Email Protection

Here is the step by step process to configure the Mimecast¬†Impersonation Protection Bypass policy. If you are not sure what is¬†Impersonation Protection is here is the definition (Courtesy Mimecast.com) The increasing number of “whaling” attacks, usually targeting an organization’s senior management, means additional protection is required against¬†email threats that do not contain attachments or URLs.…

Read More How to configure Mimecast Impersonation Protection Bypass policy