Springe zum Hauptinhalt

Blog

News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.

Zero Trust

How to keep track of your OneDrive and Teams data sharing links

4 min read

How to keep track of your OneDrive and Teams data sharing links part 2

Our series of articles examines the risks of sharing files through OneDrive or Teams and offers advice on how to ensure information security without...

Read More
How to keep track of your OneDrive and Teams data sharing links

3 min read

How to keep track of your OneDrive and Teams data sharing links part 1

Have you ever stopped thinking about who has access to the files you've shared via OneDrive or Teams? With so much collaboration happening online...

Read More
Woman writing press release

4 min read

12 tips on preventing social engineering attacks

In this blog post, we will clrify to you what is a social engineering, how do hackers proceed in order to get confidential data from you and, we will...

Read More
Two people pointing at the digital lock logo

3 min read

Security Awareness Campaigns And Zero Trust

In our article "Security Awareness Programs: IT Security Starts with the Users." we discussed that the users need to feel involved with the awareness...

Read More
Holzwürfel mit Buchstaben

1 min read

Release 2021.2 – DriveLock Operations Center is the Central Console

The second major release of this year is notably not only for extensive improvements but also for the unification of management and configuration...

Read More
Secutiry written in numerical code

4 min read

Could Kaseya VSA supply chain ransomware attack have been prevented?

The background story is that despite the existence of the Kaseya vulnerability, a decent endpoint security solution could have provided better...

Read More
Checklist marked in red

2 min read

Are you compliant for essential 8 in cyber security?

“There are only two types of companies: those that have been hacked, and those that will be." Former FBI Director Robert Mueller No one can escape...

Read More
Logo of ISG Lens

1 min read

DriveLock Named as Leader for Data Leakage/Loss

Prevention Solutions ISG Provider Lens™ lauds zero-trust approach, solution features and lack of backdoor in a country with extremely demanding data...

Read More
3 red lock and 1 blue lock within numeric code

2 min read

4 Essential Strategies for IT Security

The Australian Cyber Security Centre (ACSC) is an Australian Government intelligence and security agency who provides advice and assistance on...

Read More
Graphic of investigation

2 min read

Modern Endpoint Security & EDR

The importance of endpoint security continues to be prevalent in today's threat landscape as 70% of all breaches are found to have originated from...

Read More