• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Monthly Archive:: June 2017

Protecting your Enterprise from Phishing Attacks

Protecting your Enterprise from Phishing Attacks

Estimated reading time: 3 minutes

In 2016, according to a report by a security training company (wombat security), 86% of the companies reported being a victim of phishing attacks. As many as 67% companies were the target of spear phishing. Phishing attacks cause severe damage to...
Read Blog
June 20, 2017

The threat of data loss at unsecured endpoints

The threat of data loss at unsecured endpoints

Estimated reading time: 3 minutes

Data theft or loss by employees is a reality no one can deny. The cost of one such internal breach at Bank of America was 10 million USD. According to a study by Verizon, almost 20% of the all the data...
Read Blog
June 19, 2017

Importance of Security Threat Intelligence

Importance of Security Threat Intelligence

Estimated reading time: 3 minutes

Hackers are continuously innovating new ways of cyber-attacks. The malware are getting commercialized and attackers can launch spam and DDOS attacks at will. Many attackers modify their already discovered ‘malicious products’ (the malware) to keep ahead of anti-malware industry and security professionals. As...
Read Blog
June 18, 2017

Building a Security Incident Response Plan

Building a Security Incident Response Plan

Estimated reading time: 3 minutes

Over the last few years, the Governments of many countries around the world have become sensitive towards inadequate protection of consumer data by the companies. Many of them have enacted various laws and regulations to protect this sensitive data. The late 1990s...
Read Blog
June 17, 2017

Need for Security Expert at Senior Level: CISO

Need for Security Expert at Senior Level: CISO

Estimated reading time: 3 minutes

You might be sitting relaxed in your office thinking that cyber threats are for others. My IT department is sufficient to take care of the security of my data and systems. Or probably, we aren’t that big or popular that...
Read Blog
June 16, 2017

Addressing the weakest link in cyber security: Human Error

Addressing the weakest link in cyber security: Human Error

Estimated reading time: 3 minutes

To err is human, to forgive is divine, and we all know it too well. But we have also witnessed multiple occasions when the impact of an error can be quite devastating. While we may forgive, but the damage...
Read Blog
June 15, 2017

5 Cyber Attacks that Shook the World

5 Cyber Attacks that Shook the World

Estimated reading time: 3 minutes

Cyber-crime, with sophisticated methods, has become a multi billion dollar industry. Cyber-crime has evolved to data breaches and online identity theft using highly technical methods such as network eavesdropping. The definition of most expensive attack or which one is most damaging varies according...
Read Blog
June 14, 2017

CertLock Trojan can disable your antivirus software

CertLock Trojan can disable your antivirus software

Estimated reading time: 2 minutes

An antivirus software keeps your computer safe from malware, viruses, online threats, and suspicious or harmful elements. Although bypassing this protective guard is a difficult task for attackers, they never stop trying to do so. Recently, we came across...
Read Blog
June 13, 2017

Dealing with Insider Threats: A Brief Guide for CISOs

Dealing with Insider Threats: A Brief Guide for CISOs

Estimated reading time: 3 minutes

Cyber security threats are among the top concerns of an enterprise, with the fear and nervousness fueled by the recent incidents of massive security breaches and ransomware attacks. But what is less well known is that more than half of these security...
Read Blog
June 12, 2017

Security Threats in Cloud Computing

Security Threats in Cloud Computing

Estimated reading time: 4 minutes

Security Threats in Cloud Computing More and more organizations are moving to cloud-based computing. Not only data, but even software and systems are being hosted on cloud. With the rise of remote working and ‘Bring Your Own Device’ culture,...
Read Blog
June 11, 2017
← Previous 1 2 3 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies