• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: Cybersecurity

Strengthening India’s defense with cybersecurity

Strengthening India’s defense with cybersecurity

Estimated reading time: 3 minutes

India’s 72nd Independence Day is a day of much celebration and reflection. While the country has certainly progressed on various fronts, it is also time for all citizens to come together and stay aware of the need to remain...
Read Blog
August 13, 2018
19
Shares

Cybersecurity in international sporting events like the 2018 FIFA World Cup

Cybersecurity in international sporting events like the 2018 FIFA World Cup

Estimated reading time: 3 minutes

It is the season of the beautiful game. The world is tuned into the festival of football that is the 2018 FIFA World Cup in Russia. As some of the greatest superstars of the sport show off their skills...
Read Blog
July 3, 2018
9
Shares

Latest cyber threats you should know about

Latest cyber threats you should know about

Estimated reading time: 3 minutes

Cybersecurity threats are often like an ever-changing monster – you just can’t defeat it. A strong anti-virus solution with all the other necessary tools will help you secure your organization’s defense but it’s impossible to control what is happening...
Read Blog
June 26, 2018
9
Shares

5 Poor security practices that endanger an IT organization

5 Poor security practices that endanger an IT organization

Estimated reading time: 3 minutes

Security is a habit. Like most human habit, it requires years of practice to form. The exception to this is the bad habits. Cybersecurity experts know that bad habits are intrinsically easy to slip into. It’s just easier for...
Read Blog
June 20, 2018
4
Shares

Blockchain: A brief introduction

Blockchain: A brief introduction

Estimated reading time: 3 minutes

Cryptocurrency is not just a fad anymore – it is a reality. Almost every day, there’s a new headline about Bitcoin and its recent surge or fall. And many of these articles use terms which might sound alien. One...
Read Blog
June 15, 2018

How to identify, prevent and recover from cryptojacking attacks

How to identify, prevent and recover from cryptojacking attacks

Estimated reading time: 3 minutes

Cryptojacking is the dangerous new threat that threatens to cause more headaches to corporate and network administrators the world over. In a way, this was a threat that was coming – the widespread popularity of cryptocurrency was a marker...
Read Blog
June 4, 2018
1
Share

How hackers use spam to maximize the impact of a cyber attack?

How hackers use spam to maximize the impact of a cyber attack?

Estimated reading time: 3 minutes

All users of the Internet are familiar with the word ‘spam.’ ‘Spam’ is unsolicited email sent in massive quantities simultaneously to numerous users, generally trying to advertise or publicize certain products or services. This junk mail is also often used as...
Read Blog
May 28, 2018
7
Shares

GDPR has arrived: Check your preparedness

GDPR has arrived: Check your preparedness

Estimated reading time: 3 minutes

25th May 2018, the day has arrived when the EU’s General Data Protection Regulation (GDPR) has come into effect. The GDPR, a high-profile and wide-ranging piece of legislation which will, no doubt, completely reshape the world of cybersecurity and data privacy. Passed by the...
Read Blog
May 25, 2018
6
Shares

Cost of security vs. Cost of cyber attack: Which one should you choose?

Cost of security vs. Cost of cyber attack: Which one should you choose?

Estimated reading time: 3 minutes

As the number and nature of cyber threats grows increasingly day by day, organizations have opened up to the threat caused by cyber attacks. The North Atlantic Treaty Organization, which is better known as NATO, recognized cyberspace as a...
Read Blog
May 24, 2018
10
Shares

5 Cybersecurity Myths for Linux Users

5 Cybersecurity Myths for Linux Users

Estimated reading time: 3 minutes

When we talk about operating systems, the immediate names that come to mind are Microsoft Windows and Apple Macintosh. Yet, while they may be two of the most well-known operating systems around, there is also quite a portion of...
Read Blog
May 8, 2018
7
Shares
← Previous 1 … 16 17 18 … 33 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (21) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (324) cyber security (34) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (12) data protection (25) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies