3 min read
How to keep track of your OneDrive and Teams data sharing links part 1
Have you ever stopped thinking about who has access to the files you've shared via OneDrive or Teams? With so much collaboration happening online...
News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.
3 min read
Have you ever stopped thinking about who has access to the files you've shared via OneDrive or Teams? With so much collaboration happening online...
4 min read
In this blog post, we will clrify to you what is a social engineering, how do hackers proceed in order to get confidential data from you and, we will...
4 min read
Your organization is much safer with a good security product. That’s a fact. But think of all the work: With an on-premises solution you’ll have to...
1 min read
DriveLock with a new look & feel DriveLock has enhanced its brand identity as part of the strategic focus to position its endpoint protection...
6 min read
National Security authorities recommend hard disk encryption as an effective measure for protecting data on desktop clients and notebooks in a...
3 min read
In our last blog post " Silent hacker attacks and the need for detection mechanisms" we talked about covert cyber attacks and the need for detection...
2 min read
The Australian Cyber Security Centre (ACSC) is an Australian Government intelligence and security agency who provides advice and assistance on...
2 min read
The importance of endpoint security continues to be prevalent in today's threat landscape as 70% of all breaches are found to have originated from...
2 min read
by Alfred Ortiz, CEO of CyberSoftwareDistributors LLC and Doctoral Candidate in Information Systems at IE University in Madrid, Spain.