Mimecast to enhance its Targeted Threat Protection services – Impersonation Protect, URL Protect, and Internal Email Protect – engineered to combat and remediate the evolving threat landscape. New features include supply chain impersonation protection, similar domain detection, the integration of new automated intelligence feeds, as well as the introduction of automated threat remediation capabilities. New research from Mimecast and Vanson Bourne revealed that organizations are not only facing a variety of different threats, but the volume and frequency of these attacks continue their upward trajectory. In fact, 53 percent expect a negative business impact from these email-borne threats in 2018.
Impersonation attacks commonly use social engineering, and are designed to trick users such as finance managers, executive assistants, and HR representatives into making wire transfers or providing information which can be monetized by cybercriminals. Normally, these attacks target people from within the same company; however, attackers have started to impersonate senders from so called trusted third parties that the target company does business with regularly. New Mimecast and Vanson Bourne research found that 40 percent of the 800 IT-decision makers who responded said they saw an increase of these types of attacks over the past 12 months. Impersonation Protect, from Mimecast, will offer supply chain impersonation protection to guard companies against similar or lookalike 3rd party email domains, helping to stop these attacks before they could cause any issue.
Mimecast has incorporated new capabilities within Impersonation Protect and URL Protect that are designed to use new algorithms to protect internal users from similar or lookalike domains. New real-time data feeds have also been added to Impersonation Protect engineered to better identify newly observed and registered domains to further enhance Mimecast’s ability to detect security threats. If the security posture of a delivered file changes, the service is designed to quickly alert and update administrators, automatically or manually remediate attachment-based malware and will log incident actions.
“Research found that 97 percent of respondents said maintaining email uptime is critical for business continuity, yet only 27 percent have adopted a cyber resilience strategy. In fact, for those that had suffered an email-based attack in the last year, the average recovery time was three days. That’s a long time, and, for many organizations, catastrophic,” said Ed Jennings, Chief Operating Officer, Mimecast.