• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

How important are security patches and updates

How important are security patches and updates

Estimated reading time: 3 minutes

Security vulnerabilities are increasing and just not so long before, we had to deal with so many of them. Remember WannaCry? In this post, we will discuss some important case in points with respect to security vulnerabilities and how...
Read Blog
April 23, 2018
5
Shares

Key Vulnerabilities in SMBs: Devices and People

Key Vulnerabilities in SMBs: Devices and People

Estimated reading time: 3 minutes

Small and medium-sized businesses (SMB) have to walk a tightrope when it comes to cybersecurity. On one hand, unlike the big business enterprises, they may not always have the financial heft to really invest in cybersecurity solutions, which often...
Read Blog
April 19, 2018
5
Shares

Negligent Employee: A dangerous internal cyber threat

Negligent Employee: A dangerous internal cyber threat

Estimated reading time: 3 minutes

Sometimes, the biggest dangers come from within. As organizations cope with the changing world of cybersecurity which continues to evolve at a frantic pace, they sometimes forget to neglect the danger that stares at them in their face. The...
Read Blog
April 16, 2018
10
Shares

Malware in attachment? Stop them before they hit your organization’s security

Malware in attachment? Stop them before they hit your organization’s security

Estimated reading time: 3 minutes

Increasingly, hacker and other malicious criminals are increasing email attachments to inject malware into their targets. Malware disguised as an email attachment represents an easy target – the recipient of the mail may unknowingly open the attachment without even...
Read Blog
April 12, 2018
11
Shares

Seqrite AntiVirus for Linux: Protect your Linux against malware

Seqrite AntiVirus for Linux: Protect your Linux against malware

Estimated reading time: 3 minutes

In the age of multi-OS platforms, it is not always easy to find the perfect cybersecurity solution for your software. Many of the common antivirus platforms today are designed for the purpose of the most popular ones, Windows and...
Read Blog
April 5, 2018
8
Shares

Antivirus for Server: A comprehensive solution for complex networks

Antivirus for Server: A comprehensive solution for complex networks

Estimated reading time: 3 minutes

When it comes to large corporate networks with complex servers, one of the biggest headaches for network administrators is how to properly secure it from cybersecurity threats. In that respect, Seqrite’s Antivirus for Server offers a convenient, powerful solution: it...
Read Blog
April 2, 2018
19
Shares

Back up can be your biggest business investment

Back up can be your biggest business investment

Estimated reading time: 3 minutes

In 2018, the line between physical and digital world is increasingly blurring. Today, no business can solely operate in just the physical sphere. The emergence of connected technologies means every company, big or small, has some digital functions. No doubt, the...
Read Blog
March 30, 2018
9
Shares

Staging a fake attack can help you evaluate your cybersecurity preparedness

Staging a fake attack can help you evaluate your cybersecurity preparedness

Estimated reading time: 3 minutes

Organizations of all hues and shades nowadays invest a lot in cybersecurity and rightly so. The world is moving from just being digital to being hyperconnected and now an organization’s most confidential information could be on the cloud. Hence,...
Read Blog
March 29, 2018
3
Shares

Executive Insights: Stopping cyber-attacks starts with IT Security Pros

Executive Insights: Stopping cyber-attacks starts with IT Security Pros

Estimated reading time: 3 minutes

PwC’s 2018 Global Economic Crime and Fraud Survey found that 49% of global organizations say they’ve experienced economic crime in the past two years. So would it mean that the remaining 51% have been protected against any such attacks...
Read Blog
March 28, 2018
4
Shares

Does your enterprise need Mobile Device Management (MDM)?

Does your enterprise need Mobile Device Management (MDM)?

Estimated reading time: 3 minutes

When we say the world is getting increasingly connected, we just refer to the small, handheld device that we carry around everywhere. It would be an understatement to state that the mobile phone is everywhere – it has, in fact,...
Read Blog
March 27, 2018
14
Shares
← Previous 1 … 42 43 44 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies