All Research Sponsored By:Mimecast

Cyber Resilience for Dummies
EBOOK: Today’s organizations are more connected than ever – IoT and cloud technologies enable massive, interconnected ecosystems. In order to ensure the security of these fragile networks, security leaders are opting for cyber resilience practices. Download your copy of Cyber Resilience for Dummies to learn more about the cyber resilience imperative.
Posted: 25 May 2022 | Published: 03 Apr 2020

The State of Email Security 2022
RESOURCE: Download this report to see why 2021 was the worst year on record for cybersecurity, as illuminated by 1,400 global IT decision makers, and use the insights and takeaways it contains to help deliver continuous improvements to your cyber resilience strategy.
Posted: 02 Mar 2022 | Published: 02 Mar 2022


Destination: Cyber Resilience
EBOOK: Cyber resilience is defined by the adoption of security defenses that continually monitor for threats and anticipate attacks with tailor-made technology ready to be deployed at a moment’s notice. Download Mimecast’s Cyber Preparedness Report to learn the steps you can take to make your organization cyber resilient.
Posted: 28 Jul 2021 | Published: 28 Jul 2021


Defense in Depth: Closing the Gaps in Microsoft 365 Security
EBOOK: If your organization uses Microsoft 365 email, is it sufficiently prepared to handle advanced email threats and attacks? Dive into this white paper to explore the security challenges facing companies that rely on Microsoft 365 for email and learn recommendations for mitigating these risks.
Posted: 27 Jul 2021 | Published: 27 Jul 2021


TA551/Shathak Threat Research
EBOOK: TA551/Shathak is a sophisticated cybercrime actor targeting end users on a global scale. The group has distributed different malware families over time, but has consistently used password-protected ZIP archives containing macro-enabled Office documents. Download this e-book for a technical deep dive and an analysis of this threat.
Posted: 26 Jul 2021 | Published: 26 Jul 2021


To Pay or Not To Pay: ransomware has become boards’ biggest concern
EBOOK: If your business was hit by ransomware, would you pay to get your data back? Companies are going to face ransomware at some point in the future; make sure you’re prepared. Check out this e-book to get cybersecurity experts’ advice and learn how to prepare for ransomware attacks.
Posted: 26 Jul 2021 | Published: 26 Jul 2021


Critical-infrastructure operators welcome government engagement on cybersecurity
WHITE PAPER: Across Australia, utility and data providers are calling for clarity and assistance in shaping and meeting tougher regulations as cybercriminals continue to pummel national infrastructure. In this white paper, explore why the Australian government is getting involved in managing policy uncertainty to help these providers map a way forward.
Posted: 23 Jul 2021 | Published: 26 Apr 2021


COVID-19 security has been an ongoing challenge for Australian CISOs
WHITE PAPER: In the massive transition to remote work, security executives are dealing with targeted threats, adoption hurdles and overwhelmed users. Criminals have become craftier, and this has caught end users unaware. Download this white paper to learn why CISOs agree that direct user engagement can make the biggest impact on risk.
Posted: 23 Jul 2021 | Published: 23 Jul 2021


How To Reduce The Risk Of Phishing And Ransomware
ANALYST REPORT: Is your organisation prepared for phishing or ransomware to pounce at any moment? Access this Osterman Research report to look at these two threats up close to examine how they’ve affected security in the past year and a half and to study how the risks of both can be reduced.
Posted: 16 Jul 2021 | Published: 31 May 2021


The State Of Brand Protection 2021 A New Front Opens Up In The War For Brand Safety
RESEARCH CONTENT: Brand impersonation saw a massive spike in 2020, both in terms of attacks as well as domains suspected to be fraudulent. Read this research report to learn more about the state of brand impersonation in 2021, including how this threat has evolved and what organizations should be doing to protect their brand.
Posted: 13 Jul 2021 | Published: 13 Jul 2021

TOPICS:  Cybersecurity

The Total Economic Impact™ Of Mimecast
ANALYST REPORT: Organisations using Microsoft 365 are always on the lookout for ways to extend the advantages offered by this platform. In this case, we discuss security and risk. Download this Forrester report to see how decision makers felt about Mimecast’s cybersecurity and archiving solutions for blocking threats, streamlining e-discovery and more.
Posted: 24 May 2021 | Published: 29 Jan 2021


Cyber Resilience Executive Society
EBOOK: For CISOs and other security leaders, 2020 and the COVID-19 pandemic served as a harsh reminder of the need for agility and resilience in cybersecurity programs. Read this report for a review of the trends, challenges and cyberattack variants observed across 2020.
Posted: 26 Apr 2021 | Published: 26 Apr 2021

TOPICS:  Cybersecurity

Securing the Enterprise in the COVID world
EBOOK: Dive into this report for the key findings from Mimecast’s 2021 state of email security survey on the DMARC standard, cybersecurity awareness training, the post-COVID threat landscape, and more.
Posted: 23 Apr 2021 | Published: 23 Apr 2021

TOPICS:  Email Security

Prevent Fraud And Phishing Attacks With DMARC
PRODUCT OVERVIEW: The FBI estimates that between 2013 and 2018, cybercriminals stole more than $12 billion using business email compromise (BEC) attacks. To prevent BEC and phishing, organisations are turning to email authentication tools. Read this Forrester report, which analyzes the features and capabilities of the DMARC standard.
Posted: 21 Oct 2020 | Published: 31 Mar 2020

Are your remote workers sitting ducks?
WHITE PAPER: COVID-19 has resulted in working from home becoming common practice– and it could stay that way for the foreseeable future. But are remote workers sitting ducks for cyberattacks? A new Mimecast-iTnews survey of Australian organisations suggests that many are just that. Download this white paper to learn more.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Danger within: email and security awareness training strategies for effective account takeover protection
WHITE PAPER: It’s a common misconception that email-borne attacks come only from outside the organisations. Can your employees discern an impersonation email or email attack using a legitimate internal account? How good is your security posture? Take a look at this whitepaper how you can create more effective email security as well as a more vigilant workforce.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Don’t Just Educate: Create Cybersafe Behaviour
WHITE PAPER: Building a cyber-resilient culture involves more than a cut-and-paste security training program that ticks the compliance checklist. In this Forrester study, discover how applying proven behavioral science to SA&T programs can yield organization-wide cultural change and improve security at the people-level.
Posted: 23 Jul 2020 | Published: 30 Apr 2020

Employees Behaving Badly? Why Awareness Training Matters
EBOOK: Employee behavior and the culture you influence greatly impact the effectiveness of your overall cyber resilience strategy. Read on for 6 ways you can make security awareness apart of your organization's culture.
Posted: 05 Nov 2018 | Published: 05 Nov 2018

E-Discovery:How CloudBasedStrategiesAre Changingthe World of Law
EGUIDE: Download this e-guide to learn how e-discovery is conquering containerized data with comprehensive cloud-based strategies, and explore how e-discovery's existence has changed the world of law through collaboration.
Posted: 18 Dec 2018 | Published: 10 Dec 2018

Store Microsoft Teams Chat Data in the Cloud
EGUIDE: Microsoft Teams e-discovery enabled for hybrid cloud systems, and digital transformation hinges on information governance policies. Read this e-guide to learn more.
Posted: 17 Dec 2018 | Published: 30 Nov 2018

Microsoft Office 365: Strengthening Security, Compliance, and Control
WHITE PAPER: This white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
Posted: 12 Jun 2014 | Published: 20 Feb 2014

Definitive Guide to Exchange Server 2010 Migration Chapter 5: Exchange 2010: Keeping up Appearances
EGUIDE: Keeping Exchange Server 2010 running at full torque requires diligent management and administration. This e-guide examines some of the most common performance issues and explains how to mitigate them. Exchange MVP Andy Grogan also details best practices you should follow to prevent any performance setbacks.
Posted: 01 Feb 2012 | Published: 31 Jan 2012

Mimecast Unifies Email Security, Archiving, and Continuity Services in the Cloud
WHITE PAPER: The market for cloud-based IT infrastructure services delivered in a software-as-a-service model continues to grow. IDC research indicates this model of IT delivery is disrupting traditional licensed software markets and changing how archiving, backup, recovery, and security technologies are procured. Read this whitepaper to learn more.
Posted: 17 Aug 2010 | Published: 17 Aug 2010

E-Discovery, Case Management & Litigation Hold: Comprehensive Archive and Search Capability to Meet Legal and Regulatory Requirements
DATA SHEET: Mimecast Unified Email Management™ is a cost effective Software-as-a-Service solution that offers integrated E-Discovery, Litigation Hold and Case Managment functionality, giving you the tools you need to rapidly execute data preservation policies and email discovery requests and guard against the risk of failing to produce required information.
Posted: 13 Aug 2010 | Published: 13 Aug 2010