Big Giveaway - Enter now

Status
Not open for further replies.

rpm

Admin
Staff member
Joined
Jul 22, 2003
Messages
65,038
This week we partnered with Mimecast to promote its The State of Email Security Report 2019, its Cyber Security Kit and other products. You can win an Amazon Fire HD 7 tablet and a Google Chromecast. To enter:
  • Click on the Mimecast banners shown on the top of this forum (mobile link here and here)
  • Tell us what you think is cool about Mimecast's The State of Email Security Report 2019 or its Cyber Security Kit.
  • Three entries per member (One for each of the websites and one for the e-book download).
Bonus prize
  • Complete the form on the Mimecast landing page, download the E-book and quote a line from the report.
The giveaway will end on Wednesday 23 October and standard competition rules apply.
 

CamiKaze

Honorary Master
Joined
May 19, 2010
Messages
13,475
Use this report to see the critical capabilities you should look for in an archiving solution and how the top vendors stack up.
 

CamiKaze

Honorary Master
Joined
May 19, 2010
Messages
13,475
Gain valuable insight from 1,025 global IT decision makers on email-based attacks, cyber resilience, business continuity, awareness training and threat intelligence.
 

lkswan747

Senior Member
Joined
Jun 28, 2017
Messages
734
Gain valuable insight from 1,025 global IT decision makers on email-based attacks, cyber resilience, business continuity, awareness training and threat intelligence.
 

PsyWulf

Executive Member
Joined
Nov 22, 2006
Messages
8,583
Office Hygiene Tip
People could potentially close a business' doors, just by opening them.

It can be dangerous to let people you don't know into your building. Holding the door open for someone you don't know is one of the most common security breaches. It could give access to an unauthorised person who might steal property or obtain sensitive information.
 

PsyWulf

Executive Member
Joined
Nov 22, 2006
Messages
8,583
67% Of Organizations Reported Increases in Impersonation Fraud
Confidence is lower than ever when it comes to impersonation attacks.
 

rubber_otter

Expert Member
Joined
May 25, 2009
Messages
1,545
It's critical to verify any request that asks you to send sensitive information or money. Hackers often create fake email accounts and try to convince employees (and even executives) to send confidential information or transfer money. Verify that requests are real and think before you send.
 

rubber_otter

Expert Member
Joined
May 25, 2009
Messages
1,545
Gain valuable insight from 1,025 global IT decision makers on email-based attacks, cyber resilience, business continuity, awareness training and threat intelligence.
 

chickenbeef

Executive Member
Joined
Sep 10, 2008
Messages
8,046
It's critical to verify any request that asks you to send sensitive information or money. Hackers often create fake email accounts and try to convince employees (and even executives) to send confidential information or transfer money. Verify that requests are real and think before you send.
 

rubber_otter

Expert Member
Joined
May 25, 2009
Messages
1,545
Be careful of how you handle sensitive documents, especially hard copies. Always shred hard copies of confidential documents when no longer needed. These could give fraudsters access to personal information.
 

Deanza

Well-Known Member
Joined
Jan 24, 2008
Messages
107
Industry-leading search SLAs for real-time access to information
 

CamiKaze

Honorary Master
Joined
May 19, 2010
Messages
13,475
It's critical to verify any request that asks you to send sensitive information or money. Hackers often create fake email accounts and try to convince employees (and even executives) to send confidential information or transfer money. Verify that requests are real and think before you send.
 

DiabloDane

Senior Member
Joined
Apr 10, 2019
Messages
601
Gain valuable insight from 1,025 global IT decision makers on email-based attacks, cyber resilience, business continuity, awareness training and threat intelligence.
 

R_D_V

Well-Known Member
Joined
Aug 31, 2015
Messages
180
Gain valuable insight from 1,025 global IT decision makers on email-based attacks, cyber resilience, business continuity, awareness training and threat intelligence.
 

R_D_V

Well-Known Member
Joined
Aug 31, 2015
Messages
180
Mimecast Cloud Archive can help you achieve:

  • Seamless integration across archiving, continuity and security
  • Robust e-discovery and compliance tools
  • Industry-leading search SLAs for real-time access to information
  • Training, education and flawless implementations with Legendary Customer Success™ program
 

JaredOzzy

Active Member
Joined
Nov 10, 2016
Messages
46
Use this report to see the critical capabilities you should look for in an archiving solution and how the top vendors stack up.
 

JaredOzzy

Active Member
Joined
Nov 10, 2016
Messages
46
Gain valuable insight from 1,025 global IT decision makers on email-based attacks, cyber resilience, business continuity, awareness training and threat intelligence.
 

JaredOzzy

Active Member
Joined
Nov 10, 2016
Messages
46
It's critical to verify any request that asks you to send sensitive information or money. Hackers often create fake email accounts and try to convince employees (and even executives) to send confidential information or transfer money. Verify that requests are real and think before you send.
 

NeonNinja

Neon Resident
Joined
Nov 22, 2009
Messages
19,375
Use this report to see the critical capabilities you should look for in an archiving solution and how the top vendors stack up.
 
Status
Not open for further replies.
Top