6 min read
12 tips on preventing social engineering attacks
Imagine this: A cybercriminal doesn't need to be a coding genius to break into your systems. Sometimes, the most potent weapon isn't a complex piece...
News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.
6 min read
Imagine this: A cybercriminal doesn't need to be a coding genius to break into your systems. Sometimes, the most potent weapon isn't a complex piece...
5 min read
Your organization is much safer with a good security product. That’s a fact. But think of all the work: With an on-premises solution you’ll have to...
1 min read
DriveLock with a new look & feel DriveLock has enhanced its brand identity as part of the strategic focus to position its endpoint protection...
5 min read
Cyber hygiene - these are simple security principles that every organisation should know and implement to keep all sensitive data under control and...
4 min read
Security Awareness Programs: IT Security Starts with the Users." we discussed that the users need to feel involved with the awareness programs in...
5 min read
Cybersecurity is a hot topic that has penetrated the corners of our society. Regional newspapers regularly write about cyber attacks on local...
5 min read
More and more new malware variants and so-called fileless attack vectors threaten corporate networks. The AV-TEST Institute registers more than...
3 min read
U.S. companies seeking contracts from the U.S. Department of Defense (DoD) and other federal agencies are required to demonstrate strict IT security...
1 min read
DriveLock has been voted one of the Champions in Endpoint Protection in the "Professional User Rating - Security Solutions (PUR-S)" survey conducted...
National information security authorities are warning: A critical vulnerability, also known as Log4Shell, LogJam or CVE-2021-44228, has been detected...