6 min read
12 tips on preventing social engineering attacks
Imagine this: A cybercriminal doesn't need to be a coding genius to break into your systems. Sometimes, the most potent weapon isn't a complex piece...
News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.
6 min read
Imagine this: A cybercriminal doesn't need to be a coding genius to break into your systems. Sometimes, the most potent weapon isn't a complex piece...
5 min read
Cyber hygiene - these are simple security principles that every organisation should know and implement to keep all sensitive data under control and...
4 min read
Security Awareness Programs: IT Security Starts with the Users." we discussed that the users need to feel involved with the awareness programs in...
5 min read
Cybersecurity is a hot topic that has penetrated the corners of our society. Regional newspapers regularly write about cyber attacks on local...
5 min read
More and more new malware variants and so-called fileless attack vectors threaten corporate networks. The AV-TEST Institute registers more than...
7 min read
In our last blog post "Silent hacker attacks and the need for detection mechanisms" we talked about covert cyber attacks and the need for detection...
2 min read
In recent weeks, the coronavirus has become the main topic for the global population, health authorities, politicians and organisations. For hackers,...
4 min read
Entering into a new decade requires businesses and professionals to rethink, reconsider and update their approach to IT security and ensuring the...
8 min read
While firewalls, antivirus software, and intrusion detection systems serve as essential security layers, human error remains the weakest link in...
3 min read
Data breaches and cyber threats loom like shadows in the digital landscape, underscoring the importance of encryption as a fundamental safeguard for...