• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

10 Cybersecurity Do’s and Don’ts for SMEs

10 Cybersecurity Do’s and Don’ts for SMEs

Estimated reading time: 5 minutes

Effective cybersecurity for Small and Medium Businesses (SMEs) is a major necessity today, thanks to the large number of such businesses that are flourishing. With easy Internet access, high-end business productivity tools and cloud-based service platforms, SMEs have it...
Read More
March 23, 2016

How Seqrite’s Device Control Upholds Security Compliance

How Seqrite’s Device Control Upholds Security Compliance

Estimated reading time: 2 minutes

Business enterprises today have a catalog of security threats to be aware of, and none more so than the risks associated with the multiple device types that are plugged in to company systems. Employees regularly plug in devices such...
Read More
March 16, 2016

4 Ransomware Protection Tips for Your Business

4 Ransomware Protection Tips for Your Business

Estimated reading time: 3 minutes

If you haven’t already heard, the threat of ransomware is firmly hovering over many business enterprises. Without the right security measures and proactive crisis management, ransomware can be debilitating for even the most stable business entities. A recent high-profile...
Read More
March 9, 2016

Smart Homes and the Internet of Things (IoT)

Smart Homes and the Internet of Things (IoT)

Estimated reading time: 5 minutes

The visionary concept of smart homes was conceived decades ago, but thanks to the technical limitations of infrastructure and technology, this vision was just a dream for the average home owner. Until now. Automated homes are now here thanks...
Read More
March 7, 2016

5 Essential Security Tips for Startups

5 Essential Security Tips for Startups

Estimated reading time: 1 minute

If you are planning to launch a startup business which essentially requires customers’ data for its development and sustainability, then IT security should be on your list of priorities. There is no denying to that fact that, investing in...
Read More
January 29, 2016

How Vulnerable is your Small and Medium-sized Business?

How Vulnerable is your Small and Medium-sized Business?

Estimated reading time: 4 minutes

Are you aware that the best targets for hackers and malware authors around the world are small and medium sized businesses? The reasons for this are aplenty, but the most crucial cause of this is that smaller businesses have...
Read More
January 29, 2016

Logjam Vulnerability: Why You Need to Upgrade Your Browsers

Logjam Vulnerability: Why You Need to Upgrade Your Browsers

Estimated reading time: 2 minutes

Original Post – May 21, 2015 Another new SSL (Secure Sockets Layer) vulnerability has come to light in the last few hours and your home computers and office workstations could be at risk. If you are familiar with the...
Read More
January 29, 2016

Alert: Ransomware Infections on the Rise

Estimated reading time: 6 minutes

Overview: Over the last year or so, there has been tremendous growth in the number of ransomware attacks that have been spotted in the wild. Cybercriminals have effectively cracked this ‘business model’ and are generating a significant amount of...
Read More
February 5, 2015
← Previous 1 … 61 62
Popular Posts
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • Uncovering LockBit Black’s Attack Chain and Anti-forensic activity Uncovering LockBit Black’s Attack Chain and Anti-forensic activity February 1, 2023
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..
  • Jayesh Kulkarni
    Jayesh Kulkarni

    Jayesh is working as a Security Researcher for a couple of years. He likes to...

    Read more..
Stay Updated!
Topics
apt (11) Cyber-attack (32) cyber-attacks (56) cyberattack (11) cyberattacks (12) Cybersecurity (301) cyber security (26) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (103) Enterprise security (15) EPS (10) Exploit (12) firewall (11) hackers (11) IoT (10) malware (64) malware attack (23) malware attacks (12) MDM (25) Microsoft (14) Network security (18) Patch Management (12) phishing (18) Ransomware (60) ransomware attack (29) ransomware attacks (30) ransomware protection (12) security (10) Seqrite (26) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (15) windows (11)
Products
  • Seqrite MSSP Portal
  • HawkkScan
  • HawkkProtect
  • HawkkHunt XDR
  • HawkkEye
  • HawkkEye Endpoint Security Cloud
  • HawkkEye mSuite
  • HawkkEye Workspace
  • Endpoint Security (EPS)
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category

© 2022 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.