Targeted Threat Protection - End User Asset Templates

Don't forget to read our Enablement Assets Styling Guide!

Targeted Threat Protection Introduction Email  

 

Focus

Introducing Targeted Threat Protection

 

Recommended Email Subject

Protecting your email

 

Salient Points

  • Email can be dangerous.
  • Threats can be present in documents.
  • Links can also be dangerous.
  • New technology is being deployed to help protect us.
TTP01.png Download

Targeted Threat Protection - URL Protect Email

 

Focus
Targeted Threat Protection - URL Protect

 

Recommended Email Subject
To click or not to click

 

Salient Points

  • We don't always think before we click.
  • Hackers can steal your login details through malicious links.
  • New technology being deployed to help protect us:
  • Per click security check.
  • Will block bad sites.
  • Visual changes

    Pro Tip

    • The more careful you are about what links you click, the less frequently you will see the security awareness information page.Replace this text with content of your own.
TTP_02_UR Protect - Full eShot Image.png Download

Targeted Threat Protection - Attachment Protect Email

 

Focus
Targeted Threat Protection - Attachment Protect.

 

Recommended Email Subject
Making your attachments safer

 

Salient Points

  • Attachments can be dangerous.
  • Safe file conversion: Emails from external senders will be converted to Safe PDF.
  • Pre-emptive: Emails from external senders will be security scanned

     

    Pro Tip

    • Safe files like PDFs can be opened and read as normal. If you need the original file, like Word or Excel for editing, you can request it by following the instructions attached to the email.
TTP03 - Attachment Protection.png Download

Targeted Threat Protection - Impersonation Protect Email

 

Focus

Targeted Threat Protection - Impersonation Protect

 

Recommended Email Subject

Protection from imposters.

 

Salient Points

  • Hackers may try to impersonated trusted people.
  • They may try and get you to share sensitive information or transfer funds.
  • Suspicious messages will be marked in the subject line.
  • Suspicious messages will also have a message added to the body.

     

    Pro Tip

  • You can help spot an imposter email by checking the email address for subtle changes, like 'cornpany' instead of 'company'.
TTP04 - Impersonation Protect.png Download

Targeted Threat Protection - Device Enrollment Email

 

Focus
Targeted Threat Protection - Device Enrollment.

 

Recommended Email Subject
Email security enrollment.

 

Salient Points

  • Outline of device enrollment.
TTP05 - TTP Device Enrollment.png Download

End-User Enablement - Notification Template

Mimecast recommends you inform your end users of this enhancement so they are aware of the new templates.

In order to assist with this, please download our end user enablement template, which can be sent to your end users announcing these changes.  

TTP - 06 - Notification Template.png Download

Browser Isolation Introduction Email

 

Focus
Introducing Browser Isolation

 

Recommended Email Subject
Additional protection when surfing the web

Additional protection when clicking links in emails

 

Salient Points

  • It is impossible to detect every malicious website.
  • Browser Isolation protects from even those that cannot be detected.
  • It will rarely be invoked.
  • Instructions to users should be tailored based on the policy configured.
Browser Isolation Image.png Download

Targeted Threat Protection - Decryption Portal

 

Focus

Targeted Threat Protection - Decryption Portal

 

Recommended Email Subject

Using the Decryption Portal

 

Salient Points

  • User receives an email, if an encrypted file has been removed from a message.
  • User enters a password for the file, where prompted.
  • The file is sent to Mimecast for scanning, and is delivered if deemed safe.
  • Instructions for users to find their local Mimecast for Outlook Security Champion, for tips and help

    Pro Tip
    • Safe files like PDFs can be opened and read as normal. If you need the original file, like Word or Excel for editing, you can request it by following the instructions attached to the email.
Decryption Portal Download
 

 

 

 

Was this article helpful?
3 out of 3 found this helpful

Comments

0 comments

Please sign in to leave a comment.