FAQ – Haven Deployment

For on-premise network security appliance installations, we will do our best to limit the amount of time the network is down. Depending on the type of installation, downtime can be anywhere between 2 minutes to 2 hours. We can also schedule installation timing to happen when this will cause the least disruption to your organization.

Corvid Cyberdefense engineers will have access to your network in order to manage and maintain it. We are happy to provide you with more information as requested.

Depending on location, our network security engineer can either be on site or connect through phone or video conference to walk you through each step and ensure the installation goes smoothly with as little downtime as possible.

Your time will be required at touch points throughout the onboarding process, and typically be about 5 hours over the 30-day deployment timeframe.

Yes, we will ask for a list of those who require access to the ticketing portal during the onboarding process. It is best to limit access to as few as possible in order to limit the individuals who have access to make changes to your organization’s security configurations.

If your Haven service agreement includes Cylance endpoint protection, it can replace your current AV. However, please do not uninstall your current AV until Cylance is installed, including a series of follow up reviews, which take approximately 7-14 days. This will allow various policy rules and exclusions to be created based on your goals and the specifics of your IT environment.

Monthly Training Videos
Employees will receive an email with a link to access training videos that were created to be short, entertaining, and educational. A few start-up episodes were selected that teach about core threats like phishing, ransomware, and password security. Episodes are 3-4 minutes in length and they teach a lesson on one specific security threat using a real-life security breach as the story line. Every month, users will receive an email to let them know that a new video episode is available.

Monthly Simulated Phishing Campaigns
Because so many data breaches originate from a phishing email, we’ll be sending occasional simulated spoofed (fake) emails designed to test employee awareness of a true phishing email. These spoofed emails will not reveal any sensitive information, but will provide an idea of where improves in employee training are needed. When a user clicks within a simulated phishing email, that person will be automatically prompted to watch a video on the subject of identifying a phishing email.As our main POC (point-of-contact) you will receive by-user participation and performance reports.

The report of actual and potential threats found is sent to the client that includes our recommendations. Actual threats will be quarantined. We ask the client to confirm the category for items that are a potential risk for the organization. If they are necessary to the organization, they can be waived/safelisted, if not, it is often recommended that they are quarantined.

    The login credentials you use for your personal Mimecast portal may be different than the ones used when you receive a secure email message from someone outside of your organization. Here are a few steps you can try to access the message if you’re having difficulty.

    1. Log out of the Mimecast portal
    2. Click the email link again
    3. Enter the email address that received the secure email
    4. Authenticate using cloud password (if prompted)
    5. If the password is unsuccessful, choose “forgot password” to reset it
    6. Log in using your new password
    7. If still unable to access your secure message, please contact your admin who can submit a support ticket to get help.
    The login credentials you use for your personal Mimecast portal may be different than the ones used when you receive a secure email message from someone outside of your organization. Here are a few steps you can try to access the message if you’re having difficulty.

    1. Log out of the Mimecast portal
    2. Click the email link again
    3. Enter the email address that received the secure email
    4. Authenticate using cloud password (if prompted)
    5. If the password is unsuccessful, choose “forgot password” to reset it
    6. Log in using your new password
    7. If still unable to access your secure message, please contact your admin who can submit a support ticket to get help.
    The login credentials you use for your personal Mimecast portal may be different than the ones used when you receive a secure email message from someone outside of your organization. Here are a few steps you can try to access the message if you’re having difficulty.

    1. Log out of the Mimecast portal
    2. Click the email link again
    3. Enter the email address that received the secure email
    4. Authenticate using cloud password (if prompted)
    5. If the password is unsuccessful, choose “forgot password” to reset it
    6. Log in using your new password
    7. If still unable to access your secure message, please contact your admin who can submit a support ticket to get help.
    The login credentials you use for your personal Mimecast portal may be different than the ones used when you receive a secure email message from someone outside of your organization. Here are a few steps you can try to access the message if you’re having difficulty.

    1. Log out of the Mimecast portal
    2. Click the email link again
    3. Enter the email address that received the secure email
    4. Authenticate using cloud password (if prompted)
    5. If the password is unsuccessful, choose “forgot password” to reset it
    6. Log in using your new password
    7. If still unable to access your secure message, please contact your admin who can submit a support ticket to get help.
    The login credentials you use for your personal Mimecast portal may be different than the ones used when you receive a secure email message from someone outside of your organization. Here are a few steps you can try to access the message if you’re having difficulty.

    1. Log out of the Mimecast portal
    2. Click the email link again
    3. Enter the email address that received the secure email
    4. Authenticate using cloud password (if prompted)
    5. If the password is unsuccessful, choose “forgot password” to reset it
    6. Log in using your new password
    7. If still unable to access your secure message, please contact your admin who can submit a support ticket to get help.
    The login credentials you use for your personal Mimecast portal may be different than the ones used when you receive a secure email message from someone outside of your organization. Here are a few steps you can try to access the message if you’re having difficulty.

    1. Log out of the Mimecast portal
    2. Click the email link again
    3. Enter the email address that received the secure email
    4. Authenticate using cloud password (if prompted)
    5. If the password is unsuccessful, choose “forgot password” to reset it
    6. Log in using your new password
    7. If still unable to access your secure message, please contact your admin who can submit a support ticket to get help.