The State of Email Security Report
Actionable steps to improve your organization’s email security and cyber resilience.
Educational institutions are incredibly rich targets for cybercriminals – large volumes of data, valuable intellectual property, numerous access points, and a continuously changing student body that’s difficult to train and secure.
All it takes is one successful cyber attack to expose your community, damage your institution’s brand, and cause significant financial loss. The ability to keep bad guys out – and minimize damage if they do get in – has never been more important.Industry Brief
Educational institutions - whether they’re K-12, college, or universities - are obvious targets for ransomware, phishing, and impersonation attacks. Keeping student and staff data secure is your top priority. However, tight budgets, limited resources, and a lot of complexity can make doing so a challenge.
Cybersecurity doesn’t need to be so hard. Mimecast offers easy to implement, easy to manage, effective and affordable security solutions for hundreds of institutions just like yours.
Role: Faculty at a private university.
Mistake: Clicked on an emailed link that supposedly redirects him to an application for funding for his research area.
Result: The malicious link unleashes a ransomware attack that infiltrates the university’s network and brings down their technology systems.
1. Pay the Ransom - No Guarantees
2. Rebuild Servers from Data Backups
US ransomware attacks, 2019 costs
Average cost of a ransomware incident
Average time to recover from an attack
Role: Professor at Wiggham Community College.
Mistake: Receives an ‘from IT’ to update her log-in credentials; clicks on the link and enters her information on a website that looks legit.
Result: The hacker uses stolen credentials to access the community college’s network.
Hackers can now steal precious faculty and student PII
Average cost of a data breach for Education (U.S.)
Average cost of a data breach per employee
Average cost per record breached for Education
Role: Professor at Hopper University.
Result: Nation-state hackers steal classified research and provide it to their government.
Iranian Hackers stole credentials of professors, research data and IP
Amount of documents and data stolen
# of American universities compromised
# of compromised email accounts
Role: University student.
Result: Jack uses stolen credentials to access the network, log into the grading system to update his grades.
Share of total mail volume generated by employees
Of malware is deployed through email + web
Suffer negative impacts from an email-borne attack*
“Mimecast has provided an increased feeling of 'being in control', more end-user awareness and less effort and cost spent on fixing damage caused by malicious email content.”
“Targeted Threat Protection has been invaluable for preventing malware attacks against our network as our users sometimes carelessly click links delivered via email.”
Mimecast understands the unique challenges our educational institution customers face and is dedicated to serving their cyber protection needs. Let us protect your environment so you can focus on your educational priorities.
The average cost of a data breach for Education
Data breaches involve human error
Average cost of a breached record for Education
Prevents Phishing Attacks and Malware from getting to users’ inboxes.
Reduces Risk of malicious attachments and URLs.
Applies Best-practice Inspections to all email, including inbound, internal, and outbound.Learn more
Easy And Quick video-based modules delivered monthly that take less than 5 minutes to complete.
Engaging laugh-out-loud funny security awareness training that your employees enjoy rather than dread.
Effective micro-learning approach improves cyber awareness, sharpens cyber security reflexes, and reduces the risk of an innocent but devastating mistake.Learn more
Protects Online Activity without impacting productivity.
Reduces “Shadow IT” by limiting the use of risky sites and unsanctioned applications.
Keeps Users Safe On Any Device whether they are using a PC, tablet or smart phone.Learn more
Prevent Loss of Critical Data as a last line of defense against ransomware.
Supports Rapid Recovery of data and service restoration after an attack.
Provides Point in Time Data Recovery of emails, files, and contacts.Learn more