• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: cyber-attacks

Security measures to be taken by FinTech startups to avoid cyber attacks

Security measures to be taken by FinTech startups to avoid cyber attacks

Estimated reading time: 4 minutes

The financial sector is one of the favorite targets of cyber criminals. The examples of a security breach in the financial world are available a dime a dozen. The latest one was the 81 million USD online robbery at...
Read Blog
July 20, 2017

Importance of information security in education sector

Importance of information security in education sector

Estimated reading time: 3 minutes

The education sector, especially institutions of higher education, have been the focus of Information Security Professionals in recent times. It has been observed that the education sector ranks very high in the list of targets for cyber-attacks. Investigations have...
Read Blog
July 19, 2017

Top 5 security threats for retailers in digital age

Top 5 security threats for retailers in digital age

Estimated reading time: 3 minutes

Today businesses and corporations are increasingly adopting technologies to utilize the power that digitization provides. The retail industry sees increasing value in adopting this trend and they are continuously investing to provide a unique experience to customers. For instance,...
Read Blog
July 10, 2017

Protecting your Enterprise from Phishing Attacks

Protecting your Enterprise from Phishing Attacks

Estimated reading time: 3 minutes

In 2016, according to a report by a security training company (wombat security), 86% of the companies reported being a victim of phishing attacks. As many as 67% companies were the target of spear phishing. Phishing attacks cause severe damage to...
Read Blog
June 20, 2017

The threat of data loss at unsecured endpoints

The threat of data loss at unsecured endpoints

Estimated reading time: 3 minutes

Data theft or loss by employees is a reality no one can deny. The cost of one such internal breach at Bank of America was 10 million USD. According to a study by Verizon, almost 20% of the all the data...
Read Blog
June 19, 2017

Dealing with Insider Threats: A Brief Guide for CISOs

Dealing with Insider Threats: A Brief Guide for CISOs

Estimated reading time: 3 minutes

Cyber security threats are among the top concerns of an enterprise, with the fear and nervousness fueled by the recent incidents of massive security breaches and ransomware attacks. But what is less well known is that more than half of these security...
Read Blog
June 12, 2017

Aligning Cybersecurity with Business Objectives

Aligning Cybersecurity with Business Objectives

Estimated reading time: 2 minutes

A report by Center for Strategic and International Studies revealed that there are three levels of misaligned incentives that work against cyber security in organizations: The corporate structure of organizations vs free flow of criminal enterprises: The incentives of attackers are shaped by...
Read Blog
June 10, 2017

Dealing with Evolving Cyber Attacks

Dealing with Evolving Cyber Attacks

Estimated reading time: 2 minutes

Technology is an ever-evolving thing that also comes with certain amount of risks. Cyber attack is one such serious threat that we need to understand. It is really necessary to avoid these problems and focus on your business’s protection. Small businesses are relatively...
Read Blog
June 6, 2017
← Previous 1 … 5 6
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies