• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

Top Seqrite features and solutions that made a mark in 2016

Top Seqrite features and solutions that made a mark in 2016

Estimated reading time: 4 minutes

No business is too small to evade a cyber-attack or data breach. Enterprise security has moved beyond traditional antivirus solutions and it’s time that cybersecurity becomes an important aspect of any organization’s financial budget. If 2016 has been the...
Read Blog
December 31, 2016

Decryption Tool for CrySiS/XTBL Ransomware

Decryption Tool for CrySiS/XTBL Ransomware

Estimated reading time: 2 minutes

The decryption of CrySiS/XTBL Ransomware is now possible thanks to the recent release of its master decryption keys needed to recover the files encrypted by the ransomware. While we couldn’t guess the apparent reason behind the release, we have...
Read Blog
December 16, 2016
2

Here’s why your startup might be the perfect target for hackers

Here’s why your startup might be the perfect target for hackers

Estimated reading time: 3 minutes

So you’re a ‘new kid on the block’ in the big business world. Just getting started with the setting up of your infrastructure and organizing the systems and processes? Of course cybersecurity is the least of your concerns at...
Read Blog
December 14, 2016

Seqrite Endpoint Security (EPS) rated ‘Top Product’ by AV TEST Institute

Seqrite Endpoint Security (EPS) rated ‘Top Product’ by AV TEST Institute

Estimated reading time: 2 minutes

In December 2016, AV-TEST Product Review and Certification Report for Sep-Oct 2016 recognized Seqrite EPS for its superior protection, usability and performance. AV-TEST carries out several individual and comparative tests per year and performs extensive certification procedures in which...
Read Blog
December 12, 2016

Seqrite Endpoint Security (EPS) version 7.1 released: All the key features explained

Seqrite Endpoint Security (EPS) version 7.1 released: All the key features explained

Estimated reading time: 3 minutes

We have just released Endpoint Security (EPS) version 7.1 with some new enhancements and improved compliance features. This blog is a comprehensive guide to all you need to know about EPS 7.1. The new version is a refinement and...
Read Blog
December 5, 2016
1

5 Biggest Cyberattacks of 2016

5 Biggest Cyberattacks of 2016

Estimated reading time: 4 minutes

As the world is rapidly going digital, our privacy and security is more vulnerable than ever. Ignorance is no bliss and this is why we bring to you a roundup of some of the biggest cyberattacks of the year 2016....
Read Blog
December 1, 2016

EPS Enterprise Suite earns AVLab Award for real-time ransomware protection

EPS Enterprise Suite earns AVLab Award for real-time ransomware protection

Estimated reading time: 3 minutes

In October 2016, AVLab protection test against ransomware threats gave a 100% effectiveness score to Seqrite Endpoint Security (EPS) Enterprise Suite Edition. 28 malicious software files of crypto-ransomware were used to test the effectiveness of the solution in terms...
Read Blog
November 22, 2016

5 Tips for Preventing Ransomware

5 Tips for Preventing Ransomware

Estimated reading time: 3 minutes

You will not realize the importance of the phrase ‘Prevention is better than cure’ any better till you or someone you know witnesses a ransomware attack first hand. As the name suggests ‘ransomware’ is a kind of a cyberattack...
Read Blog
November 9, 2016

SC Magazine Gives High Rating to Quick Heal Endpoint Security Total

Estimated reading time: 2 minutes

What do the top reviewers in the security industry think of our technology? Our product ratings this past month have been very good across the board with the leading AV testing labs, and we’ll update you on those ratings...
Read Blog
October 28, 2016

Is your Remote Desktop System safe from Bruteforce attacks?

Estimated reading time: 3 minutes

As we have explained in the previous Troldesh ransomawre blog, Cyber criminals are now spreading and infecting ransomware by gaining access to computers through Remote Desktop. Remote access to the victim’s computer is gained by using brute-force techniques which...
Read Blog
October 18, 2016
2
← Previous 1 … 69 70 71 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies