Intelligent CISO Issue 03 | Page 57

detect security threats. Additionally, using Mimecast’s global threat intelligence network, Internal Email Protect can help customers more quickly remediate security threats that originate from any email account inside or outside the organisation. Internal Email Protect will constantly monitor and re-check the status of all file attachment ‘fingerprints’ globally. If the security posture of a delivered file changes, the service is designed to quickly alert and update administrators, automatically or manually remediate attachment-based malware and will log incident actions. Ed Jennings, Chief Operating Officer, Mimecast senders from so-called trusted third parties that the target company does business with regularly. New Mimecast and Vanson Bourne research found that 40% of the 800 IT-decision makers who responded said they saw an increase in these types of attacks over the past 12 months. Mimecast’s Impersonation Protect will offer supply chain impersonation protection to guard companies against similar or lookalike third party email domains, helping to stop these attacks before they could cause any issue. This tactic helps to mask the true destination of a link. Mimecast has incorporated new capabilities within www.intelligentciso.com | Issue 03 Impersonation Protect and URL Protect that are designed to use new algorithms to protect internal users from similar or lookalike domains. New real-time data feeds have also been added to Impersonation Protect, engineered to better identify newly observed and registered domains to further enhance Mimecast’s ability to “In fact, for those that had suffered an email-based attack in the last year, the average recovery time was three days. That’s a long time and, for many organisations, catastrophic. “It is critical organisations have comprehensive security controls in place before, continuity during and automated recovery after an attack to help them build cyber-resilience for email.” Available in June 2018, these new features will be delivered through Mime|OS, a 100% single cloud platform that underpins the Mimecast services and via a single administration console with a simple to use user interface. Built using micro-services, Mime|OS allows customers to take advantage of the cost and performance benefits of industry-standard hardware and resource-sharing, specifically for the secure management of email and data. u 57 Lookalike domains are also increasingly becoming a problem, as recently publicised. Attackers are now using non- western character sets to display letters that look identical to the naked eye, such as the Cyrillic ‘ а ’ in comparison to the Western ‘a’. Attackers have started to impersonate senders from so-called trusted third parties that the target company does business with regularly. “Cybercriminals are constantly looking for new ways to be stealthy and trick users, which was the key driver for us to enhance Targeted Threat Protection with these new capabilities. Research found that 97% of respondents said maintaining email uptime is critical for business continuity, yet only 27% have adopted a cyber-resilience strategy,” said Ed Jennings, Chief Operating Officer, Mimecast.