5 min read
Managing access rights for resources
In our series of articles, we examine the risks of sharing files via OneDrive or Teams and provide tips on how to ensure information security without...
News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.
5 min read
In our series of articles, we examine the risks of sharing files via OneDrive or Teams and provide tips on how to ensure information security without...
5 min read
Penetration testing tools are the ethical hacker's best friend. Ethical hacking is often referred to as "white-hat hacking," and it involves skilled...
4 min read
Our series of articles examines the risks of sharing files through OneDrive or Teams and offers advice on how to ensure information security without...
3 min read
Have you ever stopped thinking about who has access to the files you've shared via OneDrive or Teams? With so much collaboration happening online...
4 min read
In this blog post, we will clrify to you what is a social engineering, how do hackers proceed in order to get confidential data from you and, we will...
4 min read
Security Awareness Programs: IT Security Starts with the Users." we discussed that the users need to feel involved with the awareness programs in...
1 min read
The second major release of this year is notably not only for extensive improvements but also for the unification of management and configuration...
4 min read
The background story is that despite the existence of the Kaseya vulnerability, a decent endpoint security solution could have provided better...
2 min read
“There are only two types of companies: those that have been hacked, and those that will be." Former FBI Director Robert Mueller No one can escape...
1 min read
Prevention Solutions ISG Provider Lens™ lauds zero-trust approach, solution features and lack of backdoor in a country with extremely demanding data...