Springe zum Hauptinhalt

Mega-Menü-Produkt-Services_Pfeil

HYPERSECURE PlatformZero Trust Strategy

 

COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT SecurityTo the Blog
Support
Service Desk Partner  Portal

 

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT SecurityTo the Blog

Blog

News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.

Cyber Security (4)

A woman in front of the computer during work

4 min read

Cyber Hygiene: 6 Useful Tipps

Cyber hygiene - these are simple security principles that every organisation should know and implement to keep all sensitive data under control and...

Read More
Two people pointing at the digital lock logo

3 min read

Security Awareness Campaigns And Zero Trust

In our article "Security Awareness Programs: IT Security Starts with the Users." we discussed that the users need to feel involved with the awareness...

Read More
Man in front of DriveLock laptop

4 min read

Security Awareness Programs: IT Security Starts with the Users

Cybersecurity is a hot topic that has penetrated the corners of our society. Regional newspapers regularly write about cyber attacks on local...

Read More
Two team mates sitting in fornt of DriveLock laptop

3 min read

Cyber Security Awareness Training - How It Works

More and more new malware variants and so-called fileless attack vectors threaten corporate networks. The AV-TEST Institute registers more than...

Read More
Ingenieur in der Fabrik

3 min read

DriveLock support to achieve mandated CMMC and NIST certifications

U.S. companies seeking contracts from the U.S. Department of Defense (DoD) and other federal agencies are required to demonstrate strict IT security...

Read More
Digitales Schloss über dem Laptop

1 min read

PUR-S 2022: DriveLock Stays as the Endpoint Protection Champion

DriveLock has been voted one of the Champions in Endpoint Protection in the "Professional User Rating - Security Solutions (PUR-S)" survey conducted...

Read More
Cyber attack loading time

DriveLock Products Not Affected by Log4j Vulnerability

National information security authorities are warning: A critical vulnerability, also known as Log4Shell, LogJam or CVE-2021-44228, has been detected...

Read More
Cyber attack loading time

5 min read

Microsoft Exchange hack - when the patch came, it was already too late

Among a high-profile wave of cyberattacks in March 2021, tens of thousands of email servers worldwide fell victim due to a vulnerability in the...

Read More
Cyber Security Cloud

2 min read

Australian Businesses Under Attack - How To Protect Yourself

On June 19, Australian Prime Minister Scott Morrison reported that businesses are targeted by a sophisticated, state-based cyber actor. In recent...

Read More
Woman in glasses looking at the code

3 min read

EDR - the Sherlock Holmes of cyber security

In our last blog post " Silent hacker attacks and the need for detection mechanisms" we talked about covert cyber attacks and the need for detection...

Read More