• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay updated.

How hackers use spam to maximize the impact of a cyber attack?

How hackers use spam to maximize the impact of a cyber attack?

Estimated reading time: 3 minutes

All users of the Internet are familiar with the word ‘spam.’ ‘Spam’ is unsolicited email sent in massive quantities simultaneously to numerous users, generally trying to advertise or publicize certain products or services. This junk mail is also often used as...
Read Blog
May 28, 2018
7
Shares

GDPR has arrived: Check your preparedness

GDPR has arrived: Check your preparedness

Estimated reading time: 3 minutes

25th May 2018, the day has arrived when the EU’s General Data Protection Regulation (GDPR) has come into effect. The GDPR, a high-profile and wide-ranging piece of legislation which will, no doubt, completely reshape the world of cybersecurity and data privacy. Passed by the...
Read Blog
May 25, 2018
6
Shares

Cost of security vs. Cost of cyber attack: Which one should you choose?

Cost of security vs. Cost of cyber attack: Which one should you choose?

Estimated reading time: 3 minutes

As the number and nature of cyber threats grows increasingly day by day, organizations have opened up to the threat caused by cyber attacks. The North Atlantic Treaty Organization, which is better known as NATO, recognized cyberspace as a...
Read Blog
May 24, 2018
10
Shares

5 Critical corporate cybersecurity risks for SMBs

5 Critical corporate cybersecurity risks for SMBs

Estimated reading time: 3 minutes

A major issue which plagues small and medium businesses (SMBs) when it comes to cybersecurity is their own perception. Often, SMBs suffer from a notion that they are not as important, that they do need to worry about fixing...
Read Blog
May 21, 2018

How to protect your server against ransomware attacks?

How to protect your server against ransomware attacks?

Estimated reading time: 3 minutes

There is one big reason why ransomware has suddenly become the hot new topic in cybersecurity: its ease of use. The proponents of ransomware have realized that it provides an easy, anonymous way to terrorize corporates and get easy...
Read Blog
May 16, 2018

Wake up call: Right time to secure your online data

Wake up call: Right time to secure your online data

Estimated reading time: 3 minutes

First things first, there really is never a good time to secure the online data of your business. Any business with a cybersecurity-first mindset should have done it long, long ago. But in case, a business needs a strong...
Read Blog
May 14, 2018
9
Shares

How cybersecurity laws play an important role in securing your organization

How cybersecurity laws play an important role in securing your organization

Estimated reading time: 3 minutes

The role of digital technology is only increasing in today’s day and age. From big governments to even bigger corporations, much of the business around the world occurs on the digital highway. This kind of hyperconnectivity is common nowadays,...
Read Blog
May 10, 2018
9
Shares

Poor network visibility: Don’t put your enterprise’s security at risk

Poor network visibility: Don’t put your enterprise’s security at risk

Estimated reading time: 3 minutes

This is a world that is connected. Whether is the Internet of Things (IoT) or BYOD (Bring Your Own Device), enterprise networks do not exist in silos anymore. The number of devices that connect to enterprise networks is exponentially...
Read Blog
May 9, 2018
5
Shares

5 Cybersecurity Myths for Linux Users

5 Cybersecurity Myths for Linux Users

Estimated reading time: 3 minutes

When we talk about operating systems, the immediate names that come to mind are Microsoft Windows and Apple Macintosh. Yet, while they may be two of the most well-known operating systems around, there is also quite a portion of...
Read Blog
May 8, 2018
7
Shares

The Human Factor: Keeping Your Cybersecurity Defence Strong and Secure

The Human Factor: Keeping Your Cybersecurity Defence Strong and Secure

Estimated reading time: 3 minutes

Technology is definitely getting hi-tech. But one thing which still remains decidedly rooted is plain and simple human frailty. And in the cybersecurity-obsessed war that organizations and individuals are fighting on a day-to-day basis, human errors can often prove...
Read Blog
May 2, 2018
8
Shares
← Previous 1 … 21 22 23 … 42 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (321) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies