Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Mimecast

Below you will find reports with the source of “Mimecast”

image from The State of Email & Collaboration Security 2024

The State of Email & Collaboration Security 2024

The State of Email & Collaboration Security 2024 report is based on an in-depth global survey of 1,100 information technology and cybersecurity professionals. Mimecast commissioned UK-based research firm Vanson Bourne to conduct the survey, which took place during October and November 2023.Survey participants worked at organizations ranging from 250 to 500 employees to more than 10,000 employees.

(more available)
Added: April 12, 2024
image from The State of Email Security 2023

The State of Email Security 2023

Mimecast’s seventh annual State of Email Security report comes as organizations all over the world grow more skittish over rising economic volatility and intensifying geopolitical tensions. Now is definitely not the time to become lax on cybersecurity.

(more available)
Added: July 5, 2023
image from The State of Email Security 2022

The State of Email Security 2022

Mimecast’s State of Email Security 2022 (SOES) study sheds light on the gains in cyber resilience that many companies are making, even as it reveals shortfalls and places where there is considerable room for improvement.

(more available)
Added: September 13, 2022
image from Company-Issued Computers: What Are Employees Really Doing With Them?

Company-Issued Computers: What Are Employees Really Doing With Them?

This report comes from a survey of more than 1,000 businesspeople around the world that have a company-issued computing device. It looks into what people are using their work computers for, and how that can leave them vulnerable to cyber threats.

(more available)
Added: October 29, 2020
image from 100 Days of Coronavirus

100 Days of Coronavirus

This report focuses on the changes in security threats and the effect that COVID-19 has on the overall landscape.

Added: May 8, 2020
image from Whaling Anatomy Of An Attack: Protecting Your Organization From CEO Email Scams

Whaling Anatomy Of An Attack: Protecting Your Organization From CEO Email Scams

This book takes a look at “whaling” scams. Or largescale phishing attacks. It offers some analysis and insight into how these scams can be avoided.

(more available)
Added: October 24, 2018
image from The ROPEMAKER Email Exploit

The ROPEMAKER Email Exploit

This threat advisory offers insight into the ROPEMAKER Email Exploit.

Added: October 23, 2018
image from The Nervous, The Vigilant, And The Battle-Scarred: IT Security Personas Revealed

The Nervous, The Vigilant, And The Battle-Scarred: IT Security Personas Revealed

This book offers some insight into email cybersecurity issues. It posits that email doesn’t have to be scary.

Added: October 22, 2018
image from Email Archiving: It's Time For An Update

Email Archiving: It's Time For An Update

This report offers a guide to understanding the importance of email archiving.

Added: October 20, 2018
image from Strengthen Your Defenses Against Cybercrime

Strengthen Your Defenses Against Cybercrime

This ebook provides insight based on a survey that sought to understand the state of email cybersecurity.

Added: October 19, 2018
image from Strategies For Archiving In Hybrid Environments

Strategies For Archiving In Hybrid Environments

This white paper discusses the key issues facing corporate decision makers surrounding archiving requirements and the location of their data. The paper also discusses some of the results of an in-depth survey of content archiving decision makers and influencers in mid-sized and large organizations that was conducted during August 2017.

(more available)
Added: October 18, 2018
image from Office 365 Exchange Online: Research Report December 2016

Office 365 Exchange Online: Research Report December 2016

This ebook provides a report on the results of a survey that was conducted to discover information on 4 issues related to Office 365.

(more available)
Added: October 17, 2018
image from It's Time To Breakup With Your Old-School Archive

It's Time To Breakup With Your Old-School Archive

This ebook takes a look at cloud archiving, and why it is a better choice than older more traditional methods.

(more available)
Added: October 16, 2018
image from Impersonation Protect: A Whale Of A Tale: How To Stop The Rising Tide Of Impersonation Attacks

Impersonation Protect: A Whale Of A Tale: How To Stop The Rising Tide Of Impersonation Attacks

This report takes a look at whaling attacks and considers what can be done to stop these kinds of attacks.

(more available)
Added: October 15, 2018
image from How To Keep Cyberattacks In Check

How To Keep Cyberattacks In Check

This small report offers some simple guidelines that can help your organization keep cyberattacks at bay.

Added: October 14, 2018
image from Conversational Office 365 Risk Mitigation: A Conversational Geek Book

Conversational Office 365 Risk Mitigation: A Conversational Geek Book

This ebook provides a casual approach to cloud mitigation. It offers information in a conversational method, allowing for the reader to be able to more effectively communicate with those in his organization who need the information.

(more available)
Added: October 13, 2018
image from Australian Companies Leaving Themselves Exposed On Security And Compliance:Survey

Australian Companies Leaving Themselves Exposed On Security And Compliance:Survey

This paper presents the results of a survey conducted in Australia to understand how prepared companies were for cyber breach situations, and compliance.

(more available)
Added: October 12, 2018
© Cyentia Institute 2025
Library updated: July 1, 2025 00:08 UTC (build b1d7be4)