Hornetsecurity Blog
Get regular updates from the world of cloud security
In our blog, the Hornetsecurity team – especially the experts from the Security Lab – regularly report on IT security topics as well as on current innovations and events at Hornetsecurity.
Why You Still Need On-Prem Backup in The Cloud Era
Cloud technologies have fundamentally altered how we leverage computing resources. From software packages that require no maintenance by the customer to machine learning, the cloud gives us new ways to solve challenges. Unfortunately, it also introduces new problems,...
The Significance of Encrypted File Transfer for Data Security
In this article, we're going to look at encrypted file transfers and why this is an important but often overlooked component of cyber security. There are a few basic things in computer security that will never change, such as the need to protect your data against...
The Biggest Data Loss Risks and How to Address Them
The lack of understanding around data protection presents a serious barrier to proper planning. Some organizations fail to adequately plan simply because they do not realize its importance. Others do not feel that the danger justifies the effort. The lack of a plan...
Hornetsecurity releases “Microsoft 365: The Essential Companion Guide” as a comprehensive resource for businesses using M365
Hornetsecurity’s essential guide to Microsoft 365 will assist companies with navigating M365 and successfully transitioning to the cloud The eBook has three focus areas: M365 Basics; Managing, Maintaining, and Support for M365; and Security, Backup, and Compliance...
The Role of Backup in Organizational Security
No single security measure will work for every problem or every time. To address that never-ending problem, datacenter administrators depend on a “defense in depth” paradigm. Defense in depth uses a layered approach to security such that multiple items collectively...
Defending Your Organization Against Whaling Phishing
Do you hold a high-authority position within your organization, such as a C-level executive like CEO, CTO, CFO, CMO, and CLO? If so, this article is written to assist you in navigating through phishing attacks that target profiles of individuals in your role. It is...
Understanding Supply Chain Attacks and Protecting Your Business
In today's complex infrastructure, there are a lot of software and hardware dependencies. As a vendor, you are not always in control of all dependencies, but leverage them for your product or service to work properly. Using third-party dependencies and integrating...
Monthly Threat Report September 2023: The Demise of Qakbot?
IntroductionThe Monthly Threat Report by Hornetsecurity brings you monthly insights into M365 security trends, email-based threats, and commentary on current events in the cybersecurity space. This edition of the Monthly Threat Report focuses on data from the month of...