• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: malware attacks

Minimize Cybersecurity Risk with IT Asset Management

Minimize Cybersecurity Risk with IT Asset Management

Estimated reading time: 3 minutes

Cybersecurity has evolved as one of the top organizational areas of concern for both government organizations and commercial setups. Not a day goes by when we don’t come across organizations leveraging IT Asset Management in the form of a...
Read Blog
February 23, 2018

Top 3 cybersecurity risks every HR chief should care about

Top 3 cybersecurity risks every HR chief should care about

Estimated reading time: 3 minutes

Cybersecurity isn’t just an IT department’s job anymore. The varied and vast nature of security threats nowadays mean that the days when “cybersecurity” was just a buzzword thrown around by technology department and network administrators were the only ones...
Read Blog
February 20, 2018
76
Shares
1

Cryptomining Malware: The New Favorite of Hackers

Cryptomining Malware: The New Favorite of Hackers

Estimated reading time: 3 minutes

Ransomware threats have long been plaguing the online space and are usually considered to be extremely disruptive in nature. Unlike other malware threats which keep a low profile, ransomware attacks announce themselves before crippling a system for diverse benefits....
Read Blog
February 7, 2018
4
Shares

Asset Management: Protecting your company’s most important assets

Asset Management: Protecting your company’s most important assets

Estimated reading time: 3 minutes

A comprehensive IT Asset Management (ITAM) program facilitates an accurate, documented IT environment covering the organization’s assets and data along with their owners and highlighting security and risks across the network. It helps to make critical decisions regarding software...
Read Blog
January 29, 2018
8
Shares

Security issues faced by Financial Sector from outdated vendor systems

Security issues faced by Financial Sector from outdated vendor systems

Estimated reading time: 3 minutes

While analyzing the supply chain associated with the financial sector, it is evident that obsolete software modules and machines can eventually lead to security threats. One out of five financial services firms face issues regarding older versions of Windows...
Read Blog
December 29, 2017
6
Shares

How third-party risks are becoming a rising threat to the organization?

How third-party risks are becoming a rising threat to the organization?

Estimated reading time: 3 minutes

These days, businesses are reliant on third-party vendors who give them end-to-end support in every aspect. These third parties can easily access all the sensitive and confidential information of the client. In some cases, most of these third parties...
Read Blog
December 13, 2017
7
Shares

How a ransomware infects your computer [INFOGRAPHIC]

How a ransomware infects your computer [INFOGRAPHIC]

Estimated reading time: < 1 minute

Education is a constant process – it never stops. While we have spoken about ransomware at great lengths in the past, there is no reason why we should not be doing that again. Ransomware is probably the most dreaded...
Read Blog
October 12, 2017

Impact of malware/ransomware attacks on Government data

Impact of malware/ransomware attacks on Government data

Estimated reading time: 3 minutes

Malware/ransomware attacks continue to affect the cyberspace with several critical sectors impacted in the worst possible manner. Cyber threats and instances of hacking are also succeeding at a rapid rate. That said, it is the Government data that’s actually...
Read Blog
September 19, 2017

Risks of using outdated software, OS, and browsers

Risks of using outdated software, OS, and browsers

Estimated reading time: 3 minutes

Computer systems evolve at a breakneck pace. Every now and then, there are newer versions of software including web browsers, operating systems, and databases. These upgrades not only have better features but also have better security features built into them. However, many times...
Read Blog
September 4, 2017

5 steps for a successful incident response plan

5 steps for a successful incident response plan

Estimated reading time: 3 minutes

There is no foolproof security system anywhere in the world yet. Despite the best of security measures and best of the teams, breaches do occur. There is no point living in a make-believe world where implementation of the top of the...
Read Blog
August 25, 2017
1 2 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies