Remote/Hybrid Workforce
email and collaboration tools used to compromise organisations, so it is imperative that businesses start putting cybersecurity first and start to secure their systems immediately.
Can you tell us more about the launch of Mimecast’s Email Security, Cloud Integrated solution and how it will help enable organisations to Work Protected? According to research by Mimecast, 80% of respondents say the volume of email threats in their organisation has increased in the last 12 months. Terefore, it is vital for businesses to have the option to defend themselves without complexity and confusion. However, when it comes to email security, it’s important to remember that every business is different. Te IT teams involved need to consider the needs or the organisations, the complexity of the environment they are working in and what the overall solution they want to accomplish.
“As cyber-attacks become more rampant, more than eight out of ten companies are bracing for the next email borne threat.”
With the evolving nature of today’s
threat landscape, there isn’t a ‘one-size- fits-all’ email security solution designed to address the unique needs of every enterprise. Scalability is key. Mimecast’s new email security solution, Cloud Integrated, is ideal for teams that need email security fast, with the ability to scale. Cloud Integrated can be typically activated in just under 5 minutes. Te solution enables us to scale our services so more organisations can work Protected with secure business communications, people, and data.
What are the greatest threats business are currently facing in regards to email security? Te biggest threats businesses are currently facing in regard to email security are the
www.pcr-online.biz December/January 2023 | 31
increasing vectors through which we access email or messages. Tis could be through a variety of mediums, including but not limited to the following: work inboxes; personal email inboxes; social media messages; text messages; or even via professional networking sites. Malicious actors will look to compromise these vectors either
by sending phishing emails to trick users into clicking on links to steal information or credentials, sending malicious attachments, or getting the victim to disclose confidential information, whether it be personal or corporate. So it’s very important that security is watertight and the correct cyber defences around these platforms are in place. Corporations can do that by applying a layer of security on top of their existing email management system and rolling out cybersecurity awareness training to all their staff.
Why is the volume of email threats increasing? What are the main causes of this? As the digital landscape continues to evolve, the threat landscape is adapting too. New threats to cybersecurity are emerging at breakneck speed. In fact, Mimecast’s State of Email Security research reveals that 96% of companies have been the target of an email-related phishing attempt this year. Malicious actors are looking to exploit companies whilst they
are distracted with other challenges. Take the pandemic as a prior example and now it is the cost-of-living crisis. Cyber attackers are looking to exploit consumers through confusion and fear by monopolising on current events.
What are the biggest weaknesses that businesses are regularly overlooking in regards to email security? Te greatest weakness would be not looking at it from a holistic perspective. When considering organisations that do this well, they approach security holistically – paying attention to securing their people, data and communications in a layered approach. Tese organisations oſten use models such as MiTRE Att&CK &
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52