• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

Setting up a business? Secure it with Seqrite EPS

Setting up a business? Secure it with Seqrite EPS

Estimated reading time: 3 minutes

Starting a new business is an exciting and stressful period in anyone’s life.  The systems, the processes, the people- everything is new, and getting it all to work together can be really a nerve-wracking experience. Further, a startup always...
Read Blog
August 22, 2017

Conduct phishing simulation tests to keep employees alert

Conduct phishing simulation tests to keep employees alert

Estimated reading time: 3 minutes

Cyber-attacks on endpoints and networks are continuously growing, and organizations need to get their defense up and running. That said, the technological advancements are working well against cyber criminals and the breaches are now harder to create. This is...
Read Blog
August 18, 2017

How Ransomware works: Understanding the strategy behind cyberattacks

How Ransomware works: Understanding the strategy behind cyberattacks

Estimated reading time: 4 minutes

Security concerns have skyrocketed in recent times, thanks to the spurt in cyberattacks, and especially ransomware. Ransomware tactics have been known for a long time now, but it is only in recent times that it has taken on very...
Read Blog
August 17, 2017

Are retailers doing enough to protect consumers’ data?

Are retailers doing enough to protect consumers’ data?

Estimated reading time: 3 minutes

The retail industry has been traditionally perceived to be a happy hunting ground for hackers and other cyber attackers. There are card based and card-not-present transactions done with POS, and online retail purchases and both of these are prone...
Read Blog
August 16, 2017

How cyber crime has become the greatest threat to companies across the world?

How cyber crime has become the greatest threat to companies across the world?

Estimated reading time: 3 minutes

Data in today’s world is a powerful tool which when used correctly can boost businesses to reach new heights. While data offers competitive advantage to organizations, cyber crime has slowly evolved into a worthy antagonist – shaping up as...
Read Blog
August 15, 2017

Seqrite AntiVirus for Linux: Comprehensive antivirus solution for Linux networks

Seqrite AntiVirus for Linux: Comprehensive antivirus solution for Linux networks

Estimated reading time: < 1 minute

Seqrite AntiVirus for Linux is designed to simplify security configurations and synchronize control on Linux networks across all levels of the organization. Seqrite AntiVirus for Linux shields Linux systems against malware. It offers On-demand and Schedule scanning, Samba Share...
Read Blog
August 14, 2017
50
Shares

Understanding data encryption in network security

Understanding data encryption in network security

Estimated reading time: 3 minutes

Information Security is a big concern today for CISOs and administrators everywhere. The information in question could be the company’s own information, or it could be that pertaining to its customers. In either case, protecting the information, preventing it...
Read Blog
August 14, 2017

5 Security measures you should take to protect your organization’s network

5 Security measures you should take to protect your organization’s network

Estimated reading time: 4 minutes

Technology continuously evolves to provide greater and more powerful features. At the same time, newer threats are getting uncovered with every advancement in technology. More modern devices present fresher avenues and endpoints that can be used for hacking and making a breach. New...
Read Blog
August 11, 2017

An analysis of GlobeImposter Ransomware by Quick Heal Security Labs

An analysis of GlobeImposter Ransomware by Quick Heal Security Labs

Estimated reading time: 5 minutes

GlobeImposter Ransomware has been increasingly active and observed recently to be appending different suffixes to files it encrypt. A few patterns observed are using 3 random numbers such as “.492, .490, .725, .726, and .707”, random alphanumeric words such...
Read Blog
August 11, 2017

Top industries at risk of cyber attacks in 2017

Top industries at risk of cyber attacks in 2017

Estimated reading time: 3 minutes

Businesses today carry more sensitive data than ever before. Any crucial information about the customers, if it gets into the wrong hands, can cause a lot of damage to both clients as well as companies. Apart from the client’s information,...
Read Blog
August 10, 2017
← Previous 1 … 61 62 63 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (321) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies