sb-au logo
Story image

Internet Solutions scoops two awards at Mimecast South Africa Partner Awards

08 Aug 2017

Pan-African telecommunications service provider Internet Solutions received two major awards at the 2017 Mimecast Partner Awards in Johannesburg last week, reflecting major growth in the company and its commitment to email security.

Internet Solutions walked away with Mimecast’s Growth Partner Award, which recognises partners with the highest sales increases. The company also received the Regional Partner Award for ‘outstanding sales performance in regions outside Gauteng’.

Mimecast’s director of channel and alliance, Jason Roos, says Internet Solutions deserves recognition.

“Internet Solutions has once again excelled at helping its customers tackle evolving email threats like ransomware and impersonation fraud in email. Our partnership of services, support and education is helping boost the cyber resilience of many critical business services,” he explains.

Internet Solutions has worked with Mimecast for the last two years, and has seen a dramatic uptake in demand for Mimecast cloud-based security management tools – especially after well-known cyber attacks such as WannaCry.

Greg Whitaker, Executive head: Partners at Internet Solutions, says the partnership is mutually-beneficial and each contributes to the other’s growth.

“This is an ideal business relationship based on shared interest, emphasis on service and vision for the ICT services required by enterprises now, and in the future,” he says.

Commenting on the awards, Whitaker says, “We believe that Mimecast is a market leader in email security and archiving, which is why we’re confident recommending their products to enterprise clients that face business-critical risk in the event of a security breach”.

“This is a wonderful acknowledgement of our relentless drive to educate our clients on the importance of implementing security measures to protect themselves from cyber-attacks,” he says.

Last month Internet Solutions launched its very own cybersecurity education service, called PhishNet.

“Phishing attacks are increasingly sophisticated and they target individuals, so proactive employee education is an important element of a holistic cybersecurity strategy,” commented chief solutions officer Sean Nourse at the time.

The service allows security teams to create genuine-looking phishing campaigns, demonstrate what a phishing attempt looks like and educate staff about how to deal with one.

Internet Solutions also designed its own PhishNet campaign and sent it to a list of IT-savvy contacts. 40% clicked the link in the email, despite missing obvious phishing signs such as spelling mistakes, an outdated logo and questionable subject line.

“This test clearly demonstrated that everyone is vulnerable to phishing, not only people who are technologically-inexperienced. We can be negligent and distracted using our personal devices, and we’re no different when using company laptops, mobile phones and tablets,” Nourse concludes.

Download image
Remote workforces drive new risk management strategies
remote and onsite workers have access to multiple collaboration tools, leading to fresh risk management strategies in the post COVID world.More
Story image
Why DX is not complete without a transformed security architecture
Secure Access Services Edge (SASE) is the process by which core WAN edge capabilities like SD-WAN, routing, and WAN optimisation at branch locations are integrated with cloud-based security services like secure web gateways, firewall-as-a-service, cloud access security brokers, and more.More
Download image
Strengthen the weakest link in your security chain
Globalisation. Remote working. High-turnover workforces. These factors and more add up to make increasingly dynamic workforces - and without proper management, your business could fall behind.More
Story image
Claroty and Deloitte partner up to deliver cybersecurity for industrial tech
“Industrial organisations are keen to transform themselves into digital utilities, but often security can be an obstacle rather than an enabler of digital transformation.”More
Story image
Check Point catches new form of Joker malware targeting Google Play Store
Check Point researchers have identified malware that is disguised as a legitimate looking Android application and is used to capture user’s information. Known as ‘Joker’, the billing fraud malware is specifically designed to evade Google Play Store protections.More
Story image
Okta, CrowdStrike, Netskope and Proofpoint create shared zero trust security strategy
Okta, CrowdStrike, Netskope and Proofpoint have joined forces to develop and launch an integrated, zero trust security strategy, stating that this is crucial for today’s digital and remote working environments.More