• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: incident response plan

Prioritizing cybersecurity: Where to start?

Prioritizing cybersecurity: Where to start?

Estimated reading time: 3 minutes

Cybersecurity encompasses a bigger picture and majority of c-suite IT executives are paying close attention to the existing threats and mitigation plans. While some companies are finding it hard to meet the demands related to digital transformation, there are...
Read Blog
March 20, 2018
8
Shares

Big data leads to big breaches: Know the pitfalls

Big data leads to big breaches: Know the pitfalls

Estimated reading time: 3 minutes

The key theme of today’s day and age is “connected”. Whether it’s the Internet of Things (IoT), connected solutions and mobility, the world’s electronic devices are getting increasingly connected, which of course, the amount of information being collected as...
Read Blog
March 8, 2018
14
Shares

How Cyber War Games can help you improve Incident Response Plan?

How Cyber War Games can help you improve Incident Response Plan?

Estimated reading time: 3 minutes

Ask any experienced network security expert and they will agree on the importance of having a strong, secure Incident Response Plan to safeguard an organization. After all, no security system is 100% foolproof and there is no guarantee that...
Read Blog
March 6, 2018
4
Shares

Multi-layered approach is the key towards cybersecurity

Multi-layered approach is the key towards cybersecurity

Estimated reading time: 3 minutes

With the cybersecurity threat-landscape evolving with each passing day, it becomes important that organizations opt for newer and safer strategies for staying functional without worrying about cyber-threats. Moreover, organizations must readily focus on cybersecurity while keeping a track of...
Read Blog
January 9, 2018
5
Shares

What are the major ingredients of cybersecurity in 2018?

What are the major ingredients of cybersecurity in 2018?

Estimated reading time: 3 minutes

2017 was a highly eventful year for cybersecurity experts as they incessantly kept combating the proliferating security incidents with considerable success. While a few incidents grabbed the headlines, a majority of cyber-attacks went unannounced. Now in 2018, it seems...
Read Blog
January 4, 2018
3
Shares

Pillars of enterprise data protection: A proactive approach

Pillars of enterprise data protection: A proactive approach

Estimated reading time: 3 minutes

Modern day data security and protection requirements aren’t only about integrity, confidentiality, and availability. Instead, security professionals must take a proactive approach for improving business value and addressing organizational security. However, talking about proactivity isn’t going to make much...
Read Blog
November 27, 2017

Spotted a breach? Know more about the after-effects of a security incident

Spotted a breach? Know more about the after-effects of a security incident

Estimated reading time: 3 minutes

Data breaches have now become a common occurrence but with myriad legislations in place— including the likes of GDPR— stakes for the enterprises are at an all-time high. When it comes to handling a breach, companies depend on the...
Read Blog
October 20, 2017

5 steps for a successful incident response plan

5 steps for a successful incident response plan

Estimated reading time: 3 minutes

There is no foolproof security system anywhere in the world yet. Despite the best of security measures and best of the teams, breaches do occur. There is no point living in a make-believe world where implementation of the top of the...
Read Blog
August 25, 2017

Building a Security Incident Response Plan

Building a Security Incident Response Plan

Estimated reading time: 3 minutes

Over the last few years, the Governments of many countries around the world have become sensitive towards inadequate protection of consumer data by the companies. Many of them have enacted various laws and regulations to protect this sensitive data. The late 1990s...
Read Blog
June 17, 2017
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (21) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (326) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies