Blog

enterprise IT security

Quick Heal Debuts at RSA 2016, San Francisco, USA

 February 26, 2016

Estimated reading time: 2 minutes

Widely recognized as the world’s largest information security event, the RSA Conference takes place in San Francisco each year to bring together the brightest minds and the most advanced technologies in our industry. All of us at Quick Heal are very excited to participate in the 2016 conference, which takes...

Quick Heal Security Predictions for 2016: Be Alert, Be Secured and Stay Safe!

 December 24, 2015

Estimated reading time: 3 minutes

It is time to say goodbye to 2015 and welcome 2016. New Year wishes, greetings and celebrations are on its way. And, so are New Year resolutions and predictions. Quick Heal family wishes you a Merry Christmas and a safe and secured New Year 2016. 2015 was an eventful year...

How Vulnerable is your Small and Medium-sized Business? [UPDATED]

 June 24, 2015

Estimated reading time: 4 minutes

Are you aware that the best targets for hackers and malware authors around the world are small and medium sized businesses? The reasons for this are aplenty, but the most crucial cause of this is that smaller businesses have multiple points of vulnerability. Moreover, the security practices that they adopt...

A Guide to Data Leakage and How Data Loss Prevention (DLP) Tools Help

 August 13, 2014

Estimated reading time: 4 minutes

Data Loss Prevention (DLP) is one of the most hyped up and discussed, but least understood enterprise security tools for companies that wish to safeguard the confidentiality of their data. While many assume that data loss is a minor inconvenience that is associated with the simple loss of crucial devices...

Android Work: Business Security Suite by Google Inc.

 July 8, 2014

Estimated reading time: 4 minutes

In business enterprises across the world, more and more employees are now bringing their own devices and eliminating the preexisting borders between personal and professional lives. It is not uncommon now to see people working and responding to work emails while on the move and even while on vacation. To...

Enterprise Security: Mobile ad libraries pose new security threats

 June 4, 2014

Estimated reading time: 3 minutes

A new threat to enterprise security that many organizations neglect and fail to address effectively is that of mobile advertising networks. These ad libraries are freely used by mobile developers to track user behavior patterns and to generate ad revenue. However, the increased usage of smartphones and tablets by employees...

Intelligent Firewall: Deciding the Fate of Your Enterprise Security

 April 30, 2014

Estimated reading time: 3 minutes

Is your enterprise Firewall blocking all potentially damaging traffic at the perimeter? Or are certain groups within the organization being given the permission to add exceptions to the Firewall list? Studies have shown that although Firewalls are implemented and configured by IT departments, many organizations actually face data breaches and...

Enterprise Wi-Fi Security: One Password isn’t Enough

 April 9, 2014

Estimated reading time: 3 minutes

The widespread adoption of Wi-Fi network connectivity by enterprises and IT departments worldwide has now exposed enterprise networks to a new dimension of vulnerability in the form of wireless hackers and casual intruders. Wireless connectivity certainly helps organizations connect their devices more efficiently and it also improves their bottom line...

Better IT Security Means Better Business for Small and Medium Enterprises

 January 15, 2014

Estimated reading time: 2 minutes

The trend of online shopping has grown exponentially over the past few years, and odds are, it is only going to grow. If we talk about India, it has close to 10 million online shoppers. As of 2013 the country’s e-commerce market was worth $16 billion; 88% more than what...

Cyber Crimes against India – Increasing in Leaps and Bounds

 November 21, 2013

Estimated reading time: 2 minutes

Reportedly, India happens to be the 4th most favorite target of cyber criminals when it comes to phishing attacks. This fact is vouched by the number of cyber attacks hitting the country, which has scaled exponentially in 2013. Here are some findings by the Indian Computer Emergency Response Team (CERT-In)...