Hornetsecurity Blog
Get regular updates from the world of cloud security
In our blog, the Hornetsecurity team – especially the experts from the Security Lab – regularly report on IT security topics as well as on current innovations and events at Hornetsecurity.
Protecting Your Business: The Importance of Cyber Insurance
In today's digital age, the threat of cyberattacks looms larger than ever, and businesses are increasingly becoming targets of sophisticated cybercriminals. In this landscape, safeguarding your company against potential risks is paramount. One crucial aspect of this...
Welcome to the Microsoft 365 Universe
In this article, we’re going to look at the different flavors of M365, how to pick between them, and what value they provide to your business. A correctly implemented Microsoft 365 is an enabler for your business, making it easy for your staff to work in teams and...
How to Prevent Ransomware Attacks: An Easy-to-Follow Guide
It's been the scourge of businesses globally for several years now, and shows no sign of abating - ransomware, which makes ransomware attack prevention crucial. Not a new threat, but growing in seriousness over the last few years, aided by the ease for the criminals...
What Are Email Data Leaks and How to Prevent Them
According to our research published in Cyber Security Report, email continues to be the primary communication channel for many organizations, with over 333 billion emails sent and received daily. Based on projections, that figure will increase to almost 400 billion...
The Vulnerability of AI to Cyber Attacks – AI’s Achilles’ Heel
Artificial Intelligence (AI) attacks are not quite at the level of Skynet depicted in the 1984 film “The Terminator,” but this hasn’t stopped the speculations and real-world implications around AI technological advances. Although the science fiction within “The...
How to Create the Optimal Disaster Recovery Architecture
We have worked through designing and configuring a backup strategy. We have dispatched others on a quest to define their needs and roles in a disaster situation. Now we need to focus on the critical aspect for the IT admin - to architect a solution that will carry...
Cyber Security Report 2024 – Top Five Things to Look Out for in 2024
Our yearly Cyber Security Report is here – download it free here. One of the best things about Hornetsecurity’s yearly Cyber Security Report is its foundation in empirical data. For this year we analyzed over 45 billion emails and derived our insights and...
Essential Objectives your Disaster Recovery Strategy Must Achieve
When we talk about disaster recovery and business continuity planning, we devote most of our time and space to backup operations. For technologists and systems administrators, that makes sense. However, this is not the full story. For almost everyone else in a...