• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: phishing

5 key takeaways from major data breaches

5 key takeaways from major data breaches

Estimated reading time: 3 minutes

Cyber-attacks, hacks or data breaches have become common in recent times. Be it large scale businesses or a startup; no one is safe from the ever-growing cyber threat landscape. While keeping track of all cyber-attacks is not possible for...
Read Blog
September 18, 2017

Why Data Breaches should make you rethink your IT Strategy

Why Data Breaches should make you rethink your IT Strategy

Estimated reading time: 3 minutes

In this post, we give you an insight into data breach – a point-blank catastrophe that looms over most organizations. What is Data Breach? Data breach occurs when confidential data of an organization is lost or illegally obtained by...
Read Blog
September 7, 2017

How cyber criminals attract users by launching interesting phishing email subject lines?

How cyber criminals attract users by launching interesting phishing email subject lines?

Estimated reading time: 3 minutes

Email is one of the favorite mediums of attack for cyber criminals. They launch spyware, ransomware, viruses and other kinds of malware and phishing attacks using emails. The user only needs to click the link in the email or open the...
Read Blog
August 24, 2017

Conduct phishing simulation tests to keep employees alert

Conduct phishing simulation tests to keep employees alert

Estimated reading time: 3 minutes

Cyber-attacks on endpoints and networks are continuously growing, and organizations need to get their defense up and running. That said, the technological advancements are working well against cyber criminals and the breaches are now harder to create. This is...
Read Blog
August 18, 2017

Banking malware, Dridex bounces back through PDF

Banking malware, Dridex bounces back through PDF

Estimated reading time: 3 minutes

Dridex is a banking malware which uses macros to spread on windows systems. Spam email attachments are utilized to spread this infection. Banking malware are generally key loggers. They trick users into opening the attachment; it then records the...
Read Blog
May 10, 2017

Spear Phishing: What is it and how it can affect your business security

Spear Phishing: What is it and how it can affect your business security

Estimated reading time: 3 minutes

What is Spear Phishing? Spear phishing is a variation of a phishing scam wherein hackers send a targeted email to an individual which appears to be from a trusted source. The agenda of these mails like any other cyber...
Read Blog
January 16, 2017

Here’s why your startup might be the perfect target for hackers

Here’s why your startup might be the perfect target for hackers

Estimated reading time: 3 minutes

So you’re a ‘new kid on the block’ in the big business world. Just getting started with the setting up of your infrastructure and organizing the systems and processes? Of course cybersecurity is the least of your concerns at...
Read Blog
December 14, 2016
← Previous 1 2 3
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies