Skip navigation
All Places > The Mimecaster Central Blog > Blog > 2017 > August
2017

Mother Nature has a tendency to render anything and anyone powerless in its wrath -- even our businesses aren't immune. And there's no bigger manifestation of this than the hurricane, where heavy, swirling winds and flooding can wreak havoc on entire communities in its path.

 

As of this morning, residents in Texas in the United States are bracing for this potential worst, as Hurricane Harvey, a strong Category 2 storm with maximum sustained winds of 105 MPH, inches closer to the coast. When it makes landfall late this evening and into the early hours of Saturday morning, it is expected to be Category 3. 

 

As a result, many companies in the storm's path are already bracing their employees and organizations for the worst with business continuity plans being rolled into place. 

 

Mimecast too offers continuity guidelines for administrators to plan and provide end users with continuity of email services -- and peace of mind -- during an infrastructure outage or disaster recovery event such as Hurricane Harvey. With our Continuity Best Practice and Mimecast Continuity Planning Manual documents, you'll be able to plan for any outage before it even takes place, reducing the amount of administration required when the hurricane is in full swing. 

 

So remember to get you and your loved ones to safety first and foremost, but at the same time, plan ahead for your business and your end users. 

 

Weather the storm now with our business continuity planning materials (and be sure to print out physical copies to keep handy):

Continuity Best Practice 

Mimecast Continuity Planning Manual 

Matthew Gardiner is a Senior Product Marketing Manager at Mimecast and is currently focused on email security, phishing, malware, and cloud security.

 

How do you get ahead of cyber attackers? For the most part, security defenders, such as Mimecast, spend a lot of time reacting to the latest tools and techniques used by cybercriminals. In fencing terms, they lunge, and we parry on behalf of our customers. And then sometime later they lunge again...and we parry again. 

 

With a network of tens of thousands of customers and billions of emails a month, we see a lot of stuff. One time it is a new flavor of ransomware sent as an attachment, and the next it is a malicious URL meant to harvest your users' credentials. And 'round and 'round it goes..and goes.

 

However, anyone who follows hockey knows that one of the best techniques to win is to skate to where the puck is going and not to where it currently is. In the context of security, that means continuously conducting, periodically reporting on, and quickly updating defenses based on threat research that is ahead of the attackers. Now we lunge and they parry (perhaps). Today, we have done just that.

 

Read about the newly disclosed ROPEMAKER email exploit that Mimecast has just brought public via this blog and the associated deep-dive paper

 

You can also learn more about the security control we have added to TTP - URL Protect to help defend against an attack that might try and leverage this technique.

 

I encourage your questions and comments!