Hornetsecurity Blog
Get regular updates from the world of cloud security
In our blog, the Hornetsecurity team – especially the experts from the Security Lab – regularly report on IT security topics as well as on current innovations and events at Hornetsecurity.
What Are Email Data Leaks and How to Prevent Them
According to our research published in Cyber Security Report, email continues to be the primary communication channel for many organizations, with over 333 billion emails sent and received daily. Based on projections, that figure will increase to almost 400 billion...
The Vulnerability of AI to Cyber Attacks – AI’s Achilles’ Heel
Artificial Intelligence (AI) attacks are not quite at the level of Skynet depicted in the 1984 film “The Terminator,” but this hasn’t stopped the speculations and real-world implications around AI technological advances. Although the science fiction within “The...
How to Create the Optimal Disaster Recovery Architecture
We have worked through designing and configuring a backup strategy. We have dispatched others on a quest to define their needs and roles in a disaster situation. Now we need to focus on the critical aspect for the IT admin - to architect a solution that will carry...
Essential Objectives your Disaster Recovery Strategy Must Achieve
When we talk about disaster recovery and business continuity planning, we devote most of our time and space to backup operations. For technologists and systems administrators, that makes sense. However, this is not the full story. For almost everyone else in a...
Tested Techniques for Preventing Cloud Attacks on Your System
Whenever we see a technology rising in the market, it quickly becomes one of the targets for hackers. The same is happening with the cloud. According to Statista, as of 2023, 60% of corporate data is stored in a public cloud hosted by AWS, Microsoft, Google, and...
How Artificial Intelligence (AI) is Changing Cybersecurity
Traditional security systems can't keep pace with the increased number of cyber threat activities. The amount of data that is being generated is large and complex. According to the Data Never Sleeps 4.0 report 2016, over 18 TB of data is generated every minute. Today,...
Monthly Threat Report December 2023: Holidays Bring Malicious Email and Lots of Patches to Apply
IntroductionThe Monthly Threat Report by Hornetsecurity brings you monthly insights into M365 security trends, email-based threats, and commentary on current events in the cybersecurity space. This edition of the Monthly Threat Report focuses on data from the month of...
How Often Should I be Taking Backups
Now you understand your organization’s data protection needs and you have the means to implement them. To bring it to life, you need to design the schedules for your backups. Unless you have very little data or a high budget for backup, you will use more than one...