• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite

data loss Archive

What is Personally Identifiable Information (PII)? How to protect it under GDPR?

Estimated reading time: 3 minutes

Cybersecurity threats compel us to revisit certain identity-based terminologies and Personally Identifiable Information is probably one of the most important ones. Personally Identifiable Information (PII) signifies any substantial information or data that can help a governing body trace the...
Read More
March 5, 2018
  • 11
    Shares

What not to do if your business is the victim of a cyber attack

Estimated reading time: 3 minutes

It is not a situation any network administrator ever wants to be in. Yet, considering the multitude of attacks nowadays, the possibility of being in such a situation is getting more and more likely. The last year has shown...
Read More
February 28, 2018
  • 7
    Shares

Machine Learning: How close we are in Defeating Online Payment Fraud?

Estimated reading time: 3 minutes

The unhindered growth of e-commerce and its impact has seemingly increased the risks of online fraud. Moreover, the attacks have amplified in terms of magnitude as the technologies adopted by the hackers are getting persuasive and more powerful, with...
Read More
February 12, 2018

Data Security: Where are the SMBs failing in securing their data

Estimated reading time: 3 minutes

Small and medium sized businesses usually rely on organizational data for flourishing and succeeding in their endeavors. However, there are chances that the SMBs are putting all their data at risk by implementing erroneous strategies.  According to the latest...
Read More
February 9, 2018
  • 12
    Shares

Why you should never pay ransom to hackers

Estimated reading time: 3 minutes

Since WannaCry swept the world in 2017, ransomware has become a network administrator’s worst nightmare. It’s not without any reason: the devastating WannaCry ransomware attack affected more than 200,000 computers across 150 countries with huge damages. Other notable ransomware attacks...
Read More
February 8, 2018
  • 7
    Shares

What is the right time to audit your cybersecurity program?

Estimated reading time: 4 minutes

In November 2017, Forever 21, a Los Angeles based clothing retailer, announced that a potential data breach might have affected some of its customers. On investigating, they found that the “encryption and tokenization solution” implemented in 2015 might not...
Read More
January 23, 2018
  • 14
    Shares

What is Disaster Recovery as a Service (DRaaS)?

Disaster Recovery as a Service

Estimated reading time: 3 minutes

Disasters, whether they are natural or man-made, can strike anytime without any kind of due notice. Any business, small or big, will need to anticipate the possibility of such disasters and have a plan in place. While one tactic...
Read More
January 17, 2018
  • 12
    Shares

Security issues faced by Financial Sector from outdated vendor systems

Estimated reading time: 3 minutes

While analyzing the supply chain associated with the financial sector, it is evident that obsolete software modules and machines can eventually lead to security threats. One out of five financial services firms face issues regarding older versions of Windows...
Read More
December 29, 2017
  • 6
    Shares

Double Whammy: What happens when one cyber-attack hides under another attack?

Estimated reading time: 3 minutes

When it comes to handling the cybersecurity threats, enterprises often concentrate on addressing standalone vulnerabilities and security incidents. Organizations believe that mitigating individual threats can keep catastrophic attacks at bay but the modern threat landscape is way more sophisticated than...
Read More
December 21, 2017
  • 4
    Shares

How third-party risks are becoming a rising threat to the organization?

Third-party security risks

Estimated reading time: 3 minutes

These days, businesses are reliant on third-party vendors who give them end-to-end support in every aspect. These third parties can easily access all the sensitive and confidential information of the client. In some cases, most of these third parties...
Read More
December 13, 2017
  • 7
    Shares
1 2 3 Next →

Popular Posts

  • BlueKeep Attacks seen in the wild! BlueKeep Attacks seen in the wild! November 8, 2019
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Will Automation be the next big weapon against cyber threats?

    Will Automation be the next big weapon against cyber threats?

    December 5, 2019
  • Leveraging security analytics to bolster enterprise cybersecurity

    Leveraging security analytics to bolster enterprise cybersecurity

    December 4, 2019
  • Seqrite UTM : Security Weapon Against Man In The Middle Attacks

    Seqrite UTM : Security Weapon Against Man In The Middle Attacks

    December 3, 2019
Tweets by @Seqrite

Stay Updated!

Follow Us On

Topics

Antivirus For Linux (10) Antivirus For Server (9) BYOD (9) CISO (8) Cyber-attack (30) cyber-attacks (55) cyberattacks (11) cyber security (25) Cybersecurity (207) Cyber threat (29) cyber threats (44) data breach (49) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (14) endpoint security (99) Enterprise security (14) Exploit (12) firewall (10) GDPR (9) hackers (9) incident response plan (9) IoT (8) malware (49) malware attack (20) malware attacks (12) MDM (25) mobile device management (9) Network security (17) Patch Management (12) phishing (16) Ransomware (47) ransomware attack (29) ransomware attacks (29) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (33) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2019 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.