• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: endpoint security

Email-borne cyber attacks: A constant security threat

Email-borne cyber attacks: A constant security threat

Estimated reading time: 3 minutes

Since the invention of the World Wide Web in 1989 by Tim Berners-Lee, the technology has changed. What used to be a collection of simple text-based Usenet groups metamorphosed into multimedia and graphics. First email communication was all the...
Read Blog
July 12, 2018
5
Shares

Unstructured data: The unseen dangers

Unstructured data: The unseen dangers

Estimated reading time: 3 minutes

As the name suggests, unstructured data refers to raw and organized data that cannot be stored in predefined relationship structures. While this kind of data can be text-heavy in the form of email messages, PDFs, business plans, unstructured data...
Read Blog
July 6, 2018

5 Critical corporate cybersecurity risks for SMBs

5 Critical corporate cybersecurity risks for SMBs

Estimated reading time: 3 minutes

A major issue which plagues small and medium businesses (SMBs) when it comes to cybersecurity is their own perception. Often, SMBs suffer from a notion that they are not as important, that they do need to worry about fixing...
Read Blog
May 21, 2018

Wake up call: Right time to secure your online data

Wake up call: Right time to secure your online data

Estimated reading time: 3 minutes

First things first, there really is never a good time to secure the online data of your business. Any business with a cybersecurity-first mindset should have done it long, long ago. But in case, a business needs a strong...
Read Blog
May 14, 2018
9
Shares

The Human Factor: Keeping Your Cybersecurity Defence Strong and Secure

The Human Factor: Keeping Your Cybersecurity Defence Strong and Secure

Estimated reading time: 3 minutes

Technology is definitely getting hi-tech. But one thing which still remains decidedly rooted is plain and simple human frailty. And in the cybersecurity-obsessed war that organizations and individuals are fighting on a day-to-day basis, human errors can often prove...
Read Blog
May 2, 2018
8
Shares

Here’s the checklist of an efficient endpoint security solution

Here’s the checklist of an efficient endpoint security solution

Estimated reading time: 3 minutes

For any organization, big or small, endpoint security acts as a frontline against cyber attacks. Ultimately, endpoints refer to every device that is connected to the enterprise network. Most attacks on an organization can be traced back to devices...
Read Blog
April 25, 2018
4
Shares

Key Vulnerabilities in SMBs: Devices and People

Key Vulnerabilities in SMBs: Devices and People

Estimated reading time: 3 minutes

Small and medium-sized businesses (SMB) have to walk a tightrope when it comes to cybersecurity. On one hand, unlike the big business enterprises, they may not always have the financial heft to really invest in cybersecurity solutions, which often...
Read Blog
April 19, 2018
5
Shares

Hackers love organizations of all sizes

Hackers love organizations of all sizes

Estimated reading time: 3 minutes

Hacking is the unauthorized entry into a computer or network with the individuals engaged in these activities referred to as hackers. Hackers alter system or security software and/or hardware of the computer or network to accomplish a goal that...
Read Blog
March 15, 2018
14
Shares

Found new vulnerabilities: What’s next?

Found new vulnerabilities: What’s next?

Estimated reading time: 2 minutes

A big headache which all network administrators have is the vulnerability status of their business. With more and more business being conducted online, every organization has an online presence and network. Popular software attracts the attention of malicious criminals...
Read Blog
March 14, 2018
6
Shares

How to manage patches in mixed OS environments

How to manage patches in mixed OS environments

Estimated reading time: 3 minutes

The importance of patch management in today’s cybersecurity environment cannot be understated by organizations today. The world of cyber threats is a rapidly evolving and dynamic one. Hackers are hard at work at every hour and at every minute...
Read Blog
March 9, 2018
← Previous 1 … 3 4 5 … 11 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies