• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: Cybersecurity

Healthcare: Cybersecurity risks with vendors

Healthcare: Cybersecurity risks with vendors

Estimated reading time: 3 minutes

There has been a surge in cyber attacks in the healthcare industry. Ransomware attacks have increased across all sectors, but healthcare industry is particularly vulnerable to such attacks. Getting locked out of systems while handling critical patient data or operational...
Read Blog
September 6, 2017

Risks of using outdated software, OS, and browsers

Risks of using outdated software, OS, and browsers

Estimated reading time: 3 minutes

Computer systems evolve at a breakneck pace. Every now and then, there are newer versions of software including web browsers, operating systems, and databases. These upgrades not only have better features but also have better security features built into them. However, many times...
Read Blog
September 4, 2017

Why your startup needs dedicated security solutions?

Why your startup needs dedicated security solutions?

Estimated reading time: 3 minutes

Startups usually have a lot on their plate when it comes to managing finances and security solutions. However, more often than not, the budding entrepreneurs fall short of resources needed for hiring the concerned workforce. While some resort to...
Read Blog
August 31, 2017

Why should you keep a back-up of all your data?

Why should you keep a back-up of all your data?

Estimated reading time: 3 minutes

Modern businesses depend heavily on the continuous availability of data be it of the customer, product, employee or financial. Data, in any form (files, emails, collaboration tool or database) must always be available when required. Just like any other asset, loss...
Read Blog
August 29, 2017
7
Shares

Not investing in cybersecurity can lead to ‘Inverse ROI’ for your business

Not investing in cybersecurity can lead to ‘Inverse ROI’ for your business

Estimated reading time: 3 minutes

Almost every country spends a large amount of its wealth on its military. It spends billions of dollars in buying latest arms and ammunition. Yet, barring a few instances, those weapons are hardly used. To a layman, it seems...
Read Blog
August 28, 2017

How cyber criminals attract users by launching interesting phishing email subject lines?

How cyber criminals attract users by launching interesting phishing email subject lines?

Estimated reading time: 3 minutes

Email is one of the favorite mediums of attack for cyber criminals. They launch spyware, ransomware, viruses and other kinds of malware and phishing attacks using emails. The user only needs to click the link in the email or open the...
Read Blog
August 24, 2017

Setting up a business? Secure it with Seqrite EPS

Setting up a business? Secure it with Seqrite EPS

Estimated reading time: 3 minutes

Starting a new business is an exciting and stressful period in anyone’s life.  The systems, the processes, the people- everything is new, and getting it all to work together can be really a nerve-wracking experience. Further, a startup always...
Read Blog
August 22, 2017

Conduct phishing simulation tests to keep employees alert

Conduct phishing simulation tests to keep employees alert

Estimated reading time: 3 minutes

Cyber-attacks on endpoints and networks are continuously growing, and organizations need to get their defense up and running. That said, the technological advancements are working well against cyber criminals and the breaches are now harder to create. This is...
Read Blog
August 18, 2017

How Ransomware works: Understanding the strategy behind cyberattacks

How Ransomware works: Understanding the strategy behind cyberattacks

Estimated reading time: 4 minutes

Security concerns have skyrocketed in recent times, thanks to the spurt in cyberattacks, and especially ransomware. Ransomware tactics have been known for a long time now, but it is only in recent times that it has taken on very...
Read Blog
August 17, 2017

Are retailers doing enough to protect consumers’ data?

Are retailers doing enough to protect consumers’ data?

Estimated reading time: 3 minutes

The retail industry has been traditionally perceived to be a happy hunting ground for hackers and other cyber attackers. There are card based and card-not-present transactions done with POS, and online retail purchases and both of these are prone...
Read Blog
August 16, 2017
← Previous 1 … 30 31 32 33 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (21) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (326) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies