Hornetsecurity Blog
Get regular updates from the world of cloud security
In our blog, the Hornetsecurity team – especially the experts from the Security Lab – regularly report on IT security topics as well as on current innovations and events at Hornetsecurity.
Enhancing Productivity with Microsoft 365 Clients
There are many pieces of software you can use to connect to M365 – in this article, we’ll look at these and how you manage them from a governance point of view.Desktop ChoicesMicrosoft recommends the latest version of Chrome, Edge, Firefox, Safari, or Internet...
Email Threats in 2024 Are Evolving – How Advanced Threat Protection Keeps Your Business One Step Ahead of Attacks
The most common way that criminals gain access to your business is through malicious emails. This is often a phishing email, asking the recipient to change their corporate password with a link to a site, or to approve a parcel delivery, or in what’s becoming more...
Keeping Microsoft 365 Running Smoothly: Tips for Proactive Microsoft 365 Support
At least initially, a big challenge for us in IT is the loss of control that the cloud brings. If you have a problem on-premises with email delivery, you can check every part of the chain to see where the problem lies. Once you have migrated to M365, it’s now a shared...
Cyber Insurance: A Shield for Your Business in the Digital Age
In an increasingly interconnected world, where businesses rely heavily on technology, the risk of cyberattacks is ever-present. As cybercriminals continue to evolve and become more sophisticated, the need for robust cybersecurity measures is greater than ever. Cyber...
Strategies for Successful Office 365 Migration
If you’re a new business, this article doesn’t apply to you – simply create user accounts in the cloud, join your Windows 10/11 devices to Entra ID, and manage your iOS and Android devices with endpoint manager, and you’re good to go.MigrationMost businesses, however,...
Best Practices for Microsoft 365 Administration
In this article, we will unlock the full potential of Microsoft 365 administration by exploring efficient practices through web portals, PowerShell automation, and specialized tools like Microsoft 365 Lighthouse for Managed Service Providers (MSPs). Once you have your...
Monthly Threat Report January 2024: Holiday-Focused Attacks on the Decrease, but Danger Remains
Protecting Your Business: The Importance of Cyber Insurance
In today's digital age, the threat of cyberattacks looms larger than ever, and businesses are increasingly becoming targets of sophisticated cybercriminals. In this landscape, safeguarding your company against potential risks is paramount. One crucial aspect of this...