• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite

Quick Heal Annual Threat Report 2017: Excerpts

Estimated reading time: 2 minutes

Quick Heal Threat Reports are collated after intensive research by our Threat Research and Response Team. They provide an overview and analysis of threat activity reported from Quick Heal installations all over the world. The recently launched Quick Heal...
Read More
March 9, 2017

Why should cybersecurity be a part of your Financial Budget?

Estimated reading time: 2 minutes

Organizations across the world that experienced a cyberattack have suffered huge revenue losses. Cybersecurity is a business priority and it is important that the C-suite must understand the importance of enterprise security and fund it appropriately. No enterprise, big...
Read More
February 13, 2017

Spear Phishing: What is it and how it can affect your business security

Estimated reading time: 3 minutes

What is Spear Phishing? Spear phishing is a variation of a phishing scam wherein hackers send a targeted email to an individual which appears to be from a trusted source. The agenda of these mails like any other cyber...
Read More
January 16, 2017

Cybersecurity for Financial Services

Estimated reading time: 3 minutes

No doubt financial services sector continues to be an attractive target for hackers. In 2016, we saw a huge number of cyberattacks on banks and other financial services companies. A single security breach can affect the organization as well...
Read More
January 9, 2017

Top Seqrite features and solutions that made a mark in 2016

Estimated reading time: 4 minutes

No business is too small to evade a cyber-attack or data breach. Enterprise security has moved beyond traditional antivirus solutions and it’s time that cybersecurity becomes an important aspect of any organization’s financial budget. If 2016 has been the...
Read More
December 31, 2016

Decryption Tool for CrySiS/XTBL Ransomware

Estimated reading time: 2 minutes

The decryption of CrySiS/XTBL Ransomware is now possible thanks to the recent release of its master decryption keys needed to recover the files encrypted by the ransomware. While we couldn’t guess the apparent reason behind the release, we have...
Read More
December 16, 2016
2

Here’s why your startup might be the perfect target for hackers

Estimated reading time: 3 minutes

So you’re a ‘new kid on the block’ in the big business world. Just getting started with the setting up of your infrastructure and organizing the systems and processes? Of course cybersecurity is the least of your concerns at...
Read More
December 14, 2016

Seqrite Endpoint Security (EPS) rated ‘Top Product’ by AV TEST Institute

Estimated reading time: 2 minutes

In December 2016, AV-TEST Product Review and Certification Report for Sep-Oct 2016 recognized Seqrite EPS for its superior protection, usability and performance. AV-TEST carries out several individual and comparative tests per year and performs extensive certification procedures in which...
Read More
December 12, 2016

Seqrite Endpoint Security (EPS) version 7.1 released: All the key features explained

Estimated reading time: 3 minutes

We have just released Endpoint Security (EPS) version 7.1 with some new enhancements and improved compliance features. This blog is a comprehensive guide to all you need to know about EPS 7.1. The new version is a refinement and...
Read More
December 5, 2016
1

5 Biggest Cyberattacks of 2016

hacking, security threat, ransomware, malware

Estimated reading time: 4 minutes

As the world is rapidly going digital, our privacy and security is more vulnerable than ever. Ignorance is no bliss and this is why we bring to you a roundup of some of the biggest cyberattacks of the year 2016....
Read More
December 1, 2016
← Previous 1 … 54 55 56 57 Next →

Popular Posts

  • RAT used by Chinese cyberspies infiltrating Indian businesses RAT used by Chinese cyberspies infiltrating Indian businesses December 18, 2020
  • How can EdTech companies deal with rising security challenges? How can EdTech companies deal with rising security challenges? December 24, 2020
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Stay Updated!

Topics

Antivirus For Linux (10) Antivirus For Server (9) BYOD (9) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (275) cyber security (25) Cyber threat (29) cyber threats (44) Data (10) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) incident response plan (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (55) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.