Hornetsecurity Blog
Get regular updates from the world of cloud security
In our blog, the Hornetsecurity team – especially the experts from the Security Lab – regularly report on IT security topics as well as on current innovations and events at Hornetsecurity.
Monthly Threat Report April 2024: Impersonation Attacks, and the US CSRB’s Report on Storm-0558
QUARTER OF UK BUSINESSES AREN’T USING AI TO BOLSTER CYBERSECURITY
New survey from cybersecurity provider Hornetsecurity reveals that half (45%) of UK businesses have been victims of a cyberattack 3 in 5 businesses are most concerned about AI-assisted phishing 1 in 10 describe themselves as ‘not ready at all’ for a zero-day...
Cyber Kill Chain vs. MITRE ATT&CK: An Insightful Comparison
There are two challenges we in cybersecurity face when it comes to communicating what we do the rest of the business (and the rest of the world). For many people, computers, networks, and Information Technology in general are opaque, and most businesspeople know how...
What is Data Backup and Recovery? Understanding the Fundamentals
What is Backup?These days, every business that cares for its data and information must have a backup. A copy of a file kept somewhere other than its original place is called a backup file. Making copies of data so that the original can be restored in the event of a...
Enhancing Security with Microsoft 365 Ransomware Protection
Boosting Your Defenses: The Multilayered Ransomware Protection Method of Microsoft 365The two main reasons why businesses have embraced Microsoft 365 so rapidly are hybrid working and reduced capital costs. However, due to its sizable user base and quick subscriber...
The Importance of Backup in Microsoft 365
In this article we look at the need for data protection in Microsoft 365 – what Microsoft is responsible for – and what your organization is responsible for.Native Data Resiliency As any capable cloud service, Microsoft takes the availability of customers data in M365...
What Is Endpoint Backup, and How Does It Work?
Definition of Endpoint BackupEndpoint backup software ensures data security and ease of recovery by automatically backing up data from devices such as desktops, laptops, cellphones, and tablets. Its functions include file versioning, encryption, remote access, and...
Advanced Threat Protection in Microsoft 365
There are many security tools built into the O365 platform, but when you move to M365 E3 or E5, you unlock a whole new set of advanced features for securing your business. In this article, we’re going to look at these tools, except for Endpoint Manager, which we have...