• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: endpoint security

Warning Signs that Your Computer is infected with malware – Part II

Warning Signs that Your Computer is infected with malware – Part II

Estimated reading time: 3 minutes

In our first part of this series, we provided a few scenarios of your system not working the way it should and how it could be a symptom of a malware infection. Unfortunately, if you thought those were the...
Read Blog
March 1, 2019
12
Shares

Warning Signs that Your Computer is infected with malware – Part I

Warning Signs that Your Computer is infected with malware – Part I

Estimated reading time: 3 minutes

A malware infection can lead to a major drop in productivity. Whether it’s on an office system or on a personal one, these infections can lead to everyday work grinding down to a halt and at worse, a complete...
Read Blog
February 27, 2019
2
Shares

Most common cybersecurity threats that occur in the healthcare sector

Most common cybersecurity threats that occur in the healthcare sector

Estimated reading time: 3 minutes

While almost all industries and sectors are at the risk of cyber threats, the effects on these threats on certain sectors can be disastrous. One of these sectors is healthcare. A cyber attack on a healthcare system can be...
Read Blog
February 25, 2019
14
Shares

Brute-force attacks – Traditional but still Effective

Brute-force attacks – Traditional but still Effective

Estimated reading time: 2 minutes

Brute-force attacks can probably be regarded as the first word in the alphabet of cybersecurity. Among the oldest ways of trying to gain unauthorized access to an account, brute-force attacks have been around forever. But the fact that despite...
Read Blog
February 7, 2019
24
Shares

How to reduce the risk of data leakage when an employee is Out Of Office

How to reduce the risk of data leakage when an employee is Out Of Office

Estimated reading time: 3 minutes

Vacations are great. Employees like to get away from it all, the pressures of work, the many meetings, the deadlines, etc. But there’s another category of people who also love vacations and employees who are Out of Office (OOO)...
Read Blog
January 18, 2019
19
Shares

How to prevent Remote Desktop Protocol (RDP) attacks

How to prevent Remote Desktop Protocol (RDP) attacks

Estimated reading time: 3 minutes

Remote Desktop Protocol (RDP) attacks can be extremely dangerous, whether from an enterprise or a single user point of view. They are basically backdoors which allow external users to access and use a system over the Internet. The United...
Read Blog
December 3, 2018
12
Shares

Why should you say NO to ransomware demands!

Why should you say NO to ransomware demands!

Estimated reading time: 3 minutes

Ransomware is scary. Anyone who has ever been the victim of a ransomware attack or seen the havoc WannaCry unleashed, would agree. And it is not a threat that seems to be going away anytime soon – the European...
Read Blog
December 3, 2018
8
Shares

Tracing the story of Emotet malware campaign

Tracing the story of Emotet malware campaign

Estimated reading time: 3 minutes

For any enterprise which has some sort of association with the financial sector, it is important to be familiar with the threat of Emotet. Yes, Emotet, a part of the banking Trojan family which is distributed through various different...
Read Blog
December 1, 2018
15
Shares

Your business is hit by a breach. Now what should you do?

Your business is hit by a breach. Now what should you do?

Estimated reading time: 3 minutes

The worst has happened. Your database has been breached and the company is scrambling for cover. Every second seems to be a time bomb and your IT security team is working overtime, trying to assess the damage. Your CEO...
Read Blog
November 26, 2018
11
Shares

Cybersecurity Roundup 2018

Cybersecurity Roundup 2018

Estimated reading time: 3 minutes

In almost a blink of the eye, the year will be over. In cybersecurity terms though, 2018 could probably be defined as “business as usual”. Cyber threats only increased, there were news of even more daring attacks and cyber...
Read Blog
November 22, 2018
22
Shares
← Previous 1 2 3 … 11 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies