Mimecast 100 Days of Threat Intelligence

Our new ways of working create new risks

This report reviews Mimecast’s detection data at various layers during the first 100-day period of coronavirus (COVID-19), commencing from the beginning of January 2020.  A week by week analysis of the evolving threat landscape and attack vectors.  The report will breaks down the period into an easily digestible weekly review of detections.

The report reviews the findings of the various weekly detection outputs and gives a broad summary of the activity seen over the period of analysis. Where identified, recommendations will be detailed to aid the mitigation of the threats identified and these are summarized in a later section of this report with the addition of other recommendations considered of importance given the current situation and the ongoing pandemic.

This report includes:

  • Key Events of the Pandemic
  • The Threat Landscape & Email Attack Vectors – Weekly Activity
  • Spam Detections - Impersonation Detections - Malware Detections - Blocked URL Click Detections
  • Malicious Emails - Examples
  • Web Campaigns
  • Common Vulnerabilities
  • Which Technologies Are of Most Concern?
  • Geopolitical Outlook
  • Recommendations
  • Advisories issued

** GDPR & Privacy ** We wholeheartedly believe in your and our rights to privacy and in the GDPR. The bottom of the page explains how we use your data.

enter your details below to get your copy:

NCSC Certified Training B&W 300px

We are industry experienced practitioners when it comes to cyber security training & cyber security consultancy services

Cyber Security Training

Training

We offer a host of courses including our GCHQ Certified Cyber Security & Privacy Essentials (CSPE) course and our Cyber Incident and Response Planning (CIPR) workshop

Virtual CISO DPO

Virtual CISO and DPO

Our virtual CISOs and DPOs are industry thought leaders and have several years of experience in cyber security and data privacy working with small, medium and large organisations

Cyber Security Events

Events

We work with event organisers from around the world to create engaging cyber security events. Our pool of keynote speakers are carefully chosen and are recognised global industry leaders.

ISO27001

Cyber Essentials & ISO27001

Acquiring an accreditation is often a daunting and complicated task. We work with you to ensure that your business is ready for any and all compliance requirements

GDPR GAP Assessment

Third Party Assessments

With the ever increasing dependency on outsourcing it isimperative for businesses to manage risks posed by third parties. Leaving the backdoor unlocked is simply not an option.

Cyber Security GAP Assessment

Security Gap Assessments

We offer GAP assessments against most frameworks and accreditation including Information Security, PCI-DSS, Data Privacy and Cyber Incident Response

How we use your data:

  • Contact you about our services including, but not limited to, training, trusted advisory and consultancy.
  • Keep you posted on free resources and documents.
  • Update you on upcoming webinars and surveys.
  • Update you when we host our ground-breaking Wisdom of Crowds events.
  • Ask you, every now and then, if you want to take part in crowdsourced initiatives.
  • Our partners (we carefully select our partners) may contact you to arrange or demo or share more information with you about their products or services when you watch one of our sponsored webinars. Remember, you can always tell us or our partners, "No, not interested".

 Download the Remote Working Cybersecurity Checklist

A free guide on how to work securely while away from office.