Securing your Smart Home: Threat Response
To keep your smart devices in your home secure, prevention measures are essential, but sometimes threats can get through an unseen gap in defenses or through methods outside of your …
A data breach occurs when someone gains unauthorized access to confidential data. This can have devastating and long-lasting consequences for those affected.
To keep your smart devices in your home secure, prevention measures are essential, but sometimes threats can get through an unseen gap in defenses or through methods outside of your …
The Internet of Things (IoT) is a widespread reality – phones, laptops, watches, tablets, appliances, and other smart devices are present in almost every part of our lives. The IoT …
In 2019, there were 1,473 data breaches in the United States alone – a 17% increase from the previous year. Though breaches can vary in scale and severity, they have …
Over the weekend, Universal Health Services (UHS) was hit by a cyberattack that targeted their network. Anonymous sources have reported that all computer systems are down, and medical staff are …
Much of the new normal is here to stay – threats and solutions alike. Here’s what you need to know to keep your data and devices safe. Remote work …
With the continuing concern of Covid-19, many school districts are planning to have all or mostly online classes this fall. Remote learning comes with a variety of challenges, and it …
Step #1: Use a functioning Windows PC that is connected to the internet (8GB of free disk space required). Step #2: Insert a blank external USB thumb drive into the …
Windows Remote Encryption With DriveStrike’s Windows BitLocker integration deploying and enabling whole drive encryption has never been easier. DriveStrike provides added data security at no additional cost while easing …
DriveStrike Becomes Android EMM Partner SALT LAKE CITY, Utah — DriveStrike, the Smart Choice in mobile device security and management, today announced that it is recognized by Google™ as a …
California Consumer Privacy Act (CCPA): The essentials… The California Consumer Privacy Act (CCPA) is a data privacy law effective January 1, 2020. The data security framework and regulations apply to …
Experts from Microsoft, Google, and elsewhere suggest that users who enable multi-factor authentication (MFA) for their accounts end up blocking 99.9% of automated aka bot attacks. DriveStrike proudly supports MFA …
On May 10th, DataBreaches.net reported the American Medical Collection Agency breach, Gemini Advisory found information from 200,000 payment cards for sale on the dark web. Gemini’s investigation links the breached …
HIPAA compliance violations are costly yet easily avoidable with a little due diligence. In the last year more than 80,000 health records were exposed in a data breach because an …
DriveStrike’s Apple Device Enrollment Program Apple’s Device Enrollment Program (DEP) enables you to purchase devices from Apple (or authorized resellers) with DriveStrike automatically installed, helping you: Ease the IT burden on setting …
Your phone is missing, now what? I know it is frightening to consider the risk, all of your personal information: pictures, videos, facebook, instagram, twitter, email, banking information, tax information, …
Your laptop is missing, now what? I know it is frightening to consider the risk, all of your personal information: pictures, videos, facebook, instagram, twitter, email, banking information, tax information, …
The Questions We receive questions on this topic nearly every day… The questions range from: Can I wipe a laptop offline? Can I disable a laptop I don’t have access …
Spearstone Announces DriveStrike Medical Device Data Breach Protection Offering Spearstone, is a leader in data and device security. Spearstone’s DriveStrike, expands its software solution services to provide data breach protection, …
GDPR compliance, data privacy, data security, HIPAA, privacy policy, cookie policy, SOX, data breach protection, the list goes on and on. If you use the internet you can’t escape the …
The DriveStrike team recommends implementing and enforcing mobile device management best practices and policies. Companies with employees, contractors, or vendors who access company data using any mobile computing device are …