• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Monthly Archive:: August 2019

The manufacturing industry’s major cybersecurity challenges

The manufacturing industry’s major cybersecurity challenges

Estimated reading time: 3 minutes

Until recently, the manufacturing sector as a whole rarely took cyber threats seriously. This was primarily due to the domain’s outlook that it was a highly specialized industry and hence would not be on the radar of cyberattackers. The...
Read Blog
August 29, 2019

The retail industry’s major cybersecurity challenges

The retail industry’s major cybersecurity challenges

Estimated reading time: 3 minutes

The retail sector has always been at the risk of cyberattacks. The industry has already seen high-profile data breaches, some of which have happened in the recent past at large retail brands, lucrative to cyberattackers, such as Target, TJX...
Read Blog
August 27, 2019

The transformation of enterprise security from 2017 to 2019

The transformation of enterprise security from 2017 to 2019

Estimated reading time: 2 minutes

The nature of enterprise security is such that it continuously keeps evolving. Trends change, threats vary and morph into different entities, approaches that seem relevant get outdated in six months or sometimes even lesser. For enterprises looking to stay...
Read Blog
August 22, 2019

Are you taking your enterprise mobility management seriously?

Are you taking your enterprise mobility management seriously?

Estimated reading time: 2 minutes

A stark contrast to yesteryears with strict office hours, today’s business trends are permitting employees flexibility when it comes to office hours, remote working and devices through which they can work from. It is in this context, many leading...
Read Blog
August 20, 2019

Essential practices to strengthen your business’ cybersecurity

Essential practices to strengthen your business’ cybersecurity

Estimated reading time: 4 minutes

With enterprises being the centre of attention of an ever-evolving threat landscape, foolproof security of business assets has become the need of the hour. To counter the menace of cyberattacks, today we have businesses that specialize in the development...
Read Blog
August 16, 2019

How important is it to understand enterprise security management?

How important is it to understand enterprise security management?

Estimated reading time: 3 minutes

Businesses increasingly face a wide array of ever-changing cyber risks as they adapt to the technologies and trends of today’s work environment. The world is in the throes of a digital revolution which has constituted a wide array of...
Read Blog
August 13, 2019

SSH In Nutshell : A protocol for secured network communication

SSH In Nutshell : A protocol for secured network communication

Estimated reading time: 4 minutes

Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. A widely used Transport Layer Protocol, SSH is used to secure connections between clients and servers. SSH was basically designed as a...
Read Blog
August 12, 2019

How should enterprises fill the rising talent gap in cybersecurity?

How should enterprises fill the rising talent gap in cybersecurity?

Estimated reading time: 2 minutes

The cyber threat landscape is one of the most talked-about issues, across industries, currently. The dynamic nature of cyberattacks automatically transforms cybersecurity to be the complete opposite of a stable function. Cybercriminals and hackers are trying to find new...
Read Blog
August 8, 2019

Enterprises are getting ready for Enterprise mobility management

Enterprises are getting ready for Enterprise mobility management

Estimated reading time: 2 minutes

Modern businesses are encouraging their workforce to work flexibly.  Avenues such as remote working, working from home, CYOD, BYOD etc. are a surging trend nowadays among professionals working in an array of business domains. This is typically contrasting from...
Read Blog
August 6, 2019

Enterprises can begin securing their endpoints by following these five simple steps.

Enterprises can begin securing their endpoints by following these five simple steps.

Estimated reading time: 3 minutes

Sustainable enterprise security is both a great practice and a core business process. Enterprises are increasingly becoming aware of the diverse & intense nature of threats that exist in cybersphere and the damage it can cause – that’s where...
Read Blog
August 1, 2019
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies