• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite

endpoint security Archive

Are you making these common public cloud migration mistakes?

Have you considered security risks when moving to the cloud?

Estimated reading time: 2 minutes

Enterprises are increasingly migrating operations to the public cloud, enthused by the many benefits it offers. By embracing cloud competencies, enterprises can become leaner and faster, enabling their employees to access information and services from wherever they are. It...
Read More
October 9, 2020

When will IT & ITes businesses understand the data breach dangers from a work from home staff?

Technology companies struggling to establish efficient remote operations

Estimated reading time: 2 minutes

The unprecedented rise of a work from home staff has greatly increased the risk of data breaches for the IT/ITes sector. With companies forced to mandate Work From Home (WFH) for its employees in the face of the global...
Read More
June 9, 2020

Seqrite Endpoint Security supports Windows 10 May 2020 Update 20H1 (Vibranium)

windows-10-20H1-update

Estimated reading time: 1 minute

Microsoft has recently come up with a new update for Windows 10 PCs, called Windows 10 May 2020 Update 20H1 (Vibranium) Build version 2004. This post lists down some of the highlights of this update and Seqrite Endpoint Security’s...
Read More
May 26, 2020

Can a single solution secure enterprise endpoints?

Can a single solution secure enterprise endpoints?

Estimated reading time: 2 minutes

Endpoint security acts as the vanguard against an enterprise’s battle against cyber attacks. This is because every device that connects to a corporate network is in most cases the first point of penetration for threats and malware. For enterprises...
Read More
July 22, 2019

What happens when you don’t patch your software?

patch_management

Estimated reading time: 3 minutes

In May 2017, the entire world plunged into chaos. The WannaCry ransomware ravaged through close to 300,000 systems and 200,000 victims, shutting down networks, causing chaos and demanding payment to give data back. Just a month later, another cyber...
Read More
March 6, 2019
  • 13
    Shares

Warning Signs that Your Computer is infected with malware – Part II

Estimated reading time: 3 minutes

In our first part of this series, we provided a few scenarios of your system not working the way it should and how it could be a symptom of a malware infection. Unfortunately, if you thought those were the...
Read More
March 1, 2019
  • 12
    Shares

Warning Signs that Your Computer is infected with malware – Part I

Estimated reading time: 3 minutes

A malware infection can lead to a major drop in productivity. Whether it’s on an office system or on a personal one, these infections can lead to everyday work grinding down to a halt and at worse, a complete...
Read More
February 27, 2019
  • 2
    Shares

Most common cybersecurity threats that occur in the healthcare sector

healthcare_cybersecurity

Estimated reading time: 3 minutes

While almost all industries and sectors are at the risk of cyber threats, the effects on these threats on certain sectors can be disastrous. One of these sectors is healthcare. A cyber attack on a healthcare system can be...
Read More
February 25, 2019
  • 14
    Shares

Brute-force attacks – Traditional but still Effective

Brute force

Estimated reading time: 3 minutes

Brute-force attacks can probably be regarded as the first word in the alphabet of cybersecurity. Among the oldest ways of trying to gain unauthorized access to an account, brute-force attacks have been around forever. But the fact that despite...
Read More
February 7, 2019
  • 24
    Shares

How to reduce the risk of data leakage when an employee is Out Of Office

Out Of Office

Estimated reading time: 3 minutes

Vacations are great. Employees like to get away from it all, the pressures of work, the many meetings, the deadlines, etc. But there’s another category of people who also love vacations and employees who are Out of Office (OOO)...
Read More
January 18, 2019
  • 19
    Shares
1 2 … 11 Next →

Popular Posts

  • RAT used by Chinese cyberspies infiltrating Indian businesses RAT used by Chinese cyberspies infiltrating Indian businesses December 18, 2020
  • Are we prepared against risks generating from the IoT revolution? Are we prepared against risks generating from the IoT revolution? January 15, 2021
  • How can EdTech companies deal with rising security challenges? How can EdTech companies deal with rising security challenges? December 24, 2020

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • BEC and Ransomware attacks increase during the pandemic

    BEC and Ransomware attacks increase during the pandemic

    January 22, 2021
  • Are we prepared against risks generating from the IoT revolution?

    Are we prepared against risks generating from the IoT revolution?

    January 15, 2021
  • Proactiveness is the key to resolving hybrid cloud’s security challenges

    Proactiveness is the key to resolving hybrid cloud’s security challenges

    January 6, 2021

Stay Updated!

Topics

Antivirus For Linux (10) Antivirus For Server (9) BYOD (9) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (275) cyber security (25) Cyber threat (29) cyber threats (44) Data (10) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) incident response plan (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (55) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.