• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Monthly Archive:: August 2017

Are retailers doing enough to protect consumers’ data?

Are retailers doing enough to protect consumers’ data?

Estimated reading time: 3 minutes

The retail industry has been traditionally perceived to be a happy hunting ground for hackers and other cyber attackers. There are card based and card-not-present transactions done with POS, and online retail purchases and both of these are prone...
Read Blog
August 16, 2017

How cyber crime has become the greatest threat to companies across the world?

How cyber crime has become the greatest threat to companies across the world?

Estimated reading time: 3 minutes

Data in today’s world is a powerful tool which when used correctly can boost businesses to reach new heights. While data offers competitive advantage to organizations, cyber crime has slowly evolved into a worthy antagonist – shaping up as...
Read Blog
August 15, 2017

Seqrite AntiVirus for Linux: Comprehensive antivirus solution for Linux networks

Seqrite AntiVirus for Linux: Comprehensive antivirus solution for Linux networks

Estimated reading time: < 1 minute

Seqrite AntiVirus for Linux is designed to simplify security configurations and synchronize control on Linux networks across all levels of the organization. Seqrite AntiVirus for Linux shields Linux systems against malware. It offers On-demand and Schedule scanning, Samba Share...
Read Blog
August 14, 2017
50
Shares

Understanding data encryption in network security

Understanding data encryption in network security

Estimated reading time: 3 minutes

Information Security is a big concern today for CISOs and administrators everywhere. The information in question could be the company’s own information, or it could be that pertaining to its customers. In either case, protecting the information, preventing it...
Read Blog
August 14, 2017

5 Security measures you should take to protect your organization’s network

5 Security measures you should take to protect your organization’s network

Estimated reading time: 4 minutes

Technology continuously evolves to provide greater and more powerful features. At the same time, newer threats are getting uncovered with every advancement in technology. More modern devices present fresher avenues and endpoints that can be used for hacking and making a breach. New...
Read Blog
August 11, 2017

An analysis of GlobeImposter Ransomware by Quick Heal Security Labs

An analysis of GlobeImposter Ransomware by Quick Heal Security Labs

Estimated reading time: 5 minutes

GlobeImposter Ransomware has been increasingly active and observed recently to be appending different suffixes to files it encrypt. A few patterns observed are using 3 random numbers such as “.492, .490, .725, .726, and .707”, random alphanumeric words such...
Read Blog
August 11, 2017

Top industries at risk of cyber attacks in 2017

Top industries at risk of cyber attacks in 2017

Estimated reading time: 3 minutes

Businesses today carry more sensitive data than ever before. Any crucial information about the customers, if it gets into the wrong hands, can cause a lot of damage to both clients as well as companies. Apart from the client’s information,...
Read Blog
August 10, 2017

What is Endpoint Encryption?

What is Endpoint Encryption?

Estimated reading time: 3 minutes

Endpoint devices like PCs, Smartphones and USB drives usually have a lot of sensitive data stored within. Organizations with truckloads of corporate information and other confidential details need to ensure that unauthorized access to these data sets is negated....
Read Blog
August 9, 2017

An analysis of the fileless malware by Quick Heal Security Labs

An analysis of the fileless malware by Quick Heal Security Labs

Estimated reading time: 4 minutes

The fileless malware is a malware family that does not leave any trace of its infection in the affected file system. Also known as the ‘memory resident virus’, this type of malware hides in the registry and memory making...
Read Blog
August 9, 2017

Why choose Seqrite EPS against Ransomware?

Why choose Seqrite EPS against Ransomware?

Estimated reading time: 3 minutes

Ransomware, by now, has become as common a term, in the cyber security eco-system. With multiple massive ransomware attacks across the globe in recent times, almost everyone, including individual customers and organizations, have become aware of the threat that...
Read Blog
August 8, 2017
← Previous 1 2 3 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies