Simple onboarding of the Hornetsecurity Services: Video tutorial for product training

Simple onboarding of the Hornetsecurity Services: Video tutorial for product training

Extortion, theft, drug trafficking – in times of digitalization, all these crimes are also committed online. Email communication has a central role therein: it is considered the most popular means of communication in companies and at the same time the main vector of incidence for malware. Through social engineering, cybercriminals manipulate their victims in order to persuade them to click on links and open attachments containing ransomware and trojans, for example.

However, companies are not only facing the challenge of protecting email inboxes from misuse as a gateway for cyberattacks. Information and data communicated via email are also increasingly becoming a valuable digital resource in a cybercriminal environment. Managed Security Services offer comprehensive protection against increasing cybercrime without the installation of additional hardware or software. Every day, several new cyber threats emerge that seek their way into the system, so it is important to act quickly.

Hornetsecurity’s Email Security Services protect your email communications from the most sophisticated cyber attacks, annoying spam and malware. In order to offer customers, the opportunity to familiarize themselves with the services in advance and to make the implementation of the products as easy as possible, Hornetsecurity extends its onboarding service with a training program in form of YouTube videos. The activation of the services can thus be implemented as quickly and easily as possible directly by the user.

The trainings are organized in different playlists: The Spamfilter Basic Playlist provides information about the setup of Hornetsecuritys Spam & Malware Protection and its different features. The Spamfilter Advanced I Playlist contains further information on the use of 365 Total Protection, Email archiving and the Signature & Disclaimer. The Spamfilter Advanced II Playlist provides users with useful information on Email encryption and Advanced Threat Protection.

The videos can be accessed at any time using the links below and provide customers all the information they need for onboarding.

Hornetsecurity mobile – on the move with the Progressive Web App

Hornetsecurity mobile – on the move with the Progressive Web App

In recent years, the number of apps downloaded from app stores to mobile devices has steadily decreased. According to a forecast by the IT consulting firm Gartner, half of all apps used in 2020 will be Progressive Web Apps (PWA). Hornetsecurity reacted to this trend and released a Progressive Web App for the Hornetsecurity Control Panel.

A Progressive Web App is a combination of a responsive website and a native app. Since February 2019, a Progressive Web App is available to all Hornetsecurity customers, enabling them to access the control panel from a mobile device in a simple way. Since the release of the control panel version 6.5.2.0 at the end of June 2019, the Progressive Web App has also been available as a white label version with which Hornetsecurity customers and partners who have booked the white label option can customize the app name, icon and splash screen.

Advantages of the Progressive Web App from Hornetsecurity

With the Progressive Web App, it is possible to create an icon on the home screen, allowing easy access to the control panel. In comparison to a responsive website, the Control Panel does not has to be opened in a browser but is accessed directly by clicking on the icon. With the white label version, the icon, app name and logo on the splash screen can also be adapted to the company’s design.

Another advantage is that, unlike native apps, the Progressive Web App does not need to be downloaded and therefore does not consume any storage capacity on the mobile device. The Progressive Web App software also updates automatically. Furthermore, the use of the Progressive Web App saves time, as the user name and password can be saved and thus prevent the time-consuming, repeated input of user data.

So, if you want to access the control panel quickly and conveniently from home or on the train, install the Progressive Web App and benefit from better usability.

How to

1. Open the Internet browser on your smartphone and enter “cp.hornetsecurity.com” in the address bar.
2. At the bottom of your browser, a pop-up opens with the instructions for installing the Web App.
3. After installing the Web App on your home screen, open the app and log in with your login data.

Hornetsecurity signs first U.S. distributor deal

Hornetsecurity signs first U.S. distributor deal

Value-added distributor Contronex includes Hornetsecurity’s Cloud Security Services into its portfolio   Hornetsecurity has closed its first VAD contract in the U.S. with Naples, FL based distributor Contronex.  With this new partnership, Hornetsecurity will significantly expand its reach into the U.S. and Canada.
Hornetsecurity News

Stay in touch

Sign up to get the latest News about Cloud Security.

  According to Oliver Dehning, CEO of Hornetsecurity. “With Contronex, we have found the perfect match. They are experienced in providing the best security solutions in the IT marketplace.  Also, they offer an extensive network of resellers that are trained in selling high-class security products. We’re very happy to have established a relationship with this experienced partner.”   “As a growing value-added distributor of IT security software solutions, we regularly add new vendors to expand our product portfolio. With Hornetsecurity, the onboarding process was accomplished quicker than ever”, adds Beat Kramer, CEO at Contronex.   Hornetsecurity, a leading European Cloud Security Service provider, offers a full suite of Email Security Solutions protecting companies of all sizes from malware or phishing attacks and unauthorized access and loss of data, all without the need for extra hardware, software or administrative effort.
Founded in 1990 in Naples, FL, Contronex specializes in the distribution of IT security solutions and commits to three simple concepts: integrity, reliability and commitment to service, which aligns perfectly with the Hornetsecurity approach. Contronex has developed a unique partner program for resellers and managed service providers that helps them to purchase the products their clients’ need.
More practical, more compatible. Hornetdrive 4.5 is available.

More practical, more compatible. Hornetdrive 4.5 is available.

Good news for Hornetdrive users: Hornetsecurity has treated its fully encrypted cloud storage with a new update. The latest version Hornetdrive 4.5 has many new features in store, especially when it comes to compatibility and user experience. Here are some of them in detail.  
Hornetsecurity News

Stay in touch

Sign up to get the latest News about Cloud Security.

Users of Mac OS version 10.13 (High Sierra) will benefit from one of the new features in particular. With this update, Hornetdrive now supports Apple’s new file system APFS, which has replaced the outdated HFS+. So you can use Hornetdrive like before on your brand-new iMac od MacBook, too.  

Export of log files facilitates data analysis

  Another practical feature increases Hornetdrive’s user friendliness. Version 4.5 offers a new export and filter function. This facilitates users to keep an overview on all events taking place. Every activity is logged in a so-called “event log file”, which can contain a high number of data. With the new export and filter functionality, these data can be downloaded easily as a CSV file and thus filtered and analyzed outside of Hornetdrive.  

Always stay up to date

  Also, the new notification feature helps users react and adapt to recent activities within Hornetdrive. This functionality can be found under “Settings” and “Notifications”. There they can determine whether to receive pop-up or email notifications for certain events like file conflicts, new file versions, the renaming of folders or new drive members.  
Turn on notifications in a flash

Turn on notifications in a flash

  The new Hornetdrive version 4.5 can be downloaded cost-free from now on for all Windows, Mac OS X and Linux versions on our website. Android and iOS users can get their latest version in the play store or app store.  
Security breach in Microsoft Office – Hornetsecurity filters harmful documents

Security breach in Microsoft Office – Hornetsecurity filters harmful documents

A short while ago, security experts discovered the security breach CVE-2017-11882 in the Microsoft Office suite. Microsoft reacted quickly and closed the breach with a security update. Due to the publication of the exploit, however, attackers are now aware of the breach and target systems that haven’t been patched yet.   All Office versions besides Office 365 are affected by the security breach. The exploit is located in the Equation editor of Microsoft, which is a former version of the formula editor. It uses a buffer overflow which allows the attacker to execute his hazardous code on the user’s system. Through this, it is possible to download malware from the Internet and to install them.   Breach existed for 17 years   The Equation editor was compiled in 2000 and since then never reconditioned. Due to this, it is not fulfilling current security standards and allows a buffer overflow to happen which leads to the exploit. Even though the causing formula editor was replaced in Office 2007, it is still part of the package in order to ensure backward compatibility with older document versions, where the 17-year-old piece of software is needed to display and edit mathematical formula.   The only interaction necessary for the exploit to be executed is for a user to open the infected document. After that, the hazardous code will be executed automatically. Only the protected view, the so-called sandbox of the Office programs, is prohibiting its execution.   Hornetsecurity detects exploit in documents   Since the security breach was published, attackers are increasingly trying to distribute infected Office documents using the exploit. However, Hornetsecurity adapted its filters so it can detect infected documents before they appear in the mailbox. Nevertheless, we advise you to perform the security update as soon as possible.  
5 steps to counter Advanced Persistent Threat as a company

5 steps to counter Advanced Persistent Threat as a company

Especially with APTs, so-called Advanced Persistent Threats, the complexity and sophistication that are associated with these cyber attacks, is rarely apparent at first sight. Focused on the objective, these attacks are carried out over a period of several weeks, months or even years, with the goal always being the same: espionage.   Meanwhile, it is no longer just a matter of spying on state information, as it was originally the case. An Advanced Persistent Threat is increasingly posing a risk to companies. Economic and industrial espionage are no longer just encountered in blockbusters from the 70s and 80s. In fact, this threat is a part of the daily routine of small, medium, but also large companies.  

Advanced Persistent Threat – A successive type of attack

  An Advanced Persistent Threat is based on very sophisticated (advanced) techniques of attacking, and the criminal activity continues for a long period of time (persistent). It‘s a long-term undetected spy attack.   The progressive infiltration of a company on a digital and personal level is associated with a great deal of effort from the cyber criminals. A background check of the victim is carried out initially. The next step involves initial approaches of a more subtle nature. It is therefore not uncommon for the attacker to appear in the form of a potential business partner or employee.   If the attacker has a regular opportunity to enter and leave the company, it is only a matter of time before he can implement his tools on individual computers or the entire network in order, for example, to steal sensitive data of a company or even a group in the final phase. Welcome to the Age of Economic Espionage 2.0 by the Advanced Persistent Threat. Conventional security concepts, such as antivirus, firewalls and so on, are by far no longer sufficient to deal with Advanced Persistent Threats. The same applies to the monitoring of data traffic, for example via intrusion detection. Again, further protective measures must be taken into account, which need to be much more complex.   In the following, Hornetsecurity will show you 5 concrete steps to protect your company from an Advanced Persistent Threat:    

1. Realtime Monitoring

In order to defend yourself from exploits, targeted phishing attacks or special forms of Advanced Persistent Threat, you should perform a comprehensive analysis at all times in your organization. Only in this way you will have the opportunity to recognize suspicious technical processes at an early stage and counteract them in a timely and effective manner.    

2. Stay up-to-date

Central databases that collect and analyze cybercrime activities worldwide can help you keep an eye on current threats, which are caused by Advanced Persistent Threats.    

3. Data Leak Prevention

An employee tries to open files for which he has no authorization? Recognize and prevent first irregularities before it is too late and the company’s internal data reach the hands of third parties by electronic means.    

4. Creating Isolated Company Environments

The magic word for this form of protection is “sandbox”. What is meant in principle is a test environment, which is disconnected from the main system, so that files which represent a potential risk can be opened in an isolated area without causing sensational damage. Advanced Persistent Threats can also be contained in this way.    

5. Pattern Recognition

It is of particular relevance that you use applications, which reliably monitor your network traffic, but at the same time can also limit the network if any abnormalities occur. This applies to unauthorized access, but also for the detection of malicious software, which is usually not used in companies. In this way you, as a business, can already rely on a solid foundation to protect yourself against Advanced Persistent Threats.