Springe zum Hauptinhalt
COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT SecurityTo the Blog
Support
Service Desk Partner Portal

 

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT Security
To the BlogNewsletter

Blog

News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.

Digital lock over the laptop

6 min read

Adware is not malware, but still a threat

In today's digital world, cyberattacks are a constant threat, and adware attacks are one of the most common forms of malware. Adware can not only affect the user experience, but also jeopardize security and privacy.

Read More
Man sitting in front of a computer at work

7 min read

12 onion websites: A look at the dark web

In the depths of the internet, there is an area that is not accessible via conventional search engines: the dark web. This part of the internet is...

Read More
Anzeige mit Cybersicherheitssymbolen

7 min read

Application Whitelising: Securing Data Encryption Through Controlled Execution

While data encryption forms a fundamental layer of protection, ensuring only trusted applications can access and process encrypted data is equally...

Read More
VPN graphic with lock, computer, network

8 min read

The importance of VPNs for secure business

One of the key technologies that plays a decisive role in this is the Virtual Private Network (VPN). VPNs have become an indispensable tool in...

Read More
Router with various connectors

4 min read

IP addresses: The hidden risks to your company network security

An IP address is the cornerstone of digital communication in any working environment and serves as a unique identifier for devices connected to a...

Read More
Security signature on the computer

4 min read

How companies can benefit from two-factor authentication?

In a digitized world where companies and businesses are increasingly reliant on technology and online services, the security of sensitive data and...

Read More
Keyboard with a fingerprint on it

7 min read

Your enterprise Single Sign-On security guide

Efficient identity and access management is crucial for modern organizations to ensure both the security and user-friendliness of their digital...

Read More
Hacker on the laptop

6 min read

Introduction to the Deep Web: The Hidden Internet

From checking the latest news and shopping to communicating with friends and family - the internet is everywhere. But what most of us see and use is...

Read More
Military equipment

5 min read

Cybersecurity measures in the defense sector in Germany

The classic concept of defense - tanks, planes, troops - is now supplemented by a battlefield that is invisible to the naked eye: cyberspace. For the...

Read More
DNS meaning in a graphic

8 min read

The invisible threat: understanding DNS leaks and their impact

Data protection and online security are of paramount importance. From encrypting your connection to using VPNs (Virtual Private Networks), there are...

Read More