Springe zum Hauptinhalt

Mega-Menü-Produkt-Services_Pfeil

HYPERSECURE PlatformZero Trust Strategy

 

COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT SecurityTo the Blog
Support
Service Desk Partner Portal

 

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT Security
To the BlogNewsletter

Blog

News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.

Cyberattack (3)

Cyber Security Cloud

2 min read

Australian Businesses Under Attack - How To Protect Yourself

On June 19, Australian Prime Minister Scott Morrison reported that businesses are targeted by a sophisticated, state-based cyber actor. In recent...

Read More
Woman in glasses looking at the code

3 min read

EDR - the Sherlock Holmes of cyber security

In our last blog post " Silent hacker attacks and the need for detection mechanisms" we talked about covert cyber attacks and the need for detection...

Read More
Woman wearing glasses

4 min read

Silent hacker attacks and the need for detection mechanisms

Again and again, we read about hacking incidents where attackers can spy on a company, an authority or a ministry and remain unnoticed for months...

Read More
3 red lock and 1 blue lock within numeric code

2 min read

4 Essential Strategies for IT Security

The Australian Cyber Security Centre (ACSC) is an Australian Government intelligence and security agency who provides advice and assistance on...

Read More
Hacker in front of computer after breaking in

2 min read

The Coronavirus gives hackers more freedom to infiltrate your network

In recent weeks, the coronavirus has become the main topic for the global population, health authorities, politicians and organisations. For hackers,...

Read More
A man in front of numeric code

3 min read

Zero Trust - The Blueprint To Safeguard Your Digital Business

Enter the concept of "Zero Trust" in cybersecurity. It's not just a buzzword; it's a paradigm shift. Zero Trust challenges conventional wisdom and...

Read More
Cyber Secutiry cloud above 4 pair of hands

4 min read

11 reasons why patch management is not sufficient

In today's rapidly evolving digital landscape, prioritizing the safety and stability of your systems is crucial. Given the increasing sophistication...

Read More
Digital lock above laptop

4 min read

Avoid Cyber Risks In IOT and IIOT Worlds

The Internet of Things (IoT) and its industrial counterpart, the Industrial Internet of Things (IIoT), have revolutionized the way we live and work....

Read More
Person in front of laptop with open DriveLock software

5 min read

Enforcing The Human Firewall: The Key to Preventing Cyber Attacks

While firewalls, antivirus software, and intrusion detection systems serve as essential security layers, human error remains the weakest link in...

Read More
Elements which data protection definition covers

3 min read

How To Make Endpoint Security Easy And Effective

Managing endpoint security can feel like a constant uphill battle. Keeping up with the latest threats, ensuring all devices are patched and...

Read More