• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: ransomware attack

How To Prevent Remote Ransomware: The Easy Way

How To Prevent Remote Ransomware: The Easy Way

Estimated reading time: 4 minutes

Ransomware attacks today have become increasingly prevalent and sophisticated. One such alarming trend is the surge in remote ransomware attacks, also known as malicious remote encryption. This attack vector involves using compromised endpoints to encrypt data on other devices...
Read Blog
January 9, 2024

Data Security: Where are the SMBs failing in securing their data

Data Security: Where are the SMBs failing in securing their data

Estimated reading time: 3 minutes

Small and medium sized businesses usually rely on organizational data for flourishing and succeeding in their endeavors. However, there are chances that the SMBs are putting all their data at risk by implementing erroneous strategies.  According to the latest...
Read Blog
February 9, 2018
12
Shares

2018: What’s your New Year resolution for cybersecurity?

2018: What’s your New Year resolution for cybersecurity?

Estimated reading time: 3 minutes

Reports released by CSO suggest that cybersecurity threats are expected to amplify up to a staggering $6 trillion, by the end of 2021. This revelation validates the fact that security threats are looming large and majority of global businesses...
Read Blog
January 2, 2018

Cybersecurity News Rundown December 2017

Cybersecurity News Rundown December 2017

Estimated reading time: 2 minutes

Welcome to our Cybersecurity News Rundown for the month of December 2017. Here, we will be sharing latest and trending news on events and technological updates from the world of cybersecurity that happened over the past month. Make sure...
Read Blog
December 31, 2017
6
Shares

Essential policies to rescue your organization from advanced cyber threats

Essential policies to rescue your organization from advanced cyber threats

Estimated reading time: 3 minutes

Organizations need to spend a lot of time thinking about the network security measures as even a single security breach can inflict a lot of damage on the enterprises. It is important to revisit the existing security strategies or...
Read Blog
December 27, 2017
10
Shares

Know what insider threats are hiding in your network

Know what insider threats are hiding in your network

Estimated reading time: 3 minutes

The recent lawsuit filed against Anthony Levandowski of Uber signifies how terrible insider threats can be and what effects they can have on the confidential data sets. The lawsuit was filed by Alphabet which accused Levandowski of stealing more than...
Read Blog
December 18, 2017

The Cyber Threat Landscape 2017

The Cyber Threat Landscape 2017

Estimated reading time: 3 minutes

Cyber threats are multiplying at an uncontrollable rate and 2017 hasn’t been any different. While global damages, concerning cybersecurity, are expected to surpass $5 billion by the end of this year, the actual predicament is the supposed yearly growth which...
Read Blog
December 4, 2017
2
Shares

Why should companies invest in evolving cybersecurity technology?

Why should companies invest in evolving cybersecurity technology?

Estimated reading time: 3 minutes

With the cyber-threat landscape evolving with time, we are continually witnessing newer strains of malware attacking IT security networks. Needless to say, organizations are losing their ground, and it’s time they address the issues at hand by innovating the...
Read Blog
November 16, 2017

Top 5 most wanted cybercriminals across the globe

Top 5 most wanted cybercriminals across the globe

Estimated reading time: 3 minutes

Cyber-crime is being widely discussed as a critical topic holding global relevance. In the professional discourse, it is essential that businesses, government-specific entities, and even citizens are vigilant enough when it comes to avoiding the potential threats. This also...
Read Blog
November 13, 2017

Five essential elements of a cybersecure network

Five essential elements of a cybersecure network

Estimated reading time: 3 minutes

The rapid increase in cyber attacks is a global reality, which doesn’t seem to be settling down anytime soon. Ponemon Institute estimates that cyber attacks on SMB’s have increased by 55 percent over the last year. With the increased digitization of businesses, more and more...
Read Blog
November 2, 2017
1 2 3 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies