Springe zum Hauptinhalt
COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT Security

Drivelock_Service_Blog_CTA_EN

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT Security
Drivelock_Service_Newsletter_CTA

Drivelock_Service_Blog_CTA_EN

Blog

News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.

3 min read

Credential stuffing: The underestimated danger in the shadow of data leaks

At a time when new data leaks are making headlines almost daily, IT security teams - especially in critical organizations, the manufacturing industry and healthcare - are under enormous pressure. It is no longer enough to simply harden your own...

Read More
Man clicks on an e-mail icon

6 min read

Email spoofing: what you need to know

Daily email communication is essential for businesses and organizations, but it also carries significant risks. One of the biggest dangers is email...

Read More
Writing person on the laption

4 min read

Protect your company from spyware with our 7 tips

In today's digital era, we are more dependent on technology than ever before, but this dependence comes with risks. One of the underestimated threats...

Read More
Woman working on the computer during phishing attempt

8 min read

15 Types of Phishing Attacks: Strategies for Defense and Prevention

Phishing remains one of the most persistent and dangerous threats to the digital security of organizations, especially within critical sectors such...

Read More
Office space decorated with Christmas ornaments

5 min read

Recipe for secure IT: How to prepare your protection against cybercrime

The Christmas season is a time of joy, presents and a well-deservedvacation, butwhilewelook forward to cookies and contemplation, cyber criminals...

Read More

1 min read

From the idea to the battlefield

Innovation does not become a capability when it works technically - but when it can be operated securely, supported institutionally and made scalable.

Read More
Person holding a ball with digital connections

5 min read

9 useful tips on modern network security

We all leave behind digital traces - whether at work, when banking online or on social networks. These traces are valuable and in need of protection....

Read More
Hardware Firewall

5 min read

Comparison: Hardware firewall versus software firewall

Securing corporate networks against increasingly complex cyber threats is a core task for IT specialists, particularly in security-critical sectors...

Read More
Graphic of two people trying to enter a locked computer

5 min read

Compromised passwords: an underestimated risk for companies

Passwords are the cornerstone of our digital security - they are the first, often only, obstacle for unauthorized persons who want to access our...

Read More
Locked laptop

6 min read

10 tips for preventing data breaches

Recent headlines about massive data breaches have once again reminded us how vulnerable our personal information is in the digital world. Whether...

Read More