• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Cybersecurity Archive

Addressing the weakest link in cyber security: Human Error

Addressing the weakest link in cyber security: Human Error

Estimated reading time: 3 minutes

To err is human, to forgive is divine, and we all know it too well. But we have also witnessed multiple occasions when the impact of an error can be quite devastating. While we may forgive, but the damage...
Read Blog
June 15, 2017

5 Cyber Attacks that Shook the World

5 Cyber Attacks that Shook the World

Estimated reading time: 3 minutes

Cyber-crime, with sophisticated methods, has become a multi billion dollar industry. Cyber-crime has evolved to data breaches and online identity theft using highly technical methods such as network eavesdropping. The definition of most expensive attack or which one is most damaging varies according...
Read Blog
June 14, 2017

Dealing with Insider Threats: A Brief Guide for CISOs

Dealing with Insider Threats: A Brief Guide for CISOs

Estimated reading time: 3 minutes

Cyber security threats are among the top concerns of an enterprise, with the fear and nervousness fueled by the recent incidents of massive security breaches and ransomware attacks. But what is less well known is that more than half of these security...
Read Blog
June 12, 2017

Cyber Security – Do Manufacturing Firms Need to Bother?

Cyber Security – Do Manufacturing Firms Need to Bother?

Estimated reading time: 3 minutes

A few years ago, who would have thought that Manufacturing companies could ever face any sort of cyber threat. Cyber threats were always a point of concern for the IT companies. However, today, the reality is quite different. Manufacturing...
Read Blog
June 9, 2017

How one computer ended up corrupting an entire company

How one computer ended up corrupting an entire company

Estimated reading time: 3 minutes

2012 witnessed one of its kind cyber-attack where a single infected computer led to a massive wipe out of data from 35000 computers. It all happened at Saudi Aramco, a leading petroleum and natural gas company. Let’s look in...
Read Blog
June 8, 2017

Dealing with Evolving Cyber Attacks

Dealing with Evolving Cyber Attacks

Estimated reading time: 2 minutes

Technology is an ever-evolving thing that also comes with certain amount of risks. Cyber attack is one such serious threat that we need to understand. It is really necessary to avoid these problems and focus on your business’s protection. Small businesses are relatively...
Read Blog
June 6, 2017

Need for Data Loss Prevention in Healthcare Industry

Need for Data Loss Prevention in Healthcare Industry

Estimated reading time: 4 minutes

A report published by the Ponemon Institute indicated that there were 106 major data breaches in the Healthcare Industry in 2016. The total number of patient records exposed was more than 13.5 million. The average loss for single record...
Read Blog
June 5, 2017

Latest AV-TEST report rates Seqrite EPS as ‘Top Product’ again

Latest AV-TEST report rates Seqrite EPS as ‘Top Product’ again

Estimated reading time: 2 minutes

In January and February 2017, AV-TEST tested 13 security products. AV-TEST considered only realistic test scenarios and tested the products against current threats. The products had to prove their abilities by using all functions and protection levels. Seqrite EPS received...
Read Blog
March 30, 2017

Cyber Security for the Education Sector

Cyber Security for the Education Sector

Estimated reading time: 3 minutes

Schools, colleges and universities possess huge records comprising critical information about students. They hold the responsibility of protecting confidential information of students which includes, grade sheets, transcripts, financial records etc. Here are some important cyber security suggestions to follow...
Read Blog
March 27, 2017
1

Facts we bet you didn’t know about enterprise security

Facts we bet you didn’t know about enterprise security

Estimated reading time: < 1 minute

1. Mobile will continue to rise as a point of entry for hackers. Seqrite Mobile Device Management allows enterprises to grant their employees the privilege of mobile productivity without boundaries. Know more: https://bit.ly/2mSlXDI 2. Employees’ mobile devices are already causing costly...
Read Blog
March 17, 2017
← Previous 1 … 30 31 32 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (21) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (326) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies