Hornetsecurity Blog
Get regular updates from the world of cloud security
In our blog, the Hornetsecurity team – especially the experts from the Security Lab – regularly report on IT security topics as well as on current innovations and events at Hornetsecurity.
Best Practices for Microsoft 365 Administration
In this article, we will unlock the full potential of Microsoft 365 administration by exploring efficient practices through web portals, PowerShell automation, and specialized tools like Microsoft 365 Lighthouse for Managed Service Providers (MSPs). Once you have your...
Monthly Threat Report January 2024: Holiday-Focused Attacks on the Decrease, but Danger Remains
IntroductionThe Monthly Threat Report by Hornetsecurity brings you monthly insights into M365 security trends, email-based threats, and commentary on current events in the cybersecurity space. This edition of the Monthly Threat Report focuses on data from the month of...
Protecting Your Business: The Importance of Cyber Insurance
In today's digital age, the threat of cyberattacks looms larger than ever, and businesses are increasingly becoming targets of sophisticated cybercriminals. In this landscape, safeguarding your company against potential risks is paramount. One crucial aspect of this...
Welcome to the Microsoft 365 Universe
In this article, we’re going to look at the different flavors of M365, how to pick between them, and what value they provide to your business. A correctly implemented Microsoft 365 is an enabler for your business, making it easy for your staff to work in teams and...
How to Prevent Ransomware Attacks: An Easy-to-Follow Guide
It's been the scourge of businesses globally for several years now, and shows no sign of abating - ransomware, which makes ransomware attack prevention crucial. Not a new threat, but growing in seriousness over the last few years, aided by the ease for the criminals...
What Are Email Data Leaks and How to Prevent Them
According to our research published in Cyber Security Report, email continues to be the primary communication channel for many organizations, with over 333 billion emails sent and received daily. Based on projections, that figure will increase to almost 400 billion...
The Vulnerability of AI to Cyber Attacks – AI’s Achilles’ Heel
Artificial Intelligence (AI) attacks are not quite at the level of Skynet depicted in the 1984 film “The Terminator,” but this hasn’t stopped the speculations and real-world implications around AI technological advances. Although the science fiction within “The...
How to Create the Optimal Disaster Recovery Architecture
We have worked through designing and configuring a backup strategy. We have dispatched others on a quest to define their needs and roles in a disaster situation. Now we need to focus on the critical aspect for the IT admin - to architect a solution that will carry...