Here's a quick checklist of things you should do when your email has been compromised.
June 7, 2018 3:00 PM
May 17, 2018 4:53 PM
Even though email is as ubiquitous at law firms as it is in other industries, few legal professionals pay adequate attention to the importance of effectively managing their emails. In a series of blog posts, we will look at the importance of classifying emails, archiving emails, mailbox management, getting legal professionals to comply with email management policies, data security practices, handling emails for departing attorneys or matter release and email retention and destruction.
May 7, 2018 3:28 PM
Read our CTO Mike Paul's new article, "Mimecast and Microsoft Office Play Nice Together for Law Firm Email Management," in Law Technology Today!
March 28, 2018 3:13 PM
We thank our partners at DocsCorp for sharing this blog post about the new release of cleanDocs 2.1. cleanDocs is a breakthrough technology that removes metadata from Microsoft Office, PDF and ZIP files at sub-second speeds.
March 13, 2018 3:14 PM
Hackers' methods continue to evolve. That means your security must evolve.
To adequately protect your firm, you need:
Topics: Security, Training, Malware, Information Governance, Email Management, Network, Access Control, Mimecast, Dual Factor Authentication, whaling, cybersecurity, Passwords, Biometric Authentication, Two Factor Authentication, Ransomware, Hacking, Advanced Persistent Threats, phishing, Antivirus, Cybercrime, Enterprise Mobility Management, Mobile, Email Security, 2FA, Information Security, Penetration Testing, Vulnerability Testing, firewall
February 28, 2018 2:09 PM
We have recently been made aware of a sophisticated email phishing campaign targeting law firms and other businesses.
August 8, 2017 9:26 AM
Has your password been stolen? Are you worried one of your firms' email addresses has been compromised?
There's an easy way to find out.
June 22, 2017 10:26 AM
We're very appreciative to our partners at Mimecast for sharing this report from Forrester. We hope it will help you prepare for the GPDR.
May 22, 2017 2:22 PM
March 7, 2017 5:08 PM
September 6, 2016 2:43 PM
Does your organization think email archiving is a nice-to-have? Think again.
May 3, 2016 4:17 PM
It's happened. You've done everything you can to defend your law firm from this day, but the hacker successfully breached your walls. Now, you're faced with encrypted files, lost confidential data, demands for money, the insertion of other forms of malware on your network or, even worse, some combination of these and/or more malicious activities or demands.
What do you do now? Who needs to know? Who are you gonna call?
Topics: Security, Training, Malware, IT Tips, Email Management, whaling, cybersecurity, Hashcat, Passwords, Hacking, phishing, Virus, Antivirus, FBI Internet Crime Complaint Center, US-CERT, IC3, Secret Service, PII, Federal Trade Commission, APTs, Cybercrime
April 27, 2016 3:49 PM
We're happy to host Dan Carmel, Chief Marketing Officer at our longtime partner iManage, in this post for Innovative Insights.
March 18, 2016 11:52 AM
Protecting organizations from cyberattack is not just the responsibility of the IT security team. Shared responsibility is key.
February 22, 2016 3:55 PM
UPDATE 1 MAR 2016: Our partners at Mimecast announced today at the RSA Conference that they are launching the first-ever threat protection against whaling. Learn more here.
Whaling Attack? No, it’s not the latest survivalist reality television show. It’s a potential hacking threat posing a real problem for today’s technologically driven law firms and companies. [Update 29 FEB 2016: Here are a few good, if sad, examples of whaling.]
As in reality, whales are bigger than phish. Phishing is usually conducted using shotgun-style emails sent to the masses looking for people to divulge sensitive information, like Social Security Numbers or other personally identifiable information (PII). A whaling attack, however, targets the C-suite, partners, upper management, celebrities and other individuals of high worth or influence.