• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Cybersecurity Archive

How to strike the correct balance between enterprise security and employee productivity?

How to strike the correct balance between enterprise security and employee productivity?

Estimated reading time: 3 minutes

When it comes to enterprise security, companies are always trying to hit the right spot. The problem is that enterprises require employees to be at their productive best – that is, after all, what they are hired for and...
Read Blog
July 23, 2019

Rise of cyber-physical attacks

Rise of cyber-physical attacks

Estimated reading time: 3 minutes

It was back in 2012 when the then Defense Secretary of the United States warned of the possibility of the country facing a “cyber-Pearl Harbor”. He painted a bleak possibility – that extremist groups and enemy nations would use...
Read Blog
May 27, 2019

The need for international agreements on cybersecurity

The need for international agreements on cybersecurity

Estimated reading time: 3 minutes

Over the last decade or so, it has become increasingly obvious that cybersecurity is no longer just a local issue. As the world has leaped into a digital era with communication in the blink of an eye and the...
Read Blog
March 11, 2019
4
Shares

Warning Signs that Your Computer is infected with malware – Part II

Warning Signs that Your Computer is infected with malware – Part II

Estimated reading time: 3 minutes

In our first part of this series, we provided a few scenarios of your system not working the way it should and how it could be a symptom of a malware infection. Unfortunately, if you thought those were the...
Read Blog
March 1, 2019
12
Shares

Warning Signs that Your Computer is infected with malware – Part I

Warning Signs that Your Computer is infected with malware – Part I

Estimated reading time: 3 minutes

A malware infection can lead to a major drop in productivity. Whether it’s on an office system or on a personal one, these infections can lead to everyday work grinding down to a halt and at worse, a complete...
Read Blog
February 27, 2019
2
Shares

Most common cybersecurity threats that occur in the healthcare sector

Most common cybersecurity threats that occur in the healthcare sector

Estimated reading time: 3 minutes

While almost all industries and sectors are at the risk of cyber threats, the effects on these threats on certain sectors can be disastrous. One of these sectors is healthcare. A cyber attack on a healthcare system can be...
Read Blog
February 25, 2019
14
Shares

MaaS Moving Towards APT as a Service?

MaaS Moving Towards APT as a Service?

Estimated reading time: 3 minutes

We have all heard about the dark web. It’s that mysterious part of the Internet which can’t be accessed normally, which is not indexed on a search engine and contains all the illegal activities that are taking place. Whether...
Read Blog
February 5, 2019
9
Shares

This is how hackers can invade your system without installing malware

This is how hackers can invade your system without installing malware

Estimated reading time: 3 minutes

Even those with a passive interest in cybersecurity have a fair idea of how hackers can take control of a system. This is mostly done through malware – unsuspecting users somehow download or access a malicious file or a...
Read Blog
February 1, 2019
13
Shares

Applying Deep Learning for PE-Malware Classification

Applying Deep Learning for PE-Malware Classification

Estimated reading time: 6 minutes

Deep Learning & Computer vision techniques are making progress in every possible field. With growing computing powers many organizations use them to resolve or minimize many day-to-day problems. In a recent talk at AVAR 2018, Quick Heal AI team...
Read Blog
January 10, 2019
15
Shares

How to prevent Remote Desktop Protocol (RDP) attacks

How to prevent Remote Desktop Protocol (RDP) attacks

Estimated reading time: 3 minutes

Remote Desktop Protocol (RDP) attacks can be extremely dangerous, whether from an enterprise or a single user point of view. They are basically backdoors which allow external users to access and use a system over the Internet. The United...
Read Blog
December 3, 2018
12
Shares
← Previous 1 … 7 8 9 … 16 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (23) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (327) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (109) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (23) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies