• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Monthly Archive:: September 2016

How to Recover Files After a Ransomware Attack?

How to Recover Files After a Ransomware Attack?

Estimated reading time: 2 minutes

What if you know your data is securely backed up when a ransomware strikes and you don’t have to worry about recovering your files? The Backup and Restore feature of Seqrite helps you achieve this. What is a Ransomware?...
Read Blog
September 8, 2016

Seqrite Patch Management: A Centralized Solution to all Microsoft Application Vulnerability Needs

Seqrite Patch Management:  A Centralized Solution to all Microsoft Application Vulnerability Needs

Estimated reading time: 2 minutes

Cyber Security threats today have become increasingly sophisticated and complex. Organizations, however, have not been able to evolve at the same pace. As organizations move ahead and embrace new technologies without fully comprehending the implications these have on the...
Read Blog
September 2, 2016
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies