• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

Healthcare: Cybersecurity risks with vendors

Healthcare: Cybersecurity risks with vendors

Estimated reading time: 3 minutes

There has been a surge in cyber attacks in the healthcare industry. Ransomware attacks have increased across all sectors, but healthcare industry is particularly vulnerable to such attacks. Getting locked out of systems while handling critical patient data or operational...
Read Blog
September 6, 2017

Risks of using outdated software, OS, and browsers

Risks of using outdated software, OS, and browsers

Estimated reading time: 3 minutes

Computer systems evolve at a breakneck pace. Every now and then, there are newer versions of software including web browsers, operating systems, and databases. These upgrades not only have better features but also have better security features built into them. However, many times...
Read Blog
September 4, 2017

Seqrite Cybersecurity Quiz

Seqrite Cybersecurity Quiz

Estimated reading time: < 1 minute

Are you one of those who know-it-all about cybersecurity? Test you knowledge with this cybersecurity quiz and tweet your scores to @Seqrite with #SeqriteQuiz.
Read Blog
September 1, 2017
1

Why your startup needs dedicated security solutions?

Why your startup needs dedicated security solutions?

Estimated reading time: 3 minutes

Startups usually have a lot on their plate when it comes to managing finances and security solutions. However, more often than not, the budding entrepreneurs fall short of resources needed for hiring the concerned workforce. While some resort to...
Read Blog
August 31, 2017

Cybersecurity News Rundown August 2017

Cybersecurity News Rundown August 2017

Estimated reading time: 2 minutes

Welcome to our Cybersecurity News Rundown for the month of August 2017. Here, we will be sharing latest and trending news on events and technological updates from the world of cybersecurity that happened over the past month. Make sure...
Read Blog
August 31, 2017

Malspam Campaign using CVE-2017-0199 Targets Manufacturing, Pharmaceutical and other important Industries

Malspam Campaign using CVE-2017-0199 Targets Manufacturing, Pharmaceutical and other important Industries

Estimated reading time: 4 minutes

Quick Heal Security Labs has come across various email campaigns that are actively exploiting the famous vulnerability CVE-2017-0199 in their bid to target prominent private industries in India. CVE-2017-0199 was a zero-day vulnerability reported in April 2017 by two...
Read Blog
August 30, 2017

Why should you keep a back-up of all your data?

Why should you keep a back-up of all your data?

Estimated reading time: 3 minutes

Modern businesses depend heavily on the continuous availability of data be it of the customer, product, employee or financial. Data, in any form (files, emails, collaboration tool or database) must always be available when required. Just like any other asset, loss...
Read Blog
August 29, 2017
7
Shares

Not investing in cybersecurity can lead to ‘Inverse ROI’ for your business

Not investing in cybersecurity can lead to ‘Inverse ROI’ for your business

Estimated reading time: 3 minutes

Almost every country spends a large amount of its wealth on its military. It spends billions of dollars in buying latest arms and ammunition. Yet, barring a few instances, those weapons are hardly used. To a layman, it seems...
Read Blog
August 28, 2017

5 steps for a successful incident response plan

5 steps for a successful incident response plan

Estimated reading time: 3 minutes

There is no foolproof security system anywhere in the world yet. Despite the best of security measures and best of the teams, breaches do occur. There is no point living in a make-believe world where implementation of the top of the...
Read Blog
August 25, 2017

How cyber criminals attract users by launching interesting phishing email subject lines?

How cyber criminals attract users by launching interesting phishing email subject lines?

Estimated reading time: 3 minutes

Email is one of the favorite mediums of attack for cyber criminals. They launch spyware, ransomware, viruses and other kinds of malware and phishing attacks using emails. The user only needs to click the link in the email or open the...
Read Blog
August 24, 2017
← Previous 1 … 60 61 62 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (321) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies