Springe zum Hauptinhalt
COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT SecurityTo the Blog
Support
Service Desk Partner Portal

 

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT Security
To the BlogNewsletter

Blog

News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.

Access Control

6 min read

Identity Governance and Administration (IGA): The linchpin of your cyber security strategy

Managing user identities and access rights is one of the biggest challenges facing organizations. With ever-increasing cyber threats and the need to...

Read More
Digital lock above the laptop in the office

4 min read

Privileged access management: the key to strengthening your cyber defense

Data breaches are an ever-present threat in today's digital landscape. While many factors contribute to these incidents, one area plays a...

Read More
Data security: Keep track of OneDrive and Teams sharing links

5 min read

Managing access rights for resources

In our series of articles, we examine the risks of sharing files via OneDrive or Teams and provide tips on how to ensure information security without...

Read More
Person logging into the system

5 min read

Access control: the foundation of your digital security

Imagine your digital ecosystem as a house. It contains valuable information, sensitive data and critical systems. Access control acts as your...

Read More
Hacker on the laptop

4 min read

Introduction to the Deep Web: The Hidden Internet

From checking the latest news and shopping to communicating with friends and family - the internet is everywhere. But what most of us see and use is...

Read More
digitales Schloss

4 min read

Application Control: Robust Security Solution for Your Company

The number of attacks is constantly increasing and attackers are becoming more and more targeted and tricky. They specifically exploit the human...

Read More
Shield with a key lock on the computer system

5 min read

Five Steps to CMMC 2.0 Compliance

The Cybersecurity Maturity Model Certification (CMMC) 2.0 is more than just a compliance requirement for defense contractors—it's a strategic...

Read More
How to keep track of your OneDrive and Teams data sharing links

4 min read

How to keep track of your OneDrive and Teams data sharing links part 2

Our series of articles examines the risks of sharing files through OneDrive or Teams and offers advice on how to ensure information security without...

Read More
How to keep track of your OneDrive and Teams data sharing links

3 min read

How to keep track of your OneDrive and Teams data sharing links part 1

Have you ever stopped thinking about who has access to the files you've shared via OneDrive or Teams? With so much collaboration happening online...

Read More