{"id":313,"date":"2022-07-11T17:06:55","date_gmt":"2022-07-11T17:06:55","guid":{"rendered":"https:\/\/www.qbssoftware.com\/neur\/blog\/hornetsecurity-explains-how-tried-and-true-cybersecurity-product-choices-increasingly-need-active-support\/"},"modified":"2022-07-11T17:06:55","modified_gmt":"2022-07-11T17:06:55","slug":"hornetsecurity-explains-how-tried-and-true-cybersecurity-product-choices-increasingly-need-active-support","status":"publish","type":"post","link":"https:\/\/www.qbssoftware.com\/neur\/hornetsecurity-explains-how-tried-and-true-cybersecurity-product-choices-increasingly-need-active-support\/","title":{"rendered":"Hornetsecurity Explains How Tried-And-True Cybersecurity Product Choices Increasingly Need Active Support"},"content":{"rendered":"

Because <\/font><\/font><\/font>more complex IT security strategies won’t typically increase security on their own, organisations must proactively find ways of identifying unseen vulnerabilities, taking a more diligent, holistic approach to cybersecurity.<\/font><\/font><\/font><\/p>\n

<\/p>\n

For instance, in a survey by Hornetsecurity<\/a>, respondent organisations that activated more Microsoft 365 security features actually reported more cyberattacks in the last year by as many as 29% of the companies polled.<\/font><\/font><\/font><\/p>\n

<\/p>\n

Hornetsecurity advises moving end users away from simply relying on features out of the box, which may mean reacting to issues rather than proactively moving against them. <\/font><\/font><\/font> <\/p>\n

<\/p>\n

Instead, by supporting a selection of tried and tested, user-friendly solutions — such as Hornetsecurity<\/a> email filtering and cloud security — with other dedicated security solutions and services, end user customers are likely to enjoy the optimum route to protection.<\/font><\/font><\/font><\/p>\n

<\/p>\n

Complementing Hornetsecurity with Altaro’s Hyper-V Backup solution, for instance, can advance opportunities for application providers, MSPs and channel partners through QBS’s next-gen software delivery platform.<\/font><\/font><\/font><\/p>\n

<\/p>\n

The rise to cloud and hybrid is raising the stakes <\/b><\/font><\/font><\/font> <\/p>\n

<\/p>\n

All too often, features in an off-the-shelf product may be misconfigured, leaving vulnerabilities. <\/font><\/font><\/font> <\/p>\n

<\/p>\n

In addition, 62.6% of respondents in the Hornetsecurity poll indicate that the main roadblock to implementing security features within their organisation is ‘not enough time or resources’.<\/font><\/font><\/font><\/p>\n

<\/p>\n

Those using one or two <\/font><\/font><\/font>Microsoft 365<\/a> stock security features reported attacks 24.4% and 28.2% of the time and using six or seven features correlated with attacks 55.6% and 40.8% of the time, respectively. <\/font><\/font><\/font> <\/p>\n

<\/p>\n

Meanwhile, cloud and hybrid cloud solutions are increasingly favoured by many end-user companies across Europe and North America. In a Q1 poll by Hornetsecurity, 47% of respondents from internal IT teams reported that workloads will be \u201cmostly in the cloud\u201d in five years — the share rising to 52% among MSP customers.<\/font><\/font><\/font><\/p>\n

<\/p>\n

Contact QBS:MSP<\/a> to learn how the QBS-Hornetsecurity team-up can help partners tackle rising complexities and challenges around security and cloud adoption.<\/font><\/font><\/font><\/p>\n

<\/p>\n

( Image by Robert Waghorn<\/span><\/a> from Pixabay<\/span><\/a> )<\/p>\n<\/p>\n

<\/p>\n","protected":false},"excerpt":{"rendered":"

Because more complex IT security strategies won’t typically increase security on their own, organisations must proactively find ways of identifying unseen vulnerabilities, taking a more diligent, holistic approach to cybersecurity. For instance, in a survey by Hornetsecurity, respondent organisations that activated more Microsoft 365 security features actually reported more cyberattacks in the last year by […]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"post_vendor":[],"class_list":["post-313","post","type-post","status-publish","format-standard","hentry","category-uncategorised"],"acf":[],"yoast_head":"\nHornetsecurity Explains How Tried-And-True Cybersecurity Product Choices Increasingly Need Active Support - QBS Software - Northern Europe<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.qbssoftware.com\/neur\/hornetsecurity-explains-how-tried-and-true-cybersecurity-product-choices-increasingly-need-active-support\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hornetsecurity Explains How Tried-And-True Cybersecurity Product Choices Increasingly Need Active Support\" \/>\n<meta property=\"og:description\" content=\"Because more complex IT security strategies won’t typically increase security on their own, organisations must proactively find ways of identifying unseen vulnerabilities, taking a more diligent, holistic approach to cybersecurity. For instance, in a survey by Hornetsecurity, respondent organisations that activated more Microsoft 365 security features actually reported more cyberattacks in the last year by […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.qbssoftware.com\/neur\/hornetsecurity-explains-how-tried-and-true-cybersecurity-product-choices-increasingly-need-active-support\/\" \/>\n<meta property=\"og:site_name\" content=\"QBS Software - Northern Europe\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-11T17:06:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.qbssoftware.com\/neur\/wp-content\/uploads\/sites\/6\/2024\/06\/qbs-software-website.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"QBS Software\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@qbssoftware\" \/>\n<meta name=\"twitter:site\" content=\"@qbssoftware\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"QBS Software\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.qbssoftware.com\/neur\/hornetsecurity-explains-how-tried-and-true-cybersecurity-product-choices-increasingly-need-active-support\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.qbssoftware.com\/neur\/hornetsecurity-explains-how-tried-and-true-cybersecurity-product-choices-increasingly-need-active-support\/\"},\"author\":{\"name\":\"QBS Software\",\"@id\":\"https:\/\/www.qbssoftware.com\/neur\/#\/schema\/person\/cfc33e2c74cc8dd6ac65d9ebaaef9c13\"},\"headline\":\"Hornetsecurity Explains How Tried-And-True Cybersecurity Product Choices Increasingly Need Active Support\",\"datePublished\":\"2022-07-11T17:06:55+00:00\",\"dateModified\":\"2022-07-11T17:06:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.qbssoftware.com\/neur\/hornetsecurity-explains-how-tried-and-true-cybersecurity-product-choices-increasingly-need-active-support\/\"},\"wordCount\":327,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.qbssoftware.com\/neur\/#organization\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.qbssoftware.com\/neur\/hornetsecurity-explains-how-tried-and-true-cybersecurity-product-choices-increasingly-need-active-support\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.qbssoftware.com\/neur\/hornetsecurity-explains-how-tried-and-true-cybersecurity-product-choices-increasingly-need-active-support\/\",\"url\":\"https:\/\/www.qbssoftware.com\/neur\/hornetsecurity-explains-how-tried-and-true-cybersecurity-product-choices-increasingly-need-active-support\/\",\"name\":\"Hornetsecurity Explains How Tried-And-True Cybersecurity Product Choices Increasingly Need Active Support - QBS Software - Northern Europe\",\"isPartOf\":{\"@id\":\"https:\/\/www.qbssoftware.com\/neur\/#website\"},\"datePublished\":\"2022-07-11T17:06:55+00:00\",\"dateModified\":\"2022-07-11T17:06:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.qbssoftware.com\/neur\/hornetsecurity-explains-how-tried-and-true-cybersecurity-product-choices-increasingly-need-active-support\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.qbssoftware.com\/neur\/hornetsecurity-explains-how-tried-and-true-cybersecurity-product-choices-increasingly-need-active-support\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.qbssoftware.com\/neur\/hornetsecurity-explains-how-tried-and-true-cybersecurity-product-choices-increasingly-need-active-support\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.qbssoftware.com\/neur\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hornetsecurity Explains How Tried-And-True Cybersecurity Product Choices Increasingly Need Active Support\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.qbssoftware.com\/neur\/#website\",\"url\":\"https:\/\/www.qbssoftware.com\/neur\/\",\"name\":\"QBS Software\",\"description\":\"Software delivery platform\",\"publisher\":{\"@id\":\"https:\/\/www.qbssoftware.com\/neur\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.qbssoftware.com\/neur\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.qbssoftware.com\/neur\/#organization\",\"name\":\"QBS Software\",\"url\":\"https:\/\/www.qbssoftware.com\/neur\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.qbssoftware.com\/neur\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.qbssoftware.com\/neur\/wp-content\/uploads\/sites\/6\/2024\/06\/qbs-logo-d-i.png\",\"contentUrl\":\"https:\/\/www.qbssoftware.com\/neur\/wp-content\/uploads\/sites\/6\/2024\/06\/qbs-logo-d-i.png\",\"width\":800,\"height\":800,\"caption\":\"QBS Software\"},\"image\":{\"@id\":\"https:\/\/www.qbssoftware.com\/neur\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/qbssoftware\",\"https:\/\/www.linkedin.com\/company\/qbs-software\/\",\"https:\/\/www.youtube.com\/user\/QBSSoftwareLtd\"],\"email\":\"info@qbssoftware.com\",\"telephone\":\"+44 (0) 20 8733 7100\",\"publishingPrinciples\":\"https:\/\/www.qbssoftware.com\/neur\/privacy-policy\/\",\"ethicsPolicy\":\"https:\/\/www.qbssoftware.com\/neur\/corporate-responsibility-charter\/\",\"diversityPolicy\":\"https:\/\/www.qbssoftware.com\/neur\/corporate-responsibility-charter\/\",\"diversityStaffingReport\":\"https:\/\/www.qbssoftware.com\/neur\/corporate-responsibility-charter\/\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.qbssoftware.com\/neur\/#\/schema\/person\/cfc33e2c74cc8dd6ac65d9ebaaef9c13\",\"name\":\"QBS Software\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.qbssoftware.com\/neur\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b9ccdb10afdc47096808553219bd2754b3cd7321e06e15851cc190ace5e13292?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b9ccdb10afdc47096808553219bd2754b3cd7321e06e15851cc190ace5e13292?s=96&d=mm&r=g\",\"caption\":\"QBS Software\"},\"url\":\"https:\/\/www.qbssoftware.com\/neur\/author\/qbs-software\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hornetsecurity Explains How Tried-And-True Cybersecurity Product Choices Increasingly Need Active Support - QBS Software - Northern Europe","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.qbssoftware.com\/neur\/hornetsecurity-explains-how-tried-and-true-cybersecurity-product-choices-increasingly-need-active-support\/","og_locale":"en_GB","og_type":"article","og_title":"Hornetsecurity Explains How Tried-And-True Cybersecurity Product Choices Increasingly Need Active Support","og_description":"Because more complex IT security strategies won’t typically increase security on their own, organisations must proactively find ways of identifying unseen vulnerabilities, taking a more diligent, holistic approach to cybersecurity. For instance, in a survey by Hornetsecurity, respondent organisations that activated more Microsoft 365 security features actually reported more cyberattacks in the last year by […]","og_url":"https:\/\/www.qbssoftware.com\/neur\/hornetsecurity-explains-how-tried-and-true-cybersecurity-product-choices-increasingly-need-active-support\/","og_site_name":"QBS Software - Northern Europe","article_published_time":"2022-07-11T17:06:55+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/www.qbssoftware.com\/neur\/wp-content\/uploads\/sites\/6\/2024\/06\/qbs-software-website.jpg","type":"image\/jpeg"}],"author":"QBS Software","twitter_card":"summary_large_image","twitter_creator":"@qbssoftware","twitter_site":"@qbssoftware","twitter_misc":{"Written by":"QBS Software","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.qbssoftware.com\/neur\/hornetsecurity-explains-how-tried-and-true-cybersecurity-product-choices-increasingly-need-active-support\/#article","isPartOf":{"@id":"https:\/\/www.qbssoftware.com\/neur\/hornetsecurity-explains-how-tried-and-true-cybersecurity-product-choices-increasingly-need-active-support\/"},"author":{"name":"QBS Software","@id":"https:\/\/www.qbssoftware.com\/neur\/#\/schema\/person\/cfc33e2c74cc8dd6ac65d9ebaaef9c13"},"headline":"Hornetsecurity Explains How Tried-And-True Cybersecurity Product Choices Increasingly Need Active Support","datePublished":"2022-07-11T17:06:55+00:00","dateModified":"2022-07-11T17:06:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.qbssoftware.com\/neur\/hornetsecurity-explains-how-tried-and-true-cybersecurity-product-choices-increasingly-need-active-support\/"},"wordCount":327,"commentCount":0,"publisher":{"@id":"https:\/\/www.qbssoftware.com\/neur\/#organization"},"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.qbssoftware.com\/neur\/hornetsecurity-explains-how-tried-and-true-cybersecurity-product-choices-increasingly-need-active-support\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.qbssoftware.com\/neur\/hornetsecurity-explains-how-tried-and-true-cybersecurity-product-choices-increasingly-need-active-support\/","url":"https:\/\/www.qbssoftware.com\/neur\/hornetsecurity-explains-how-tried-and-true-cybersecurity-product-choices-increasingly-need-active-support\/","name":"Hornetsecurity Explains How Tried-And-True Cybersecurity Product Choices Increasingly Need Active Support - QBS Software - Northern Europe","isPartOf":{"@id":"https:\/\/www.qbssoftware.com\/neur\/#website"},"datePublished":"2022-07-11T17:06:55+00:00","dateModified":"2022-07-11T17:06:55+00:00","breadcrumb":{"@id":"https:\/\/www.qbssoftware.com\/neur\/hornetsecurity-explains-how-tried-and-true-cybersecurity-product-choices-increasingly-need-active-support\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.qbssoftware.com\/neur\/hornetsecurity-explains-how-tried-and-true-cybersecurity-product-choices-increasingly-need-active-support\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.qbssoftware.com\/neur\/hornetsecurity-explains-how-tried-and-true-cybersecurity-product-choices-increasingly-need-active-support\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.qbssoftware.com\/neur\/"},{"@type":"ListItem","position":2,"name":"Hornetsecurity Explains How Tried-And-True Cybersecurity Product Choices Increasingly Need Active Support"}]},{"@type":"WebSite","@id":"https:\/\/www.qbssoftware.com\/neur\/#website","url":"https:\/\/www.qbssoftware.com\/neur\/","name":"QBS Software","description":"Software delivery platform","publisher":{"@id":"https:\/\/www.qbssoftware.com\/neur\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.qbssoftware.com\/neur\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.qbssoftware.com\/neur\/#organization","name":"QBS Software","url":"https:\/\/www.qbssoftware.com\/neur\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.qbssoftware.com\/neur\/#\/schema\/logo\/image\/","url":"https:\/\/www.qbssoftware.com\/neur\/wp-content\/uploads\/sites\/6\/2024\/06\/qbs-logo-d-i.png","contentUrl":"https:\/\/www.qbssoftware.com\/neur\/wp-content\/uploads\/sites\/6\/2024\/06\/qbs-logo-d-i.png","width":800,"height":800,"caption":"QBS Software"},"image":{"@id":"https:\/\/www.qbssoftware.com\/neur\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/qbssoftware","https:\/\/www.linkedin.com\/company\/qbs-software\/","https:\/\/www.youtube.com\/user\/QBSSoftwareLtd"],"email":"info@qbssoftware.com","telephone":"+44 (0) 20 8733 7100","publishingPrinciples":"https:\/\/www.qbssoftware.com\/neur\/privacy-policy\/","ethicsPolicy":"https:\/\/www.qbssoftware.com\/neur\/corporate-responsibility-charter\/","diversityPolicy":"https:\/\/www.qbssoftware.com\/neur\/corporate-responsibility-charter\/","diversityStaffingReport":"https:\/\/www.qbssoftware.com\/neur\/corporate-responsibility-charter\/"},{"@type":"Person","@id":"https:\/\/www.qbssoftware.com\/neur\/#\/schema\/person\/cfc33e2c74cc8dd6ac65d9ebaaef9c13","name":"QBS Software","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.qbssoftware.com\/neur\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b9ccdb10afdc47096808553219bd2754b3cd7321e06e15851cc190ace5e13292?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b9ccdb10afdc47096808553219bd2754b3cd7321e06e15851cc190ace5e13292?s=96&d=mm&r=g","caption":"QBS Software"},"url":"https:\/\/www.qbssoftware.com\/neur\/author\/qbs-software\/"}]}},"_links":{"self":[{"href":"https:\/\/www.qbssoftware.com\/neur\/wp-json\/wp\/v2\/posts\/313","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.qbssoftware.com\/neur\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.qbssoftware.com\/neur\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.qbssoftware.com\/neur\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.qbssoftware.com\/neur\/wp-json\/wp\/v2\/comments?post=313"}],"version-history":[{"count":0,"href":"https:\/\/www.qbssoftware.com\/neur\/wp-json\/wp\/v2\/posts\/313\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.qbssoftware.com\/neur\/wp-json\/wp\/v2\/media?parent=313"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.qbssoftware.com\/neur\/wp-json\/wp\/v2\/categories?post=313"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.qbssoftware.com\/neur\/wp-json\/wp\/v2\/tags?post=313"},{"taxonomy":"post_vendor","embeddable":true,"href":"https:\/\/www.qbssoftware.com\/neur\/wp-json\/wp\/v2\/post_vendor?post=313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}