• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay updated.

Poor network visibility: Don’t put your enterprise’s security at risk

Poor network visibility: Don’t put your enterprise’s security at risk

Estimated reading time: 3 minutes

This is a world that is connected. Whether is the Internet of Things (IoT) or BYOD (Bring Your Own Device), enterprise networks do not exist in silos anymore. The number of devices that connect to enterprise networks is exponentially...
Read Blog
May 9, 2018
5
Shares

5 Cybersecurity Myths for Linux Users

5 Cybersecurity Myths for Linux Users

Estimated reading time: 3 minutes

When we talk about operating systems, the immediate names that come to mind are Microsoft Windows and Apple Macintosh. Yet, while they may be two of the most well-known operating systems around, there is also quite a portion of...
Read Blog
May 8, 2018
7
Shares

The Human Factor: Keeping Your Cybersecurity Defence Strong and Secure

The Human Factor: Keeping Your Cybersecurity Defence Strong and Secure

Estimated reading time: 3 minutes

Technology is definitely getting hi-tech. But one thing which still remains decidedly rooted is plain and simple human frailty. And in the cybersecurity-obsessed war that organizations and individuals are fighting on a day-to-day basis, human errors can often prove...
Read Blog
May 2, 2018
8
Shares

Spotted unusual activity on network: Here’s what to do next

Spotted unusual activity on network: Here’s what to do next

Estimated reading time: 3 minutes

Efficient cybersecurity relies on one major commandment: prevention. Just like the physical world, prevention is better than cure and in the case of the cyber world, having the proper defence in place goes a long way in securing an...
Read Blog
April 27, 2018
2
Shares

Here’s the checklist of an efficient endpoint security solution

Here’s the checklist of an efficient endpoint security solution

Estimated reading time: 3 minutes

For any organization, big or small, endpoint security acts as a frontline against cyber attacks. Ultimately, endpoints refer to every device that is connected to the enterprise network. Most attacks on an organization can be traced back to devices...
Read Blog
April 25, 2018
4
Shares

Key Vulnerabilities in SMBs: Devices and People

Key Vulnerabilities in SMBs: Devices and People

Estimated reading time: 3 minutes

Small and medium-sized businesses (SMB) have to walk a tightrope when it comes to cybersecurity. On one hand, unlike the big business enterprises, they may not always have the financial heft to really invest in cybersecurity solutions, which often...
Read Blog
April 19, 2018
5
Shares

Negligent Employee: A dangerous internal cyber threat

Negligent Employee: A dangerous internal cyber threat

Estimated reading time: 3 minutes

Sometimes, the biggest dangers come from within. As organizations cope with the changing world of cybersecurity which continues to evolve at a frantic pace, they sometimes forget to neglect the danger that stares at them in their face. The...
Read Blog
April 16, 2018
10
Shares

Malware in attachment? Stop them before they hit your organization’s security

Malware in attachment? Stop them before they hit your organization’s security

Estimated reading time: 3 minutes

Increasingly, hacker and other malicious criminals are increasing email attachments to inject malware into their targets. Malware disguised as an email attachment represents an easy target – the recipient of the mail may unknowingly open the attachment without even...
Read Blog
April 12, 2018
11
Shares

Seqrite AntiVirus for Linux: Protect your Linux against malware

Seqrite AntiVirus for Linux: Protect your Linux against malware

Estimated reading time: 3 minutes

In the age of multi-OS platforms, it is not always easy to find the perfect cybersecurity solution for your software. Many of the common antivirus platforms today are designed for the purpose of the most popular ones, Windows and...
Read Blog
April 5, 2018
8
Shares

Antivirus for Server: A comprehensive solution for complex networks

Antivirus for Server: A comprehensive solution for complex networks

Estimated reading time: 3 minutes

When it comes to large corporate networks with complex servers, one of the biggest headaches for network administrators is how to properly secure it from cybersecurity threats. In that respect, Seqrite’s Antivirus for Server offers a convenient, powerful solution: it...
Read Blog
April 2, 2018
19
Shares
← Previous 1 … 22 23 24 … 42 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (23) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (15) Cybersecurity (332) cyber security (34) Cyber threat (33) cyber threats (49) data breach (56) data breaches (29) data loss (28) data loss prevention (33) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (110) Enterprise security (18) Exploit (13) GDPR (13) malware (76) malware analysis (12) malware attack (23) malware attacks (12) MDM (27) Microsoft (15) mobile device management (11) Network security (23) Patch Management (12) phishing (29) Ransomware (69) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (11) Seqrite (37) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies