• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Monthly Archive:: January 2021

BEC and Ransomware attacks increase during the pandemic

BEC and Ransomware attacks increase during the pandemic

Estimated reading time: 2 minutes

The ongoing COVID-19 pandemic has had a far-reaching impact on the world as we know —it has also led to a huge increase in cyber frauds. Emboldened by the chaos and instability caused by the pandemic, threat actors have...
Read Blog
January 22, 2021

Are we prepared against risks generating from the IoT revolution?

Are we prepared against risks generating from the IoT revolution?

Estimated reading time: 2 minutes

According to IoT Analytics, the number of Internet of Things (IoT) devices is expected to grow to a massive 22 billion by 2025. Bain & Company estimates that the value of the combined IoT market to be USD 520...
Read Blog
January 15, 2021

Proactiveness is the key to resolving hybrid cloud’s security challenges

Proactiveness is the key to resolving hybrid cloud’s security challenges

Estimated reading time: 2 minutes

The hybrid cloud model is fast becoming the environment of choice for enterprises. The reasons are simple: this model offers a seamless mix of convenience and security. Chief Information Officers appreciate the convenience of hybrid cloud models, offering organizations...
Read Blog
January 6, 2021
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies