• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Endpoint Security Archive

Minimize Cybersecurity Risk with IT Asset Management

Minimize Cybersecurity Risk with IT Asset Management

Estimated reading time: 3 minutes

Cybersecurity has evolved as one of the top organizational areas of concern for both government organizations and commercial setups. Not a day goes by when we don’t come across organizations leveraging IT Asset Management in the form of a...
Read Blog
February 23, 2018

Top 3 cybersecurity risks every HR chief should care about

Top 3 cybersecurity risks every HR chief should care about

Estimated reading time: 3 minutes

Cybersecurity isn’t just an IT department’s job anymore. The varied and vast nature of security threats nowadays mean that the days when “cybersecurity” was just a buzzword thrown around by technology department and network administrators were the only ones...
Read Blog
February 20, 2018
76
Shares
1

Small businesses are underestimating cyber attacks

Small businesses are underestimating cyber attacks

Estimated reading time: 3 minutes

A cursory look at the cybersecurity landscape in 2017 throws up some of the biggest names in their respective industries. From Uber to Yahoo to Equifax to India’s Zomato and lots more, it seemed even the biggest companies in the...
Read Blog
February 16, 2018
14
Shares
4

Cryptomining Malware: The New Favorite of Hackers

Cryptomining Malware: The New Favorite of Hackers

Estimated reading time: 3 minutes

Ransomware threats have long been plaguing the online space and are usually considered to be extremely disruptive in nature. Unlike other malware threats which keep a low profile, ransomware attacks announce themselves before crippling a system for diverse benefits....
Read Blog
February 7, 2018
4
Shares

Cryptocurrency- The Good, The Bad & The Ugly

Cryptocurrency- The Good, The Bad & The Ugly

Estimated reading time: 3 minutes

Cryptocurrency is the current buzzword of this day and age. Not a day goes by when there’s not a news item about cryptocurrency, either with warnings about its danger or breathless coverage of its fluctuating value. Without doubt, it’s...
Read Blog
February 6, 2018
4
Shares

Multi-Factor Authentication: Everything you need to Know

Multi-Factor Authentication: Everything you need to Know

Estimated reading time: 3 minutes

It wouldn’t be wrong to assume that login credentials and other confidential user-specific insights are the most frequently compromised data sets, extensively targeted by the malicious parties. Since 2017 witnessed hackers breaching 711 million users records; thereby accessing around...
Read Blog
February 5, 2018
5
Shares

Machine learning approach for advanced threat hunting

Machine learning approach for advanced threat hunting

Estimated reading time: 6 minutes

In today’s fast-changing world, the cyber threat landscape is getting increasingly complex and signature-based systems are falling behind to protect endpoints. All major security solutions are built with layered security models to protect endpoints from today’s advanced threats. Machine...
Read Blog
February 2, 2018
5
Shares

Asset Management: Protecting your company’s most important assets

Asset Management: Protecting your company’s most important assets

Estimated reading time: 3 minutes

A comprehensive IT Asset Management (ITAM) program facilitates an accurate, documented IT environment covering the organization’s assets and data along with their owners and highlighting security and risks across the network. It helps to make critical decisions regarding software...
Read Blog
January 29, 2018
8
Shares

Cyber Vulnerability: Where do you stand?

Cyber Vulnerability: Where do you stand?

Estimated reading time: 2 minutes

Cyber-attacks have become household commonplaces, and the threats are increasing at an uncontrollable pace. According to threat reports released by leading security service providers, there has been a massive rise in the frequency of zero-day threats with vulnerabilities almost...
Read Blog
January 25, 2018

Endpoint Security: Things to consider before choosing the right one

Endpoint Security: Things to consider before choosing the right one

Estimated reading time: 3 minutes

The term endpoint security refers to protecting endpoints such as desktops and laptops connected to the enterprise network. Endpoint security happens to be the front line in the battle against cyber-attacks because every device that connects to a corporate network...
Read Blog
January 18, 2018
← Previous 1 … 5 6 7 8 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies