• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

data breaches Archive

What is Personally Identifiable Information (PII)? How to protect it under GDPR?

What is Personally Identifiable Information (PII)? How to protect it under GDPR?

Estimated reading time: 3 minutes

Cybersecurity threats compel us to revisit certain identity-based terminologies and Personally Identifiable Information is probably one of the most important ones. Personally Identifiable Information (PII) signifies any substantial information or data that can help a governing body trace the...
Read More
March 5, 2018
  • 11
    Shares

What is Disaster Recovery as a Service (DRaaS)?

What is Disaster Recovery as a Service (DRaaS)?

Estimated reading time: 3 minutes

Disasters, whether they are natural or man-made, can strike anytime without any kind of due notice. Any business, small or big, will need to anticipate the possibility of such disasters and have a plan in place. While one tactic...
Read More
January 17, 2018
  • 12
    Shares

7 Major causes of data breaches

7 Major causes of data breaches

Estimated reading time: 3 minutes

The growing threat of data breaches globally has kept businesses on their toes. They occur when important proprietary, sensitive or confidential information is accessed or disclosed in an unauthorized faction. Data breaches can have a deep-lasting effect on a...
Read More
January 8, 2018
  • 4
    Shares

Essential policies to rescue your organization from advanced cyber threats

Essential policies to rescue your organization from advanced cyber threats

Estimated reading time: 3 minutes

Organizations need to spend a lot of time thinking about the network security measures as even a single security breach can inflict a lot of damage on the enterprises. It is important to revisit the existing security strategies or...
Read More
December 27, 2017
  • 10
    Shares

Biggest cyber attacks in 2017

Biggest cyber attacks in 2017

Estimated reading time: 4 minutes

Cybersecurity was undoubtedly one of the most influential areas of technology in 2017. The year witnessed an inordinate number of cybersecurity meltdowns globally. Let us look at some of the biggest cyber-attacks of 2017 that shook the world. 1....
Read More
December 11, 2017
  • 99
    Shares

How a ransomware infects your computer [INFOGRAPHIC]

How a ransomware infects your computer [INFOGRAPHIC]

Estimated reading time: 1 minute

Education is a constant process – it never stops. While we have spoken about ransomware at great lengths in the past, there is no reason why we should not be doing that again. Ransomware is probably the most dreaded...
Read More
October 12, 2017

Hackers Surveillance: How cybercriminals use hacker surveillance to target your business?

Hackers Surveillance: How cybercriminals use hacker surveillance to target your business?

Estimated reading time: 3 minutes

Data breaches and cyber-attacks are common occurrences which usually proliferate at an exponential rate. While it is important that enterprises tighten their enclosures, it is also advisable to understand how cybercriminals prepare for a breach. Hacker surveillance is one way...
Read More
October 9, 2017

Mobile Device Management: How to manage security of your mobile devices

Mobile Device Management: How to manage security of your mobile devices

Estimated reading time: 3 minutes

Smartphones have made way into our personal and professional life. Apart from always being connected to the world, there are many business functions that users, today, perform with their smartphones. Business emails, document reviews, editing, and video conferencing are just...
Read More
September 20, 2017

5 key takeaways from major data breaches

5 key takeaways from major data breaches

Estimated reading time: 3 minutes

Cyber-attacks, hacks or data breaches have become common in recent times. Be it large scale businesses or a startup; no one is safe from the ever-growing cyber threat landscape. While keeping track of all cyber-attacks is not possible for...
Read More
September 18, 2017

New Hacking Threats: Biometric Vulnerabilities

New Hacking Threats: Biometric Vulnerabilities

Estimated reading time: 3 minutes

Biometric authentication seems to be the authentication technology of the future. Scan the finger on the finger print scanner and payment is done for your purchase. No need to type out your card details and enter OTPs. Scan your...
Read More
September 11, 2017
1 2 3 Next →
Popular Posts
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • Uncovering LockBit Black’s Attack Chain and Anti-forensic activity Uncovering LockBit Black’s Attack Chain and Anti-forensic activity February 1, 2023
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..
  • Jayesh Kulkarni
    Jayesh Kulkarni

    Jayesh is working as a Security Researcher for a couple of years. He likes to...

    Read more..
Stay Updated!
Topics
apt (11) Cyber-attack (32) cyber-attacks (56) cyberattack (11) cyberattacks (12) Cybersecurity (301) cyber security (26) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (103) Enterprise security (15) EPS (10) Exploit (12) firewall (11) hackers (11) IoT (10) malware (64) malware attack (23) malware attacks (12) MDM (25) Microsoft (14) Network security (18) Patch Management (12) phishing (18) Ransomware (60) ransomware attack (29) ransomware attacks (30) ransomware protection (12) security (10) Seqrite (26) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (15) windows (11)
Products
  • Seqrite MSSP Portal
  • HawkkScan
  • HawkkProtect
  • HawkkHunt XDR
  • HawkkEye
  • HawkkEye Endpoint Security Cloud
  • HawkkEye mSuite
  • HawkkEye Workspace
  • Endpoint Security (EPS)
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category

© 2022 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.