Springe zum Hauptinhalt

Mega-Menü-Produkt-Services_Pfeil

HYPERSECURE PlatformZero Trust Strategy

 

COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT SecurityTo the Blog
Support
Service Desk Partner Portal

 

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT Security
To the BlogNewsletter

Blog

News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.

Zero Trust

Person, die auf einer schwarzen Tastatur tippt

4 min read

Top Penetration Testing Tools for Ethical Hackers

In the ever-evolving landscape of cybersecurity, penetration testing tools are the ethical hacker's best friend. Ethical hacking is often referred to...

Read More
How to keep track of your OneDrive and Teams data sharing links

4 min read

How to keep track of your OneDrive and Teams data sharing links part 2

Our series of articles examines the risks of sharing files through OneDrive or Teams and offers advice on how to ensure information security without...

Read More
How to keep track of your OneDrive and Teams data sharing links

3 min read

How to keep track of your OneDrive and Teams data sharing links part 1

Have you ever stopped thinking about who has access to the files you've shared via OneDrive or Teams? With so much collaboration happening online...

Read More
Woman writing press release

4 min read

12 tips on preventing social engineering attacks

In this blog post, we will clrify to you what is a social engineering, how do hackers proceed in order to get confidential data from you and, we will...

Read More
Two people pointing at the digital lock logo

3 min read

Security Awareness Campaigns And Zero Trust

In our article "Security Awareness Programs: IT Security Starts with the Users." we discussed that the users need to feel involved with the awareness...

Read More
Holzwürfel mit Buchstaben

1 min read

Release 2021.2 – DriveLock Operations Center is the Central Console

The second major release of this year is notably not only for extensive improvements but also for the unification of management and configuration...

Read More
Secutiry written in numerical code

4 min read

Could Kaseya VSA supply chain ransomware attack have been prevented?

The background story is that despite the existence of the Kaseya vulnerability, a decent endpoint security solution could have provided better...

Read More
Checklist marked in red

2 min read

Are you compliant for essential 8 in cyber security?

“There are only two types of companies: those that have been hacked, and those that will be." Former FBI Director Robert Mueller No one can escape...

Read More
Logo of ISG Lens

1 min read

DriveLock Named as Leader for Data Leakage/Loss

Prevention Solutions ISG Provider Lens™ lauds zero-trust approach, solution features and lack of backdoor in a country with extremely demanding data...

Read More
3 red lock and 1 blue lock within numeric code

2 min read

4 Essential Strategies for IT Security

The Australian Cyber Security Centre (ACSC) is an Australian Government intelligence and security agency who provides advice and assistance on...

Read More