• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite

ransomware attack Archive

Data Security: Where are the SMBs failing in securing their data

Estimated reading time: 3 minutes

Small and medium sized businesses usually rely on organizational data for flourishing and succeeding in their endeavors. However, there are chances that the SMBs are putting all their data at risk by implementing erroneous strategies.  According to the latest...
Read More
February 9, 2018
  • 12
    Shares

2018: What’s your New Year resolution for cybersecurity?

Estimated reading time: 3 minutes

Reports released by CSO suggest that cybersecurity threats are expected to amplify up to a staggering $6 trillion, by the end of 2021. This revelation validates the fact that security threats are looming large and majority of global businesses...
Read More
January 2, 2018

Cybersecurity News Rundown December 2017

Cybersecurity News Rundown

Estimated reading time: 2 minutes

Welcome to our Cybersecurity News Rundown for the month of December 2017. Here, we will be sharing latest and trending news on events and technological updates from the world of cybersecurity that happened over the past month. Make sure...
Read More
December 31, 2017
  • 6
    Shares

Essential policies to rescue your organization from advanced cyber threats

Cybersecurity policies

Estimated reading time: 3 minutes

Organizations need to spend a lot of time thinking about the network security measures as even a single security breach can inflict a lot of damage on the enterprises. It is important to revisit the existing security strategies or...
Read More
December 27, 2017
  • 10
    Shares

Know what insider threats are hiding in your network

Insider threats

Estimated reading time: 3 minutes

The recent lawsuit filed against Anthony Levandowski of Uber signifies how terrible insider threats can be and what effects they can have on the confidential data sets. The lawsuit was filed by Alphabet which accused Levandowski of stealing more than...
Read More
December 18, 2017

The Cyber Threat Landscape 2017

The Cyber Threat Landscape

Estimated reading time: 3 minutes

Cyber threats are multiplying at an uncontrollable rate and 2017 hasn’t been any different. While global damages, concerning cybersecurity, are expected to surpass $5 billion by the end of this year, the actual predicament is the supposed yearly growth which...
Read More
December 4, 2017
  • 2
    Shares

Why should companies invest in evolving cybersecurity technology?

Estimated reading time: 3 minutes

With the cyber-threat landscape evolving with time, we are continually witnessing newer strains of malware attacking IT security networks. Needless to say, organizations are losing their ground, and it’s time they address the issues at hand by innovating the...
Read More
November 16, 2017

Top 5 most wanted cybercriminals across the globe

Estimated reading time: 3 minutes

Cyber-crime is being widely discussed as a critical topic holding global relevance. In the professional discourse, it is essential that businesses, government-specific entities, and even citizens are vigilant enough when it comes to avoiding the potential threats. This also...
Read More
November 13, 2017

Five essential elements of a cybersecure network

Estimated reading time: 3 minutes

The rapid increase in cyber attacks is a global reality, which doesn’t seem to be settling down anytime soon. Ponemon Institute estimates that cyber attacks on SMB’s have increased by 55 percent over the last year. With the increased digitization of businesses, more and more...
Read More
November 2, 2017

Cybersecurity in IT organizations: The changing threat landscape

Estimated reading time: 4 minutes

Cybersecurity is a huge challenge for all firms today. The ever-increasing dependence on technology invariably makes the business susceptible to cyber attacks. Companies see cyber threats as a danger to their business that may come from the software they use. But what...
Read More
November 1, 2017
1 2 3 Next →

Popular Posts

  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017
  • This is how hackers can invade your system without installing malware This is how hackers can invade your system without installing malware February 1, 2019

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Ankita Ashesh
    Ankita Ashesh

    Ankita is a Communications Strategist at Quick Heal with a passion for covering...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • GandCrab Riding Emotet’s Bus!

    GandCrab Riding Emotet’s Bus!

    February 15, 2019
  • Increase in threats to mobile devices

    Increase in threats to mobile devices

    February 14, 2019
  • Biometric authentication data at risk

    Biometric authentication data at risk

    February 12, 2019
Tweets by @Seqrite

Join our Newsletter

Sign up for our Newsletter and get regular cybersecurity round-ups delivered to your inbox.

Follow Us On

Topics

Antivirus For Linux (9) Antivirus For Server (9) Bitcoin (6) Cryptocurrency (7) Cyber-attack (29) cyber-attacks (54) Cybersecurity (165) cyber security (24) Cyber threat (28) cyber threats (44) data breach (48) data breaches (27) data loss (28) data loss prevention (33) data protection (20) data security (13) DLP (49) Encryption (11) endpoint security (94) Enterprise security (12) Exploit (12) firewall (8) GDPR (7) hackers (7) incident response plan (9) malware (24) malware attack (20) malware attacks (12) MDM (18) mobile device management (9) Network security (16) Patch Management (12) phishing (15) Ransomware (43) ransomware attack (29) ransomware attacks (29) ransomware protection (12) Seqrite (15) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) Unified Threat Management (7) UTM (30) Vulnerability (9) WannaCry (7)

Products

  • End Point Security (EPS)
  • Seqrite Encryption
  • Seqrite Endpoint Security Cloud
  • Mobile Device Management (MDM)
  • Cloud Security
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2018 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.