Hornetsecurity Blog
Get regular updates from the world of cloud security
In our blog, the Hornetsecurity team – especially the experts from the Security Lab – regularly report on IT security topics as well as on current innovations and events at Hornetsecurity.
Vade expands data center in Lille to bring additional Hornetsecurity cybersecurity products to the French market
Hornetsecurity expands French presence with EUR 3.8m investment in data center in LilleParis, France (23 April 2024) – Hornetsecurity, a global leader in cloud security services, is pleased to announce a new extension to its data center in Lille, France, further...
What Your Employees Need to Know About Phishing + Real-Life Examples
In this article, we’ll present a series of real-world phishing emails, with personal details altered or obfuscated to protect the innocent. These are useful for training users to spot the clues that something is trying to trick them, so feel free to use these in your...
Unmasking Phishing: Understanding the Insidious Threat to Your Organization
In this article, we delve into the pervasive threat of phishing and its profound implications for organizational security. Phishing, an ever-evolving tactic employed by cybercriminals, continues to pose a significant risk to businesses worldwide. From impersonating...
How to Mitigate IT Security Risks: Best Practices for Effective Risk Management
Do you work in Cybersecurity? Guess what – your job is actually risk management. Is your role in general IT, or in sales, marketing, HR or management? Guess what – your job isn’t risk management, but a part of your role should be dedicated to risk management. Why, you...
Monthly Threat Report April 2024: Impersonation Attacks, and the US CSRB’s Report on Storm-0558
QUARTER OF UK BUSINESSES AREN’T USING AI TO BOLSTER CYBERSECURITY
New survey from cybersecurity provider Hornetsecurity reveals that half (45%) of UK businesses have been victims of a cyberattack 3 in 5 businesses are most concerned about AI-assisted phishing 1 in 10 describe themselves as ‘not ready at all’ for a zero-day...
Cyber Kill Chain vs. MITRE ATT&CK: An Insightful Comparison
There are two challenges we in cybersecurity face when it comes to communicating what we do the rest of the business (and the rest of the world). For many people, computers, networks, and Information Technology in general are opaque, and most businesspeople know how...
What is Data Backup and Recovery? Understanding the Fundamentals
What is Backup? These days, every business that cares for its data and information must have a backup. A copy of a file kept somewhere other than its original place is called a backup file. Making copies of data so that the original can be restored in the event of a...