Protecting organizations from cyberattack is not just the responsibility of the IT security team. Shared responsibility is key.
Protecting organizations from cyberattack is not just the responsibility of the IT security team. Shared responsibility is key.
Topics: Cloud, Cloud Storage, Email Management, Mimecast, cybersecurity, Infographic, Partners, eBook
UPDATE 1 MAR 2016: Our partners at Mimecast announced today at the RSA Conference that they are launching the first-ever threat protection against whaling. Learn more here.
Whaling Attack? No, it’s not the latest survivalist reality television show. It’s a potential hacking threat posing a real problem for today’s technologically driven law firms and companies. [Update 29 FEB 2016: Here are a few good, if sad, examples of whaling.]
As in reality, whales are bigger than phish. Phishing is usually conducted using shotgun-style emails sent to the masses looking for people to divulge sensitive information, like Social Security Numbers or other personally identifiable information (PII). A whaling attack, however, targets the C-suite, partners, upper management, celebrities and other individuals of high worth or influence.
Topics: Security, Malware, Technology Consulting, IT Tips, Disaster Recovery, Email Management, Network, SentinelOne, whaling, cybersecurity, phishing
Posted by Kyle Worley
February 16, 2016 5:05 PM
When it comes to information security there is no silver bullet to stop attackers from infiltrating your firm. The “defense-in-depth” approach to information security is simple: add many layers of protection between yourself and the outside world. Hardening your computer is exactly what it sounds like, adding security measures to increase the difficulty of an attacker compromising your system. Below you will find a checklist of system hardening best practices, each of these are easy to implement and are critical in protecting your computer.
Topics: Security, Malware, Technology Consulting, Data Recovery, IT Tips, Disaster Recovery, Information Governance, Email Management, Access Control, SentinelOne
Our partner Mimecast has shared their newest defenses against email threats – and what you need to do to ensure they are actively protecting your systems. Some of these steps may be somewhat complex to the non-Exchange Administrator. If you need help getting started, please contact us.
Topics: Security, Malware, Technology Consulting, IT Tips, Email Management, Network, Mimecast
Is your inbox regularly flooded with promotions, updates and other emails you're pretty sure you never signed up to receive?
Are you having a hard time finding important emails buried by those seemingly unnecessary emails?
We can sympathize.
Well, the answer is simple, and it's one you should resolve to accomplish this year: clean out your inbox by unsubscribing from emails you never read.
Here's one simple way to do that:
Topics: Technology Consulting, IT Tips, Email Management
Comment on this post