Explanations of terms and information from the world of IT security
Our knowledge database provides you with valuable information on various topics in the field of IT security. Learn which dangers exist and how you can specifically counter these threats to ward off CEO fraud, ransomware, phishing and the like. In addition, you’ll find an overview of relevant terms in the field of information security.
The abbreviation DDoS stands for Distributed Denial Of Service. A DDoS attack is a type of DoS attack in which several hijacked systems are used to carry out an attack against the target system.
With the establishment of cryptocurrency, the era of a new means of payment has been ushered Crypto Mining in. To better understand the miners’ gold rush, we have summarized the most important facts.
Even with the best technical security precautions, every company has a risk factor that is difficult to control: the human one. What exactly is social engineering and how can you protect yourself?
Spear phishing is a cyber attack with extremely malicious intent that is derived from traditional phishing. In a conventional phishing attack, the target persons fall randomly into the attacker’s grid.
Business Email Compromise (BEC) is characterized according to its different forms. In addition to compromising an employee’s email account, methods such as spear phishing or CEO fraud are also used, the latter being preferred by criminals for gaining access to confidential company information or money.
Today, encryption is mainly thought of as an IT term, because data, e-mails, computers etc. are encrypted. But that was not always so. Encryption actually has its origins back in the year 480. And until a few years ago, encryption was primarily used in espionage or in top-secret government communications.
The most important IT news. Read our latest blog posts
Irvin Shillingford to lead cybersecurity business in key regions as part of strategic business growth planLONDON, UK (19 January 2023) – Hornetsecurity, a leading global provider of email security, backup and security awareness training services, has appointed Irvin...
1 IN 3 ORGANIZATIONS DOES NOT PROVIDE ANY CYBERSECURITY TRAINING TO REMOTE WORKERS DESPITE A MAJORITY OF EMPLOYEES HAVING ACCESS TO CRITICAL DATA
Hornetsecurity survey reveals nearly one-fifth of IT pros say workers are not secure when working remotely Almost three-quarters of remote staff have access to critical data Nearly half of respondents say their organisation plans to increase the percentage of...
1 in 5 I.T. pros say remote workers are not secure, survey finds Key takeaways from the 2022 Remote Management Survey by Hornetsecurity 18% of I.T. professionals believe that remote employees are not working securely and that company data is at risk 8 out of 10...