Welcome to the DataLocker blog, your home for DataLocker’s thoughts on the trends moving the cybersecurity industry. Bad actors are constantly developing new ways to attack and steal your data – don’t get caught in the dark. Follow the DataLocker blog for the latest in security vulnerabilities and how you can better protect your remote data.
When it comes to ensuring cybersecurity, Two-Factor Authentication (2FA) is one of the the most popular authentication methods. Individuals usually rely on basic password security, but cybercriminals are sophisticated enough to breach passwords and harvest sensitive data. Here, 2FA adds an extra layer of security by requiring two methods of authentication to access any databases […]
These days everything is online and password security may not be enough to prevent data from getting in the hands of hackers. Luckily, Two-Factor authentication can add an additional layer of security to the standard password approach. As tech improves, experts continue to develop new forms of 2FA for better security, some even involving powerful […]
The internet has simplified the way we work. But as it’s grown, so too has the amount of cybercrime. In fact, the FBI reports that the reported losses due to cybercrime exceeded $4.1 Billion in 2020. . Large and small businesses as well as individual accounts are all vulnerable to attack by expert cyber criminals, […]
BJC is a non-profit healthcare organization operating in over 12 hospitals in the St. Louis area. They were seeking a way to ensure that employees could keep sensitive data protected, even in remote work environments. Download the full case study below to see how they kept their data safe
Businesses are seeing more and more instances of data breach. What can you do? In our latest infographic we explore 15 ways you can prevent data breach. We cover industries ranging from public sector and healthcare all the way to finance and manufacturing. Click the image below to explore.
After succumbing to ransomware, businesses paid hackers an average of $84K to get their data back. And although the number of businesses reporting having been attacked by ransomware has gone down, it’s not because ransomware is happening less frequently. It’s because attackers are becoming more sophisticated and more targeted in their approach. Fewer businesses overall […]
2020 was a rough year. While many of the year’s events were difficult to predict and perhaps unavoidable (COVID-19, wildfires, and civil unrest, etc.), many of 2020’s massive data breaches were predictable and completely avoidable. Perhaps the most noteworthy attack was the recent SolarWinds debacle in which Russian state actors entered the networks of several […]
Thunderspy allows for evil maid type attacks against a host computer. Evil maid attacks require physical access to the victim’s machine and usually enough time to do something conspicuous such as disassembly. A successful attack will give the intruder direct memory access to the machine which gives them the ability to compromise all local security […]
As many companies move to a remote teleworking environment there is increased concern about how to keep sensitive data at rest secure. What can be done to provide workers with secure and stable storage using DataLocker’s centrally managed software solutions? Encrypt local data allowing offline work if the Internet becomes temporarily clogged SafeCrypt utilizes military-grade […]
What if your “laptop” only weighed 9 grams, never broke down, and took 3 minutes to issue out? DataLocker’s managed, encrypted USB drives can be utilized as thumbtops: smaller, smarter, tougher, lighter, and cheaper than a laptop. They allow your organization to stay compliant, secure, and productive. Compared to online virtual environments and remote PCs, […]