• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

5 Biggest Cyberattacks of 2016

5 Biggest Cyberattacks of 2016

Estimated reading time: 4 minutes

As the world is rapidly going digital, our privacy and security is more vulnerable than ever. Ignorance is no bliss and this is why we bring to you a roundup of some of the biggest cyberattacks of the year 2016....
Read Blog
December 1, 2016

EPS Enterprise Suite earns AVLab Award for real-time ransomware protection

EPS Enterprise Suite earns AVLab Award for real-time ransomware protection

Estimated reading time: 3 minutes

In October 2016, AVLab protection test against ransomware threats gave a 100% effectiveness score to Seqrite Endpoint Security (EPS) Enterprise Suite Edition. 28 malicious software files of crypto-ransomware were used to test the effectiveness of the solution in terms...
Read Blog
November 22, 2016

5 Tips for Preventing Ransomware

5 Tips for Preventing Ransomware

Estimated reading time: 3 minutes

You will not realize the importance of the phrase ‘Prevention is better than cure’ any better till you or someone you know witnesses a ransomware attack first hand. As the name suggests ‘ransomware’ is a kind of a cyberattack...
Read Blog
November 9, 2016

How to Recover Files After a Ransomware Attack?

How to Recover Files After a Ransomware Attack?

Estimated reading time: 2 minutes

What if you know your data is securely backed up when a ransomware strikes and you don’t have to worry about recovering your files? The Backup and Restore feature of Seqrite helps you achieve this. What is a Ransomware?...
Read Blog
September 8, 2016

Seqrite Patch Management: A Centralized Solution to all Microsoft Application Vulnerability Needs

Seqrite Patch Management:  A Centralized Solution to all Microsoft Application Vulnerability Needs

Estimated reading time: 2 minutes

Cyber Security threats today have become increasingly sophisticated and complex. Organizations, however, have not been able to evolve at the same pace. As organizations move ahead and embrace new technologies without fully comprehending the implications these have on the...
Read Blog
September 2, 2016

Seqrite Endpoint Security v.7.0 Released

Seqrite Endpoint Security v.7.0 Released

Estimated reading time: 2 minutes

Seqrite Endpoint Security (SEPS) v.7.0 has been released with new product variants, features, and enhancements. The new version comes with competitive features for each SEPS product variant and upgraded to support businesses of all sizes. Enterprise Suite Endpoint Security...
Read Blog
August 23, 2016

Pokemon Go Makes Implementation of MDM Strategy a Necessity in Organizations

Pokemon Go Makes Implementation of MDM Strategy a Necessity in Organizations

Estimated reading time: 3 minutes

Whether your organization is into manufacturing steel or designing apps for smartphones, employee work flexibility is becoming more of a requirement than a privilege for every organization. Start-ups and SMBs are seeing real gains by encouraging Bring-Your-Own-Device (BYOD) at...
Read Blog
August 1, 2016

Solution to system startup issue faced by Seqrite users

Solution to system startup issue faced by Seqrite users

Estimated reading time: < 1 minute

Some of our users might be facing system startup issues. This blog post explains the solution to the problem. Problem description A certain group of Seqrite users has reported to be experiencing system startup issues. The issue occurred after...
Read Blog
July 1, 2016

Quick Heal launches ‘Seqrite Services’ and ‘Quick Heal Academy’

Quick Heal launches ‘Seqrite Services’ and ‘Quick Heal Academy’

Estimated reading time: 2 minutes

At Quick Heal, our mission is to keep our users’ systems and devices secured and protected against all types of cyber threats with products that run the latest and cutting-edge technology. A vital part of this mission is our...
Read Blog
June 21, 2016

The 3 Commandments for Complete SMB Security

The 3 Commandments for Complete SMB Security

Estimated reading time: 3 minutes

Cybersecurity for small businesses is more than just a trending topic now; it is a bare necessity for business enterprises. With so many different ways for attackers to breach businesses and steal their confidential data, the need of the...
Read Blog
April 29, 2016
← Previous 1 … 77 78 79 Next →
Featured Authors
  • Seqrite
    Seqrite

    Seqrite is a leading enterprise cybersecurity solutions provider. With a focus...

    Read more..
  • Jyoti Karlekar
    Jyoti Karlekar

    I'm an avid writer who enjoys crafting content about emerging technologies and...

    Read more..
  • Bineesh P
    Bineesh P

    I am a passionate cybersecurity enthusiast and a dedicated writer. With a knack...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
Topics
apt (25) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (15) Cybersecurity (335) cyber security (34) Cyber threat (33) cyber threats (50) data breach (56) data breaches (29) data loss (28) data loss prevention (33) data privacy (15) data protection (30) data security (15) DLP (49) DPDP (13) DPDPA (15) Encryption (16) endpoint security (110) Enterprise security (18) Exploit (13) GDPR (13) malware (76) malware analysis (13) malware attack (23) malware attacks (12) MDM (27) Microsoft (15) Network security (24) Patch Management (12) phishing (29) Ransomware (69) ransomware attack (30) ransomware attacks (30) ransomware protection (14) Seqrite (40) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) Threat Intelligence (13) UTM (34) Vulnerability (16) zero trust (13)
Loading
Blogs on Information Technology, Network & Cybersecurity | Seqrite

Leading enterprise IT security solutions provider simplifying endpoint, data, and network security with best-in-class threat prevention, detection, and response solutions worldwide.

Read More

Follow us:

Subscribe To Our Newsletter

Stay informed about the latest cybersecurity trends and insights.

Loading
Products & Services
  • Cloud
  • Endpoint Protection
  • Endpoint Detection and Response
  • Mobile Device Management
  • BYOD
  • Extended Detection and Response
  • Zero Trust Network Access
  • Data Privacy
  • On Prem
  • Endpoint Protection
  • Endpoint Detection and Response
  • Data Privacy
  • Platform
  • Malware Analysis Platform
  • Micro Business
  • SOHO Total Edition
  • Services
  • Threat Intel
  • Digital Risk Protection Services (DRPS)
  • Ransomware Recovery as a Services (RRaaS)
  • DPDP Compliance
  • Managed Detection and Response
Resources
  • Blogs
  • Whitepapers
  • Datasheets
  • Threat Reports
  • Manuals
  • Policy & Compliance
  • EULA
  • PoV
  • GoDeep.AI
Contact Us
  • Registered Offices
  • Nearest Offices
  • Let’s Talk Cybersecurity
Support
  • Technical Support
  • Download Software
  • Offline Updater
  • Firmware Upgrades
  • Upgrades
  • Product Documentation
About Us
  • About Seqrite
  • Leadership
  • Awards & Recognition
  • Newsroom
Partner
  • Partner Program
  • Locate Partner
  • Become A Partner
  • Seqrite Certification

© 2026 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies