• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: endpoint security

What is the right time to audit your cybersecurity program?

What is the right time to audit your cybersecurity program?

Estimated reading time: 4 minutes

In November 2017, Forever 21, a Los Angeles based clothing retailer, announced that a potential data breach might have affected some of its customers. On investigating, they found that the “encryption and tokenization solution” implemented in 2015 might not...
Read Blog
January 23, 2018
14
Shares

Endpoint Security: Things to consider before choosing the right one

Endpoint Security: Things to consider before choosing the right one

Estimated reading time: 3 minutes

The term endpoint security refers to protecting endpoints such as desktops and laptops connected to the enterprise network. Endpoint security happens to be the front line in the battle against cyber-attacks because every device that connects to a corporate network...
Read Blog
January 18, 2018

What is Disaster Recovery as a Service (DRaaS)?

What is Disaster Recovery as a Service (DRaaS)?

Estimated reading time: 3 minutes

Disasters, whether they are natural or man-made, can strike anytime without any kind of due notice. Any business, small or big, will need to anticipate the possibility of such disasters and have a plan in place. While one tactic...
Read Blog
January 17, 2018
12
Shares

6 Hidden IT risks in 2018

6 Hidden IT risks in 2018

Estimated reading time: 3 minutes

Dangers can often lie within. This is an information age where data is gold and in this day and age, no matter what business you are in, your Information Technology department is often your greatest asset. 2017, the year...
Read Blog
January 12, 2018
15
Shares

Multi-layered approach is the key towards cybersecurity

Multi-layered approach is the key towards cybersecurity

Estimated reading time: 3 minutes

With the cybersecurity threat-landscape evolving with each passing day, it becomes important that organizations opt for newer and safer strategies for staying functional without worrying about cyber-threats. Moreover, organizations must readily focus on cybersecurity while keeping a track of...
Read Blog
January 9, 2018
5
Shares

7 Major causes of data breaches

7 Major causes of data breaches

Estimated reading time: 3 minutes

The growing threat of data breaches globally has kept businesses on their toes. They occur when important proprietary, sensitive or confidential information is accessed or disclosed in an unauthorized faction. Data breaches can have a deep-lasting effect on a...
Read Blog
January 8, 2018
4
Shares

How consumers see privacy and cyber risks?

How consumers see privacy and cyber risks?

Estimated reading time: 3 minutes

There is a general perception that modern-day consumers, while being savvy on all digital and social media platforms, don’t give a lot of thought to internet security. As it turns out though, that is just a perception. The reality...
Read Blog
January 5, 2018
3
Shares

Essential policies to rescue your organization from advanced cyber threats

Essential policies to rescue your organization from advanced cyber threats

Estimated reading time: 3 minutes

Organizations need to spend a lot of time thinking about the network security measures as even a single security breach can inflict a lot of damage on the enterprises. It is important to revisit the existing security strategies or...
Read Blog
December 27, 2017
10
Shares

Cybersecurity tips for retailers and consumers

Cybersecurity tips for retailers and consumers

Estimated reading time: 4 minutes

The holiday season has arrived, and it is high time that consumers and retailers make arrangements for staying one step ahead of the prevalent holiday scams. With trouble lurking in the shadows due to multiple spikes in spending habits,...
Read Blog
December 22, 2017

Lessons security professionals should learn from the year 2017

Lessons security professionals should learn from the year 2017

Estimated reading time: 4 minutes

2017 has been a year of several high-profile cyber-attacks with an excruciatingly large number of breaches originating from third-party software modules and compromised accounts. With hackers constantly trying to gain access to confidential data sets, it is important to...
Read Blog
December 20, 2017
← Previous 1 … 6 7 8 … 11 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (23) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (14) Cybersecurity (328) cyber security (34) Cyber threat (33) cyber threats (48) data breach (56) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (110) Enterprise security (17) Exploit (14) firewall (11) GDPR (13) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (23) Patch Management (12) phishing (27) Ransomware (68) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies