12 min read
15 different types of cyberattacks
In this relentless digital battlefield, businesses and organizations are pitted against a multitude of adversaries ranging from individual hackers...
News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.
12 min read
In this relentless digital battlefield, businesses and organizations are pitted against a multitude of adversaries ranging from individual hackers...
6 min read
In the current age of digitalization, companies across various sectors and sizes face a growing risk of cyberattacks. Despite implementing...
4 min read
In this blog post, we will clrify to you what is a social engineering, how do hackers proceed in order to get confidential data from you and, we will...
5 min read
Cyber hygiene - these are simple security principles that every organisation should know and implement to keep all sensitive data under control and...
3 min read
In our article "Security Awareness Programs: IT Security Starts with the Users." we discussed that the users need to feel involved with the awareness...
4 min read
Cybersecurity is a hot topic that has penetrated the corners of our society. Regional newspapers regularly write about cyber attacks on local...
4 min read
More and more new malware variants and so-called fileless attack vectors threaten corporate networks. The AV-TEST Institute registers more than...
3 min read
In our last blog post " Silent hacker attacks and the need for detection mechanisms" we talked about covert cyber attacks and the need for detection...
2 min read
In recent weeks, the coronavirus has become the main topic for the global population, health authorities, politicians and organisations. For hackers,...
3 min read
Entering into a new decade requires businesses and professionals to rethink, reconsider and update their approach to IT security and ensuring the...