Backup 24 September 2025 Migrating from VMware to Proxmox: What You Need to Know Migrating from VMware to Proxmox is not an easy undertaking and requires serious consideration. Let’s walk… Read More
Email Security, Security Awareness 17 September 2025 Back from Vacation? Here’s How to Conquer Your Inbox It’s Monday morning, you’re back in the office (or home office), coffee or tea in… Read More
Compliance, Security Awareness 10 September 2025 What the UK’s Ransomware Payment Ban Means for Your Business The UK is moving ahead with a ransomware payment ban for public bodies and critical… Read More
Threat Reports 09 September 2025 Monthly Threat Report September 2025 The Monthly Threat Report by Hornetsecurity brings you monthly insights into M365 security trends, email-based… Read More
Security Awareness 03 September 2025 DeepSeek Under the Microscope: Are Privacy Risks and Security Concerns Justified? In this analysis, we'll dissect the anatomy of DeepSeek's security and privacy practices, uncovering the… Read More
Compliance 27 August 2025 Why Data Sovereignty Matters More Than Ever in a Cloud-First World Who’s minding your company’s data, and how? If it’s generated in one country but processed… Read More
Security Awareness 22 August 2025 From Beach to Breach: How a Relaxed Mind Can Lead to Data Disasters It’s that time of the year – summer, sun, relaxation and beach holidays and our… Read More
Compliance, Microsoft 365 20 August 2025 The SharePoint Hack – Lessons Learned From 400+ Servers Being Pwned In this article we’re going to cover what happened with the latest SharePoint vulnerability, who… Read More
Threat Reports 19 August 2025 Monthly Threat Report August 2025 The Monthly Threat Report by Hornetsecurity brings you monthly insights into M365 security trends, email-based… Read More
How Artificial Intelligence (AI) is Changing Cybersecurity Security Awareness 12 December 2023 Traditional security systems can’t keep pace with the increased number of cyber threat activities. The amount… Read more
5 Common Phishing Techniques Email Security 07 May 2023 Today’s phishing techniques are highly sophisticated, they’re bypassing email security filters, and they’re targeting your… Read more
Human Vulnerabilities – Exploring Types of Social Engineering Attacks Security Awareness 02 October 2023 It’s Monday morning; you have a fresh cup of coffee in hand and are ready… Read more