Blog | DataLocker Inc. 

DataLocker Blog

FEATURE STORY

DataLocker receives its Security Visa

Read More

Welcome to the DataLocker blog, your home for DataLocker’s thoughts on the trends moving the cybersecurity industry. Bad actors are constantly developing new ways to attack and steal your data – don’t get caught in the dark. Follow the DataLocker blog for the latest in security vulnerabilities and how you can better protect your remote data.


January 15, 2022 | DataLocker Blog

When archiving or backing up your digital assets or data, there are multiple choices.  While every company’s needs and requirements vary, there is no one-size-fits-all approach or solution to this. Here we’ll look at the advantages and pitfalls of USB drives, the most common storage option used by professionals and individuals for archive and backup.  […]

Read more


January 15, 2022 | DataLocker Blog

Data backup has become quite familiar with time. Most people are now creating data backups as they have to deal with adverse consequences otherwise. Almost 90% of companies are backing up their data, but only half maintain a daily schedule despite 42% having experienced data loss. The main reason is that companies don’t have sufficient […]

Read more


January 15, 2022 | DataLocker Blog

Businesses and organizations have a lot of essential data that they need to secure. If they lose their data, their daily operations will halt. You might try to secure your system in every way, but there is no way to make your system fool-proof.  Operating systems or hardware might crash, any employee can make errors, […]

Read more


January 15, 2022 | DataLocker Blog

As World Backup Day is around the corner, this is the right time to procure external devices and backup your important data. Even though most people have started backing up their data on secure servers, 54.5% still do not create data backup. This means that one in five people are at constant risk of losing […]

Read more


January 8, 2022 | DataLocker Blog

Established by the United States Department of Defense (DOD), the Cybersecurity Maturity Model Certification (CMMC) is a framework designed to fortify the cyber defenses of government contractors. The program aims to safeguard confidential information within the DOD supply chain by requiring comprehensive third-party assessments of the security practices of both contractors and subcontractors alike. In […]

Read more


January 8, 2022 | DataLocker Blog

The bidding arena for government contracts is fiercely competitive. However, security compliance can make winning those attractive bids a rather complex and costly proposition. This conundrum is further compounded by evolving requirements that are as dynamic as the attacks they strive to foil. CMMC demands that all companies obtain certification via an exhaustive assessment process […]

Read more


January 8, 2022 | DataLocker Blog

Since its reveal in 2019, there has been plenty of discussion surrounding CMMC and the game-changing implications it brings to light. Roughly two years later, the DOD unloaded yet another bombshell when announcing a new and improved version of the standard. CMMC 2.0 introduced significant changes to the original framework, most notably, the steps necessary […]

Read more


January 8, 2022 | DataLocker Blog

Self-assessment has long been a staple of regulatory compliance programs. Companies take the initiative to review and audit the systems and procedures they are responsible for, and then forward the results to the regulatory body overseeing the program. The problem with this model lies in the fact that not all parties applying for certification can […]

Read more


January 8, 2022 | DataLocker Blog

CMMC is one of the most important compliance standards to come along in the modern digital age. One could argue that is among the most complex as well. The DOD is demanding contractors to endure a rigid assessment process that technically, has never been conducted before. What’s more, CMMC is very much a work in […]

Read more


January 8, 2022 | DataLocker Blog

This next section will help you navigate the vast and complex world of CMMC compliance. We will overview the key terms, answer some of the most frequently asked questions about the framework, and provide access to resources that are sure to make a valuable addition to your CMMC toolkit. CMMC Glossary Controlled unclassified information (CUI): […]

Read more