• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay updated.

Top 5 IT Problems for Sysadmins: Seqrite has the solution!

Top 5 IT Problems for Sysadmins: Seqrite has the solution!

Estimated reading time: 3 minutes

For enterprises, sysadmins or system administrators are vital resources who play a critical role in overall productivity. By ensuring upkeep and optimal functioning of all computer systems and networks within an enterprise, a sysadmin provides a very important link...
Read Blog
August 23, 2018
8
Shares

Importance of industry certifications for security products and what do they mean

Importance of industry certifications for security products and what do they mean

Estimated reading time: 3 minutes

The importance of cybersecurity has slowly seeped into the consciousness of enterprises. A cybercrime can undo years of work in an instant and enterprises are recognizing this and trying to find ways to stay safe. Hence, investment in security...
Read Blog
August 16, 2018
3
Shares

Top 5 IT tips for remote and mobile teams

Top 5 IT tips for remote and mobile teams

Estimated reading time: 3 minutes

Cybersecurity threats are lurking everywhere. In 2015, a vulnerability was detected in WiFi routers in hotel allowing attackers to distribute malware and monitor and record data sent over the network. A laptop is stolen every 53 seconds in the...
Read Blog
August 16, 2018
3
Shares

Strengthening India’s defense with cybersecurity

Strengthening India’s defense with cybersecurity

Estimated reading time: 3 minutes

India’s 72nd Independence Day is a day of much celebration and reflection. While the country has certainly progressed on various fronts, it is also time for all citizens to come together and stay aware of the need to remain...
Read Blog
August 13, 2018
19
Shares

What is EMM? Enterprise Mobility Management explained

What is EMM? Enterprise Mobility Management explained

Estimated reading time: 3 minutes

With the advent of mobile devices and now, currently, the Internet of Things (IoT), mobility has become the buzzword in enterprises. It is not only about managing one physical network in a location – now employees have a range...
Read Blog
August 9, 2018
5
Shares

Tailgating: Security Risks Involved

Tailgating: Security Risks Involved

Estimated reading time: 3 minutes

It is a common scenario. An employee swipes his identity card and enters his office premises. He spots someone without an id card outside the gates, wanting to get in. He wants to help – he offers them entry...
Read Blog
July 27, 2018
4
Shares

Seqrite Mobile Device Management: Everything you need to know

Seqrite Mobile Device Management: Everything you need to know

Estimated reading time: 3 minutes

The proliferation of mobile devices has meant that there has been a sea of change in how business is conducted globally. Now, more than ever, mobile phone devices play a key role in business communication globally – from emails...
Read Blog
July 23, 2018
9
Shares

New Product Launch: Seqrite Secure Web Gateway

New Product Launch: Seqrite Secure Web Gateway

Estimated reading time: 3 minutes

More and more organizations are opting for a secure web gateway solution as the next step up from conventional security solutions. Secure web gateways prevent unsecured traffic from entering an organization’s internal network and prevent employees/users from accessing or...
Read Blog
July 18, 2018
1

Seqrite Endpoint Encryption: The encryption that your business needs

Seqrite Endpoint Encryption: The encryption that your business needs

Estimated reading time: 3 minutes

With data becoming an organization’s most valuable asset, the need of the hour for businesses is encryption, to protect their sensitive data, keep up with legal considerations, abide by global compliance policies and safeguard customer interests. Encryption is hence...
Read Blog
July 16, 2018
23
Shares

Email-borne cyber attacks: A constant security threat

Email-borne cyber attacks: A constant security threat

Estimated reading time: 3 minutes

Since the invention of the World Wide Web in 1989 by Tim Berners-Lee, the technology has changed. What used to be a collection of simple text-based Usenet groups metamorphosed into multimedia and graphics. First email communication was all the...
Read Blog
July 12, 2018
5
Shares
← Previous 1 … 19 20 21 … 42 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (321) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies