• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay updated.

Benefits of having Intrusion Prevention/Detection System in your enterprise

Benefits of having Intrusion Prevention/Detection System in your enterprise

Estimated reading time: 3 minutes

Networks have been in existence for a very long time and are indeed a boon as it has brought people and the world closer to each other. With the networks, the threat of intrusion of these networks became a...
Read Blog
February 15, 2018

Diving deep into the Business Email Compromise

Diving deep into the Business Email Compromise

Estimated reading time: 3 minutes

Business Email Compromise is the new kid in the block in cyber crime space. As per an FBI report, Business Email Compromise (BEC) has affected more than 130 countries since October 2013 and the global losses or attempted losses...
Read Blog
February 14, 2018

Machine Learning: How close we are in Defeating Online Payment Fraud?

Machine Learning: How close we are in Defeating Online Payment Fraud?

Estimated reading time: 3 minutes

The unhindered growth of e-commerce and its impact has seemingly increased the risks of online fraud. Moreover, the attacks have amplified in terms of magnitude as the technologies adopted by the hackers are getting persuasive and more powerful, with...
Read Blog
February 12, 2018

Data Security: Where are the SMBs failing in securing their data

Data Security: Where are the SMBs failing in securing their data

Estimated reading time: 3 minutes

Small and medium sized businesses usually rely on organizational data for flourishing and succeeding in their endeavors. However, there are chances that the SMBs are putting all their data at risk by implementing erroneous strategies.  According to the latest...
Read Blog
February 9, 2018
12
Shares

Why you should never pay ransom to hackers

Why you should never pay ransom to hackers

Estimated reading time: 3 minutes

Since WannaCry swept the world in 2017, ransomware has become a network administrator’s worst nightmare. It’s not without any reason: the devastating WannaCry ransomware attack affected more than 200,000 computers across 150 countries with huge damages. Other notable ransomware attacks...
Read Blog
February 8, 2018
7
Shares

Cryptomining Malware: The New Favorite of Hackers

Cryptomining Malware: The New Favorite of Hackers

Estimated reading time: 3 minutes

Ransomware threats have long been plaguing the online space and are usually considered to be extremely disruptive in nature. Unlike other malware threats which keep a low profile, ransomware attacks announce themselves before crippling a system for diverse benefits....
Read Blog
February 7, 2018
4
Shares

Cryptocurrency- The Good, The Bad & The Ugly

Cryptocurrency- The Good, The Bad & The Ugly

Estimated reading time: 3 minutes

Cryptocurrency is the current buzzword of this day and age. Not a day goes by when there’s not a news item about cryptocurrency, either with warnings about its danger or breathless coverage of its fluctuating value. Without doubt, it’s...
Read Blog
February 6, 2018
4
Shares

Multi-Factor Authentication: Everything you need to Know

Multi-Factor Authentication: Everything you need to Know

Estimated reading time: 3 minutes

It wouldn’t be wrong to assume that login credentials and other confidential user-specific insights are the most frequently compromised data sets, extensively targeted by the malicious parties. Since 2017 witnessed hackers breaching 711 million users records; thereby accessing around...
Read Blog
February 5, 2018
5
Shares

How to defend your network against DDoS attacks?

How to defend your network against DDoS attacks?

Estimated reading time: 3 minutes

When it comes to enlisting the most unrecognizable forms of cyber-attacks, Distributed Denial of Service (DDoS) features on top of the pecking order. While DDoS attacks started off as simple and volumetric threats for creating disruptions, they have amplified...
Read Blog
January 31, 2018

Cybersecurity: How to approach a broader perspective at the board level

Cybersecurity: How to approach a broader perspective at the board level

Estimated reading time: 3 minutes

The dangers that cyber threats pose have never been as apparent as now. High-profile organizations have been at the receiving end, there has been both reputational and financial damage and brand equity has been hit. One thing is clear:...
Read Blog
January 30, 2018
9
Shares
← Previous 1 … 26 27 28 … 42 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (23) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (15) Cybersecurity (332) cyber security (34) Cyber threat (33) cyber threats (49) data breach (56) data breaches (29) data loss (28) data loss prevention (33) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (110) Enterprise security (18) Exploit (13) GDPR (13) malware (76) malware analysis (12) malware attack (23) malware attacks (12) MDM (27) Microsoft (15) mobile device management (11) Network security (23) Patch Management (12) phishing (29) Ransomware (69) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (11) Seqrite (37) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) zero trust (12)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies