• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite

cyber security Archive

Can a single solution secure enterprise endpoints?

Can a single solution secure enterprise endpoints?

Estimated reading time: 2 minutes

Endpoint security acts as the vanguard against an enterprise’s battle against cyber attacks. This is because every device that connects to a corporate network is in most cases the first point of penetration for threats and malware. For enterprises...
Read More
July 22, 2019

Use CAA DNS records for SSL Certificate and minimize cyber threats

Estimated reading time: 3 minutes

SSL or Secure Sockets Layer (commonly referred as HTTPS) has now become a necessity for protecting your websites whether it is handling any sensitive information or not. An organization needs to install SSL certificate, issued by a Certificate Authority...
Read More
September 21, 2017

Dangers of hackers breaking into your printer

Printer Hack

Estimated reading time: 3 minutes

Do you think that printers can’t be hacked as there is really nothing to hack in there? You might be completely wrong! Printers have been a favorite target of hackers for a while now. They are routinely compromised, whether they are setup at...
Read More
August 4, 2017

Security mistakes in Fintech that can easily be avoided

Fintech security mistakes

Estimated reading time: 4 minutes

Financial industry is one of the most lucrative targets for cyber criminals. It is a rich source of information that can be directly used by them for personal gains. Attacks on financial enterprises happen on daily basis all around the world....
Read More
August 2, 2017

What is encryption and why it is important for your organization?

Encryption

Estimated reading time: 3 minutes

In old days, the life in technology was simple with simple security issues. Hackers were amateurs who broke the security of networks just for fun. But today, cyber criminals use sophisticated technology to break into the secure network of...
Read More
August 1, 2017

3 Key Security Challenges for IoT

Security challenges for IoT

Estimated reading time: 3 minutes

Internet of things (IoT) is no more just ‘the next big thing’ but has already started entering our lives in different forms. Today there are billions of devices from consumer products (e.g. Fitbit) to Industrial products (Industrial sensors) that...
Read More
July 27, 2017

Security Challenges in BYOD

Security challenges in BYOD

Estimated reading time: 4 minutes

BYOD (Bring Your Own Device) refers to employees using their own devices including phones, tablets, and laptops to connect to the office network and perform their official duties. BYOD is the preferred policy of many employers these days, for...
Read More
July 25, 2017

Why Education Institutions Need Security Software?

Security challenges in education institutes

Estimated reading time: 4 minutes

If you think that schools and colleges don’t need any cyber security as they don’t store any data that will interest criminals, think again. In May 2015, Pennsylvania State University’s engineering school was the target of a cyber attack. The...
Read More
July 24, 2017

Cyber security challenges of the future

Cyber Security

Estimated reading time: 4 minutes

As the cyber world is progressing , so are the threats around it. In the late 80’s and early 90’s, the threats were simple as compared to today’s standards. The viruses got transferred through infected floppies, but they were easy to detect and stop. Today,...
Read More
July 21, 2017

Importance of information security in education sector

Information security in education sector

Estimated reading time: 3 minutes

The education sector, especially institutions of higher education, have been the focus of Information Security Professionals in recent times. It has been observed that the education sector ranks very high in the list of targets for cyber-attacks. Investigations have...
Read More
July 19, 2017
1 2 3 Next →

Popular Posts

  • RAT used by Chinese cyberspies infiltrating Indian businesses RAT used by Chinese cyberspies infiltrating Indian businesses December 18, 2020
  • Are we prepared against risks generating from the IoT revolution? Are we prepared against risks generating from the IoT revolution? January 15, 2021
  • How can EdTech companies deal with rising security challenges? How can EdTech companies deal with rising security challenges? December 24, 2020

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • BEC and Ransomware attacks increase during the pandemic

    BEC and Ransomware attacks increase during the pandemic

    January 22, 2021
  • Are we prepared against risks generating from the IoT revolution?

    Are we prepared against risks generating from the IoT revolution?

    January 15, 2021
  • Proactiveness is the key to resolving hybrid cloud’s security challenges

    Proactiveness is the key to resolving hybrid cloud’s security challenges

    January 6, 2021

Stay Updated!

Topics

Antivirus For Linux (10) Antivirus For Server (9) BYOD (9) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (275) cyber security (25) Cyber threat (29) cyber threats (44) Data (10) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) incident response plan (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (55) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.