Hornetsecurity Blog
Get regular updates from the world of cloud security
In our blog, the Hornetsecurity team – especially the experts from the Security Lab – regularly report on IT security topics as well as on current innovations and events at Hornetsecurity.
Mastering Endpoint Security with Microsoft Intune
M365 E3 and E5 brings you Microsoft Intune, Microsoft’s mobile device management (MDM) cloud service. In this article we’ll look at how it can help you manage devices and PCs, mobile apps, protect company data, and enforce security policies. There used to be an...
Monthly Threat Report March 2024: A Busy Cybersecurity News Cycle with High-Impact Events
Microsoft 365 Permissions and Copilot – a ticking time bomb for Security and Compliance
File sharing in business is one of those technologies that mostly happens “under the radar”. New SharePoint sites are spun up for projects or groups, or new Teams are created with lots of files shared. This sharing can be both with internal users and external users....
Microsoft Teams As Your Ultimate Collaboration Hub
There have been many instant messaging/chat applications attempting to take on business communication, and without a doubt, Microsoft's Teams is the best yet. This is in no small part fueled by the COVID-19 pandemic, which has seen Teams usage grow from 13 million...
Vade joins Hornetsecurity Group, creating a European cybersecurity leader
Partnership aims to position the group as the preeminent cybersecurity provider for customers and partners in Europe who value data sovereignty and best-in-class cloud, compliance and digital communications security services Hanover, Germany and Hem, France (5 March...
Maximizing Productivity with Office 365’s Other Apps
There are many other applications and services in the O365 portfolio. In this article, we'll look at some of them with a brief introduction.PlannerMicrosoft has had Project for large scale project management for many years but for small to medium undertakings it’s...
Microsoft 365 Groups: Your Gateway to Efficiency
M365 groups are a fundamental building block across different services. In this article, we'll look at the diverse uses of them.Group TypesAn area that often confuses new O365 administrators is the different types of groups, here's a short rundown to sort it out:...
How Difficult Is It to Remove Ransomware
Ransomware has been a part of the cybercrime ecosystem since the late 1980s and remains a major threat in the cyber landscape today.Understanding Ransomware Mechanics and Its Short EvolutionThe AIDS Trojan was the first known Ransomware attack that encrypted your...