Big Giveaway - Enter now

Status
Not open for further replies.

qace

Senior Member
Joined
Oct 11, 2005
Messages
594
Research firm Vanson Bourne conducted a Mimecast-commissioned global survey of 1,025 IT decision makers to gain useful insights into their experiences and outlook on the current state of email security. These participants were interviewed from December 2018 through February 2019 across the US, UK, Germany, Netherlands, Australia, South Africa and United Arab Emirates.
 

Zarnicate

Well-Known Member
Joined
May 15, 2016
Messages
480
It's critical to verify any request that asks you to send sensitive information or money. Hackers often create fake email accounts and try to convince employees (and even executives) to send confidential information or transfer money. Verify that requests are real and think before you send.
 

patrick123

Expert Member
Joined
Apr 10, 2005
Messages
2,708
Gain valuable insight from 1,025 global IT decision makers on email-based attacks, cyber resilience, business continuity, awareness training and threat intelligence.
 

patrick123

Expert Member
Joined
Apr 10, 2005
Messages
2,708
Always use discretion before posting information about work on social media. Don't reveal any sensitive work information or identify co-workers by name. You may expose nonpublic information or tag co-workers without their consent.
 

Rickster

EVGA Fanatic
Joined
Jul 31, 2012
Messages
16,694
Office Hygiene Tip
People could potentially close a business' doors, just by opening them.

It can be dangerous to let people you don't know into your building. Holding the door open for someone you don't know is one of the most common security breaches. It could give access to an unauthorised person who might steal property or obtain sensitive information.
 

patrick123

Expert Member
Joined
Apr 10, 2005
Messages
2,708
Human error is a contributor to 95% of all security breaches. Mistakes happen all the time and can lead to debilitating financial, reputation and intellectual property loss.
 

OldGoat

Well-Known Member
Joined
May 24, 2006
Messages
482
It's critical to verify any request that asks you to send sensitive information or money. Hackers often create fake email accounts and try to convince employees (and even executives) to send confidential information or transfer money. Verify that requests are real and think before you send.
 

joshuatree

Expert Member
Joined
Jul 2, 2012
Messages
1,531
Use this report to see the critical capabilities you should look for in an archiving solution and how the top vendors stack up.
 

Moosa86

Well-Known Member
Joined
Jan 22, 2014
Messages
122
People could potentially close a business' doors, just by opening them.

It can be dangerous to let people you don't know into your building. Holding the door open for someone you don't know is one of the most common security breaches. It could give access to an unauthorised person who might steal property or obtain sensitive information.
 

joshuatree

Expert Member
Joined
Jul 2, 2012
Messages
1,531
Gain valuable insight from 1,025 global IT decision makers on email-based attacks, cyber resilience, business continuity, awareness training and threat intelligence
 

joshuatree

Expert Member
Joined
Jul 2, 2012
Messages
1,531
It's critical to verify any request that asks you to send sensitive information or money. Hackers often create fake email accounts and try to convince employees (and even executives) to send confidential information or transfer money. Verify that requests are real and think before you send.
 

Rocco1

Expert Member
Joined
Sep 8, 2008
Messages
1,010
Gain valuable insight from 1,025 global IT decision makers on email-based attacks, cyber resilience, business continuity, awareness training and threat intelligence
 

Jovs

Well-Known Member
Joined
Aug 1, 2008
Messages
459
Gain valuable insight from 1,025 global IT decision makers on email-based attacks, cyber resilience, business continuity, awareness training and threat intelligence.
 

Jovs

Well-Known Member
Joined
Aug 1, 2008
Messages
459
Use this report to see the critical capabilities you should look for in an archiving solution and how the top vendors stack up.
 

Red Plumstead

Expert Member
Joined
Jun 20, 2011
Messages
2,456
From the E-Book

Malcolm Harkins, Chief Security and Trust Officer at Cylance said, “As a security industry, we have to move away from being in a constant state of reaction. I want to minimize damage to my organization – I want prevention.”
 

Red Plumstead

Expert Member
Joined
Jun 20, 2011
Messages
2,456
It's critical to verify any request that asks you to send sensitive information or money. Hackers often create fake email accounts and try to convince employees (and even executives) to send confidential information or transfer money. Verify that requests are real and think before you send.
 

Red Plumstead

Expert Member
Joined
Jun 20, 2011
Messages
2,456
67% Of Organizations Reported Increases in Impersonation Fraud
Confidence is lower than ever when it comes to impersonation attacks.
 

charlieb

Senior Member
Joined
Jun 3, 2009
Messages
518
Mimecast's Awareness Training is cybersecurity training made fun, proven effective. With the right materials, your employees can overcome the evolving cyber threat landscape.
 
Status
Not open for further replies.
Top