• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: endpoint security

What are exploits? Everything you need to know

What are exploits? Everything you need to know

Estimated reading time: 3 minutes

Cybersecurity experts are always cautious when they hear the word “exploits”, and for good reason. Exploits are often a preferred channel through which cybercriminals like to hit their targets. What makes it easier for these criminals is that exploits...
Read Blog
August 25, 2018
16
Shares

How to make the most of your Seqrite EPS

How to make the most of your Seqrite EPS

Estimated reading time: 3 minutes

Seqrite Endpoint Security (EPS) is a comprehensive, powerful platform for enterprises to secure their endpoint security. With innovative technologies like Anti Ransomware, Advanced DNA Scan and Behavioral Detection System to protect networks from the advanced threats of the present,...
Read Blog
August 24, 2018
7
Shares

Top 5 IT Problems for Sysadmins: Seqrite has the solution!

Top 5 IT Problems for Sysadmins: Seqrite has the solution!

Estimated reading time: 3 minutes

For enterprises, sysadmins or system administrators are vital resources who play a critical role in overall productivity. By ensuring upkeep and optimal functioning of all computer systems and networks within an enterprise, a sysadmin provides a very important link...
Read Blog
August 23, 2018
8
Shares

Importance of industry certifications for security products and what do they mean

Importance of industry certifications for security products and what do they mean

Estimated reading time: 3 minutes

The importance of cybersecurity has slowly seeped into the consciousness of enterprises. A cybercrime can undo years of work in an instant and enterprises are recognizing this and trying to find ways to stay safe. Hence, investment in security...
Read Blog
August 16, 2018
3
Shares

What India’s data protection law might mean for your business

What India’s data protection law might mean for your business

Estimated reading time: 3 minutes

India has taken a step forward towards laying down a proper policy for data protection. The Srikrishna Committee, a 10-member expert committee headed by former Supreme Court judge BN Srikrishna and appointed by the Indian government in August 2017...
Read Blog
August 6, 2018
305
Shares

Email-borne cyber attacks: A constant security threat

Email-borne cyber attacks: A constant security threat

Estimated reading time: 3 minutes

Since the invention of the World Wide Web in 1989 by Tim Berners-Lee, the technology has changed. What used to be a collection of simple text-based Usenet groups metamorphosed into multimedia and graphics. First email communication was all the...
Read Blog
July 12, 2018
5
Shares

Unstructured data: The unseen dangers

Unstructured data: The unseen dangers

Estimated reading time: 3 minutes

As the name suggests, unstructured data refers to raw and organized data that cannot be stored in predefined relationship structures. While this kind of data can be text-heavy in the form of email messages, PDFs, business plans, unstructured data...
Read Blog
July 6, 2018

5 Critical corporate cybersecurity risks for SMBs

5 Critical corporate cybersecurity risks for SMBs

Estimated reading time: 3 minutes

A major issue which plagues small and medium businesses (SMBs) when it comes to cybersecurity is their own perception. Often, SMBs suffer from a notion that they are not as important, that they do need to worry about fixing...
Read Blog
May 21, 2018

Wake up call: Right time to secure your online data

Wake up call: Right time to secure your online data

Estimated reading time: 3 minutes

First things first, there really is never a good time to secure the online data of your business. Any business with a cybersecurity-first mindset should have done it long, long ago. But in case, a business needs a strong...
Read Blog
May 14, 2018
9
Shares

The Human Factor: Keeping Your Cybersecurity Defence Strong and Secure

The Human Factor: Keeping Your Cybersecurity Defence Strong and Secure

Estimated reading time: 3 minutes

Technology is definitely getting hi-tech. But one thing which still remains decidedly rooted is plain and simple human frailty. And in the cybersecurity-obsessed war that organizations and individuals are fighting on a day-to-day basis, human errors can often prove...
Read Blog
May 2, 2018
8
Shares
← Previous 1 … 3 4 5 … 12 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (23) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (14) Cybersecurity (329) cyber security (34) Cyber threat (33) cyber threats (48) data breach (56) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (112) Enterprise security (18) Exploit (14) firewall (11) GDPR (13) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (23) Patch Management (12) phishing (29) Ransomware (68) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (36) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies