• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

Aligning Cybersecurity with Business Objectives

Aligning Cybersecurity with Business Objectives

Estimated reading time: 2 minutes

A report by Center for Strategic and International Studies revealed that there are three levels of misaligned incentives that work against cyber security in organizations: The corporate structure of organizations vs free flow of criminal enterprises: The incentives of attackers are shaped by...
Read Blog
June 10, 2017

Cyber Security – Do Manufacturing Firms Need to Bother?

Cyber Security – Do Manufacturing Firms Need to Bother?

Estimated reading time: 3 minutes

A few years ago, who would have thought that Manufacturing companies could ever face any sort of cyber threat. Cyber threats were always a point of concern for the IT companies. However, today, the reality is quite different. Manufacturing...
Read Blog
June 9, 2017

How one computer ended up corrupting an entire company

How one computer ended up corrupting an entire company

Estimated reading time: 3 minutes

2012 witnessed one of its kind cyber-attack where a single infected computer led to a massive wipe out of data from 35000 computers. It all happened at Saudi Aramco, a leading petroleum and natural gas company. Let’s look in...
Read Blog
June 8, 2017

Dealing with Evolving Cyber Attacks

Dealing with Evolving Cyber Attacks

Estimated reading time: 2 minutes

Technology is an ever-evolving thing that also comes with certain amount of risks. Cyber attack is one such serious threat that we need to understand. It is really necessary to avoid these problems and focus on your business’s protection. Small businesses are relatively...
Read Blog
June 6, 2017

Need for Data Loss Prevention in Healthcare Industry

Need for Data Loss Prevention in Healthcare Industry

Estimated reading time: 4 minutes

A report published by the Ponemon Institute indicated that there were 106 major data breaches in the Healthcare Industry in 2016. The total number of patient records exposed was more than 13.5 million. The average loss for single record...
Read Blog
June 5, 2017

Impact of Major Cyber-attacks Across the Globe

Impact of Major Cyber-attacks Across the Globe

Estimated reading time: 3 minutes

Cyber-attacks have become a lucrative money-making business for criminals, inviting smarter, more sophisticated hackers to launch advanced and complex attacks on organizations. Modern times demand that almost all of companies’ information, be it financial, process-related, customer or intellectual property,...
Read Blog
June 3, 2017

Security Challenges and Solutions to Ensure Cyber Security in FinTech

Security Challenges and Solutions to Ensure Cyber Security in FinTech

Estimated reading time: 2 minutes

The FinTech or financial technology industry, by its very nature, is favorite of hackers. As per the current status of FinTech organization’s security, you must have seen several security hacks, breaches, or data leaks in the past few years. In 2016,...
Read Blog
June 1, 2017

Seqrite EPS with Centralized Patch Management – Proven Security Approach for Ransomware Protection

Seqrite EPS with Centralized Patch Management – Proven Security Approach for Ransomware Protection

Estimated reading time: < 1 minute

Patch, patch and patch ! This has been the go-to mantra of security professionals and the recent WannaCry ransomware attack has highlighted its importance once again. A large number of PCs worldwide were not patched with the latest update...
Read Blog
May 22, 2017

Seqrite Endpoint Security (EPS) version 7.2 released: All the key features explained

Seqrite Endpoint Security (EPS) version 7.2 released: All the key features explained

Estimated reading time: 2 minutes

Seqrite has launched Seqrite Endpoint Security (EPS) 7.2, a comprehensive solution securing endpoints and data that encompasses more competitive features with enhanced protection and powerful performance. Seqrite EPS 7.2 incorporates a host of new and improved features that provides SMEs...
Read Blog
May 16, 2017

MS17-010 – Windows SMB server exploitation leads to ransomware outbreak

Estimated reading time: 2 minutes

The Microsoft Windows SMB (Server Message Block) is being actively exploited in the wild, post the Shadow Brokers (TSB) leak in April 2017. According to Microsoft’s blog, the exploits were already covered in previously released security bulletins. The Shadow...
Read Blog
May 13, 2017
← Previous 1 … 67 68 69 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies