs, Cybercrime
Posted by Dan Carmel, Chief Marketing Officer, iManage
April 27, 2016 3:49 PM
We're happy to host Dan Carmel, Chief Marketing Officer at our longtime partner iManage, in this post for Innovative Insights.
Topics: iManage, ECM, Email Management, iManage Work, Document Management, User Experience, Work Product Management
Protecting organizations from cyberattack is not just the responsibility of the IT security team. Shared responsibility is key.
Topics: Cloud, Cloud Storage, Email Management, Mimecast, cybersecurity, Infographic, Partners, eBook
UPDATE 1 MAR 2016: Our partners at Mimecast announced today at the RSA Conference that they are launching the first-ever threat protection against whaling. Learn more here.
Whaling Attack? No, it’s not the latest survivalist reality television show. It’s a potential hacking threat posing a real problem for today’s technologically driven law firms and companies. [Update 29 FEB 2016: Here are a few good, if sad, examples of whaling.]
As in reality, whales are bigger than phish. Phishing is usually conducted using shotgun-style emails sent to the masses looking for people to divulge sensitive information, like Social Security Numbers or other personally identifiable information (PII). A whaling attack, however, targets the C-suite, partners, upper management, celebrities and other individuals of high worth or influence.
Topics: Security, Malware, Technology Consulting, IT Tips, Disaster Recovery, Email Management, Network, SentinelOne, whaling, cybersecurity, phishing
Comment on this post