• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay updated.

What is Disaster Recovery as a Service (DRaaS)?

What is Disaster Recovery as a Service (DRaaS)?

Estimated reading time: 3 minutes

Disasters, whether they are natural or man-made, can strike anytime without any kind of due notice. Any business, small or big, will need to anticipate the possibility of such disasters and have a plan in place. While one tactic...
Read Blog
January 17, 2018
12
Shares

Why Centralized Administration is an Important Security Tool?

Why Centralized Administration is an Important Security Tool?

Estimated reading time: 3 minutes

Today’s cyber threat landscape spreads across endpoints, servers, web, networks and emails. Not just that, with the excessive adoption of cloud technologies, the threat multiplies to on-premise and cloud too. Thus, making it a mammoth task for security administrators...
Read Blog
January 16, 2018

6 Hidden IT risks in 2018

6 Hidden IT risks in 2018

Estimated reading time: 3 minutes

Dangers can often lie within. This is an information age where data is gold and in this day and age, no matter what business you are in, your Information Technology department is often your greatest asset. 2017, the year...
Read Blog
January 12, 2018
15
Shares

Importance of user authentication in network security

Importance of user authentication in network security

Estimated reading time: 3 minutes

Authentication can easily be termed as the foundation of any eBusiness. With companies expanding their audience-base, it becomes important that they concentrate on user-authentication for validating and securing their identity. Reliable authentication also lays the foundation for asset and...
Read Blog
January 11, 2018

Multi-layered approach is the key towards cybersecurity

Multi-layered approach is the key towards cybersecurity

Estimated reading time: 3 minutes

With the cybersecurity threat-landscape evolving with each passing day, it becomes important that organizations opt for newer and safer strategies for staying functional without worrying about cyber-threats. Moreover, organizations must readily focus on cybersecurity while keeping a track of...
Read Blog
January 9, 2018
5
Shares

7 Major causes of data breaches

7 Major causes of data breaches

Estimated reading time: 3 minutes

The growing threat of data breaches globally has kept businesses on their toes. They occur when important proprietary, sensitive or confidential information is accessed or disclosed in an unauthorized faction. Data breaches can have a deep-lasting effect on a...
Read Blog
January 8, 2018
4
Shares

How consumers see privacy and cyber risks?

How consumers see privacy and cyber risks?

Estimated reading time: 3 minutes

There is a general perception that modern-day consumers, while being savvy on all digital and social media platforms, don’t give a lot of thought to internet security. As it turns out though, that is just a perception. The reality...
Read Blog
January 5, 2018
3
Shares

What are the major ingredients of cybersecurity in 2018?

What are the major ingredients of cybersecurity in 2018?

Estimated reading time: 3 minutes

2017 was a highly eventful year for cybersecurity experts as they incessantly kept combating the proliferating security incidents with considerable success. While a few incidents grabbed the headlines, a majority of cyber-attacks went unannounced. Now in 2018, it seems...
Read Blog
January 4, 2018
3
Shares

Bandwidth Limit Exceeded: Causes and Solution

Bandwidth Limit Exceeded: Causes and Solution

Estimated reading time: 3 minutes

Every network administrator knows that feeling. You receive an innocuous notification early in your billing cycle – “Exceeded quota”. Bad news. Your network has already exceeded the bandwidth allocated to it. The only option now is to buy extra...
Read Blog
January 3, 2018
3
Shares

2018: What’s your New Year resolution for cybersecurity?

2018: What’s your New Year resolution for cybersecurity?

Estimated reading time: 3 minutes

Reports released by CSO suggest that cybersecurity threats are expected to amplify up to a staggering $6 trillion, by the end of 2021. This revelation validates the fact that security threats are looming large and majority of global businesses...
Read Blog
January 2, 2018
← Previous 1 … 27 28 29 … 42 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies