• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Products Archive

What happens when you don’t patch your software?

What happens when you don’t patch your software?

Estimated reading time: 3 minutes

In May 2017, the entire world plunged into chaos. The WannaCry ransomware ravaged through close to 300,000 systems and 200,000 victims, shutting down networks, causing chaos and demanding payment to give data back. Just a month later, another cyber...
Read Blog
March 6, 2019
13
Shares

Seqrite mSuite – everything you need to know

Seqrite mSuite – everything you need to know

Estimated reading time: 3 minutes

Among the many tasks faced by top information security leaders at enterprises, mobile device management (MDM) is uppermost. Mobiles or cell phones are an everyday reality in this present day and age; the number of mobile phone users is...
Read Blog
March 4, 2019
13
Shares

Increase in threats to mobile devices

Increase in threats to mobile devices

Estimated reading time: 3 minutes

There’s an increasing threat to mobile devices all over the world and it’s not difficult to wonder why. The number of those small mini-computers we carry around in our pockets has literally just exploded – an estimate observed that...
Read Blog
February 14, 2019
9
Shares

Data Security Compliance for NBFCs

Data Security Compliance for NBFCs

Estimated reading time: 3 minutes

Non-bank financial institutions (NBFIs) or non-bank financial companies (NBFCs) have been an integral part of the Indian financial system. These are financial institutions that do not have a banking license or regulated by an agency but can still carry...
Read Blog
December 20, 2018
19
Shares

Which data should your company encrypt?

Which data should your company encrypt?

Estimated reading time: 3 minutes

As companies like Equifax, Target and Home Depot discovered to their chagrin, data breaches can be a long-drawn, costly, embarrassing affair.  The consequences can be disastrous – detailed, mostly negative media coverage, a loss of face in the eyes...
Read Blog
October 23, 2018
13
Shares

Impact of embracing MDM solutions for banking operations

Impact of embracing MDM solutions for banking operations

Estimated reading time: 3 minutes

The rise of mobile telephones has impacted the way corporations do business in all spheres and all over the world. The world of banking has not been an exception. A survey of US adults in 2018 found that mobile...
Read Blog
October 23, 2018
2
Shares

Management of mobile devices in the digital classroom with Seqrite MDM

Management of mobile devices in the digital classroom with Seqrite MDM

Estimated reading time: 3 minutes

In an earlier era, schools and educational institutions mostly frowned upon the mobile/cell phone. These items of portability were banned from campuses with students facing repercussions for possessing and using them within the institution. This was a time when...
Read Blog
October 16, 2018

Encryption solution for educational institutes

Encryption solution for educational institutes

Estimated reading time: 3 minutes

When the discussion veers around topics like data security and breach, what are the kinds of organizations which, you think, are most likely at risk? The first answer that comes to your minds might be banks or big multinational...
Read Blog
October 11, 2018
11
Shares

Rise of security risks on Mobile

Rise of security risks on Mobile

Estimated reading time: 3 minutes

According to a recent survey, the number of mobile phone users in the world is expected to pass 5 billion in 2019. That’s an incredible number of people using mobile phones. Truly, when we talk about a digital connected...
Read Blog
September 16, 2018
3
Shares

What is EMM? Enterprise Mobility Management explained

What is EMM? Enterprise Mobility Management explained

Estimated reading time: 3 minutes

With the advent of mobile devices and now, currently, the Internet of Things (IoT), mobility has become the buzzword in enterprises. It is not only about managing one physical network in a location – now employees have a range...
Read Blog
August 9, 2018
5
Shares
1 2 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (21) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (326) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies