• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Cybersecurity Tips Archive

Multi-layered approach is the key towards cybersecurity

Multi-layered approach is the key towards cybersecurity

Estimated reading time: 3 minutes

With the cybersecurity threat-landscape evolving with each passing day, it becomes important that organizations opt for newer and safer strategies for staying functional without worrying about cyber-threats. Moreover, organizations must readily focus on cybersecurity while keeping a track of...
Read Blog
January 9, 2018
5
Shares

Tips to create a cybersecure culture at work

Tips to create a cybersecure culture at work

Estimated reading time: 3 minutes

Analyzing the cyberthreat landscape shows that many attacks and security incidents usually plague either the IT companies or small and medium businesses. While IT organizations are impacted due to their excessive exposure to the cyber world; organizations with low...
Read Blog
December 25, 2017
2
Shares

Cybersecurity tips for retailers and consumers

Cybersecurity tips for retailers and consumers

Estimated reading time: 4 minutes

The holiday season has arrived, and it is high time that consumers and retailers make arrangements for staying one step ahead of the prevalent holiday scams. With trouble lurking in the shadows due to multiple spikes in spending habits,...
Read Blog
December 22, 2017

Lessons security professionals should learn from the year 2017

Lessons security professionals should learn from the year 2017

Estimated reading time: 4 minutes

2017 has been a year of several high-profile cyber-attacks with an excruciatingly large number of breaches originating from third-party software modules and compromised accounts. With hackers constantly trying to gain access to confidential data sets, it is important to...
Read Blog
December 20, 2017

5 Reasons why startups need to boost their cyber-resilience

5 Reasons why startups need to boost their cyber-resilience

Estimated reading time: 3 minutes

Be it a board member or CXO, every individual associated with the cybersecurity business must be well versed with cyber-resilience.  Quite often, we see this term surfacing in the news, social feeds and even general conversations, making this discussion...
Read Blog
October 26, 2017

What is a Business Email Compromise (BEC) attack? How Seqrite can help in protecting your business email?

What is a Business Email Compromise (BEC) attack? How Seqrite can help in protecting your business email?

Estimated reading time: 3 minutes

A few months back, FBI released a report stating that Business Email Compromise or rather BEC scams usually cost businesses around  $3.1 billion. In addition to that, FBI also warned organizations regarding “Man-in-the-Email” and “CEO Fraud”; some of the...
Read Blog
October 19, 2017

How to defend your organization’s data on both sides of the perimeter?

How to defend your organization’s data on both sides of the perimeter?

Estimated reading time: 2 minutes

Defending the organizational perimeter from data breaches forms the crux of an existing security strategy. Neutralizing potential damages emanating out of cybersecurity threats is possible only if the data sets are secured across both sides of the perimeter. When...
Read Blog
October 13, 2017

CVE-2017-11826 – Microsoft Office Memory Corruption Vulnerability – Alert!

CVE-2017-11826 – Microsoft Office Memory Corruption Vulnerability – Alert!

Estimated reading time: < 1 minute

The recent zero-day vulnerability in Microsoft Office vulnerability CVE-2017-11826 enables attackers to perform a Remote Code Execution on targeted machines. According to a recently published blog post, this vulnerability is being exploited in the wild. Microsoft has released a security update on October 10, 2017,...
Read Blog
October 13, 2017

Cybercriminals know the importance of your data. Do you?

Cybercriminals know the importance of your data. Do you?

Estimated reading time: 3 minutes

Educating oneself when it comes to cybersecurity is extremely important and should always be stressed upon. A better understanding of this subject increases the chances of staying safe from the existing threats. More often than not, the importance of...
Read Blog
October 10, 2017

5 key takeaways from major data breaches

5 key takeaways from major data breaches

Estimated reading time: 3 minutes

Cyber-attacks, hacks or data breaches have become common in recent times. Be it large scale businesses or a startup; no one is safe from the ever-growing cyber threat landscape. While keeping track of all cyber-attacks is not possible for...
Read Blog
September 18, 2017
← Previous 1 2 3 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (23) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (327) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (109) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (23) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies