• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: DLP

Asset Management: Protecting your company’s most important assets

Asset Management: Protecting your company’s most important assets

Estimated reading time: 3 minutes

A comprehensive IT Asset Management (ITAM) program facilitates an accurate, documented IT environment covering the organization’s assets and data along with their owners and highlighting security and risks across the network. It helps to make critical decisions regarding software...
Read Blog
January 29, 2018
8
Shares

What are the major ingredients of cybersecurity in 2018?

What are the major ingredients of cybersecurity in 2018?

Estimated reading time: 3 minutes

2017 was a highly eventful year for cybersecurity experts as they incessantly kept combating the proliferating security incidents with considerable success. While a few incidents grabbed the headlines, a majority of cyber-attacks went unannounced. Now in 2018, it seems...
Read Blog
January 4, 2018
3
Shares

Bandwidth Limit Exceeded: Causes and Solution

Bandwidth Limit Exceeded: Causes and Solution

Estimated reading time: 3 minutes

Every network administrator knows that feeling. You receive an innocuous notification early in your billing cycle – “Exceeded quota”. Bad news. Your network has already exceeded the bandwidth allocated to it. The only option now is to buy extra...
Read Blog
January 3, 2018
3
Shares

2018: What’s your New Year resolution for cybersecurity?

2018: What’s your New Year resolution for cybersecurity?

Estimated reading time: 3 minutes

Reports released by CSO suggest that cybersecurity threats are expected to amplify up to a staggering $6 trillion, by the end of 2021. This revelation validates the fact that security threats are looming large and majority of global businesses...
Read Blog
January 2, 2018

Cybersecurity tips for retailers and consumers

Cybersecurity tips for retailers and consumers

Estimated reading time: 4 minutes

The holiday season has arrived, and it is high time that consumers and retailers make arrangements for staying one step ahead of the prevalent holiday scams. With trouble lurking in the shadows due to multiple spikes in spending habits,...
Read Blog
December 22, 2017

Industrial cybersecurity: Addressing business challenges

Industrial cybersecurity: Addressing business challenges

Estimated reading time: 3 minutes

Industrial cybersecurity has evolved over the years and currently we have a host of strategies and implementations for securing the Supervisory Control And Data Acquisition  (SCADA) systems and varied industrial plants. While cybersecurity awareness has improved for many companies willing...
Read Blog
November 17, 2017

Remember the security basics as your cybersecurity strategy evolves

Remember the security basics as your cybersecurity strategy evolves

Estimated reading time: 3 minutes

Most cybersecurity strategies thrive on advanced technologies when it comes to mitigating complex threats. In the meanwhile, CISOs and the concerned IT heads tend to ignore the basic precautions and security standards required for preventing data breaches. Although technological...
Read Blog
November 15, 2017

Cybersecurity in IT organizations: The changing threat landscape

Cybersecurity in IT organizations: The changing threat landscape

Estimated reading time: 3 minutes

Cybersecurity is a huge challenge for all firms today. The ever-increasing dependence on technology invariably makes the business susceptible to cyber attacks. Companies see cyber threats as a danger to their business that may come from the software they use. But what...
Read Blog
November 1, 2017

Major security issues that keep your organization’s CISO up all night

Major security issues that keep your organization’s CISO up all night

Estimated reading time: 3 minutes

With multiple ransomware attacks making the headlines, it is essential that the IT heads and concerned CISOs start treating cybersecurity as a mainstream topic. However, it is saddening to see that the sophisticated threats are continually outpacing the growth...
Read Blog
October 25, 2017

Why we need to focus on protecting enterprise devices?

Why we need to focus on protecting enterprise devices?

Estimated reading time: 3 minutes

Mobility is a widely-adopted approach that comes as a blessing for organizational growth but builds up as a headache for the IT security pros. While mobility can help enterprises reduce service costs and improve user experience by concentrating more...
Read Blog
October 23, 2017
← Previous 1 2 3 … 5 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies