6 min read
Hackers vs. companies: 12 strategies for defence against hacking
In an era where technology is ubiquitous and data has become a valuable resource, the concept of hacking has taken on a prominent role. From hacking...
News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.
6 min read
In an era where technology is ubiquitous and data has become a valuable resource, the concept of hacking has taken on a prominent role. From hacking...
6 min read
The digital landscape is rapidly evolving, and with it, the threats that companies face daily. Data leaks and losses can have serious consequences...
3 min read
June 2024 marked the 11th anniversary of the Harvard Faculty Club's Maximize Your Board's Potential program. It was the second time I've had the...
2 min read
The human firewall is the first and most important line of defence in the fight against cyberattacks. With the DriveLock Human Risk & Awareness...
2 min read
Today more than ever, the digital landscape requires powerful security measures to effectively counter the numerous cyber security threats. In view...
1 min read
With networking and globalisation in the automotive industry, internal and external risks for companies are growing. The TISAX® (Trusted Information...
6 min read
The darknet, also known as the dark web, is a hidden part of the internet that cannot be accessed via normal search engines such as Google or Bing....
6 min read
A proxy server acts as an intermediary between a client and a server. It allows clients to establish indirect network connections to other servers...
7 min read
Against the backdrop of growing threats to corporate data, hard drive encryption is no longer an option, but a necessity. BitLocker, Windows'...
3 min read
The number of attacks is constantly increasing and attackers are becoming more and more targeted and tricky. They specifically exploit the human...