• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: endpoint security

Top 3 cybersecurity risks every HR chief should care about

Top 3 cybersecurity risks every HR chief should care about

Estimated reading time: 3 minutes

Cybersecurity isn’t just an IT department’s job anymore. The varied and vast nature of security threats nowadays mean that the days when “cybersecurity” was just a buzzword thrown around by technology department and network administrators were the only ones...
Read Blog
February 20, 2018
76
Shares
1

Benefits of having Intrusion Prevention/Detection System in your enterprise

Benefits of having Intrusion Prevention/Detection System in your enterprise

Estimated reading time: 3 minutes

Networks have been in existence for a very long time and are indeed a boon as it has brought people and the world closer to each other. With the networks, the threat of intrusion of these networks became a...
Read Blog
February 15, 2018

Why you should never pay ransom to hackers

Why you should never pay ransom to hackers

Estimated reading time: 3 minutes

Since WannaCry swept the world in 2017, ransomware has become a network administrator’s worst nightmare. It’s not without any reason: the devastating WannaCry ransomware attack affected more than 200,000 computers across 150 countries with huge damages. Other notable ransomware attacks...
Read Blog
February 8, 2018
7
Shares

Cryptomining Malware: The New Favorite of Hackers

Cryptomining Malware: The New Favorite of Hackers

Estimated reading time: 3 minutes

Ransomware threats have long been plaguing the online space and are usually considered to be extremely disruptive in nature. Unlike other malware threats which keep a low profile, ransomware attacks announce themselves before crippling a system for diverse benefits....
Read Blog
February 7, 2018
4
Shares

Multi-Factor Authentication: Everything you need to Know

Multi-Factor Authentication: Everything you need to Know

Estimated reading time: 3 minutes

It wouldn’t be wrong to assume that login credentials and other confidential user-specific insights are the most frequently compromised data sets, extensively targeted by the malicious parties. Since 2017 witnessed hackers breaching 711 million users records; thereby accessing around...
Read Blog
February 5, 2018
5
Shares

Machine learning approach for advanced threat hunting

Machine learning approach for advanced threat hunting

Estimated reading time: 6 minutes

In today’s fast-changing world, the cyber threat landscape is getting increasingly complex and signature-based systems are falling behind to protect endpoints. All major security solutions are built with layered security models to protect endpoints from today’s advanced threats. Machine...
Read Blog
February 2, 2018
5
Shares

How to defend your network against DDoS attacks?

How to defend your network against DDoS attacks?

Estimated reading time: 3 minutes

When it comes to enlisting the most unrecognizable forms of cyber-attacks, Distributed Denial of Service (DDoS) features on top of the pecking order. While DDoS attacks started off as simple and volumetric threats for creating disruptions, they have amplified...
Read Blog
January 31, 2018

Cybersecurity: How to approach a broader perspective at the board level

Cybersecurity: How to approach a broader perspective at the board level

Estimated reading time: 3 minutes

The dangers that cyber threats pose have never been as apparent as now. High-profile organizations have been at the receiving end, there has been both reputational and financial damage and brand equity has been hit. One thing is clear:...
Read Blog
January 30, 2018
9
Shares

Cyber Vulnerability: Where do you stand?

Cyber Vulnerability: Where do you stand?

Estimated reading time: 2 minutes

Cyber-attacks have become household commonplaces, and the threats are increasing at an uncontrollable pace. According to threat reports released by leading security service providers, there has been a massive rise in the frequency of zero-day threats with vulnerabilities almost...
Read Blog
January 25, 2018

Become a leader in creating cyber trust with Seqrite Endpoint Security

Become a leader in creating cyber trust with Seqrite Endpoint Security

Estimated reading time: 3 minutes

Enterprises, big and small, all over the world, are waking up to the importance of garnering cyber trust. In a digital age where technology only breaches new frontiers, cyber trust has become a key differentiator. Security breaches are not...
Read Blog
January 24, 2018
17
Shares
← Previous 1 … 5 6 7 … 11 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (23) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (14) Cybersecurity (328) cyber security (34) Cyber threat (33) cyber threats (48) data breach (56) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (110) Enterprise security (17) Exploit (14) firewall (11) GDPR (13) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (23) Patch Management (12) phishing (27) Ransomware (68) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies