• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Cybersecurity Archive

Why should you say NO to ransomware demands!

Why should you say NO to ransomware demands!

Estimated reading time: 3 minutes

Ransomware is scary. Anyone who has ever been the victim of a ransomware attack or seen the havoc WannaCry unleashed, would agree. And it is not a threat that seems to be going away anytime soon – the European...
Read Blog
December 3, 2018
8
Shares

Tracing the story of Emotet malware campaign

Tracing the story of Emotet malware campaign

Estimated reading time: 3 minutes

For any enterprise which has some sort of association with the financial sector, it is important to be familiar with the threat of Emotet. Yes, Emotet, a part of the banking Trojan family which is distributed through various different...
Read Blog
December 1, 2018
15
Shares

Beware of these 5 scams this holiday season!

Beware of these 5 scams this holiday season!

Estimated reading time: 3 minutes

It’s the season of the holidays. Of fun, celebration and festivity. With just one hitch: cyber threats. The unfortunate fact is that cybercriminals are not on a holiday. They are continuously searching for ways in which they can damage...
Read Blog
November 20, 2018
11
Shares

Business Benefits of deploying Mobile Device Management

Business Benefits of deploying Mobile Device Management

Estimated reading time: 3 minutes

The mobile is literally everywhere. It has permeated almost everyone’s lives which mean the distinctions between the personal and the professional have narrowed. A personal cell phone is used for a lot of professional work by employees. Think of...
Read Blog
October 6, 2018
11
Shares

The Big Question – Internet of Things or Internet of Threats?

The Big Question – Internet of Things or Internet of Threats?

Estimated reading time: 3 minutes

The tech world seems to be gearing up for the fourth industrial revolution with an estimated 20 billion Internet of Things devices expected to be deployed by the year 2020. While these technical marvels are being designed to streamline...
Read Blog
September 24, 2018
6
Shares

What is Business Email Compromise (BEC)?

What is Business Email Compromise (BEC)?

Estimated reading time: 3 minutes

Business Email Compromise (BEC), also known as “Man-In-The-Email” or “CEO Fraud”, is a sophisticated type of phishing attack, carried out through elaborate means and usually with devastating effect. The US’s Federal Bureau of Investigation (FBI) estimated that global business...
Read Blog
September 23, 2018
4
Shares

What is social engineering? How criminals take advantage of human behavior

What is social engineering? How criminals take advantage of human behavior

Estimated reading time: 3 minutes

For all the high-tech security that is employed, an organization’s biggest chink in its defense, when it comes to cybersecurity, can be its own employees. That is not to say that these employees are deliberately doing what they are,...
Read Blog
September 14, 2018
7
Shares

How to build a zero trust network

How to build a zero trust network

Estimated reading time: 3 minutes

Traditionally, any discussion about network security is focused on a specific model that organizations have largely internalized. This model is boundary or parameter-based model and assumes of a perimeter or a boundary outside a network. By this model, cybersecurity...
Read Blog
September 6, 2018
114
Shares

Why trust Seqrite? Don’t take our word for it. Hear it from our customers

Why trust Seqrite? Don’t take our word for it. Hear it from our customers

Estimated reading time: 3 minutes

Seqrite’s range of world-class cybersecurity solutions are defined by innovation and simplicity. The solutions provided are a combination of intelligence, analysis of applications and state-of-the-art technology, and are designed to provide better protection for our customers. Backed by Quick...
Read Blog
September 5, 2018
7
Shares
1

How to make the most of your Seqrite EPS

How to make the most of your Seqrite EPS

Estimated reading time: 3 minutes

Seqrite Endpoint Security (EPS) is a comprehensive, powerful platform for enterprises to secure their endpoint security. With innovative technologies like Anti Ransomware, Advanced DNA Scan and Behavioral Detection System to protect networks from the advanced threats of the present,...
Read Blog
August 24, 2018
7
Shares
← Previous 1 … 8 9 10 … 16 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (23) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (327) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (109) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (23) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies