What You Need to Know About Laptop Theft…
Laptops contain valuable data – making them profitable targets for thieves, scammers, and fraudsters. It may not be a huge financial burden to replace one stolen device, but a resulting …
A data breach occurs when someone gains unauthorized access to confidential data. This can have devastating and long-lasting consequences for those affected.
Laptops contain valuable data – making them profitable targets for thieves, scammers, and fraudsters. It may not be a huge financial burden to replace one stolen device, but a resulting …
Since more people are working, banking, shopping, and learning from home, there has been an increase in digital data storage and use. Digital transformation is a trend that has become …
Device & Data Security Solutions for Businesses The economy is experiencing serious consequences since the advent of Covid-19, and businesses are overwhelmed trying to keep up with the rapidly …
In the current age of cloud computing and the Internet of Things, information is at our fingertips. This helps to improve communication, meet customer expectations, and streamline business processes. On …
Companies are reporting fewer data breaches in 2020. This would appear to be excellent news – it means structural security changes from 2019 have been making an impact and protecting …
To keep your smart devices in your home secure, prevention measures are essential, but sometimes threats can get through an unseen gap in defenses or through methods outside of your …
The Internet of Things (IoT) is a widespread reality – phones, laptops, watches, tablets, appliances, and other smart devices are present in almost every part of our lives. The IoT …
In 2019, there were 1,473 data breaches in the United States alone – a 17% increase from the previous year. Though breaches can vary in scale and severity, they have …
Over the weekend, Universal Health Services (UHS) was hit by a cyberattack that targeted their network. Anonymous sources have reported that all computer systems are down, and medical staff are …
Much of the new normal is here to stay – threats and solutions alike. Here’s what you need to know to keep your data and devices safe. Remote work …
With the continuing concern of Covid-19, many school districts are planning to have all or mostly online classes this fall. Remote learning comes with a variety of challenges, and it …
Step #1: Use a functioning Windows PC that is connected to the internet (8GB of free disk space required). Step #2: Insert a blank external USB thumb drive into the …
Windows Remote Encryption With DriveStrike’s Windows BitLocker integration deploying and enabling whole drive encryption has never been easier. DriveStrike provides added data security at no additional cost while easing …
DriveStrike Becomes Android EMM Partner SALT LAKE CITY, Utah — DriveStrike, the Smart Choice in mobile device security and management, today announced that it is recognized by Google™ as a …
California Consumer Privacy Act (CCPA): The essentials… The California Consumer Privacy Act (CCPA) is a data privacy law effective January 1, 2020. The data security framework and regulations apply to …
Experts from Microsoft, Google, and elsewhere suggest that users who enable multi-factor authentication (MFA) for their accounts end up blocking 99.9% of automated aka bot attacks. DriveStrike proudly supports MFA …
On May 10th, DataBreaches.net reported the American Medical Collection Agency breach, Gemini Advisory found information from 200,000 payment cards for sale on the dark web. Gemini’s investigation links the breached …
HIPAA compliance violations are costly yet easily avoidable with a little due diligence. In the last year more than 80,000 health records were exposed in a data breach because an …
DriveStrike’s Apple Device Enrollment Program Apple’s Device Enrollment Program (DEP) enables you to purchase devices from Apple (or authorized resellers) with DriveStrike automatically installed, helping you: Ease the IT burden on setting …
Your phone is missing, now what? I know it is frightening to consider the risk, all of your personal information: pictures, videos, facebook, instagram, twitter, email, banking information, tax information, …
