• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Cybersecurity Archive

Here’s the checklist of an efficient endpoint security solution

Here’s the checklist of an efficient endpoint security solution

Estimated reading time: 3 minutes

For any organization, big or small, endpoint security acts as a frontline against cyber attacks. Ultimately, endpoints refer to every device that is connected to the enterprise network. Most attacks on an organization can be traced back to devices...
Read Blog
April 25, 2018
4
Shares

Back up can be your biggest business investment

Back up can be your biggest business investment

Estimated reading time: 3 minutes

In 2018, the line between physical and digital world is increasingly blurring. Today, no business can solely operate in just the physical sphere. The emergence of connected technologies means every company, big or small, has some digital functions. No doubt, the...
Read Blog
March 30, 2018
9
Shares

Prioritizing cybersecurity: Where to start?

Prioritizing cybersecurity: Where to start?

Estimated reading time: 3 minutes

Cybersecurity encompasses a bigger picture and majority of c-suite IT executives are paying close attention to the existing threats and mitigation plans. While some companies are finding it hard to meet the demands related to digital transformation, there are...
Read Blog
March 20, 2018
8
Shares

Anonymous Cryptocurrency: Introduction to new security challenges

Anonymous Cryptocurrency: Introduction to new security challenges

Estimated reading time: 3 minutes

While the existing crypto-sphere is already plagued by issues concerning scalability, financial privacy is fast shaping us yet another prerequisite to sizeable investments. Individuals are constantly emphasizing on anonymous cryptocurrencies courtesy the flexibilities on offer. That said, we believe...
Read Blog
March 12, 2018

How do cyber criminals celebrate Valentine’s day

How do cyber criminals celebrate Valentine’s day

Estimated reading time: 2 minutes

February 14th, Valentine’s Day, maybe the day of love but there’s no love lost between cybercriminals and their target. In recent years, these criminals are only getting smarter in their ways and ensuring that they time their attacks at...
Read Blog
February 13, 2018
201
Shares

Cybersecurity: How to approach a broader perspective at the board level

Cybersecurity: How to approach a broader perspective at the board level

Estimated reading time: 3 minutes

The dangers that cyber threats pose have never been as apparent as now. High-profile organizations have been at the receiving end, there has been both reputational and financial damage and brand equity has been hit. One thing is clear:...
Read Blog
January 30, 2018
9
Shares

New fake resume email campaign infecting users with the SmokeLoader malware

New fake resume email campaign infecting users with the SmokeLoader malware

Estimated reading time: 4 minutes

Email attachments are a favorite medium for attackers to deliver malware. They can be used to target a specific user or multiple users at the same time by launching spam email campaigns. To succeed in carrying out an intended...
Read Blog
January 29, 2018
8
Shares

Why Centralized Administration is an Important Security Tool?

Why Centralized Administration is an Important Security Tool?

Estimated reading time: 3 minutes

Today’s cyber threat landscape spreads across endpoints, servers, web, networks and emails. Not just that, with the excessive adoption of cloud technologies, the threat multiplies to on-premise and cloud too. Thus, making it a mammoth task for security administrators...
Read Blog
January 16, 2018

Chrome extensions exploited in a massive PUA campaign

Chrome extensions exploited in a massive PUA campaign

Estimated reading time: 4 minutes

Browser extensions also known as add-ons or plug-ins are programs that extend the functionality of a web browser making it more convenient to use and giving a better browsing experience. Browser extensions are commonly used to Enhance the appearance...
Read Blog
January 11, 2018
3
Shares
1

7 Major causes of data breaches

7 Major causes of data breaches

Estimated reading time: 3 minutes

The growing threat of data breaches globally has kept businesses on their toes. They occur when important proprietary, sensitive or confidential information is accessed or disclosed in an unauthorized faction. Data breaches can have a deep-lasting effect on a...
Read Blog
January 8, 2018
4
Shares
← Previous 1 … 10 11 12 … 16 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (23) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (327) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (109) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (23) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies