Skip to content
DriveStrike Remote Wipe
Menu
  • Pricing
  • Solutions
    • SoHo & WFH
    • Professional & Midmarket
    • Enterprise
    • Healthcare
    • Education
  • Features
    • Locate
    • Lock
    • Wipe
    • Encryption
    • Android Management
    • KillStick – Offline Wipe
  • Resources
    • Support
    • How To
      • Install DriveStrike
      • Manage Android Policies
      • Remote Wipe Windows
      • Remote Wipe iPhone
      • Remote Wipe Mac
      • Remote Wipe Android
      • Remote Wipe Linux
      • Remotely Wipe Phones
      • Find a Stolen Laptop
    • Templates & Examples
    • Blog
    • FAQ
  • About Us
    • Contact Us
    • Awards
    • Consulting
  • Sign Up
  • Log In

Category: Data Breach

HIPAA Breach AMCA
Data Breach / Data Breach Protection / Mobile Device Management / Risk Mitigation

AMCA Data Breach Exposes Millions

On May 10th, DataBreaches.net reported the American Medical Collection Agency breach, Gemini Advisory found information from 200,000 payment cards for sale on the dark web. Gemini’s investigation links the breached …

Prevent Data Breach
Cybersecurity Excellence / Data Breach / Data Breach Protection / Mobile Device Management / Privacy Awareness / Risk Mitigation

4 Steps to Avoid a HIPAA Data Breach & Fine

HIPAA compliance violations are costly yet easily avoidable with a little due diligence. In the last year more than 80,000 health records were exposed in a data breach because an …

DriveStrike Apple Device Enrollment Program
Cybersecurity Excellence / Data Breach / Data Breach Protection / GDPR / Mobile Device Management / Privacy Awareness / Risk Mitigation

DriveStrike’s Apple Device Enrollment Program is Available

DriveStrike’s Apple Device Enrollment Program Apple’s Device Enrollment Program (DEP) enables you to purchase devices from Apple (or authorized resellers) with DriveStrike automatically installed, helping you: Ease the IT burden on setting …

how to wipe a phone
Data Breach / Data Breach Protection / GDPR / Mobile Device Management / Risk Mitigation

How to Remotely Wipe a Phone

Your phone is missing, now what? I know it is frightening to consider the risk, all of your personal information: pictures, videos, facebook, instagram, twitter, email, banking information, tax information, …

Enterprise Data Security
Data Breach / Data Breach Protection / Mobile Device Management / Risk Mitigation

How To Find a Stolen Laptop

Your laptop is missing, now what? I know it is frightening to consider the risk, all of your personal information: pictures, videos, facebook, instagram, twitter, email, banking information, tax information, …

Terminated Employee Has Our Data
Data Breach / Data Breach Protection / Mobile Device Management / Risk Mitigation

Terminated Employee Won’t Return Our Laptop – Now What?

The Questions We receive questions on this topic nearly every day… The questions range from: Can I wipe a laptop offline? Can I disable a laptop I don’t have access …

DriveStrike Medical Device Data Protection
Data Breach / Data Breach Protection / GDPR / Mobile Device Management / Risk Mitigation

Medical Device Data Protection Available Now

Spearstone Announces DriveStrike Medical Device Data Breach Protection Offering Spearstone, is a leader in data and device security. Spearstone’s DriveStrike, expands its software solution services to provide data breach protection, …

Data Breach Protection
Data Breach / Data Breach Protection / GDPR / Mobile Device Management / Risk Mitigation

GDPR Compliance Help

GDPR compliance, data privacy, data security, HIPAA, privacy policy, cookie policy, SOX, data breach protection, the list goes on and on. If you use the internet you can’t escape the …

Remote Wipe Mobile Device Protection
Data Breach / Data Breach Protection / Mobile Device Management

Mobile Device Management Policy Examples

The DriveStrike team recommends implementing and enforcing mobile device management best practices and policies. Companies with employees, contractors, or vendors who access company data using any mobile computing device are …

Data Breach Protection Software
Data Breach / Data Breach Protection / Mobile Device Management

What is a data breach and what do you do when you have one?

A data breach is any incident where sensitive, confidential or otherwise protected data is accessed or disclosed by unauthorized persons or means. Data breaches often involve personal health information (PHI), …

Posts navigation

Newer posts

Blog Categories

  • CCPA
  • Cybersecurity Excellence
  • Data Breach
  • Data Breach Protection
  • GDPR
  • Mobile Device Management
  • Privacy Awareness
  • Risk Mitigation
  • Uncategorized

General Information

  • Site Map
  • About Us
  • Contact Us
  • Cookie Policy
  • Privacy Policy
  • User Agreement
  • Awards & Testimonials
  • DriveStrike GDPR Privacy Policy

Product Information

  • Remote Wipe
  • DriveStrike Support
  • Pricing – Free 30 Day Trial
  • Frequently Asked Questions (FAQ)
  • Mobile Device Management
  • Data Breach Protection
  • Tracking Laptops & Mobile Devices
  • Managing Android Device Policies
  • How To Find a Stolen Laptop
  • News & Information
  • Resources
  • Services
Keep Updated
Copyright © 2020 DriveStrike Remote Wipe
Translate »
We use cookies to give you the best experience on our website. Continuing to use our website implies you accept the use of our cookies.OkRead more