• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Security Archive

Security Threats in Cloud Computing

Security Threats in Cloud Computing

Estimated reading time: 4 minutes

Security Threats in Cloud Computing More and more organizations are moving to cloud-based computing. Not only data, but even software and systems are being hosted on cloud. With the rise of remote working and ‘Bring Your Own Device’ culture,...
Read Blog
June 11, 2017

Aligning Cybersecurity with Business Objectives

Aligning Cybersecurity with Business Objectives

Estimated reading time: 2 minutes

A report by Center for Strategic and International Studies revealed that there are three levels of misaligned incentives that work against cyber security in organizations: The corporate structure of organizations vs free flow of criminal enterprises: The incentives of attackers are shaped by...
Read Blog
June 10, 2017

Impact of Major Cyber-attacks Across the Globe

Impact of Major Cyber-attacks Across the Globe

Estimated reading time: 3 minutes

Cyber-attacks have become a lucrative money-making business for criminals, inviting smarter, more sophisticated hackers to launch advanced and complex attacks on organizations. Modern times demand that almost all of companies’ information, be it financial, process-related, customer or intellectual property,...
Read Blog
June 3, 2017

Security Challenges and Solutions to Ensure Cyber Security in FinTech

Security Challenges and Solutions to Ensure Cyber Security in FinTech

Estimated reading time: 2 minutes

The FinTech or financial technology industry, by its very nature, is favorite of hackers. As per the current status of FinTech organization’s security, you must have seen several security hacks, breaches, or data leaks in the past few years. In 2016,...
Read Blog
June 1, 2017

Seqrite EPS with Centralized Patch Management – Proven Security Approach for Ransomware Protection

Seqrite EPS with Centralized Patch Management – Proven Security Approach for Ransomware Protection

Estimated reading time: < 1 minute

Patch, patch and patch ! This has been the go-to mantra of security professionals and the recent WannaCry ransomware attack has highlighted its importance once again. A large number of PCs worldwide were not patched with the latest update...
Read Blog
May 22, 2017

Brute force attack on Microsoft SQL

Brute force attack on Microsoft SQL

Estimated reading time: 2 minutes

In recent events, we have been observing that hackers have started targeting Microsoft SQL(MSSQL) servers using its open TCP port. The database is configured with weak password, despite administrators agreeing to the importance of it. The reasons could be ease...
Read Blog
May 4, 2017

Why should cybersecurity be a part of your Financial Budget?

Why should cybersecurity be a part of your Financial Budget?

Estimated reading time: 2 minutes

Organizations across the world that experienced a cyberattack have suffered huge revenue losses. Cybersecurity is a business priority and it is important that the C-suite must understand the importance of enterprise security and fund it appropriately. No enterprise, big...
Read Blog
February 13, 2017

Spear Phishing: What is it and how it can affect your business security

Spear Phishing: What is it and how it can affect your business security

Estimated reading time: 3 minutes

What is Spear Phishing? Spear phishing is a variation of a phishing scam wherein hackers send a targeted email to an individual which appears to be from a trusted source. The agenda of these mails like any other cyber...
Read Blog
January 16, 2017

Cybersecurity for Financial Services

Cybersecurity for Financial Services

Estimated reading time: 3 minutes

No doubt financial services sector continues to be an attractive target for hackers. In 2016, we saw a huge number of cyberattacks on banks and other financial services companies. A single security breach can affect the organization as well...
Read Blog
January 9, 2017

Top Seqrite features and solutions that made a mark in 2016

Top Seqrite features and solutions that made a mark in 2016

Estimated reading time: 4 minutes

No business is too small to evade a cyber-attack or data breach. Enterprise security has moved beyond traditional antivirus solutions and it’s time that cybersecurity becomes an important aspect of any organization’s financial budget. If 2016 has been the...
Read Blog
December 31, 2016
← Previous 1 … 18 19 20 21 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies