Springe zum Hauptinhalt
COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT SecurityTo the Blog
Support
Service Desk Partner Portal

 

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT Security
To the BlogNewsletter

DriveLock

Different types of mobile devices

6 min read

Web proxy: An introduction and its advantages

The threat of cyber attacks and data leaks is constantly increasing. Companies are faced with the challenge of protecting their networks without limiting the productivity of their employees. This is where the web proxy comes into play - an...

Read More
malware on laptop

7 min read

15 Essential Types of Malware

A security breach is more than a technical headache; it represents a direct threat to patient safety and production continuity. When a hospital...

Read More

3 min read

Credential stuffing: The underestimated danger in the shadow of data leaks

At a time when new data leaks are making headlines almost daily, IT security teams - especially in critical organizations, the manufacturing industry...

Read More
Man clicks on an e-mail icon

6 min read

Email spoofing: what you need to know

Daily email communication is essential for businesses and organizations, but it also carries significant risks. One of the biggest dangers is email...

Read More
Writing person on the laption

4 min read

Protect your company from spyware with our 7 tips

In today's digital era, we are more dependent on technology than ever before, but this dependence comes with risks. One of the underestimated threats...

Read More
Woman working on the computer during phishing attempt

8 min read

15 Types of Phishing Attacks: Strategies for Defense and Prevention

Phishing remains one of the most persistent and dangerous threats to the digital security of organizations, especially within critical sectors such...

Read More
Office space decorated with Christmas ornaments

5 min read

Recipe for secure IT: How to prepare your protection against cybercrime

The Christmas season is a time of joy, presents and a well-deservedvacation, butwhilewelook forward to cookies and contemplation, cyber criminals...

Read More

1 min read

From the idea to the battlefield

Innovation does not become a capability when it works technically - but when it can be operated securely, supported institutionally and made scalable.

Read More
Person holding a ball with digital connections

5 min read

9 useful tips on modern network security

We all leave behind digital traces - whether at work, when banking online or on social networks. These traces are valuable and in need of protection....

Read More
Hardware Firewall

5 min read

Comparison: Hardware firewall versus software firewall

Securing corporate networks against increasingly complex cyber threats is a core task for IT specialists, particularly in security-critical sectors...

Read More