Hornetsecurity Blog

Get regular updates from the world of cloud security

In our blog, the Hornetsecurity team – especially the experts from the Security Lab – regularly report on IT security topics as well as on current innovations and events at Hornetsecurity.

Monthly Threat Report April 2024: Impersonation Attacks, and the US CSRB’s Report on Storm-0558

Monthly Threat Report April 2024: Impersonation Attacks, and the US CSRB’s Report on Storm-0558

This month, key highlights include a critical report on Microsoft’s response to the Storm-0558 attack, urging enhanced public cloud security. The US Federal Trade Commission reported $1.1 billion in losses from impersonation attacks in 2023. Furthermore, there was a narrow escape from a potentially catastrophic supply chain attack on a widely-used Linux library.
The Importance of Backup in Microsoft 365

The Importance of Backup in Microsoft 365

In this article we look at the need for data protection in Microsoft 365 – what Microsoft is responsible for – and what your organization is responsible for.Native Data Resiliency As any capable cloud service, Microsoft takes the availability of customers data in M365...

What Is Endpoint Backup, and How Does It Work?

What Is Endpoint Backup, and How Does It Work?

Definition of Endpoint BackupEndpoint backup software ensures data security and ease of recovery by automatically backing up data from devices such as desktops, laptops, cellphones, and tablets. Its functions include file versioning, encryption, remote access, and...

Advanced Threat Protection in Microsoft 365

Advanced Threat Protection in Microsoft 365

There are many security tools built into the O365 platform, but when you move to M365 E3 or E5, you unlock a whole new set of advanced features for securing your business. In this article, we’re going to look at these tools, except for Endpoint Manager, which we have...