• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite

Government Archive

Legacy Systems longing for enterprise attention?

Why should businesses boost the immunity of Legacy Systems?

Estimated reading time: 3 minutes

Legacy systems such as mainframes may be considered outdated by today’s standards but they continue to play major roles in many sectors, primarily finance, government, retail, healthcare and insurance. In these industries, they are crucial parts of day-to-day operations,...
Read More
August 6, 2020

Transparent Tribe Targeting Critical Indian Organizations

APTs Targeting Critical National Organizations

Estimated reading time: 5 minutes

Quick Heal Labs have been tracking this Cyber-espionage operation since 2016. We have identified this attack as operation m_project. From the past year, we have seen a surge in these APT activities. Modus operandi of the attackers have remained...
Read More
May 12, 2020

Seqrite helps Government bodies strengthen their defense

Estimated reading time: 3 minutes

If there is one type of organization which is a favorite of cyber criminals worldwide, it is government institutions. The reasons for that are obvious: most governments, whether at the state or the federal level, are massive behemoths with...
Read More
June 6, 2018

State-sponsored cyber attacks: New-age warfare

Estimated reading time: 3 minutes

The latest form that war between two countries has taken is cyber attacks. Simply put, a cyber attack is a deliberate exploitation of computer systems, technology-dependent enterprises and networks. While, no clear definition of cyber attack has yet been...
Read More
February 27, 2018
  • 16
    Shares

What makes the Government vulnerable to hackers?

Government vulnerabilities

Estimated reading time: 3 minutes

In 2014, the office of personnel management of US government was breached and records of about 18 million people were hacked. In India, four government websites were hacked and Aadhaar data (India’s social security scheme), of 130 million people...
Read More
September 25, 2017

Impact of malware/ransomware attacks on Government data

Government vulnerabilities

Estimated reading time: 3 minutes

Malware/ransomware attacks continue to affect the cyberspace with several critical sectors impacted in the worst possible manner. Cyber threats and instances of hacking are also succeeding at a rapid rate. That said, it is the Government data that’s actually...
Read More
September 19, 2017

How is new technology bringing risk to the Government?

Technological risks in Government

Estimated reading time: 4 minutes

Use of technology provides improvements in productivity, cost savings and more accurate process execution in almost all industries. This applies to both private and public sector (Government bodies). Use of technology reduces back logs, increases the speed of processes and improves overall...
Read More
September 15, 2017

5 Data breaches on Government Institutions across the globe

Estimated reading time: 3 minutes

No one is safe in the world of cybernetics, not even the Government organizations. Across the world, the Government organizations are a favorite target for hackers and cyber criminals. Be it for the value of the data held by the Government or...
Read More
September 12, 2017

Popular Posts

  • New Spear Phishing Campaign using Army Welfare Education Society’s Scholarship form New Spear Phishing Campaign using Army Welfare Education Society’s Scholarship form March 22, 2021
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • How to avoid dual attack and vulnerable files with double extension?

    How to avoid dual attack and vulnerable files with double extension?

    April 9, 2021
  • Cryptocurrency Malware: Bitcoin Mining threats you need to know about

    Cryptocurrency Malware: Bitcoin Mining threats you need to know about

    April 4, 2021
  • Zloader: Entailing Different Office Files

    Zloader: Entailing Different Office Files

    March 23, 2021

Stay Updated!

Topics

Antivirus For Linux (10) apt (10) Bitcoin (9) BYOD (9) COVID-19 (10) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (284) cyber security (26) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (103) Enterprise security (14) EPS (9) Exploit (12) firewall (11) GDPR (10) IoT (10) malware (59) malware attack (23) malware attacks (12) MDM (25) Network security (18) Patch Management (12) phishing (17) Ransomware (56) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite Workspace
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.