• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

Is your bank really safe from cyber threats? Conduct Red Team Assessment to know.

Is your bank really safe from cyber threats? Conduct Red Team Assessment to know.

Estimated reading time: 2 minutes

As cyber-attacks continue to affect businesses, it is banks that are the most lucrative target for cybercriminals. Beyond having their reputation at stake, banks also risk customer’s money and data, amplified regulatory attention and even litigation. The stakes are...
Read Blog
August 31, 2018
18
Shares

What are exploits? Everything you need to know

What are exploits? Everything you need to know

Estimated reading time: 3 minutes

Cybersecurity experts are always cautious when they hear the word “exploits”, and for good reason. Exploits are often a preferred channel through which cybercriminals like to hit their targets. What makes it easier for these criminals is that exploits...
Read Blog
August 25, 2018
16
Shares

How to make the most of your Seqrite EPS

How to make the most of your Seqrite EPS

Estimated reading time: 3 minutes

Seqrite Endpoint Security (EPS) is a comprehensive, powerful platform for enterprises to secure their endpoint security. With innovative technologies like Anti Ransomware, Advanced DNA Scan and Behavioral Detection System to protect networks from the advanced threats of the present,...
Read Blog
August 24, 2018
7
Shares

Top 5 IT Problems for Sysadmins: Seqrite has the solution!

Top 5 IT Problems for Sysadmins: Seqrite has the solution!

Estimated reading time: 3 minutes

For enterprises, sysadmins or system administrators are vital resources who play a critical role in overall productivity. By ensuring upkeep and optimal functioning of all computer systems and networks within an enterprise, a sysadmin provides a very important link...
Read Blog
August 23, 2018
8
Shares

Importance of industry certifications for security products and what do they mean

Importance of industry certifications for security products and what do they mean

Estimated reading time: 3 minutes

The importance of cybersecurity has slowly seeped into the consciousness of enterprises. A cybercrime can undo years of work in an instant and enterprises are recognizing this and trying to find ways to stay safe. Hence, investment in security...
Read Blog
August 16, 2018
3
Shares

Top 5 IT tips for remote and mobile teams

Top 5 IT tips for remote and mobile teams

Estimated reading time: 3 minutes

Cybersecurity threats are lurking everywhere. In 2015, a vulnerability was detected in WiFi routers in hotel allowing attackers to distribute malware and monitor and record data sent over the network. A laptop is stolen every 53 seconds in the...
Read Blog
August 16, 2018
3
Shares

Strengthening India’s defense with cybersecurity

Strengthening India’s defense with cybersecurity

Estimated reading time: 3 minutes

India’s 72nd Independence Day is a day of much celebration and reflection. While the country has certainly progressed on various fronts, it is also time for all citizens to come together and stay aware of the need to remain...
Read Blog
August 13, 2018
19
Shares

Again! A New .NET Ransomware Shrug2

Again! A New .NET Ransomware Shrug2

Estimated reading time: 5 minutes

For several months, Quick Heal Security Labs has been observing an increase in ransomware which are built in  .NET framework. Ransomware like SamSam, Lime and now Shrug was found to be built in .NET framework. Malware authors are finding it very easy to build...
Read Blog
August 10, 2018

What is EMM? Enterprise Mobility Management explained

What is EMM? Enterprise Mobility Management explained

Estimated reading time: 3 minutes

With the advent of mobile devices and now, currently, the Internet of Things (IoT), mobility has become the buzzword in enterprises. It is not only about managing one physical network in a location – now employees have a range...
Read Blog
August 9, 2018
5
Shares

What India’s data protection law might mean for your business

What India’s data protection law might mean for your business

Estimated reading time: 3 minutes

India has taken a step forward towards laying down a proper policy for data protection. The Srikrishna Committee, a 10-member expert committee headed by former Supreme Court judge BN Srikrishna and appointed by the Indian government in August 2017...
Read Blog
August 6, 2018
305
Shares
← Previous 1 … 37 38 39 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies