• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: cyber-attacks

Not investing in cybersecurity can lead to ‘Inverse ROI’ for your business

Not investing in cybersecurity can lead to ‘Inverse ROI’ for your business

Estimated reading time: 3 minutes

Almost every country spends a large amount of its wealth on its military. It spends billions of dollars in buying latest arms and ammunition. Yet, barring a few instances, those weapons are hardly used. To a layman, it seems...
Read Blog
August 28, 2017

Conduct phishing simulation tests to keep employees alert

Conduct phishing simulation tests to keep employees alert

Estimated reading time: 3 minutes

Cyber-attacks on endpoints and networks are continuously growing, and organizations need to get their defense up and running. That said, the technological advancements are working well against cyber criminals and the breaches are now harder to create. This is...
Read Blog
August 18, 2017

How Ransomware works: Understanding the strategy behind cyberattacks

How Ransomware works: Understanding the strategy behind cyberattacks

Estimated reading time: 4 minutes

Security concerns have skyrocketed in recent times, thanks to the spurt in cyberattacks, and especially ransomware. Ransomware tactics have been known for a long time now, but it is only in recent times that it has taken on very...
Read Blog
August 17, 2017

How cyber crime has become the greatest threat to companies across the world?

How cyber crime has become the greatest threat to companies across the world?

Estimated reading time: 3 minutes

Data in today’s world is a powerful tool which when used correctly can boost businesses to reach new heights. While data offers competitive advantage to organizations, cyber crime has slowly evolved into a worthy antagonist – shaping up as...
Read Blog
August 15, 2017

Understanding data encryption in network security

Understanding data encryption in network security

Estimated reading time: 3 minutes

Information Security is a big concern today for CISOs and administrators everywhere. The information in question could be the company’s own information, or it could be that pertaining to its customers. In either case, protecting the information, preventing it...
Read Blog
August 14, 2017

Top industries at risk of cyber attacks in 2017

Top industries at risk of cyber attacks in 2017

Estimated reading time: 3 minutes

Businesses today carry more sensitive data than ever before. Any crucial information about the customers, if it gets into the wrong hands, can cause a lot of damage to both clients as well as companies. Apart from the client’s information,...
Read Blog
August 10, 2017

Encrypt your data or be hacked: Choice is yours

Encrypt your data or be hacked: Choice is yours

Estimated reading time: 4 minutes

In the age of information, data is valuable. It can and usually does carry a legal liability with it hence it needs to be kept safe and protected. To use the data, it has to be processed through various systems...
Read Blog
August 3, 2017

Security mistakes in Fintech that can easily be avoided

Security mistakes in Fintech that can easily be avoided

Estimated reading time: 3 minutes

Financial industry is one of the most lucrative targets for cyber criminals. It is a rich source of information that can be directly used by them for personal gains. Attacks on financial enterprises happen on daily basis all around the world....
Read Blog
August 2, 2017

What is encryption and why it is important for your organization?

What is encryption and why it is important for your organization?

Estimated reading time: 3 minutes

In old days, the life in technology was simple with simple security issues. Hackers were amateurs who broke the security of networks just for fun. But today, cyber criminals use sophisticated technology to break into the secure network of...
Read Blog
August 1, 2017

Cyber security challenges of the future

Cyber security challenges of the future

Estimated reading time: 3 minutes

As the cyber world is progressing , so are the threats around it. In the late 80’s and early 90’s, the threats were simple as compared to today’s standards. The viruses got transferred through infected floppies, but they were easy to detect and stop. Today,...
Read Blog
July 21, 2017
← Previous 1 … 4 5 6 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies