• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite

ITES Archive

The Information Technology industry’s major cybersecurity challenges

What are some of the major cybersecurity issues facing the Information Technology industry

Estimated reading time: 3 minutes

The Information Technology (IT) sector has snowballed into an extremely profitable and revenue-generating entity in a relatively small amount of time. IT is single-handedly responsible to initiate and implement digitalization ensuring that a very large amount of information gets...
Read More
September 3, 2019

5 Poor security practices that endanger an IT organization

Estimated reading time: 3 minutes

Security is a habit. Like most human habit, it requires years of practice to form. The exception to this is the bad habits. Cybersecurity experts know that bad habits are intrinsically easy to slip into. It’s just easier for...
Read More
June 20, 2018
  • 4
    Shares

What not to do if your business is the victim of a cyber attack

Estimated reading time: 3 minutes

It is not a situation any network administrator ever wants to be in. Yet, considering the multitude of attacks nowadays, the possibility of being in such a situation is getting more and more likely. The last year has shown...
Read More
February 28, 2018
  • 7
    Shares

Top 3 cybersecurity risks every HR chief should care about

Estimated reading time: 3 minutes

Cybersecurity isn’t just an IT department’s job anymore. The varied and vast nature of security threats nowadays mean that the days when “cybersecurity” was just a buzzword thrown around by technology department and network administrators were the only ones...
Read More
February 20, 2018
  • 76
    Shares
1

What is Disaster Recovery as a Service (DRaaS)?

Disaster Recovery as a Service

Estimated reading time: 3 minutes

Disasters, whether they are natural or man-made, can strike anytime without any kind of due notice. Any business, small or big, will need to anticipate the possibility of such disasters and have a plan in place. While one tactic...
Read More
January 17, 2018
  • 12
    Shares

6 Hidden IT risks in 2018

Hidden IT Risks

Estimated reading time: 3 minutes

Dangers can often lie within. This is an information age where data is gold and in this day and age, no matter what business you are in, your Information Technology department is often your greatest asset. 2017, the year...
Read More
January 12, 2018
  • 15
    Shares

Essential policies to rescue your organization from advanced cyber threats

Cybersecurity policies

Estimated reading time: 3 minutes

Organizations need to spend a lot of time thinking about the network security measures as even a single security breach can inflict a lot of damage on the enterprises. It is important to revisit the existing security strategies or...
Read More
December 27, 2017
  • 10
    Shares

Tips to create a cybersecure culture at work

Cybersecure culture at work

Estimated reading time: 3 minutes

Analyzing the cyberthreat landscape shows that many attacks and security incidents usually plague either the IT companies or small and medium businesses. While IT organizations are impacted due to their excessive exposure to the cyber world; organizations with low...
Read More
December 25, 2017
  • 2
    Shares

Tips to detect a fake Virtual Private Network (VPN) Service

Detect fake VPN service

Estimated reading time: 3 minutes

While it is necessary to deploy Virtual Private Network as legitimate services, it is equally important to test the authenticity of the same. VPNs can easily add multiple layers of security to the browsing hierarchy by encrypting associated data...
Read More
December 19, 2017
  • 4
    Shares

Know what insider threats are hiding in your network

Insider threats

Estimated reading time: 3 minutes

The recent lawsuit filed against Anthony Levandowski of Uber signifies how terrible insider threats can be and what effects they can have on the confidential data sets. The lawsuit was filed by Alphabet which accused Levandowski of stealing more than...
Read More
December 18, 2017
1 2 3 Next →

Popular Posts

  • RAT used by Chinese cyberspies infiltrating Indian businesses RAT used by Chinese cyberspies infiltrating Indian businesses December 18, 2020
  • How can EdTech companies deal with rising security challenges? How can EdTech companies deal with rising security challenges? December 24, 2020
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • BEC and Ransomware attacks increase during the pandemic

    BEC and Ransomware attacks increase during the pandemic

    January 22, 2021
  • Are we prepared against risks generating from the IoT revolution?

    Are we prepared against risks generating from the IoT revolution?

    January 15, 2021
  • Proactiveness is the key to resolving hybrid cloud’s security challenges

    Proactiveness is the key to resolving hybrid cloud’s security challenges

    January 6, 2021

Stay Updated!

Topics

Antivirus For Linux (10) Antivirus For Server (9) BYOD (9) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (275) cyber security (25) Cyber threat (29) cyber threats (44) Data (10) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) incident response plan (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (55) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.