Additional Content

Please view our additional content below, from whitepapers
to eBooks to videos provided by our sponsors, partners and
subject matter experts.

Improving Cybersecurity for Remote Working – 
13 Recommendations

What are the security implications of this abrupt change? And which cybersecurity best practices are most critical to make this abrupt change both seamless and secure?

To make working from home more seamless and more secure this eBook provides 13 key recommendations, some of which can be implemented in short order, while others require an evolution of both IT and security strategies and new investments to make happen. These recommendations were drawn from Mimecast’s own experiences as a global cybersecurity company, insights from industry analysts, and perspectives drawn from members of the Cyber Resilience Think Tank.

Ransomware – The moment of truth for
data protection

A ransomware attack is a classic ticking-clock scenario. It has already struck companies of all sizes across industries around the world. Yours could be next. Are you ready?

Learn how to protect against ransomware and mitigate risk.

A complete ransomware strategy includes both reducing the risk of a successful attack and lessening the impact of an attack that does succeed. There are five things you need to do.

Data Protection Is Everyone’s Job,
So It’s No One’s Job

Implementing data protection is an ambiguous area of responsibility for too many organizations, and well-meaning truisms like “Security is everybody’s job” do not help the situation.

The result is that data security and governance too often fall between the cracks, not truly belonging under the CTO, the CIO, business units, or even the CISO or the compliance team. There is an answer to this dilemma: put the responsibility for data protection in the hands of the application owners who create or manage the applications that use the data, and empower them — and the development teams that work with them — accordingly.

The 3 Biggest Mistakes Companies are
Making with CCPA

Most of the mistakes that businesses and individuals are currently making regarding their compliance efforts fall into one of the following three categories:

- Failure to harmonize the DSAR process with litigation requirements

- Forgetting to include paper records in the DSAR process

- Over-retaining data, which heightens the potential impact of data breaches

In this guide, we’ll look into each of those obstacles and offer defensible practices 

Data Protection Compliance in the UK – Get your organisation prepared for 2021 GDPR changes and beyond

For companies located in the UK, the GDPR framework remains unchanged until the end of 2020, when new data protection legislation is poised to follow. Right now UK companies must continue to comply with the GDPR, and should plan to do so indefinitely if they collect data on European contacts such as customers.

Leveraging the Cloud to Defeat Data Disasters – How to Become a True Cloud Hero

With the right tools and approach, your IT team can realize many of the powerful advantages of the cloud and solve the operational complexity behind managing data across hybrid and multi-cloud IT environments with centralized management, automation, end-to-end security, and lower TCO. But where should you begin? Read on for critical guidance on navigating your cloud journey and determining the best solution for you and your unique environment.

How Consumer Privacy is Reshaping the Retail & Ecommerce Landscape

With Europe’s GDPR and California’s CCPA now in effect, privacy laws are catching up to consumers’ already high expectations around data privacy and consumer experience.

So how’s a retailer to continue personalization for customers while staying continuously compliant with existing and emerging privacy regulations?

We’re here to answer that question and more in this report, including information like:

- Learn what ‘zero party data’ is and why to use it

- Tips for giving customers control over their data

- How to make privacy your brand’s competitive differentiator