• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: cyber threats

What are software and zero-day vulnerabilities?

What are software and zero-day vulnerabilities?

Estimated reading time: 3 minutes

Software developers ensure that there are no security gaps when they release a new version of their software, be it an application or an operating system or any other kind of software. However, it is impossible to design a...
Read Blog
September 27, 2017

5 Best practices to prevent ransomware and safeguard your data

5 Best practices to prevent ransomware and safeguard your data

Estimated reading time: 3 minutes

Malware, including ransomware, viruses, trojans are a grave threat to organizations. Out of these, ransomware is unique. Not only does it steal and corrupt data, but it also locks out the users from their own systems so that taking...
Read Blog
September 26, 2017

What makes the Government vulnerable to hackers?

What makes the Government vulnerable to hackers?

Estimated reading time: 3 minutes

In 2014, the office of personnel management of US government was breached and records of about 18 million people were hacked. In India, four government websites were hacked and Aadhaar data (India’s social security scheme), of 130 million people...
Read Blog
September 25, 2017

Mobile Device Management: How to manage security of your mobile devices

Mobile Device Management: How to manage security of your mobile devices

Estimated reading time: 3 minutes

Smartphones have made way into our personal and professional life. Apart from always being connected to the world, there are many business functions that users, today, perform with their smartphones. Business emails, document reviews, editing, and video conferencing are just...
Read Blog
September 20, 2017

5 key takeaways from major data breaches

5 key takeaways from major data breaches

Estimated reading time: 3 minutes

Cyber-attacks, hacks or data breaches have become common in recent times. Be it large scale businesses or a startup; no one is safe from the ever-growing cyber threat landscape. While keeping track of all cyber-attacks is not possible for...
Read Blog
September 18, 2017

How is new technology bringing risk to the Government?

How is new technology bringing risk to the Government?

Estimated reading time: 3 minutes

Use of technology provides improvements in productivity, cost savings and more accurate process execution in almost all industries. This applies to both private and public sector (Government bodies). Use of technology reduces back logs, increases the speed of processes and improves overall...
Read Blog
September 15, 2017

Cybersecurity trends and predictions to watch out for in 2017

Cybersecurity trends and predictions to watch out for in 2017

Estimated reading time: 3 minutes

If 2016 was the year of data breaches, 2017 might just well take things to a whole new level; precisely when it comes to cybersecurity threats. Hackers have newer tools in their arsenal which have multiplied difficulties for organizations—...
Read Blog
September 14, 2017

Discovered data breach? What’s your strategy to manage cyber attack in the financial sector?

Discovered data breach? What’s your strategy to manage cyber attack in the financial sector?

Estimated reading time: 3 minutes

Cyber breaches are getting more and more common these days. If you are running a business, the chances are that you will be a victim of at least one breach in the lifetime of the business. The likelihood of a breach increases if...
Read Blog
September 13, 2017

New Hacking Threats: Biometric Vulnerabilities

New Hacking Threats: Biometric Vulnerabilities

Estimated reading time: 3 minutes

Biometric authentication seems to be the authentication technology of the future. Scan the finger on the finger print scanner and payment is done for your purchase. No need to type out your card details and enter OTPs. Scan your...
Read Blog
September 11, 2017

Business security in the era of connected things

Business security in the era of connected things

Estimated reading time: 3 minutes

The world is at the cusp of 4th Industrial revolution which will be empowered by Internet of Things (IoT). This is where everything is connected to everything else using a digital network. Refrigerators, alarm clocks, air conditioners, etc. shall be connected to the Internet and be accessible over mobile...
Read Blog
September 8, 2017
← Previous 1 … 3 4 5 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies