Springe zum Hauptinhalt
COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT Security

Drivelock_Service_Blog_CTA_EN

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT Security
Drivelock_Service_Newsletter_CTA

Drivelock_Service_Blog_CTA_EN

Blog

News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.

Security Awareness (3)

open, red lock on the dark blue background

11 min read

14 different types of cyberattacks

In this relentless digital battlefield, businesses and organizations are pitted against a multitude of adversaries ranging from individual hackers...

Read More
Gesichertes Passwort auf dem Laptop

7 min read

21 Essential Steps to Take When Your Company Faces a Cyber Attack

In the current age of digitalization, companies across various sectors and sizes face a growing risk of cyber attacks. Despite implementing...

Read More
Woman writing press release

6 min read

12 tips on preventing social engineering attacks

Imagine this: A cybercriminal doesn't need to be a coding genius to break into your systems. Sometimes, the most potent weapon isn't a complex piece...

Read More
A woman in front of the computer during work

5 min read

Mastering Cyber Hygiene: Your Organisation Security Health

Cyber hygiene - these are simple security principles that every organisation should know and implement to keep all sensitive data under control and...

Read More
Two people pointing at the digital lock logo

4 min read

Security Awareness Campaigns And Zero Trust

Security Awareness Programs: IT Security Starts with the Users." we discussed that the users need to feel involved with the awareness programs in...

Read More
Man in front of DriveLock laptop

5 min read

Security Awareness Programs: IT Security Starts with the Users

Cybersecurity is a hot topic that has penetrated the corners of our society. Regional newspapers regularly write about cyber attacks on local...

Read More
Two team mates sitting in fornt of DriveLock laptop

5 min read

Cybersecurity Awareness Training - How It Works

More and more new malware variants and so-called fileless attack vectors threaten corporate networks. The AV-TEST Institute registers more than...

Read More
Woman in glasses looking at the code

7 min read

EDR - the Sherlock Holmes of cyber security

In our last blog post "Silent hacker attacks and the need for detection mechanisms" we talked about covert cyber attacks and the need for detection...

Read More
Hacker in front of computer after breaking in

2 min read

The Coronavirus gives hackers more freedom to infiltrate your network

In recent weeks, the coronavirus has become the main topic for the global population, health authorities, politicians and organisations. For hackers,...

Read More
Trends written in the search bar

4 min read

3 Cybersecurity Trends For 2020

Entering into a new decade requires businesses and professionals to rethink, reconsider and update their approach to IT security and ensuring the...

Read More