• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Cybersecurity Archive

How Seqrite Endpoint security solution can help you in setting up a secure business?

How Seqrite Endpoint security solution can help you in setting up a secure business?

Estimated reading time: 3 minutes

Enterprises, big or small, across all sectors are facing unprecedented cyber threats. Viruses, malware, DDoS and other kinds of attacks are increasing by the day. Additionally, the regulation for data security and other compliance requirements are also on the...
Read Blog
July 12, 2017

Top 5 security threats for retailers in digital age

Top 5 security threats for retailers in digital age

Estimated reading time: 3 minutes

Today businesses and corporations are increasingly adopting technologies to utilize the power that digitization provides. The retail industry sees increasing value in adopting this trend and they are continuously investing to provide a unique experience to customers. For instance,...
Read Blog
July 10, 2017

Why IoT ransomware should be taken seriously?

Why IoT ransomware should be taken seriously?

Estimated reading time: 3 minutes

In recent times, ransomware like WannaCry and Petya have infiltrated thousands of computers across the globe, crippled operations of at least a handful of enterprises and government agencies, and have so far proved to be an intractable problem. Their...
Read Blog
July 7, 2017

Impact of data breach on startups

Impact of data breach on startups

Estimated reading time: 3 minutes

Cyber breaches are a threat to almost all kinds of businesses. Many large organizations establish elaborate policies and deploy sophisticated technology to ensure security of their infrastructure as well as their data. Smaller companies and start-ups, however, are different....
Read Blog
July 6, 2017

5 Major ransomware attacks in the healthcare industry

5 Major ransomware attacks in the healthcare industry

Estimated reading time: 3 minutes

Ransomware attacks affect every industry; however, the healthcare industry is highly vulnerable to them simply because of the severity of risk involved. A ransomware attack may impact either the critical services or the administrative services of a hospital or...
Read Blog
July 5, 2017

Impact of WannaCry and Petya ransomware attack

Impact of WannaCry and Petya ransomware attack

Estimated reading time: 3 minutes

What’s the latest threat that keeps security administrators awake at night these days? Chances are, that the most definitive answer would be either “WannaCry” or “Petya”, or both. But why are these two breeds of malware so fearsome?  What’s...
Read Blog
July 3, 2017
1

Seqrite Endpoint Security v7.2 receives BEST+++ certification from AVLab

Seqrite Endpoint Security v7.2 receives BEST+++ certification from AVLab

Estimated reading time: < 1 minute

AVLab is an independent organization that conducts tests on security software for corporate networks and individual user devices. These tests are conducted by using malicious software, tools, and bypassing security techniques that are used in real cyberattacks. In April...
Read Blog
June 26, 2017

Need for Security Expert at Senior Level: CISO

Need for Security Expert at Senior Level: CISO

Estimated reading time: 3 minutes

You might be sitting relaxed in your office thinking that cyber threats are for others. My IT department is sufficient to take care of the security of my data and systems. Or probably, we aren’t that big or popular that...
Read Blog
June 16, 2017

Addressing the weakest link in cyber security: Human Error

Addressing the weakest link in cyber security: Human Error

Estimated reading time: 3 minutes

To err is human, to forgive is divine, and we all know it too well. But we have also witnessed multiple occasions when the impact of an error can be quite devastating. While we may forgive, but the damage...
Read Blog
June 15, 2017

5 Cyber Attacks that Shook the World

5 Cyber Attacks that Shook the World

Estimated reading time: 3 minutes

Cyber-crime, with sophisticated methods, has become a multi billion dollar industry. Cyber-crime has evolved to data breaches and online identity theft using highly technical methods such as network eavesdropping. The definition of most expensive attack or which one is most damaging varies according...
Read Blog
June 14, 2017
← Previous 1 … 30 31 32 33 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (20) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (324) cyber security (32) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (12) data protection (25) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies