Skip to content
Security Quotient
Schedule a demo
  • Solutions
    • Cyber Security
    • Data Privacy and Protection
    • Risk and Compliance
    • Anti-Phishing
    • Campaigns
    • Certify every employee
  • Customization
  • Resources
  • Pricing
  • Help
Schedule a demo
Security Quotient
  • Solutions
    • Cyber Security
    • Data Privacy and Protection
    • Risk and Compliance
    • Anti-Phishing
    • Campaigns
    • Certify every employee
  • Customization
  • Resources
  • Pricing
  • Help
Schedule a demo

Lakshmi Santhosh

Browser-in-the-Browser attacks 

April 7, 2022April 7, 2022 by Lakshmi Santhosh

Single sign-on options are so common today that we don’t often think twice before we click to proceed. Also, if the browser has trust signals like a padlock icon, we … …

Categories browser-in-the- browser attacks, Cyber Security Awareness Advisories Leave a comment

Top 5 cloud security checklist    

April 6, 2022March 22, 2022 by Lakshmi Santhosh

Implement a regular patching cadence to maintain a secure cloud environment Modern-day enterprises are increasingly migrating their applications and data to cloud-based environments.    A large amount of data traversing … …

Categories Cloud security, Cyber Security Awareness Advisories Leave a comment

Tips to respond to a network breach

April 6, 2022March 15, 2022 by Lakshmi Santhosh

Responding to future breaches starts now Network breaches have gained momentum as businesses migrate to a hybrid work environment. As infrastructure grows and new technologies appear, keeping track of vulnerable … …

Categories Cyber Security Awareness Advisories, Network breach Leave a comment

Top 5 tips to secure online meetings

April 6, 2022March 9, 2022 by Lakshmi Santhosh

Most widely used platforms are still vulnerable to breaches A hybrid model of work-from-home and the physical office environment has become the new normal. The future of businesses relies on … …

Categories Cyber Security Awareness Advisories, Online meetings Leave a comment

Top 5 secure coding guidelines

April 8, 2022March 4, 2022 by Lakshmi Santhosh

Securing apps has become quite a challenge for developers. Building software is quite challenging, but the biggest question developers should consider is how secure the developed code is. The security … …

Categories Cyber Security Awareness Advisories Leave a comment

Staying ahead of supply chain cyber attacks

April 6, 2022February 22, 2022 by Lakshmi Santhosh

The key to staying ahead of supply chain attacks is to take proactive approaches The weakest link in your enterprise security might lie with partners and suppliers. Supply chains are … …

Categories Cyber Security Awareness Advisories, Supply Chain Cyber Attacks Leave a comment

Supply chain cyber attacks

April 6, 2022January 20, 2022 by Lakshmi Santhosh

Organizations do not work in isolation. Once the cybercriminal gains access to the supplier’s network, they work their way up the supply chain to the target organization. It may take … …

Categories Cyber Security Awareness Advisories, Supply Chain Cyber Attacks

Phishing, Vishing and SMiShing

April 6, 2022January 18, 2022 by Lakshmi Santhosh

Alongside technological advancements,  cyber crimes have escalated. The following post will give you a glimpse of some ways Cybercriminals take advantage of our digital identity. In Phishing, the attacker sends … …

Categories Cyber Security Awareness Advisories, Phishing

Top 5 SaaS Cyber Security Risks

April 6, 2022January 13, 2022 by Lakshmi Santhosh

As SaaS adoption increases, so are cyber security risks associated with it. There is indeed a growing trust in the security capability of SaaS solutions. Nevertheless, it is prudent to … …

Categories Cyber Security Awareness Advisories, SaaS

COMPANY

About

Join our team

Clients

Press

Contact

SOLUTIONS

Security Awareness Training

Security Awareness Campaigns

Customized solutions

Train and Certify Employees

COMMUNITY

Latest advisories

Free resources

FOLLOW US

  • LinkedIn
  • YouTube
  • Twitter

Images used in this site are from Freepik and Flaticon.

© 2022 Security Quotient Pvt Ltd.

Privacy Policy

Terms and Conditions

Sitemap

  • Solutions
    • Cyber Security
    • Data Privacy and Protection
    • Risk and Compliance
    • Anti-Phishing
    • Campaigns
    • Certify every employee
  • Customization
  • Resources
  • Pricing
  • Help