• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Mobile Device Management Archive

Did you know that adversaries are planning to steal your data?

Did you know that adversaries are planning to steal your data?

Estimated reading time: 2 minutes

How valuable is data? A good way to answer that question is to look at the average cost of a data breach. Recent research in May 2020 found that the average cost of a data breach was USD 3.92...
Read Blog
September 11, 2020

EMM stakeholders warned to watch out for sophisticated Cerebrus spyware

EMM stakeholders warned to watch out for sophisticated Cerebrus spyware

Estimated reading time: 3 minutes

A new variant of the Cerebrus Android Trojan has been discovered with dangerous spyware capabilities. Enterprise Mobility Management (EMM) stakeholders are warned to remain vigilant and prevent being exploited by this Trojan. Cerebrus was detected last year and was...
Read Blog
May 25, 2020

Are you taking your enterprise mobility management seriously?

Are you taking your enterprise mobility management seriously?

Estimated reading time: 2 minutes

A stark contrast to yesteryears with strict office hours, today’s business trends are permitting employees flexibility when it comes to office hours, remote working and devices through which they can work from. It is in this context, many leading...
Read Blog
August 20, 2019

Enterprises are getting ready for Enterprise mobility management

Enterprises are getting ready for Enterprise mobility management

Estimated reading time: 2 minutes

Modern businesses are encouraging their workforce to work flexibly.  Avenues such as remote working, working from home, CYOD, BYOD etc. are a surging trend nowadays among professionals working in an array of business domains. This is typically contrasting from...
Read Blog
August 6, 2019

Seqrite mSuite can be the perfect solution for the education industry

Seqrite mSuite can be the perfect solution for the education industry

Estimated reading time: 3 minutes

While financial institutions like banks or other multinational corporations (MNCs) occupy the bulk of headlines when it comes to topics like cybersecurity and data breach, it would be foolish to disregard the threats that organizations in the education industry...
Read Blog
April 22, 2019

Why Seqrite mSuite is the perfect solution for the research industry

Why Seqrite mSuite is the perfect solution for the research industry

Estimated reading time: 2 minutes

While market research organizations may not always attract the headlines in a manner similar to financial services and educational organizations, it would not be a misnomer to state that they remain at high risk of cyber attacks. The rationale...
Read Blog
April 18, 2019

[INFOGRAPHIC] Why choose Seqrite MobiSMART?

[INFOGRAPHIC] Why choose Seqrite MobiSMART?

Estimated reading time: < 1 minute

With the lines increasingly blurring between personal and official work, enterprises are in urgent need of cybersecurity solutions which can secure such kind of communication. Seqrite’s MobiSmart offers one such solution for employees accessing mobile productivity apps on BYOD...
Read Blog
April 12, 2019
5
Shares

Seqrite MobiSMART for GDPR Compliance

Seqrite MobiSMART for GDPR Compliance

Estimated reading time: 2 minutes

It has almost been a year now that the General Data Protection Regulation (GDPR) has come into effect. A landmark legislation in the history of data protection, GDPR has changed the way enterprises approach cybersecurity. With its many definitions...
Read Blog
April 10, 2019
11
Shares

Key Vulnerabilities in SMBs: Devices and People

Key Vulnerabilities in SMBs: Devices and People

Estimated reading time: 3 minutes

Small and medium-sized businesses (SMB) have to walk a tightrope when it comes to cybersecurity. On one hand, unlike the big business enterprises, they may not always have the financial heft to really invest in cybersecurity solutions, which often...
Read Blog
April 19, 2018
5
Shares

Negligent Employee: A dangerous internal cyber threat

Negligent Employee: A dangerous internal cyber threat

Estimated reading time: 3 minutes

Sometimes, the biggest dangers come from within. As organizations cope with the changing world of cybersecurity which continues to evolve at a frantic pace, they sometimes forget to neglect the danger that stares at them in their face. The...
Read Blog
April 16, 2018
10
Shares
1 2 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies