• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

5 Steps to secure healthcare data from breach

5 Steps to secure healthcare data from breach

Estimated reading time: 3 minutes

Cyber security breaches in the healthcare industry are very costly. In the USA alone they cost over $6 billion a year. Almost 90% of the hospitals report having suffered a breach over the last two years. These violations result in about half a million...
Read Blog
July 13, 2017

How Seqrite Endpoint security solution can help you in setting up a secure business?

How Seqrite Endpoint security solution can help you in setting up a secure business?

Estimated reading time: 3 minutes

Enterprises, big or small, across all sectors are facing unprecedented cyber threats. Viruses, malware, DDoS and other kinds of attacks are increasing by the day. Additionally, the regulation for data security and other compliance requirements are also on the...
Read Blog
July 12, 2017

A single infected computer can cost your business millions of dollars, know how to save

A single infected computer can cost your business millions of dollars, know how to save

Estimated reading time: 4 minutes

It was August 5th, 2012, when a massive cyber-attack crippled operations of one of the world’s leading petroleum and natural gas company, Saudi Aramco. A Virus named ‘Shamoon’ wiped out data from 35,000 computers bringing most of their operations...
Read Blog
July 11, 2017

Top 5 security threats for retailers in digital age

Top 5 security threats for retailers in digital age

Estimated reading time: 3 minutes

Today businesses and corporations are increasingly adopting technologies to utilize the power that digitization provides. The retail industry sees increasing value in adopting this trend and they are continuously investing to provide a unique experience to customers. For instance,...
Read Blog
July 10, 2017

RIG Exploit Kit’s pre-landing page is still the same

RIG Exploit Kit’s pre-landing page is still the same

Estimated reading time: 2 minutes

Exploit Kits are dynamic in nature particularly in terms of their delivery mechanism. Their landing page i.e., the content is obfuscated and changed frequently in order to evade various security software. The RIG Exploit Kit, however, has a different...
Read Blog
July 7, 2017

Why IoT ransomware should be taken seriously?

Why IoT ransomware should be taken seriously?

Estimated reading time: 3 minutes

In recent times, ransomware like WannaCry and Petya have infiltrated thousands of computers across the globe, crippled operations of at least a handful of enterprises and government agencies, and have so far proved to be an intractable problem. Their...
Read Blog
July 7, 2017

Impact of data breach on startups

Impact of data breach on startups

Estimated reading time: 3 minutes

Cyber breaches are a threat to almost all kinds of businesses. Many large organizations establish elaborate policies and deploy sophisticated technology to ensure security of their infrastructure as well as their data. Smaller companies and start-ups, however, are different....
Read Blog
July 6, 2017

5 Major ransomware attacks in the healthcare industry

5 Major ransomware attacks in the healthcare industry

Estimated reading time: 3 minutes

Ransomware attacks affect every industry; however, the healthcare industry is highly vulnerable to them simply because of the severity of risk involved. A ransomware attack may impact either the critical services or the administrative services of a hospital or...
Read Blog
July 5, 2017

Rise of Ransomware: How Seqrite can help your business stay protected

Rise of Ransomware: How Seqrite can help your business stay protected

Estimated reading time: 3 minutes

A ransomware attack can paralyze the functioning of an enterprise if they are unprepared. Over the years ransomware has become the most malicious attack faced by enterprises. In this attack, hackers hold your data hostage and demand a ransom...
Read Blog
July 4, 2017

Impact of WannaCry and Petya ransomware attack

Impact of WannaCry and Petya ransomware attack

Estimated reading time: 3 minutes

What’s the latest threat that keeps security administrators awake at night these days? Chances are, that the most definitive answer would be either “WannaCry” or “Petya”, or both. But why are these two breeds of malware so fearsome?  What’s...
Read Blog
July 3, 2017
1
← Previous 1 … 64 65 66 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies