by Brian McCarthy | Jan 14, 2020 | Air Gapping, CASB, Cybersecurity, Email Security, Phishing, Premium content, Ransomware, Security
Attackers are creating phishing sites from Sway, an effective approach as links for the domain are typically trusted. You may not be familiar with Microsoft Sway or at least have never used it. But cybercriminals have been exploiting this web app to send phishing...by Brian McCarthy | Jan 7, 2020 | Cybersecurity, Incident Response Service, malware, Premium content, threat intelligence
Executive Summary The death of Qasem Soleimani by a U.S. airstrike increases the likelihood that Iran will seek to retaliate against U.S. assets using destructive malware. However, given the complexity of attacks, timing of any potential action is...by Brian McCarthy | Dec 27, 2019 | Awareness Training, Cybersecurity, eBook, Email Security, Mimecast, Premium content
A company can put together as many technology solutions or policies as it likes, but, in the end, its people are the most important element in information security. If the employees in your organization don’t feel personally invested in improving your organization’s...by Brian McCarthy | Nov 11, 2019 | Cyber Resilience, Cybersecurity, Email Security, Mimecast, Phishing, Premium content
A staggering 96% of organizations say that e-mail phishing scams pose the biggest security risk facing their businesses over the next year. A further three quarters (76%) say the greatest and most persistent threat is the careless insider who unthinkingly clicks on...by Brian McCarthy | Nov 7, 2019 | Blog, Cybersecurity, Security
CVE (Common Vulnerabilities and Exposures) is a list of publicly known cybersecurity vulnerabilities. Here’s what it does and doesn’t offer – and how it can help your organization’s security pros and other teams. When your organization is facing an...by Brian McCarthy | Nov 7, 2019 | Blog, CASB, Cyber Resilience, Cybersecurity
Nearly 90% of data breaches happen because of poor cybersecurity posture. Unfortunately, a strong cybersecurity posture is not necessarily a function of dollars invested or the number of tools deployed. Organizations struggle to understand and improve their security...