• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Ankita Ashesh

About Ankita Ashesh

Impact of embracing MDM solutions for banking operations

Impact of embracing MDM solutions for banking operations

Estimated reading time: 3 minutes

The rise of mobile telephones has impacted the way corporations do business in all spheres and all over the world. The world of banking has not been an exception. A survey of US adults in 2018 found that mobile...
Read Blog
October 23, 2018
2
Shares

How to build a zero trust network

How to build a zero trust network

Estimated reading time: 3 minutes

Traditionally, any discussion about network security is focused on a specific model that organizations have largely internalized. This model is boundary or parameter-based model and assumes of a perimeter or a boundary outside a network. By this model, cybersecurity...
Read Blog
September 6, 2018
114
Shares

What India’s data protection law might mean for your business

What India’s data protection law might mean for your business

Estimated reading time: 3 minutes

India has taken a step forward towards laying down a proper policy for data protection. The Srikrishna Committee, a 10-member expert committee headed by former Supreme Court judge BN Srikrishna and appointed by the Indian government in August 2017...
Read Blog
August 6, 2018
305
Shares

POS security vulnerabilities for retail industry

POS security vulnerabilities for retail industry

Estimated reading time: 3 minutes

To have a look at how far technology has progressed, take a look at the simple art of shopping. What was, even a few years back, a simple matter of going to a brick-and-mortar shop, choosing an item and...
Read Blog
July 30, 2018
20
Shares

Cryptojacking: FAQs for Businesses

Cryptojacking: FAQs for Businesses

Estimated reading time: 3 minutes

If ransomware, malware, hacking and data loss weren’t enough for India’s cybersecurity space, it has now got another problem to deal with. On 11 May, 2018, it was widely reported that India had just seen a major cryptojacking attack. More than...
Read Blog
June 26, 2018
10
Shares

How do cyber criminals celebrate Valentine’s day

How do cyber criminals celebrate Valentine’s day

Estimated reading time: 2 minutes

February 14th, Valentine’s Day, maybe the day of love but there’s no love lost between cybercriminals and their target. In recent years, these criminals are only getting smarter in their ways and ensuring that they time their attacks at...
Read Blog
February 13, 2018
201
Shares

Find out how safe you are on the Internet! Take this Quiz.

Find out how safe you are on the Internet! Take this Quiz.

Estimated reading time: < 1 minute

Take our quiz to find out how safe you are on the Internet. [slickquiz id=1]  
Read Blog
February 6, 2018
228
Shares
1

Seqrite receives No. 1 rating in AV – Comparatives Performance Test

Seqrite receives No. 1 rating in AV – Comparatives Performance Test

Estimated reading time: 2 minutes

Seqrite Endpoint Security v 17.0 has received no. 1 rating in Anti-Virus Comparative Performance Test for September 2017. These tests evaluate the impact of anti-virus software on system performance. AV Comparatives evaluated 21 security software and Seqrite scored the...
Read Blog
November 14, 2017
210
Shares

Seqrite launches Encryption solution for optimal security of business data

Seqrite launches Encryption solution for optimal security of business data

Estimated reading time: 2 minutes

Seqrite encryption solution protects corporate data residing on endpoints with a strong encryption algorithms such as AES, RC6, SERPENT and TWOFISH. Full disk encryption supports Microsoft Windows Desktops and Laptops and prevents data loss occurring from loss/theft of endpoint....
Read Blog
November 6, 2017
125
Shares

Analysis of recent Locky ransomware outbreak

Analysis of recent Locky ransomware outbreak

Estimated reading time: 2 minutes

Quick Heal Security Labs has been observing the infamous Locky ransomware outbreak which kicked off recently in the last week of September. The outbreak started with spam email with various subjects and different attachment names. On 26th September, spam campaign delivering a new...
Read Blog
September 30, 2017
260
Shares
1
← Previous 1 2 3 … 5 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies