Internal Email Threats

The Challenge

The focus of most cybercriminals is to get in and around your network, with the goal of stealing your sensitive information or locking your systems and ransoming access back to you. Email has proven to be a very effective system for them to accomplish this. But what about internal email threats, those dangerous emails generated from within your organization? In many cases, mostly without their knowledge or understanding, your employees play an integral role in these attacks. Think a threat cannot spread via email once it is inside your organization? Think again. And what about your careless or malicious employees? Do they ever email information or documents where they shouldn’t?

The Solution

To combat internal email threats, Mimecast provides Internal Email Protect, a threat monitoring and remediation service for internally generated email. Internal Email Protect enables organizations to monitor, detect and remediate threats that originate from within your email system, whether the emails are destined to other internal users or to external recipients. Internal Email Protect scans attachments and URLs for malware and malicious links, as well as content inspection enabled by Data Leak Prevention. Internal Email  Protect can automatically delete infected or sensitive emails and attachments from employees’ inboxes increasing efficacy of protection.

Internal Email Protect:

  • Detects the lateral movement of threats via email from one internal user to another.
  • Identifies and blocks threats or sensitive data attempting to leave an organization.
  • Automates the removal of internal emails which are determined to contain threats or sensitive data.
  • Is an integrated part of the Mimecast administration console for reporting, configuration and management.
Analyst Report

Analyst Report: Security & Risk Pros Must Empower Employees To Prevent Phishing Attacks

Forrester Research examines where email security awareness regarding phishing threats is going wrong and how …


Case Study

HIPAA Compliance Requires Highest Email Security Standards

Comprehensive email service replaces three point products, vastly improving performance and reducing administrative burden


Blog Post

Do You Know the Five Phases of a Whaling Assault?

It’s no secret that social engineering attacks, like phishing, spear-phishing and domain spoofing have grown from being a nuisance to a colossal problem. But, perhaps the most colossal problem of the moment is Business Email Compromise, otherwise cal…