Hornetsecurity Blog
Get regular updates from the world of cloud security
In our blog, the Hornetsecurity team – especially the experts from the Security Lab – regularly report on IT security topics as well as on current innovations and events at Hornetsecurity.
Enhancing Security with Microsoft 365 Ransomware Protection
Boosting Your Defenses: The Multilayered Ransomware Protection Method of Microsoft 365The two main reasons why businesses have embraced Microsoft 365 so rapidly are hybrid working and reduced capital costs. However, due to its sizable user base and quick subscriber...
The Importance of Backup in Microsoft 365
In this article we look at the need for data protection in Microsoft 365 – what Microsoft is responsible for – and what your organization is responsible for.Native Data ResiliencyAs any capable cloud service, Microsoft takes the availability of customers data in M365...
What Is Endpoint Backup, and How Does It Work?
Definition of Endpoint BackupEndpoint backup software ensures data security and ease of recovery by automatically backing up data from devices such as desktops, laptops, cellphones, and tablets. Its functions include file versioning, encryption, remote access, and...
Advanced Threat Protection in Microsoft 365
There are many security tools built into the O365 platform, but when you move to M365 E3 or E5, you unlock a whole new set of advanced features for securing your business. In this article, we’re going to look at these tools, except for Endpoint Manager, which we have...
The Importance of Security in Office 365
In the early days of cloud computing there was a lot of concern around the security of data moved to “someone else’s datacenter”. I think it’s clear to most CISOs today that the big providers do a much better job of it security than most businesses can do (or have the...
Mastering Endpoint Security with Microsoft Intune
M365 E3 and E5 brings you Microsoft Intune, Microsoft’s mobile device management (MDM) cloud service. In this article we’ll look at how it can help you manage devices and PCs, mobile apps, protect company data, and enforce security policies. There used to be an...
Monthly Threat Report March 2024: A Busy Cybersecurity News Cycle with High-Impact Events
Microsoft 365 Permissions and Copilot – a ticking time bomb for Security and Compliance
File sharing in business is one of those technologies that mostly happens “under the radar”. New SharePoint sites are spun up for projects or groups, or new Teams are created with lots of files shared. This sharing can be both with internal users and external users....