4 min read
12 tips on preventing social engineering attacks
In this blog post, we will clrify to you what is a social engineering, how do hackers proceed in order to get confidential data from you and, we will...
News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.
4 min read
In this blog post, we will clrify to you what is a social engineering, how do hackers proceed in order to get confidential data from you and, we will...
4 min read
Cyber hygiene - these are simple security principles that every organisation should know and implement to keep all sensitive data under control and...
3 min read
In our article "Security Awareness Programs: IT Security Starts with the Users." we discussed that the users need to feel involved with the awareness...
4 min read
Cybersecurity is a hot topic that has penetrated the corners of our society. Regional newspapers regularly write about cyber attacks on local...
4 min read
More and more new malware variants and so-called fileless attack vectors threaten corporate networks. The AV-TEST Institute registers more than...
3 min read
In our last blog post " Silent hacker attacks and the need for detection mechanisms" we talked about covert cyber attacks and the need for detection...
2 min read
In recent weeks, the coronavirus has become the main topic for the global population, health authorities, politicians and organisations. For hackers,...
3 min read
Entering into a new decade requires businesses and professionals to rethink, reconsider and update their approach to IT security and ensuring the...
4 min read
TABLE OF CONTENT WHAT IS A FIREWALL? WHAT IS A HUMAN FIREWALL? STRENGTHEN YOUR FIREWALL'S WEAKEST LINK AVOID PREVENTABLE INCIDENTS HOW DRIVELOCK CAN...
3 min read
Data breaches and cyber threats loom like shadows in the digital landscape, underscoring the importance of encryption as a fundamental safeguard for...