• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Data Loss Prevention Archive

Key benefits of Seqrite Secure Web Gateway

Key benefits of Seqrite Secure Web Gateway

Estimated reading time: 2 minutes

Enterprises are recently waking up to the usefulness of having layered protection for their networks. This involves investing in various layers of protection such as anti-virus, anti-malware, anti-spyware and a firewall. However, firewalls while providing protection can often fall...
Read Blog
June 27, 2019

Email technology and its security in nutshell

Email technology and its security in nutshell

Estimated reading time: 5 minutes

Email has become a necessity of day-to-day communication. We can realize the importance of email with the fact that the down-time of organization email server directly affects the organization’s productivity. Email has become most prominent and integral part of...
Read Blog
June 26, 2019

5 Cyber Security Best Practices For Your Small to Medium-Size Business

5 Cyber Security Best Practices For Your Small to Medium-Size Business

Estimated reading time: 2 minutes

Small to medium-sized businesses often tend to underestimate cybersecurity. The reasons range from practicality – they may not have the resources, to sheer over-confidence – the notion that they are not important enough to be at risk of cybersecurity...
Read Blog
May 9, 2019

How important is it to test your cybersecurity incident response plan?

How important is it to test your cybersecurity incident response plan?

Estimated reading time: 2 minutes

With the incidents of cybercrime rising at an enormous rate, especially targeted attacks on organizations, many companies now have a cybersecurity incident response plan in place. However, a major reason these organizations still fail to respond effectively to a...
Read Blog
April 25, 2019

Your business is hit by a breach. Now what should you do?

Your business is hit by a breach. Now what should you do?

Estimated reading time: 3 minutes

The worst has happened. Your database has been breached and the company is scrambling for cover. Every second seems to be a time bomb and your IT security team is working overtime, trying to assess the damage. Your CEO...
Read Blog
November 26, 2018
11
Shares

Again! A New .NET Ransomware Shrug2

Again! A New .NET Ransomware Shrug2

Estimated reading time: 5 minutes

For several months, Quick Heal Security Labs has been observing an increase in ransomware which are built in  .NET framework. Ransomware like SamSam, Lime and now Shrug was found to be built in .NET framework. Malware authors are finding it very easy to build...
Read Blog
August 10, 2018

Using data governance and compliance to your advantage

Using data governance and compliance to your advantage

Estimated reading time: 3 minutes

Data is an asset. In this day and age, it is an incredibly valuable asset. Companies value their assets, and hence they should value data as well. Yet, the number of organizations which still do not give data its...
Read Blog
June 11, 2018
2
Shares

Everything you need to know about the Facebook-Cambridge Analytica data breach

Everything you need to know about the Facebook-Cambridge Analytica data breach

Estimated reading time: 4 minutes

Unless you have been living under a rock, you must have obviously heard of the name Cambridge Analytica and felt the reactions arising from the scandal which threatens to rock the giant of social networking, Facebook. Things are only...
Read Blog
March 26, 2018
26
Shares

Big data leads to big breaches: Know the pitfalls

Big data leads to big breaches: Know the pitfalls

Estimated reading time: 3 minutes

The key theme of today’s day and age is “connected”. Whether it’s the Internet of Things (IoT), connected solutions and mobility, the world’s electronic devices are getting increasingly connected, which of course, the amount of information being collected as...
Read Blog
March 8, 2018
14
Shares

Data Security: Where are the SMBs failing in securing their data

Data Security: Where are the SMBs failing in securing their data

Estimated reading time: 3 minutes

Small and medium sized businesses usually rely on organizational data for flourishing and succeeding in their endeavors. However, there are chances that the SMBs are putting all their data at risk by implementing erroneous strategies.  According to the latest...
Read Blog
February 9, 2018
12
Shares
← Previous 1 2 3 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (323) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies