• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: endpoint security

Healthcare: Cybersecurity risks with vendors

Healthcare: Cybersecurity risks with vendors

Estimated reading time: 3 minutes

There has been a surge in cyber attacks in the healthcare industry. Ransomware attacks have increased across all sectors, but healthcare industry is particularly vulnerable to such attacks. Getting locked out of systems while handling critical patient data or operational...
Read Blog
September 6, 2017

Setting up a business? Secure it with Seqrite EPS

Setting up a business? Secure it with Seqrite EPS

Estimated reading time: 3 minutes

Starting a new business is an exciting and stressful period in anyone’s life.  The systems, the processes, the people- everything is new, and getting it all to work together can be really a nerve-wracking experience. Further, a startup always...
Read Blog
August 22, 2017

5 Security measures you should take to protect your organization’s network

5 Security measures you should take to protect your organization’s network

Estimated reading time: 4 minutes

Technology continuously evolves to provide greater and more powerful features. At the same time, newer threats are getting uncovered with every advancement in technology. More modern devices present fresher avenues and endpoints that can be used for hacking and making a breach. New...
Read Blog
August 11, 2017

Seqrite Data Loss Prevention (DLP) -A Multi-Layered Approach to Data Security

Seqrite Data Loss Prevention (DLP) -A Multi-Layered Approach to Data Security

Estimated reading time: 3 minutes

An increasing volume of business information assets are distributed digitally today and has been growing exponentially every year. Confidential and sensitive business information is no longer restricted to physical boundaries of business enterprises. With the implementation of policies like...
Read Blog
August 1, 2017
2

Cyber security challenges of the future

Cyber security challenges of the future

Estimated reading time: 3 minutes

As the cyber world is progressing , so are the threats around it. In the late 80’s and early 90’s, the threats were simple as compared to today’s standards. The viruses got transferred through infected floppies, but they were easy to detect and stop. Today,...
Read Blog
July 21, 2017

A single infected computer can cost your business millions of dollars, know how to save

A single infected computer can cost your business millions of dollars, know how to save

Estimated reading time: 4 minutes

It was August 5th, 2012, when a massive cyber-attack crippled operations of one of the world’s leading petroleum and natural gas company, Saudi Aramco. A Virus named ‘Shamoon’ wiped out data from 35,000 computers bringing most of their operations...
Read Blog
July 11, 2017

Endpoint Security: Next Gen Threat Prevention

Endpoint Security: Next Gen Threat Prevention

Estimated reading time: 2 minutes

Gone are the days when employees used to walk into the office, login into their systems, finish their daily tasks and walk out. Today, the jobs scenario is different. Working from remote locations, signing in at different hours, logging...
Read Blog
June 23, 2017

Protecting your Enterprise from Phishing Attacks

Protecting your Enterprise from Phishing Attacks

Estimated reading time: 3 minutes

In 2016, according to a report by a security training company (wombat security), 86% of the companies reported being a victim of phishing attacks. As many as 67% companies were the target of spear phishing. Phishing attacks cause severe damage to...
Read Blog
June 20, 2017

The threat of data loss at unsecured endpoints

The threat of data loss at unsecured endpoints

Estimated reading time: 3 minutes

Data theft or loss by employees is a reality no one can deny. The cost of one such internal breach at Bank of America was 10 million USD. According to a study by Verizon, almost 20% of the all the data...
Read Blog
June 19, 2017

Seqrite Endpoint Security (EPS) version 7.2 released: All the key features explained

Seqrite Endpoint Security (EPS) version 7.2 released: All the key features explained

Estimated reading time: 2 minutes

Seqrite has launched Seqrite Endpoint Security (EPS) 7.2, a comprehensive solution securing endpoints and data that encompasses more competitive features with enhanced protection and powerful performance. Seqrite EPS 7.2 incorporates a host of new and improved features that provides SMEs...
Read Blog
May 16, 2017
← Previous 1 … 9 10 11 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (20) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (324) cyber security (33) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (12) data protection (25) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies