• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: Cyber-attack

Five essential elements of a cybersecure network

Five essential elements of a cybersecure network

Estimated reading time: 3 minutes

The rapid increase in cyber attacks is a global reality, which doesn’t seem to be settling down anytime soon. Ponemon Institute estimates that cyber attacks on SMB’s have increased by 55 percent over the last year. With the increased digitization of businesses, more and more...
Read Blog
November 2, 2017

Why we need to focus on protecting enterprise devices?

Why we need to focus on protecting enterprise devices?

Estimated reading time: 3 minutes

Mobility is a widely-adopted approach that comes as a blessing for organizational growth but builds up as a headache for the IT security pros. While mobility can help enterprises reduce service costs and improve user experience by concentrating more...
Read Blog
October 23, 2017

Cybercriminals know the importance of your data. Do you?

Cybercriminals know the importance of your data. Do you?

Estimated reading time: 3 minutes

Educating oneself when it comes to cybersecurity is extremely important and should always be stressed upon. A better understanding of this subject increases the chances of staying safe from the existing threats. More often than not, the importance of...
Read Blog
October 10, 2017

Hackers Surveillance: How cybercriminals use hacker surveillance to target your business?

Hackers Surveillance: How cybercriminals use hacker surveillance to target your business?

Estimated reading time: 3 minutes

Data breaches and cyber-attacks are common occurrences which usually proliferate at an exponential rate. While it is important that enterprises tighten their enclosures, it is also advisable to understand how cybercriminals prepare for a breach. Hacker surveillance is one way...
Read Blog
October 9, 2017

Strengthen your Enterprise Security with Seqrite EPS

Strengthen your Enterprise Security with Seqrite EPS

Estimated reading time: 3 minutes

With the increase in mobility of users, their usage and the access to the organization’s information assets extending to off-campus locations, the security perimeter keeps continuously changing.  This has led to a situation that a simple security solution within...
Read Blog
October 6, 2017

Are retailers doing enough to protect consumers’ data?

Are retailers doing enough to protect consumers’ data?

Estimated reading time: 3 minutes

The retail industry has been traditionally perceived to be a happy hunting ground for hackers and other cyber attackers. There are card based and card-not-present transactions done with POS, and online retail purchases and both of these are prone...
Read Blog
August 16, 2017

5 Security measures you should take to protect your organization’s network

5 Security measures you should take to protect your organization’s network

Estimated reading time: 4 minutes

Technology continuously evolves to provide greater and more powerful features. At the same time, newer threats are getting uncovered with every advancement in technology. More modern devices present fresher avenues and endpoints that can be used for hacking and making a breach. New...
Read Blog
August 11, 2017

What is Endpoint Encryption?

What is Endpoint Encryption?

Estimated reading time: 3 minutes

Endpoint devices like PCs, Smartphones and USB drives usually have a lot of sensitive data stored within. Organizations with truckloads of corporate information and other confidential details need to ensure that unauthorized access to these data sets is negated....
Read Blog
August 9, 2017

Why choose Seqrite EPS against Ransomware?

Why choose Seqrite EPS against Ransomware?

Estimated reading time: 3 minutes

Ransomware, by now, has become as common a term, in the cyber security eco-system. With multiple massive ransomware attacks across the globe in recent times, almost everyone, including individual customers and organizations, have become aware of the threat that...
Read Blog
August 8, 2017

Dangers of hackers breaking into your printer

Dangers of hackers breaking into your printer

Estimated reading time: 3 minutes

Do you think that printers can’t be hacked as there is really nothing to hack in there? You might be completely wrong! Printers have been a favorite target of hackers for a while now. They are routinely compromised, whether they are setup at...
Read Blog
August 4, 2017
← Previous 1 2 3 4 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies