• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Cybersecurity Archive

Top 5 IT Problems for Sysadmins: Seqrite has the solution!

Top 5 IT Problems for Sysadmins: Seqrite has the solution!

Estimated reading time: 3 minutes

For enterprises, sysadmins or system administrators are vital resources who play a critical role in overall productivity. By ensuring upkeep and optimal functioning of all computer systems and networks within an enterprise, a sysadmin provides a very important link...
Read Blog
August 23, 2018
8
Shares

Strengthening India’s defense with cybersecurity

Strengthening India’s defense with cybersecurity

Estimated reading time: 3 minutes

India’s 72nd Independence Day is a day of much celebration and reflection. While the country has certainly progressed on various fronts, it is also time for all citizens to come together and stay aware of the need to remain...
Read Blog
August 13, 2018
19
Shares

POS security vulnerabilities for retail industry

POS security vulnerabilities for retail industry

Estimated reading time: 3 minutes

To have a look at how far technology has progressed, take a look at the simple art of shopping. What was, even a few years back, a simple matter of going to a brick-and-mortar shop, choosing an item and...
Read Blog
July 30, 2018
20
Shares

Tailgating: Security Risks Involved

Tailgating: Security Risks Involved

Estimated reading time: 3 minutes

It is a common scenario. An employee swipes his identity card and enters his office premises. He spots someone without an id card outside the gates, wanting to get in. He wants to help – he offers them entry...
Read Blog
July 27, 2018
4
Shares

New Product Launch: Seqrite Secure Web Gateway

New Product Launch: Seqrite Secure Web Gateway

Estimated reading time: 3 minutes

More and more organizations are opting for a secure web gateway solution as the next step up from conventional security solutions. Secure web gateways prevent unsecured traffic from entering an organization’s internal network and prevent employees/users from accessing or...
Read Blog
July 18, 2018
1

Email-borne cyber attacks: A constant security threat

Email-borne cyber attacks: A constant security threat

Estimated reading time: 3 minutes

Since the invention of the World Wide Web in 1989 by Tim Berners-Lee, the technology has changed. What used to be a collection of simple text-based Usenet groups metamorphosed into multimedia and graphics. First email communication was all the...
Read Blog
July 12, 2018
5
Shares

Unstructured data: The unseen dangers

Unstructured data: The unseen dangers

Estimated reading time: 3 minutes

As the name suggests, unstructured data refers to raw and organized data that cannot be stored in predefined relationship structures. While this kind of data can be text-heavy in the form of email messages, PDFs, business plans, unstructured data...
Read Blog
July 6, 2018

Cybersecurity in international sporting events like the 2018 FIFA World Cup

Cybersecurity in international sporting events like the 2018 FIFA World Cup

Estimated reading time: 3 minutes

It is the season of the beautiful game. The world is tuned into the festival of football that is the 2018 FIFA World Cup in Russia. As some of the greatest superstars of the sport show off their skills...
Read Blog
July 3, 2018
9
Shares

Latest cyber threats you should know about

Latest cyber threats you should know about

Estimated reading time: 3 minutes

Cybersecurity threats are often like an ever-changing monster – you just can’t defeat it. A strong anti-virus solution with all the other necessary tools will help you secure your organization’s defense but it’s impossible to control what is happening...
Read Blog
June 26, 2018
9
Shares

Cost of security vs. Cost of cyber attack: Which one should you choose?

Cost of security vs. Cost of cyber attack: Which one should you choose?

Estimated reading time: 3 minutes

As the number and nature of cyber threats grows increasingly day by day, organizations have opened up to the threat caused by cyber attacks. The North Atlantic Treaty Organization, which is better known as NATO, recognized cyberspace as a...
Read Blog
May 24, 2018
10
Shares
← Previous 1 … 9 10 11 … 16 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (23) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (327) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (109) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (23) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies