Hornetsecurity Blog
Get regular updates from the world of cloud security
In our blog, the Hornetsecurity team – especially the experts from the Security Lab – regularly report on IT security topics as well as on current innovations and events at Hornetsecurity.
Unmasking Phishing: Understanding the Insidious Threat to Your Organization
In this article, we delve into the pervasive threat of phishing and its profound implications for organizational security. Phishing, an ever-evolving tactic employed by cybercriminals, continues to pose a significant risk to businesses worldwide. From impersonating...
How to Mitigate IT Security Risks: Best Practices for Effective Risk Management
Do you work in Cybersecurity? Guess what – your job is actually risk management. Is your role in general IT, or in sales, marketing, HR or management? Guess what – your job isn’t risk management, but a part of your role should be dedicated to risk management. Why, you...
Monthly Threat Report April 2024: Impersonation Attacks, and the US CSRB’s Report on Storm-0558
QUARTER OF UK BUSINESSES AREN’T USING AI TO BOLSTER CYBERSECURITY
New survey from cybersecurity provider Hornetsecurity reveals that half (45%) of UK businesses have been victims of a cyberattack 3 in 5 businesses are most concerned about AI-assisted phishing 1 in 10 describe themselves as ‘not ready at all’ for a zero-day...
Cyber Kill Chain vs. MITRE ATT&CK: An Insightful Comparison
There are two challenges we in cybersecurity face when it comes to communicating what we do the rest of the business (and the rest of the world). For many people, computers, networks, and Information Technology in general are opaque, and most businesspeople know how...
What is Data Backup and Recovery? Understanding the Fundamentals
What is Backup?These days, every business that cares for its data and information must have a backup. A copy of a file kept somewhere other than its original place is called a backup file. Making copies of data so that the original can be restored in the event of a...
Enhancing Security with Microsoft 365 Ransomware Protection
Boosting Your Defenses: The Multilayered Ransomware Protection Method of Microsoft 365The two main reasons why businesses have embraced Microsoft 365 so rapidly are hybrid working and reduced capital costs. However, due to its sizable user base and quick subscriber...
The Importance of Backup in Microsoft 365
In this article we look at the need for data protection in Microsoft 365 – what Microsoft is responsible for – and what your organization is responsible for.Native Data Resiliency As any capable cloud service, Microsoft takes the availability of customers data in M365...