• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: Cyber-attack

A single infected computer can cost your business millions of dollars, know how to save

A single infected computer can cost your business millions of dollars, know how to save

Estimated reading time: 4 minutes

It was August 5th, 2012, when a massive cyber-attack crippled operations of one of the world’s leading petroleum and natural gas company, Saudi Aramco. A Virus named ‘Shamoon’ wiped out data from 35,000 computers bringing most of their operations...
Read Blog
July 11, 2017

Choosing a UTM Security Solution

Choosing a UTM Security Solution

Estimated reading time: 3 minutes

Organizations face cyber threats on multiple fronts. There is a threat of virus and malware that can corrupt the data on individual machines and servers, malware that can damage the systems and programs, network intrusions to steal the information from the...
Read Blog
June 21, 2017
2

Security Threats in Cloud Computing

Security Threats in Cloud Computing

Estimated reading time: 4 minutes

Security Threats in Cloud Computing More and more organizations are moving to cloud-based computing. Not only data, but even software and systems are being hosted on cloud. With the rise of remote working and ‘Bring Your Own Device’ culture,...
Read Blog
June 11, 2017

How one computer ended up corrupting an entire company

How one computer ended up corrupting an entire company

Estimated reading time: 3 minutes

2012 witnessed one of its kind cyber-attack where a single infected computer led to a massive wipe out of data from 35000 computers. It all happened at Saudi Aramco, a leading petroleum and natural gas company. Let’s look in...
Read Blog
June 8, 2017

Security Challenges and Solutions to Ensure Cyber Security in FinTech

Security Challenges and Solutions to Ensure Cyber Security in FinTech

Estimated reading time: 2 minutes

The FinTech or financial technology industry, by its very nature, is favorite of hackers. As per the current status of FinTech organization’s security, you must have seen several security hacks, breaches, or data leaks in the past few years. In 2016,...
Read Blog
June 1, 2017
← Previous 1 … 3 4
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies