• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: cyber security

What is encryption and why it is important for your organization?

What is encryption and why it is important for your organization?

Estimated reading time: 3 minutes

In old days, the life in technology was simple with simple security issues. Hackers were amateurs who broke the security of networks just for fun. But today, cyber criminals use sophisticated technology to break into the secure network of...
Read Blog
August 1, 2017

3 Key Security Challenges for IoT

3 Key Security Challenges for IoT

Estimated reading time: 3 minutes

Internet of things (IoT) is no more just ‘the next big thing’ but has already started entering our lives in different forms. Today there are billions of devices from consumer products (e.g. Fitbit) to Industrial products (Industrial sensors) that...
Read Blog
July 27, 2017

Security Challenges in BYOD

Security Challenges in BYOD

Estimated reading time: 4 minutes

BYOD (Bring Your Own Device) refers to employees using their own devices including phones, tablets, and laptops to connect to the office network and perform their official duties. BYOD is the preferred policy of many employers these days, for...
Read Blog
July 25, 2017

Why Education Institutions Need Security Software?

Why Education Institutions Need Security Software?

Estimated reading time: 4 minutes

If you think that schools and colleges don’t need any cyber security as they don’t store any data that will interest criminals, think again. In May 2015, Pennsylvania State University’s engineering school was the target of a cyber attack. The...
Read Blog
July 24, 2017

Cyber security challenges of the future

Cyber security challenges of the future

Estimated reading time: 3 minutes

As the cyber world is progressing , so are the threats around it. In the late 80’s and early 90’s, the threats were simple as compared to today’s standards. The viruses got transferred through infected floppies, but they were easy to detect and stop. Today,...
Read Blog
July 21, 2017

Importance of information security in education sector

Importance of information security in education sector

Estimated reading time: 3 minutes

The education sector, especially institutions of higher education, have been the focus of Information Security Professionals in recent times. It has been observed that the education sector ranks very high in the list of targets for cyber-attacks. Investigations have...
Read Blog
July 19, 2017

5 Steps to secure healthcare data from breach

5 Steps to secure healthcare data from breach

Estimated reading time: 3 minutes

Cyber security breaches in the healthcare industry are very costly. In the USA alone they cost over $6 billion a year. Almost 90% of the hospitals report having suffered a breach over the last two years. These violations result in about half a million...
Read Blog
July 13, 2017

A single infected computer can cost your business millions of dollars, know how to save

A single infected computer can cost your business millions of dollars, know how to save

Estimated reading time: 4 minutes

It was August 5th, 2012, when a massive cyber-attack crippled operations of one of the world’s leading petroleum and natural gas company, Saudi Aramco. A Virus named ‘Shamoon’ wiped out data from 35,000 computers bringing most of their operations...
Read Blog
July 11, 2017

Endpoint Security: Next Gen Threat Prevention

Endpoint Security: Next Gen Threat Prevention

Estimated reading time: 2 minutes

Gone are the days when employees used to walk into the office, login into their systems, finish their daily tasks and walk out. Today, the jobs scenario is different. Working from remote locations, signing in at different hours, logging...
Read Blog
June 23, 2017

Mobile Device Management: The necessity to secure your enterprise

Mobile Device Management: The necessity to secure your enterprise

Estimated reading time: 3 minutes

In today’s day and age, mobile devices are the most omnipresent and utilized creations on Earth and have permeated both professional and personal lives of individuals. This increasing presence has led organizations to further their employees’ productivity and ease of...
Read Blog
June 22, 2017
← Previous 1 2 3 4 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies