• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Security Archive

Security mistakes in Fintech that can easily be avoided

Security mistakes in Fintech that can easily be avoided

Estimated reading time: 3 minutes

Financial industry is one of the most lucrative targets for cyber criminals. It is a rich source of information that can be directly used by them for personal gains. Attacks on financial enterprises happen on daily basis all around the world....
Read Blog
August 2, 2017

What is encryption and why it is important for your organization?

What is encryption and why it is important for your organization?

Estimated reading time: 3 minutes

In old days, the life in technology was simple with simple security issues. Hackers were amateurs who broke the security of networks just for fun. But today, cyber criminals use sophisticated technology to break into the secure network of...
Read Blog
August 1, 2017

3 Key Security Challenges for IoT

3 Key Security Challenges for IoT

Estimated reading time: 3 minutes

Internet of things (IoT) is no more just ‘the next big thing’ but has already started entering our lives in different forms. Today there are billions of devices from consumer products (e.g. Fitbit) to Industrial products (Industrial sensors) that...
Read Blog
July 27, 2017

Why Education Institutions Need Security Software?

Why Education Institutions Need Security Software?

Estimated reading time: 4 minutes

If you think that schools and colleges don’t need any cyber security as they don’t store any data that will interest criminals, think again. In May 2015, Pennsylvania State University’s engineering school was the target of a cyber attack. The...
Read Blog
July 24, 2017

Importance of information security in education sector

Importance of information security in education sector

Estimated reading time: 3 minutes

The education sector, especially institutions of higher education, have been the focus of Information Security Professionals in recent times. It has been observed that the education sector ranks very high in the list of targets for cyber-attacks. Investigations have...
Read Blog
July 19, 2017

A technical analysis of the Java RAT (Remote Access Trojan) Malware

A technical analysis of the Java RAT (Remote Access Trojan) Malware

Estimated reading time: 2 minutes

Remote Access Trojans are programs that allow attackers to gain unauthorized access to a targeted computer without the victim’s knowledge. Java RAT malware is a Trojan-Dropper written in Java. It is designed to steal passwords, access files, for keylogging...
Read Blog
July 17, 2017

5 Steps to secure healthcare data from breach

5 Steps to secure healthcare data from breach

Estimated reading time: 3 minutes

Cyber security breaches in the healthcare industry are very costly. In the USA alone they cost over $6 billion a year. Almost 90% of the hospitals report having suffered a breach over the last two years. These violations result in about half a million...
Read Blog
July 13, 2017

RIG Exploit Kit’s pre-landing page is still the same

RIG Exploit Kit’s pre-landing page is still the same

Estimated reading time: 2 minutes

Exploit Kits are dynamic in nature particularly in terms of their delivery mechanism. Their landing page i.e., the content is obfuscated and changed frequently in order to evade various security software. The RIG Exploit Kit, however, has a different...
Read Blog
July 7, 2017

General Data Protection Regulation

General Data Protection Regulation

Estimated reading time: 2 minutes

Regulation is the innovation Any data protection law is mostly drafted with a certain amount of jargon and the General Data Protection Regulation (GDPR) is no different. Many of us can hear the clock tick as the European Union is set...
Read Blog
June 29, 2017

Endpoint Security: Next Gen Threat Prevention

Endpoint Security: Next Gen Threat Prevention

Estimated reading time: 2 minutes

Gone are the days when employees used to walk into the office, login into their systems, finish their daily tasks and walk out. Today, the jobs scenario is different. Working from remote locations, signing in at different hours, logging...
Read Blog
June 23, 2017
← Previous 1 … 5 6 7 8 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (21) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (326) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies