{"id":77689,"date":"2014-01-23T20:34:40","date_gmt":"2014-01-23T15:04:40","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=77689"},"modified":"2014-01-23T20:34:40","modified_gmt":"2014-01-23T15:04:40","slug":"a-roundup-of-the-top-enterprise-it-security-blog-posts-of-2013","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/a-roundup-of-the-top-enterprise-it-security-blog-posts-of-2013\/","title":{"rendered":"A Roundup of the Top Enterprise IT Security Blog Posts of 2013"},"content":{"rendered":"<p>Enterprise IT Security can be compared to the knobs and handles in kitchen cabinets \u2013 essential items that get the least of our attention. In 2013, we presented to our readers with many essential aspects of enterprise IT security. These aspects touched points ranging from India being the 4<sup>th<\/sup> most targeted nation by phishers to why IT security can fuel the business of SMEs. Here, we have outlined some of the top enterprise IT security blog posts of 2013.<\/p>\n<div style=\"border: solid 1px #FF6600; padding: 8px; border-radius: 8px 8px 8px 8px;\">\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/blogs.quickheal.com\/better-it-security-means-better-business-for-small-and-medium-enterprises\/\">Better IT Security Means Better Business for Small and Medium Enterprises<\/a><\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/01\/enterprise_it_security.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-77613 aligncenter\" alt=\"enterprise_it_security\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/01\/enterprise_it_security-300x300.png\" width=\"255\" height=\"255\" \/><\/a><\/p>\n<p>Most customers prefer doing business with an online retailer if they know that their data and transaction are safe with it. All it takes is one data breach for a business to lose loyal and potential customers, hard-earned reputation, and foothold in the market.<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<div style=\"border: solid 1px #FF6600; padding: 8px; border-radius: 8px 8px 8px 8px;\">\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/blogs.quickheal.com\/india-the-4th-most-targeted-nation-by-phishers\/\">India \u2013 the 4th Most Targeted Nation by Phishers!<\/a><\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/12\/india_4th_targeted_country.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-77339 aligncenter\" alt=\"india_4th_targeted_country\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/12\/india_4th_targeted_country-300x300.png\" width=\"260\" height=\"260\" \/><\/a><\/p>\n<p>This post gives you a brief about how phishing attacks are affecting Indian enterprises and what can be done to contain the problem.<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<div style=\"border: solid 1px #FF6600; padding: 8px; border-radius: 8px 8px 8px 8px;\">\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/blogs.quickheal.com\/why-a-simple-antivirus-isnt-enough-for-small-and-midsize-businesses\/\">Why a Simple Antivirus Isn\u2019t Enough for Small and Midsize Businesses<\/a><\/strong><\/p>\n<p style=\"text-align: center;\">\u00a0<a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/12\/unified_threat_management_quick_heal.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-77435 aligncenter\" alt=\"unified_threat_management_quick_heal\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/12\/unified_threat_management_quick_heal-300x300.png\" width=\"272\" height=\"272\" \/><\/a><\/p>\n<p>With more and more businesses becoming aware about cyber security, UTM appliances are gaining popularity. This post outlines the key features that UTMs offer and can make a big difference in enterprise IT security.<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<div style=\"border: solid 1px #FF6600; padding: 8px; border-radius: 8px 8px 8px 8px;\">\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/blogs.quickheal.com\/mobiles-might-be-the-next-biggest-security-threat-to-businesses\/\">Mobiles Might be the Next Biggest Security Threat to Businesses<\/a><\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/01\/mobile_device_biggest_security_threat_enterprise.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-77500 aligncenter\" alt=\"mobile_device_biggest_security_threat_enterprise\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/01\/mobile_device_biggest_security_threat_enterprise-300x300.png\" width=\"270\" height=\"270\" \/><\/a><\/p>\n<p>The family of mobile devices may not be so happy by what is being predicted about them. Recent research has labelled them as the biggest enterprise security threat of 2014.<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<div style=\"border: solid 1px #FF6600; padding: 8px; border-radius: 8px 8px 8px 8px;\">\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/blogs.quickheal.com\/cyber-crimes-against-india-increasing-in-leaps-and-bounds\/\">Cyber Crimes against India \u2013 Increasing in Leaps and Bounds<\/a><\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/11\/cyber_attacks_against_India1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-77221 aligncenter\" alt=\"cyber_attacks_against_India\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/11\/cyber_attacks_against_India1-300x155.png\" width=\"313\" height=\"161\" \/><\/a><\/p>\n<p>India happens to be the 4<sup>th<\/sup> most favorite target of cyber criminals when it comes to phishing attacks. This fact is vouched by the number of cyber attacks hitting the country, which has scaled exponentially in 2013.<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<div style=\"border: solid 1px #FF6600; padding: 8px; border-radius: 8px 8px 8px 8px;\">\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/blogs.quickheal.com\/how-cyber-criminals-are-using-small-enterprises-to-attack-their-real-targets\/\">How Cyber Criminals are Using Small Enterprises to Attack their Real Targets<\/a><\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/10\/chinese_hackers_targetting_SME.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-77099 aligncenter\" alt=\"chinese_hackers_targetting_SME\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/10\/chinese_hackers_targetting_SME-300x300.jpg\" width=\"276\" height=\"276\" \/><\/a><\/p>\n<p>Small enterprises in America are increasingly targeted by cyber criminals based in China. It may seem that hackers are interested in their money or data, but the fact is, the waters are deeper than this.<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<div style=\"border: solid 1px #FF6600; padding: 8px; border-radius: 8px 8px 8px 8px;\">\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/blogs.quickheal.com\/how-prepared-is-your-business-against-data-breach\/\">How Prepared is your Business against Data Breach?<\/a><\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/08\/data-breach-enterprise-illustration1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-76584 aligncenter\" alt=\"data-breach-enterprise-illustration\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/08\/data-breach-enterprise-illustration1-300x265.png\" width=\"287\" height=\"253\" \/><\/a><\/p>\n<p>If you are running an enterprise, then its future depends on the answer you have for this question.<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<div style=\"border: solid 1px #FF6600; padding: 8px; border-radius: 8px 8px 8px 8px;margin-bottom:15px\">\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/blogs.quickheal.com\/the-underlying-threats-to-enterprise-security\/\">The Underlying Threats to Enterprise Security<\/a><\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/07\/security-enterprise-threat.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-76263 aligncenter\" alt=\"security-enterprise-threat\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/07\/security-enterprise-threat-300x266.png\" width=\"281\" height=\"249\" \/><\/a><\/p>\n<p>While the number of enterprise security threats can be in hundreds, in this post, we have discussed those that can do the maximum damage.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Enterprise IT Security can be compared to the knobs and handles in kitchen cabinets \u2013 essential items that get the least of our attention. In 2013, we presented to our readers with many essential aspects of enterprise IT security. These aspects touched points ranging from India being the 4th most targeted nation by phishers to [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":76646,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[171],"tags":[855],"class_list":["post-77689","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-enterprise","tag-top-enterprise-it-security-blog-posts"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/77689"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=77689"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/77689\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=77689"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=77689"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=77689"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}