Springe zum Hauptinhalt

Blog

News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.

DriveLock announces partnership with Safetech Innovations Global Services

2 min read

DriveLock Announces First Intercontinental Partnership with Safetech Innovations Global Services

DriveLock SE, the leading specialist for preventive IT security solutions from Germany, today announces a new global partnership in the field of cloud-based endpoint security with Safetech Innovations Global Services Ltd (Safetech). With this...

Read More

3 min read

Cybersecurity Risk Assessment from A to Z

In our increasingly interconnected world, where data flows freely and digital landscapes expand at a breakneck pace, the need for robust...

Read More
Supply chain management process on the tablet

3 min read

Guarding Your Business: How to Defend Against Supply Chain Attacks

In an age of increasing digital interconnectedness, businesses find themselves constantly on guard against a wide array of cyber threats. Among...

Read More
Woman doing Christmas online shopping by usage of credit card

3 min read

Protect Yourself from Holiday Phishing Attacks with our 6 Tips

The holiday season is a time of joy, giving, and unfortunately, increased cyber threats. As we gear up for festive celebrations, cybercriminals are...

Read More
Two female legal advisors in the office

5 min read

13 tips on Ensuring Cyber Safety in Legal Offices

In the digital age, the legal landscape is rapidly evolving, and with it comes a critical imperative: cyber safety. As the legal profession...

Read More
Hypersecure Logo on the blue background

1 min read

DriveLock introduces their new HYPERSECURE Platform

When it comes to crafting proactive Endpoint IT security solutions originating from Germany, DriveLock is the standout expert. Today DriveLock...

Read More
A code blocked by a lock

9 min read

From Myth to Malware: The Evolution of Trojan Horse Viruses

In the vast landscape of cybersecurity threats, few adversaries have proven as cunning and adaptable as the Trojan horse virus. Like its namesake...

Read More
Virus danger on the computer

6 min read

Understanding Keyloggers: How to Defend Against Them

From confidential client information to sensitive business strategies, protecting this data is essential for maintaining trust, compliance, and...

Read More
Hacker in front of a computer

3 min read

Everything you need to know about spear phishing attacks

Among the many tactics employed by cybercriminals, one particularly insidious and targeted form of attack stands out: spear phishing. Spear phishing...

Read More
Green caption You got hacked on the computer screen

7 min read

The Anatomy Of A Phishing Attack

Among the numerous cyber threats lurking on the horizon, phishing attacks have emerged as a formidable adversary. Like a stealthy predator, these...

Read More