• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: data loss

How to defend your organization’s data on both sides of the perimeter?

How to defend your organization’s data on both sides of the perimeter?

Estimated reading time: 2 minutes

Defending the organizational perimeter from data breaches forms the crux of an existing security strategy. Neutralizing potential damages emanating out of cybersecurity threats is possible only if the data sets are secured across both sides of the perimeter. When...
Read Blog
October 13, 2017

Are you an easy hacking target?

Are you an easy hacking target?

Estimated reading time: 3 minutes

Most SMEs and startups believe that cyber attackers wouldn’t be interested in them courtesy smaller frameworks and restricted financial reserves. However, based on a report released by the Verizon Data Breach Investigations, at least 61 percent of the hacked...
Read Blog
October 12, 2017

How is new technology bringing risk to the Government?

How is new technology bringing risk to the Government?

Estimated reading time: 3 minutes

Use of technology provides improvements in productivity, cost savings and more accurate process execution in almost all industries. This applies to both private and public sector (Government bodies). Use of technology reduces back logs, increases the speed of processes and improves overall...
Read Blog
September 15, 2017

New Hacking Threats: Biometric Vulnerabilities

New Hacking Threats: Biometric Vulnerabilities

Estimated reading time: 3 minutes

Biometric authentication seems to be the authentication technology of the future. Scan the finger on the finger print scanner and payment is done for your purchase. No need to type out your card details and enter OTPs. Scan your...
Read Blog
September 11, 2017

Risks of using outdated software, OS, and browsers

Risks of using outdated software, OS, and browsers

Estimated reading time: 3 minutes

Computer systems evolve at a breakneck pace. Every now and then, there are newer versions of software including web browsers, operating systems, and databases. These upgrades not only have better features but also have better security features built into them. However, many times...
Read Blog
September 4, 2017

Top 5 security threats for retailers in digital age

Top 5 security threats for retailers in digital age

Estimated reading time: 3 minutes

Today businesses and corporations are increasingly adopting technologies to utilize the power that digitization provides. The retail industry sees increasing value in adopting this trend and they are continuously investing to provide a unique experience to customers. For instance,...
Read Blog
July 10, 2017

Impact of data breach on startups

Impact of data breach on startups

Estimated reading time: 3 minutes

Cyber breaches are a threat to almost all kinds of businesses. Many large organizations establish elaborate policies and deploy sophisticated technology to ensure security of their infrastructure as well as their data. Smaller companies and start-ups, however, are different....
Read Blog
July 6, 2017

Need for Data Loss Prevention in Healthcare Industry

Need for Data Loss Prevention in Healthcare Industry

Estimated reading time: 4 minutes

A report published by the Ponemon Institute indicated that there were 106 major data breaches in the Healthcare Industry in 2016. The total number of patient records exposed was more than 13.5 million. The average loss for single record...
Read Blog
June 5, 2017
← Previous 1 2 3
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies