» Insights | DataLocker Inc.

DataLocker Blog

FEATURE STORY

DataLocker Introduces Sentry 5: The Ultimate Hardware Encrypted USB Flash Drive for Compliance and Security

Read More

Welcome to the DataLocker blog, your home for DataLocker’s thoughts on the trends moving the cybersecurity industry. Bad actors are constantly developing new ways to attack and steal your data – don’t get caught in the dark. Follow the DataLocker blog for the latest in security vulnerabilities and how you can better protect your remote data.


May 25, 2021 | DataLocker Blog

In our digital world, Two-Factor Authentication can play a crucial role in safeguarding confidential data. By combining encryption with  password protection, many businesses are enhancing their overall data security. To make the process easier, many businesses are turning to devices like the YubiKey to ensure secure authentication without much inconvenience. But what exactly is a […]

Read more


two-factor authentication

May 24, 2021 | DataLocker Blog

When it comes to ensuring cybersecurity, Two-Factor Authentication (2FA) is one of the the most popular authentication methods. Individuals usually rely on basic password security, but cybercriminals are sophisticated enough to breach passwords and harvest sensitive data. Here, 2FA adds an extra layer of security by requiring two methods of authentication to access any databases […]

Read more


May 24, 2021 | DataLocker Blog

These days everything is online and password security may not be enough to prevent data from getting in the hands of hackers. Luckily, Two-Factor authentication can add an additional layer of security to the standard password approach. As tech improves, experts continue to develop new forms of 2FA for better security, some even involving powerful […]

Read more


March 25, 2021 | DataLocker Blog

The internet has simplified the way we work. But as it’s grown, so too has the amount of cybercrime. In fact, the FBI reports that the reported losses due to cybercrime exceeded $4.1 Billion in 2020. . Large and small businesses as well as individual accounts  are all vulnerable to attack by expert cyber criminals, […]

Read more


March 17, 2021 |

BJC is a non-profit healthcare organization operating in over 12 hospitals in the St. Louis area. They were seeking a way to ensure that employees could keep sensitive data protected, even in remote work environments. Download the full case study below to see how they kept their data safe  

Read more


February 25, 2021 |

Businesses are seeing more and more instances of data breach. What can you do? In our latest infographic we explore 15 ways you can prevent data breach. We cover industries ranging from public sector and healthcare all the way to finance and manufacturing. Click the image below to explore.  

Read more


February 3, 2021 | Katie Leverman

After succumbing to ransomware, businesses paid hackers an average of $84K to get their data back. And although the number of businesses reporting having been attacked by ransomware has gone down, it’s not because ransomware is happening less frequently. It’s because attackers are becoming more sophisticated and more targeted in their approach. Fewer businesses overall […]

Read more


January 29, 2021 | Katie Leverman

2020 was a rough year. While many of the year’s events were difficult to predict and perhaps unavoidable (COVID-19, wildfires, and civil unrest, etc.), many of 2020’s massive data breaches were predictable and completely avoidable. Perhaps the most noteworthy attack was the recent SolarWinds debacle in which Russian state actors entered the networks of several […]

Read more


May 16, 2020 | DataLocker Blog

Thunderspy allows for evil maid type attacks against a host computer. Evil maid attacks require physical access to the victim’s machine and usually enough time to do something conspicuous such as disassembly. A successful attack will give the intruder direct memory access to the machine which gives them the ability to compromise all local security […]

Read more


March 24, 2020 | DataLocker Blog

As many companies move to a remote teleworking environment there is increased concern about how to keep sensitive data at rest secure. What can be done to provide workers with secure and stable storage using DataLocker’s centrally managed software solutions? Encrypt local data allowing offline work if the Internet becomes temporarily clogged SafeCrypt utilizes military-grade […]

Read more