Skip to content
Remote Wipe | Data Breach Protection
Menu

Category: Data Breach

A data breach occurs when someone gains unauthorized access to confidential data. This can have devastating and long-lasting consequences for those affected.

Cybersecurity Excellence / Data Breach / Data Breach Protection / Mobile Device Management / Privacy Awareness / Risk Mitigation

Securing your Smart Home: Threat Response

To keep your smart devices in your home secure, prevention measures are essential, but sometimes threats can get through an unseen gap in defenses or through methods outside of your …

Cybersecurity Excellence / Data Breach / Data Breach Protection / Mobile Device Management / Privacy Awareness / Risk Mitigation

Securing Your Smart Home: Threat Deterrence

The Internet of Things (IoT) is a widespread reality – phones, laptops, watches, tablets, appliances, and other smart devices are present in almost every part of our lives. The IoT …

CCPA / Cybersecurity Excellence / Data Breach / Data Breach Protection / GDPR / Privacy Awareness / Risk Mitigation

The Consequences of a Data Breach

In 2019, there were 1,473 data breaches in the United States alone – a 17% increase from the previous year. Though breaches can vary in scale and severity, they have …

Cybersecurity Excellence / Data Breach / Data Breach Protection / Mobile Device Management / Privacy Awareness / Risk Mitigation

UHS Cyberattack Exposes Harsh Reality of Healthcare Security Weaknesses

Over the weekend, Universal Health Services (UHS) was hit by a cyberattack that targeted their network. Anonymous sources have reported that all computer systems are down, and medical staff are …

Cybersecurity Excellence / Data Breach / Data Breach Protection / Mobile Device Management / Privacy Awareness / Risk Mitigation

Data Security in the Age of Covid-19

Much of the new normal is here to stay – threats and solutions alike. Here’s what you need to know to keep your data and devices safe.   Remote work …

CCPA / Cybersecurity Excellence / Data Breach / Data Breach Protection / GDPR / Mobile Device Management / Privacy Awareness / Risk Mitigation

3 Steps to Safer Remote Learning

With the continuing concern of Covid-19, many school districts are planning to have all or mostly online classes this fall. Remote learning comes with a variety of challenges, and it …

Installing DriveStrike
Cybersecurity Excellence / Data Breach / Data Breach Protection / GDPR / Mobile Device Management / Privacy Awareness / Risk Mitigation

How to Create a Bootable Windows Install USB

Step #1: Use a functioning Windows PC that is connected to the internet (8GB of free disk space required). Step #2: Insert a blank external USB thumb drive into the …

BitLocker Integration
Cybersecurity Excellence / Data Breach / Data Breach Protection / GDPR / Mobile Device Management / Privacy Awareness / Risk Mitigation

DriveStrike + BitLocker Integration for Windows Available Now

Windows Remote Encryption   With DriveStrike’s Windows BitLocker integration deploying and enabling whole drive encryption has never been easier. DriveStrike provides added data security at no additional cost while easing …

Cybersecurity Excellence / Data Breach / Data Breach Protection / GDPR / Mobile Device Management / Privacy Awareness / Risk Mitigation

Google Partners with DriveStrike EMM

DriveStrike Becomes Android EMM Partner SALT LAKE CITY, Utah — DriveStrike, the Smart Choice in mobile device security and management, today announced that it is recognized by Google™ as a …

CCPA / Cybersecurity Excellence / Data Breach / Data Breach Protection / GDPR / Privacy Awareness / Risk Mitigation

CCPA: What Is It & How Do I Comply?

California Consumer Privacy Act (CCPA): The essentials… The California Consumer Privacy Act (CCPA) is a data privacy law effective January 1, 2020. The data security framework and regulations apply to …

MFA
Cybersecurity Excellence / Data Breach / Data Breach Protection / Mobile Device Management / Risk Mitigation

Multifactor Authentication Prevents 99.9% of Cyber Attacks

Experts from Microsoft, Google, and elsewhere suggest that users who enable multi-factor authentication (MFA) for their accounts end up blocking 99.9% of automated aka bot attacks. DriveStrike proudly supports MFA …

HIPAA Breach AMCA
Data Breach / Data Breach Protection / Mobile Device Management / Risk Mitigation

AMCA Data Breach Exposes Millions

On May 10th, DataBreaches.net reported the American Medical Collection Agency breach, Gemini Advisory found information from 200,000 payment cards for sale on the dark web. Gemini’s investigation links the breached …

Prevent Data Breach
Cybersecurity Excellence / Data Breach / Data Breach Protection / Mobile Device Management / Privacy Awareness / Risk Mitigation

4 Steps to Avoid a HIPAA Data Breach & Fine

HIPAA compliance violations are costly yet easily avoidable with a little due diligence. In the last year more than 80,000 health records were exposed in a data breach because an …

DriveStrike Apple Device Enrollment Program
Cybersecurity Excellence / Data Breach / Data Breach Protection / GDPR / Mobile Device Management / Privacy Awareness / Risk Mitigation

DriveStrike’s Apple Device Enrollment Program is Available

DriveStrike’s Apple Device Enrollment Program Apple’s Device Enrollment Program (DEP) enables you to purchase devices from Apple (or authorized resellers) with DriveStrike automatically installed, helping you: Ease the IT burden on setting …

how to wipe a phone
Data Breach / Data Breach Protection / GDPR / Mobile Device Management / Risk Mitigation

How to Remotely Wipe a Phone

Your phone is missing, now what? I know it is frightening to consider the risk, all of your personal information: pictures, videos, facebook, instagram, twitter, email, banking information, tax information, …

Enterprise Data Security
Data Breach / Data Breach Protection / Mobile Device Management / Risk Mitigation

How To Find a Stolen Laptop

Your laptop is missing, now what? I know it is frightening to consider the risk, all of your personal information: pictures, videos, facebook, instagram, twitter, email, banking information, tax information, …

Terminated Employee Has Our Data
Data Breach / Data Breach Protection / Mobile Device Management / Risk Mitigation

Terminated Employee Won’t Return Our Laptop – Now What?

The Questions We receive questions on this topic nearly every day… The questions range from: Can I wipe a laptop offline? Can I disable a laptop I don’t have access …

DriveStrike Medical Device Data Protection
Data Breach / Data Breach Protection / GDPR / Mobile Device Management / Risk Mitigation

Medical Device Data Protection Available Now

Spearstone Announces DriveStrike Medical Device Data Breach Protection Offering Spearstone, is a leader in data and device security. Spearstone’s DriveStrike, expands its software solution services to provide data breach protection, …

Data Breach Protection
Data Breach / Data Breach Protection / GDPR / Mobile Device Management / Risk Mitigation

GDPR Compliance Help

GDPR compliance, data privacy, data security, HIPAA, privacy policy, cookie policy, SOX, data breach protection, the list goes on and on. If you use the internet you can’t escape the …

Remote Wipe Mobile Device Protection
Data Breach / Data Breach Protection / Mobile Device Management

Mobile Device Management Policy Examples

The DriveStrike team recommends implementing and enforcing mobile device management best practices and policies. Companies with employees, contractors, or vendors who access company data using any mobile computing device are …

Posts navigation

Older posts
Newer posts

Blog Categories

  • CCPA
  • Cybersecurity Excellence
  • Data Breach
  • Data Breach Protection
  • GDPR
  • Mobile Device Management
  • Privacy Awareness
  • Risk Mitigation
  • Uncategorized

General Information

Product Information

Keep Updated
Copyright © 2023 DriveStrike Remote Wipe
Translate »
Remote Wipe | Data Breach Protection
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}