Springe zum Hauptinhalt

Mega-Menü-Produkt-Services_Pfeil

HYPERSECURE PlatformZero Trust Strategy

 

COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT SecurityTo the Blog
Support
Service Desk Partner  Portal

 

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT SecurityTo the Blog

Blog

News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.

#Blog (4)

How to keep track of your OneDrive and Teams data sharing links

4 min read

How to keep track of your OneDrive and Teams data sharing links part 2

Our series of articles examines the risks of sharing files through OneDrive or Teams and offers advice on how to ensure information security without...

Read More
How to keep track of your OneDrive and Teams data sharing links

3 min read

How to keep track of your OneDrive and Teams data sharing links part 1

Have you ever stopped thinking about who has access to the files you've shared via OneDrive or Teams? With so much collaboration happening online...

Read More
DriveLock announces partnership with Torsion Information Security, a London-based SaaS software provider

2 min read

DriveLock expands its product portfolio with Torsion

With a new cloud-based access control solution for Microsoft 365, documents are securely shared within the company and unauthorized access is avoided...

Read More
Woman writing press release

4 min read

12 tips on preventing social engineering attacks

In this blog post, we will clrify to you what is a social engineering, how do hackers proceed in order to get confidential data from you and, we will...

Read More
Man sitting in front of DriveLock's laptop in the office

4 min read

5 reasons to run DriveLock in the cloud

Your organization is much safer with a good security product. That’s a fact. But think of all the work: With an on-premises solution you’ll have to...

Read More
DriveLocks Stand auf der Messe

1 min read

DriveLock's new brand identity

DriveLock with a new look & feel DriveLock has enhanced its brand identity as part of the strategic focus to position its endpoint protection...

Read More
Shocked man in front of computer

6 min read

Desperately Seeking a BitLocker Recovery Key!

National Security authorities recommend hard disk encryption as an effective measure for protecting data on desktop clients and notebooks in a...

Read More
Woman in glasses looking at the code

3 min read

EDR - the Sherlock Holmes of cyber security

In our last blog post " Silent hacker attacks and the need for detection mechanisms" we talked about covert cyber attacks and the need for detection...

Read More
3 red lock and 1 blue lock within numeric code

2 min read

4 Essential Strategies for IT Security

The Australian Cyber Security Centre (ACSC) is an Australian Government intelligence and security agency who provides advice and assistance on...

Read More
Graphic of investigation

2 min read

Modern Endpoint Security & EDR

The importance of endpoint security continues to be prevalent in today's threat landscape as 70% of all breaches are found to have originated from...

Read More