• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Retail/Manufacturing Archive

The manufacturing industry’s major cybersecurity challenges

The manufacturing industry’s major cybersecurity challenges

Estimated reading time: 3 minutes

Until recently, the manufacturing sector as a whole rarely took cyber threats seriously. This was primarily due to the domain’s outlook that it was a highly specialized industry and hence would not be on the radar of cyberattackers. The...
Read Blog
August 29, 2019

The retail industry’s major cybersecurity challenges

The retail industry’s major cybersecurity challenges

Estimated reading time: 3 minutes

The retail sector has always been at the risk of cyberattacks. The industry has already seen high-profile data breaches, some of which have happened in the recent past at large retail brands, lucrative to cyberattackers, such as Target, TJX...
Read Blog
August 27, 2019

What not to do if your business is the victim of a cyber attack

What not to do if your business is the victim of a cyber attack

Estimated reading time: 3 minutes

It is not a situation any network administrator ever wants to be in. Yet, considering the multitude of attacks nowadays, the possibility of being in such a situation is getting more and more likely. The last year has shown...
Read Blog
February 28, 2018
7
Shares

Diving deep into the Business Email Compromise

Diving deep into the Business Email Compromise

Estimated reading time: 3 minutes

Business Email Compromise is the new kid in the block in cyber crime space. As per an FBI report, Business Email Compromise (BEC) has affected more than 130 countries since October 2013 and the global losses or attempted losses...
Read Blog
February 14, 2018

Machine Learning: How close we are in Defeating Online Payment Fraud?

Machine Learning: How close we are in Defeating Online Payment Fraud?

Estimated reading time: 3 minutes

The unhindered growth of e-commerce and its impact has seemingly increased the risks of online fraud. Moreover, the attacks have amplified in terms of magnitude as the technologies adopted by the hackers are getting persuasive and more powerful, with...
Read Blog
February 12, 2018

What is the right time to audit your cybersecurity program?

What is the right time to audit your cybersecurity program?

Estimated reading time: 4 minutes

In November 2017, Forever 21, a Los Angeles based clothing retailer, announced that a potential data breach might have affected some of its customers. On investigating, they found that the “encryption and tokenization solution” implemented in 2015 might not...
Read Blog
January 23, 2018
14
Shares

What is Disaster Recovery as a Service (DRaaS)?

What is Disaster Recovery as a Service (DRaaS)?

Estimated reading time: 3 minutes

Disasters, whether they are natural or man-made, can strike anytime without any kind of due notice. Any business, small or big, will need to anticipate the possibility of such disasters and have a plan in place. While one tactic...
Read Blog
January 17, 2018
12
Shares

How consumers see privacy and cyber risks?

How consumers see privacy and cyber risks?

Estimated reading time: 3 minutes

There is a general perception that modern-day consumers, while being savvy on all digital and social media platforms, don’t give a lot of thought to internet security. As it turns out though, that is just a perception. The reality...
Read Blog
January 5, 2018
3
Shares

Cybersecurity tips for retailers and consumers

Cybersecurity tips for retailers and consumers

Estimated reading time: 4 minutes

The holiday season has arrived, and it is high time that consumers and retailers make arrangements for staying one step ahead of the prevalent holiday scams. With trouble lurking in the shadows due to multiple spikes in spending habits,...
Read Blog
December 22, 2017

How third-party risks are becoming a rising threat to the organization?

How third-party risks are becoming a rising threat to the organization?

Estimated reading time: 3 minutes

These days, businesses are reliant on third-party vendors who give them end-to-end support in every aspect. These third parties can easily access all the sensitive and confidential information of the client. In some cases, most of these third parties...
Read Blog
December 13, 2017
7
Shares
1 2 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies