• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

CertLock Trojan can disable your antivirus software

CertLock Trojan can disable your antivirus software

Estimated reading time: 2 minutes

An antivirus software keeps your computer safe from malware, viruses, online threats, and suspicious or harmful elements. Although bypassing this protective guard is a difficult task for attackers, they never stop trying to do so. Recently, we came across...
Read Blog
June 13, 2017

Dealing with Insider Threats: A Brief Guide for CISOs

Dealing with Insider Threats: A Brief Guide for CISOs

Estimated reading time: 3 minutes

Cyber security threats are among the top concerns of an enterprise, with the fear and nervousness fueled by the recent incidents of massive security breaches and ransomware attacks. But what is less well known is that more than half of these security...
Read Blog
June 12, 2017

Security Threats in Cloud Computing

Security Threats in Cloud Computing

Estimated reading time: 4 minutes

Security Threats in Cloud Computing More and more organizations are moving to cloud-based computing. Not only data, but even software and systems are being hosted on cloud. With the rise of remote working and ‘Bring Your Own Device’ culture,...
Read Blog
June 11, 2017

Aligning Cybersecurity with Business Objectives

Aligning Cybersecurity with Business Objectives

Estimated reading time: 2 minutes

A report by Center for Strategic and International Studies revealed that there are three levels of misaligned incentives that work against cyber security in organizations: The corporate structure of organizations vs free flow of criminal enterprises: The incentives of attackers are shaped by...
Read Blog
June 10, 2017

Cyber Security – Do Manufacturing Firms Need to Bother?

Cyber Security – Do Manufacturing Firms Need to Bother?

Estimated reading time: 3 minutes

A few years ago, who would have thought that Manufacturing companies could ever face any sort of cyber threat. Cyber threats were always a point of concern for the IT companies. However, today, the reality is quite different. Manufacturing...
Read Blog
June 9, 2017

How one computer ended up corrupting an entire company

How one computer ended up corrupting an entire company

Estimated reading time: 3 minutes

2012 witnessed one of its kind cyber-attack where a single infected computer led to a massive wipe out of data from 35000 computers. It all happened at Saudi Aramco, a leading petroleum and natural gas company. Let’s look in...
Read Blog
June 8, 2017

Dealing with Evolving Cyber Attacks

Dealing with Evolving Cyber Attacks

Estimated reading time: 2 minutes

Technology is an ever-evolving thing that also comes with certain amount of risks. Cyber attack is one such serious threat that we need to understand. It is really necessary to avoid these problems and focus on your business’s protection. Small businesses are relatively...
Read Blog
June 6, 2017

Need for Data Loss Prevention in Healthcare Industry

Need for Data Loss Prevention in Healthcare Industry

Estimated reading time: 4 minutes

A report published by the Ponemon Institute indicated that there were 106 major data breaches in the Healthcare Industry in 2016. The total number of patient records exposed was more than 13.5 million. The average loss for single record...
Read Blog
June 5, 2017

Impact of Major Cyber-attacks Across the Globe

Impact of Major Cyber-attacks Across the Globe

Estimated reading time: 3 minutes

Cyber-attacks have become a lucrative money-making business for criminals, inviting smarter, more sophisticated hackers to launch advanced and complex attacks on organizations. Modern times demand that almost all of companies’ information, be it financial, process-related, customer or intellectual property,...
Read Blog
June 3, 2017

Security Challenges and Solutions to Ensure Cyber Security in FinTech

Security Challenges and Solutions to Ensure Cyber Security in FinTech

Estimated reading time: 2 minutes

The FinTech or financial technology industry, by its very nature, is favorite of hackers. As per the current status of FinTech organization’s security, you must have seen several security hacks, breaches, or data leaks in the past few years. In 2016,...
Read Blog
June 1, 2017
← Previous 1 … 67 68 69 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (321) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies