• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: Cybersecurity

What is Endpoint Encryption?

What is Endpoint Encryption?

Estimated reading time: 3 minutes

Endpoint devices like PCs, Smartphones and USB drives usually have a lot of sensitive data stored within. Organizations with truckloads of corporate information and other confidential details need to ensure that unauthorized access to these data sets is negated....
Read Blog
August 9, 2017

Why choose Seqrite EPS against Ransomware?

Why choose Seqrite EPS against Ransomware?

Estimated reading time: 3 minutes

Ransomware, by now, has become as common a term, in the cyber security eco-system. With multiple massive ransomware attacks across the globe in recent times, almost everyone, including individual customers and organizations, have become aware of the threat that...
Read Blog
August 8, 2017

Encrypt your data or be hacked: Choice is yours

Encrypt your data or be hacked: Choice is yours

Estimated reading time: 4 minutes

In the age of information, data is valuable. It can and usually does carry a legal liability with it hence it needs to be kept safe and protected. To use the data, it has to be processed through various systems...
Read Blog
August 3, 2017

Why your company’s server & network needs to be secure?

Why your company’s server & network needs to be secure?

Estimated reading time: 4 minutes

The continuous availability of a company’s server and protection of data stored in it is crucial for smooth operations of the business. Servers often store critical information regarding products, pricing, support, contacts, etc. which are not only essential for...
Read Blog
July 18, 2017

Cybersecurity challenges: How do retailers protect their business?

Cybersecurity challenges: How do retailers protect their business?

Estimated reading time: 4 minutes

For retailers, the online market has seen tremendous growth over the last few years, to the extent that the online business often outstrips the brick-and-mortar store business. While online business is preferred by both, businesses and consumers alike, it...
Read Blog
July 17, 2017

Addressing the weakest link in cyber security: Human Error

Addressing the weakest link in cyber security: Human Error

Estimated reading time: 3 minutes

To err is human, to forgive is divine, and we all know it too well. But we have also witnessed multiple occasions when the impact of an error can be quite devastating. While we may forgive, but the damage...
Read Blog
June 15, 2017

Cyber Security – Do Manufacturing Firms Need to Bother?

Cyber Security – Do Manufacturing Firms Need to Bother?

Estimated reading time: 3 minutes

A few years ago, who would have thought that Manufacturing companies could ever face any sort of cyber threat. Cyber threats were always a point of concern for the IT companies. However, today, the reality is quite different. Manufacturing...
Read Blog
June 9, 2017

Why should cybersecurity be a part of your Financial Budget?

Why should cybersecurity be a part of your Financial Budget?

Estimated reading time: 2 minutes

Organizations across the world that experienced a cyberattack have suffered huge revenue losses. Cybersecurity is a business priority and it is important that the C-suite must understand the importance of enterprise security and fund it appropriately. No enterprise, big...
Read Blog
February 13, 2017

Cybersecurity for Financial Services

Cybersecurity for Financial Services

Estimated reading time: 3 minutes

No doubt financial services sector continues to be an attractive target for hackers. In 2016, we saw a huge number of cyberattacks on banks and other financial services companies. A single security breach can affect the organization as well...
Read Blog
January 9, 2017

Top Seqrite features and solutions that made a mark in 2016

Top Seqrite features and solutions that made a mark in 2016

Estimated reading time: 4 minutes

No business is too small to evade a cyber-attack or data breach. Enterprise security has moved beyond traditional antivirus solutions and it’s time that cybersecurity becomes an important aspect of any organization’s financial budget. If 2016 has been the...
Read Blog
December 31, 2016
← Previous 1 … 31 32 33 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies