• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Cybersecurity Archive

New Product Launch: Seqrite Secure Web Gateway

New Product Launch: Seqrite Secure Web Gateway

Estimated reading time: 3 minutes

More and more organizations are opting for a secure web gateway solution as the next step up from conventional security solutions. Secure web gateways prevent unsecured traffic from entering an organization’s internal network and prevent employees/users from accessing or...
Read Blog
July 18, 2018
1

Email-borne cyber attacks: A constant security threat

Email-borne cyber attacks: A constant security threat

Estimated reading time: 3 minutes

Since the invention of the World Wide Web in 1989 by Tim Berners-Lee, the technology has changed. What used to be a collection of simple text-based Usenet groups metamorphosed into multimedia and graphics. First email communication was all the...
Read Blog
July 12, 2018
5
Shares

Unstructured data: The unseen dangers

Unstructured data: The unseen dangers

Estimated reading time: 3 minutes

As the name suggests, unstructured data refers to raw and organized data that cannot be stored in predefined relationship structures. While this kind of data can be text-heavy in the form of email messages, PDFs, business plans, unstructured data...
Read Blog
July 6, 2018

Cybersecurity in international sporting events like the 2018 FIFA World Cup

Cybersecurity in international sporting events like the 2018 FIFA World Cup

Estimated reading time: 3 minutes

It is the season of the beautiful game. The world is tuned into the festival of football that is the 2018 FIFA World Cup in Russia. As some of the greatest superstars of the sport show off their skills...
Read Blog
July 3, 2018
9
Shares

Latest cyber threats you should know about

Latest cyber threats you should know about

Estimated reading time: 3 minutes

Cybersecurity threats are often like an ever-changing monster – you just can’t defeat it. A strong anti-virus solution with all the other necessary tools will help you secure your organization’s defense but it’s impossible to control what is happening...
Read Blog
June 26, 2018
9
Shares

5 Bad tech habits you need to work on

5 Bad tech habits you need to work on

Estimated reading time: 3 minutes

Businesses know the importance of cybersecurity. But do they know the importance of employees when it comes to cybersecurity? After all, a business’s employees offer the strongest defense against the varied manners of threats that exist in the cybersecurity...
Read Blog
June 25, 2018
8
Shares

5 Poor security practices that endanger an IT organization

5 Poor security practices that endanger an IT organization

Estimated reading time: 3 minutes

Security is a habit. Like most human habit, it requires years of practice to form. The exception to this is the bad habits. Cybersecurity experts know that bad habits are intrinsically easy to slip into. It’s just easier for...
Read Blog
June 20, 2018
4
Shares

Blockchain: A brief introduction

Blockchain: A brief introduction

Estimated reading time: 3 minutes

Cryptocurrency is not just a fad anymore – it is a reality. Almost every day, there’s a new headline about Bitcoin and its recent surge or fall. And many of these articles use terms which might sound alien. One...
Read Blog
June 15, 2018

How to identify, prevent and recover from cryptojacking attacks

How to identify, prevent and recover from cryptojacking attacks

Estimated reading time: 3 minutes

Cryptojacking is the dangerous new threat that threatens to cause more headaches to corporate and network administrators the world over. In a way, this was a threat that was coming – the widespread popularity of cryptocurrency was a marker...
Read Blog
June 4, 2018
1
Share

How hackers use spam to maximize the impact of a cyber attack?

How hackers use spam to maximize the impact of a cyber attack?

Estimated reading time: 3 minutes

All users of the Internet are familiar with the word ‘spam.’ ‘Spam’ is unsolicited email sent in massive quantities simultaneously to numerous users, generally trying to advertise or publicize certain products or services. This junk mail is also often used as...
Read Blog
May 28, 2018
7
Shares
← Previous 1 … 16 17 18 … 32 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies