Hornetsecurity Blog
Get regular updates from the world of cloud security
In our blog, the Hornetsecurity team – especially the experts from the Security Lab – regularly report on IT security topics as well as on current innovations and events at Hornetsecurity.
How Often Should I be Taking Backups
Now you understand your organization’s data protection needs and you have the means to implement them. To bring it to life, you need to design the schedules for your backups. Unless you have very little data or a high budget for backup, you will use more than one...
The Biggest Findings in Hornetsecurity’s Cyber Security Report 2024
Our yearly Cyber Security Report is here – download it free here. This year we’ve analyzed over 45 billion emails and sliced and diced this data, and compared it with last year’s report to provide actionable insights for anyone who wants to protect their business...
What Is a Sandbox Environment? Exploring Their Definition and Range of Applications
The Purpose of a SandboxSandbox is a controlled and isolated environment where security professionals analyze, observe, and execute suspicious or potentially malicious software, files, or code without harming their actual systems. Think of it as a digital quarantine...
Hornetsecurity’s Cyber Security Report 2024 is here!
Every year we at the Security Lab here at Hornetsecurity sift through billions of emails from every year and analyze the data to provide actionable insights to cyber defenders everywhere. This article serves as your appetizer for the main course, the free report which...
USE OF MALICIOUS WEB LINKS IN EMAILS HAS RISEN BY 144% IN 2023 – NEW HORNETSECURITY REPORT
Hornetsecurity’s Cyber Security Report 2024 reveals phishing remains top email threat, accounting for 43.3% of attacks, but malicious URLs jumped from 12.5% to 30.5% YoY Analysis of more 45 billion emails reveals more than a third (36.4%) are unwanted Hanover, Germany...
The Pros and Cons of All Backup Storage Targets Explained
The days of tape-only solutions have come to an end. Other media have caught up to it in cost, capacity, convenience, and reliability. You now have a variety of storage options. Backup applications that can only operate with tape have little value in modern business...
The Foolproof Method of Maintaining your Backup System
As you might expect, setting up backup is just the beginning. You will need to keep it running into perpetuity. Similarly, you cannot simply assume that everything will work. You need to keep constant vigilance over the backup system, its media, and everything that it...