<img alt="" src="https://secure.refl3alea.com/149779.png" style="display:none;">
LEGAL IT BLOG

Recommended Blogs

  • Mobile and phone security for legal - what are the greatest threats?

    Solicitors and lawyers often spend a great deal of their time out of the office; in court, at clients’ premises, and so ...

    Read More
  • 7 security tips for legal that might save your business from a data breach

    Data breaches are among the most significant cyber threats to law firms, alongside common scams such as phishing, ...

    Read More
  • Have a  secure Christmas (and a safe New Year!) [INFOGRAPHIC]

    Cyber security is a vital part of our everyday lives nowadays. When you work in a law firm or chambers, you use every ...

    Read More
  • A guide to Capex vs Opex for IT & Cloud

    IT spending is big business, and the way companies think about it may deserve new consideration. 2019 is forecast to ...

    Read More
  • Secure Shopping Guide - What you need to look out for to stay safe online

    The busy festive season is almost upon us, and those less comfortable with leaving their Christmas shopping to the very ...

    Read More
Email hosted protection services tested & tried [INFOGRAPHIC]
BY SproutIT
Email hosted protection services are capable of filtering out large numbers of threats before they reach the user. 

 

Find out more about Mimecast's Cyber Resilience for Email solution here. 

 

 

 

The team at SE Labs sent10 fake FBI blackmail emails, each created using a different level of sophistication. As well as using more fake emails, they used much larger number of targeted attacks.

 

There was one group of public 'commodity' attacks, such as anyone on the internet might receive at random, but also three categories of crafted, targeted attacks including phishing, social engineering (e.g. fraud) and targeted malware (e.g. malicious PDFs). Each individual attack was recreated 10 times in subtly different but important ways.


Attackers have a range of capabilities, from poor to extremely advanced. SE Labs' approach included basic, medium, advanced and very advanced threats to see what would be detected, stopped or allowed through.

 

Find out more about Mimecast's Cyber Resilience for Email solution here. 

 

 

 

See the description of the test that is recognised by the industry here:  http://blog.selabs.uk/2018/05/essp.html 

 

 

 

mimecast Cyber Security secure email cyber resilience cyber awareness