6 Hidden IT risks in 2018
Estimated reading time: 3 minutesDangers can often lie within. This is an information age where data is gold and in this day and age, no matter what business you are in, your Information Technology...
View ArticleWhat is the right time to audit your cybersecurity program?
Estimated reading time: 4 minutesIn November 2017, Forever 21, a Los Angeles based clothing retailer, announced that a potential data breach might have affected some of its customers. On investigating,...
View ArticleBecome a leader in creating cyber trust with Seqrite Endpoint Security
Estimated reading time: 3 minutesEnterprises, big and small, all over the world, are waking up to the importance of garnering cyber trust. In a digital age where technology only breaches new frontiers,...
View ArticleCybersecurity: How to approach a broader perspective at the board level
Estimated reading time: 3 minutesThe dangers that cyber threats pose have never been as apparent as now. High-profile organizations have been at the receiving end, there has been both reputational and...
View ArticleCryptocurrency- The Good, The Bad & The Ugly
Estimated reading time: 3 minutesCryptocurrency is the current buzzword of this day and age. Not a day goes by when there’s not a news item about cryptocurrency, either with warnings about its danger...
View ArticleCryptomining Malware: The New Favorite of Hackers
Estimated reading time: 3 minutesRansomware threats have long been plaguing the online space and are usually considered to be extremely disruptive in nature. Unlike other malware threats which keep a...
View ArticleWhy you should never pay ransom to hackers
Estimated reading time: 3 minutesSince WannaCry swept the world in 2017, ransomware has become a network administrator’s worst nightmare. It’s not without any reason: the devastating WannaCry...
View ArticleBack up can be your biggest business investment
Estimated reading time: 3 minutesIn 2018, the line between physical and digital world is increasingly blurring. Today, no business can solely operate in just the physical sphere. The emergence of...
View ArticleEmail-borne cyber attacks: A constant security threat
Estimated reading time: 3 minutesSince the invention of the World Wide Web in 1989 by Tim Berners-Lee, the technology has changed. What used to be a collection of simple text-based Usenet groups...
View ArticleSeqrite UTM : Security Weapon Against Man In The Middle Attacks
Estimated reading time: 6 minutes As implied in the name itself, Man In The Middle Attack is a type of attack where a illegal person tries to intercept the communication between two parties. Either to...
View Article