
Mimecast Q3 2023 Threat Intelligence Report
Stay Ahead of Cyber Threats with Real-Time Insights and Protection
Organizations of all sizes are facing increasingly sophisticated cyber threats that target their communications, data, and people. With cybercriminals evolving their tactics, leveraging threat intelligence has never been more critical for businesses looking to stay protected in real time. Mimecast, a leader in email security, analyzes over a billion emails every day across 42,000+ customers, providing valuable insight into the latest cyber threats before they become widespread.
Explore our Q3 2023 Threat Intelligence Report to discover key trends, actionable insights, and recommendations to help secure your business.
Key Insights from Q3 2023 Threat Intelligence Report
- Ransomware Threats: 2/3 of firms have suffered a ransomware attack in the past year.
- Email-based Attacks: 97% of organizations have been targeted by phishing attacks via email.
- Impersonation Attacks: Attackers are using increasingly sophisticated impersonation techniques to gain initial access.
- Zero-Day Exploits: Cybercriminals focused on exploiting critical zero-day vulnerabilities in MOVE it, Microsoft software, and open-source image libraries.
Targeted Industries
- High-Risk Sectors: Human resource firms, IT services, and financial services (especially banking) saw the most threats per user.
- Persistent Threats: Manufacturing, transportation, retail, and wholesale industries faced consistent high levels of cyber threat activity.
What You Can Do to Protect Your Organization
- Review and Strengthen SLAs: Ensure your service-level agreements (SLAs) include cybersecurity requirements and enhance third-party monitoring.
- Zero-Day Protection: Stay updated on vulnerabilities in critical systems and apply patches as soon as possible.
- Email Security: Configure your email system to block auto-loading images to prevent attacks using malicious image files or QR codes.
- Staff Awareness: Educate employees about the rising sophistication of impersonation attacks and phishing schemes.

This article is posted at mimecast.com

Please fill out the form to access the content