Hornetsecurity Blog

Get regular updates from the world of cloud security

In our blog, the Hornetsecurity team – especially the experts from the Security Lab – regularly report on IT security topics as well as on current innovations and events at Hornetsecurity.

Protecting Your Business: The Importance of Cyber Insurance

Protecting Your Business: The Importance of Cyber Insurance

In today's digital age, the threat of cyberattacks looms larger than ever, and businesses are increasingly becoming targets of sophisticated cybercriminals. In this landscape, safeguarding your company against potential risks is paramount. One crucial aspect of this...

Welcome to the Microsoft 365 Universe

Welcome to the Microsoft 365 Universe

In this article, we’re going to look at the different flavors of M365, how to pick between them, and what value they provide to your business. A correctly implemented Microsoft 365 is an enabler for your business, making it easy for your staff to work in teams and...

What Are Email Data Leaks and How to Prevent Them

What Are Email Data Leaks and How to Prevent Them

According to our research published in Cyber Security Report, email continues to be the primary communication channel for many organizations, with over 333 billion emails sent and received daily. Based on projections, that figure will increase to almost 400 billion...

How to Create the Optimal Disaster Recovery Architecture

How to Create the Optimal Disaster Recovery Architecture

We have worked through designing and configuring a backup strategy. We have dispatched others on a quest to define their needs and roles in a disaster situation. Now we need to focus on the critical aspect for the IT admin - to architect a solution that will carry...