• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: Cybersecurity

Why we need to focus on protecting enterprise devices?

Why we need to focus on protecting enterprise devices?

Estimated reading time: 3 minutes

Mobility is a widely-adopted approach that comes as a blessing for organizational growth but builds up as a headache for the IT security pros. While mobility can help enterprises reduce service costs and improve user experience by concentrating more...
Read Blog
October 23, 2017

Spotted a breach? Know more about the after-effects of a security incident

Spotted a breach? Know more about the after-effects of a security incident

Estimated reading time: 3 minutes

Data breaches have now become a common occurrence but with myriad legislations in place— including the likes of GDPR— stakes for the enterprises are at an all-time high. When it comes to handling a breach, companies depend on the...
Read Blog
October 20, 2017

What is a Business Email Compromise (BEC) attack? How Seqrite can help in protecting your business email?

What is a Business Email Compromise (BEC) attack? How Seqrite can help in protecting your business email?

Estimated reading time: 3 minutes

A few months back, FBI released a report stating that Business Email Compromise or rather BEC scams usually cost businesses around  $3.1 billion. In addition to that, FBI also warned organizations regarding “Man-in-the-Email” and “CEO Fraud”; some of the...
Read Blog
October 19, 2017

Strategies to mitigate risks of false positives in cybersecurity

Strategies to mitigate risks of false positives in cybersecurity

Estimated reading time: 3 minutes

Businesses facing a barrage of security risks daily rely heavily on detection technologies to assess and work alongside the existing threat landscape. However, keeping up with the same can still be a daunting task with the existence of false...
Read Blog
October 18, 2017

Hacking requires exceptional skills: How can IT security pros stay ahead of the hackers?

Hacking requires exceptional skills: How can IT security pros stay ahead of the hackers?

Estimated reading time: 3 minutes

While security professionals keep developing better software programs, hackers simultaneously devise strategies for combating the upgraded defense. Therefore, in order to analyze the importance of cybersecurity while staying one step ahead of these hackers, the security professionals need to...
Read Blog
October 16, 2017

How to defend your organization’s data on both sides of the perimeter?

How to defend your organization’s data on both sides of the perimeter?

Estimated reading time: 2 minutes

Defending the organizational perimeter from data breaches forms the crux of an existing security strategy. Neutralizing potential damages emanating out of cybersecurity threats is possible only if the data sets are secured across both sides of the perimeter. When...
Read Blog
October 13, 2017

Are you an easy hacking target?

Are you an easy hacking target?

Estimated reading time: 3 minutes

Most SMEs and startups believe that cyber attackers wouldn’t be interested in them courtesy smaller frameworks and restricted financial reserves. However, based on a report released by the Verizon Data Breach Investigations, at least 61 percent of the hacked...
Read Blog
October 12, 2017

How a ransomware infects your computer [INFOGRAPHIC]

How a ransomware infects your computer [INFOGRAPHIC]

Estimated reading time: < 1 minute

Education is a constant process – it never stops. While we have spoken about ransomware at great lengths in the past, there is no reason why we should not be doing that again. Ransomware is probably the most dreaded...
Read Blog
October 12, 2017

Central Bank of Kenya mandates robust cybersecurity across banks in Kenya by 30th Nov, 2017

Central Bank of Kenya mandates robust cybersecurity across banks in Kenya by 30th Nov, 2017

Estimated reading time: 5 minutes

The Central Bank of Kenya (CBK) recently issued a guideline to all commercials banks across Kenya to fortify their cybersecurity and establish effective cybersecurity governance and risk management. The CBK acknowledged the growing risk of cyber threats and highlighted...
Read Blog
October 11, 2017

How fraudulent SSL certificates could be utilized to hack your website?

How fraudulent SSL certificates could be utilized to hack your website?

Estimated reading time: 3 minutes

When it comes to validating the identity of any public key infrastructure, digital certificates hold all the aces. A digital certificate is more of an electronic snippet that lends legitimacy to a web service or portal— associating the same...
Read Blog
October 11, 2017
← Previous 1 … 26 27 28 … 32 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies