• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

malware attacks Archive

Minimize Cybersecurity Risk with IT Asset Management

Minimize Cybersecurity Risk with IT Asset Management

Estimated reading time: 3 minutes

Cybersecurity has evolved as one of the top organizational areas of concern for both government organizations and commercial setups. Not a day goes by when we don’t come across organizations leveraging IT Asset Management in the form of a...
Read More
February 23, 2018

Top 3 cybersecurity risks every HR chief should care about

Top 3 cybersecurity risks every HR chief should care about

Estimated reading time: 3 minutes

Cybersecurity isn’t just an IT department’s job anymore. The varied and vast nature of security threats nowadays mean that the days when “cybersecurity” was just a buzzword thrown around by technology department and network administrators were the only ones...
Read More
February 20, 2018
  • 76
    Shares
1

Cryptomining Malware: The New Favorite of Hackers

Cryptomining Malware: The New Favorite of Hackers

Estimated reading time: 3 minutes

Ransomware threats have long been plaguing the online space and are usually considered to be extremely disruptive in nature. Unlike other malware threats which keep a low profile, ransomware attacks announce themselves before crippling a system for diverse benefits....
Read More
February 7, 2018
  • 4
    Shares

Asset Management: Protecting your company’s most important assets

Asset Management: Protecting your company’s most important assets

Estimated reading time: 3 minutes

A comprehensive IT Asset Management (ITAM) program facilitates an accurate, documented IT environment covering the organization’s assets and data along with their owners and highlighting security and risks across the network. It helps to make critical decisions regarding software...
Read More
January 29, 2018
  • 8
    Shares

Security issues faced by Financial Sector from outdated vendor systems

Security issues faced by Financial Sector from outdated vendor systems

Estimated reading time: 3 minutes

While analyzing the supply chain associated with the financial sector, it is evident that obsolete software modules and machines can eventually lead to security threats. One out of five financial services firms face issues regarding older versions of Windows...
Read More
December 29, 2017
  • 6
    Shares

How third-party risks are becoming a rising threat to the organization?

How third-party risks are becoming a rising threat to the organization?

Estimated reading time: 3 minutes

These days, businesses are reliant on third-party vendors who give them end-to-end support in every aspect. These third parties can easily access all the sensitive and confidential information of the client. In some cases, most of these third parties...
Read More
December 13, 2017
  • 7
    Shares

How a ransomware infects your computer [INFOGRAPHIC]

How a ransomware infects your computer [INFOGRAPHIC]

Estimated reading time: 1 minute

Education is a constant process – it never stops. While we have spoken about ransomware at great lengths in the past, there is no reason why we should not be doing that again. Ransomware is probably the most dreaded...
Read More
October 12, 2017

Impact of malware/ransomware attacks on Government data

Impact of malware/ransomware attacks on Government data

Estimated reading time: 3 minutes

Malware/ransomware attacks continue to affect the cyberspace with several critical sectors impacted in the worst possible manner. Cyber threats and instances of hacking are also succeeding at a rapid rate. That said, it is the Government data that’s actually...
Read More
September 19, 2017

Risks of using outdated software, OS, and browsers

Risks of using outdated software, OS, and browsers

Estimated reading time: 4 minutes

Computer systems evolve at a breakneck pace. Every now and then, there are newer versions of software including web browsers, operating systems, and databases. These upgrades not only have better features but also have better security features built into them. However, many times...
Read More
September 4, 2017

5 steps for a successful incident response plan

5 steps for a successful incident response plan

Estimated reading time: 3 minutes

There is no foolproof security system anywhere in the world yet. Despite the best of security measures and best of the teams, breaches do occur. There is no point living in a make-believe world where implementation of the top of the...
Read More
August 25, 2017
1 2 Next →
Popular Posts
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • Artificial Intelligence – its use and misuse Artificial Intelligence – its use and misuse February 4, 2019
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..
  • Jayesh Kulkarni
    Jayesh Kulkarni

    Jayesh is working as a Security Researcher for a couple of years. He likes to...

    Read more..
Stay Updated!
Topics
apt (11) Cyber-attack (32) cyber-attacks (56) cyberattack (11) cyberattacks (12) Cybersecurity (301) cyber security (26) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (103) Enterprise security (15) EPS (10) Exploit (12) firewall (11) hackers (11) IoT (10) malware (64) malware attack (23) malware attacks (12) MDM (25) Microsoft (14) Network security (18) Patch Management (12) phishing (18) Ransomware (60) ransomware attack (29) ransomware attacks (30) ransomware protection (12) security (10) Seqrite (26) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (15) windows (11)
Products
  • Seqrite MSSP Portal
  • HawkkScan
  • HawkkProtect
  • HawkkHunt XDR
  • HawkkEye
  • HawkkEye Endpoint Security Cloud
  • HawkkEye mSuite
  • HawkkEye Workspace
  • Endpoint Security (EPS)
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category

© 2022 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.