• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: endpoint security

Cybersecurity tips for retailers and consumers

Cybersecurity tips for retailers and consumers

Estimated reading time: 4 minutes

The holiday season has arrived, and it is high time that consumers and retailers make arrangements for staying one step ahead of the prevalent holiday scams. With trouble lurking in the shadows due to multiple spikes in spending habits,...
Read Blog
December 22, 2017

Lessons security professionals should learn from the year 2017

Lessons security professionals should learn from the year 2017

Estimated reading time: 4 minutes

2017 has been a year of several high-profile cyber-attacks with an excruciatingly large number of breaches originating from third-party software modules and compromised accounts. With hackers constantly trying to gain access to confidential data sets, it is important to...
Read Blog
December 20, 2017

Understanding the importance of Web Content Filtering

Understanding the importance of Web Content Filtering

Estimated reading time: 2 minutes

The underlining concept of web content filtering has evolved over the years. While it started with SMEs blocking select websites and restricting access, the current set of technologies relies heavily on overall security, legal repercussions, and productivity. Previously, the...
Read Blog
December 14, 2017

Why you need advanced information security technologies?

Why you need advanced information security technologies?

Estimated reading time: 3 minutes

Cybersecurity threats have evolved over the years, compelling industries to focus on advanced technologies that are in line with the innovative threat vectors. That said, enterprises are committed towards improving the security posture of their IT systems and in...
Read Blog
November 28, 2017

Cybersecurity and Compliance requirements: Part 1

Cybersecurity and Compliance requirements: Part 1

Estimated reading time: 3 minutes

Compliance, in the simplest possible terms, refers to integrating certain industrial standards based on specific requirements. While regulatory compliance can easily impose additional costs to the IT networks and security systems, the costs and repercussions for not complying with...
Read Blog
November 24, 2017
3
Shares

Reasons to consider managed security services

Reasons to consider managed security services

Estimated reading time: 3 minutes

Dealing with the existing cyber threat landscape requires not just a state of the art security tool but also skill and technological expertise to manage the overall organizational security. It is here that managed security services come as a...
Read Blog
November 21, 2017

Why should companies invest in evolving cybersecurity technology?

Why should companies invest in evolving cybersecurity technology?

Estimated reading time: 3 minutes

With the cyber-threat landscape evolving with time, we are continually witnessing newer strains of malware attacking IT security networks. Needless to say, organizations are losing their ground, and it’s time they address the issues at hand by innovating the...
Read Blog
November 16, 2017

Remember the security basics as your cybersecurity strategy evolves

Remember the security basics as your cybersecurity strategy evolves

Estimated reading time: 3 minutes

Most cybersecurity strategies thrive on advanced technologies when it comes to mitigating complex threats. In the meanwhile, CISOs and the concerned IT heads tend to ignore the basic precautions and security standards required for preventing data breaches. Although technological...
Read Blog
November 15, 2017

Vulnerabilities are unavoidable: Here are the top 5 commandments of Vulnerability Scan

Vulnerabilities are unavoidable: Here are the top 5 commandments of Vulnerability Scan

Estimated reading time: 3 minutes

Organizations using software modules are more likely to get affected by intruders and unsolicited access. Moreover, if the software is popular, there are additional chances that the connected services and written codes might attract hackers and malicious parties. Security...
Read Blog
November 14, 2017

Deploying Endpoint Security: Key factors to consider

Deploying Endpoint Security: Key factors to consider

Estimated reading time: 2 minutes

Endpoint security is the front line in the fight against cyber attacks. Most of the attacks on organizations can be traced to a source that is external to the network i.e. the attack originates from something connected to the enterprise network. Which...
Read Blog
November 10, 2017
← Previous 1 … 7 8 9 … 12 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (23) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (14) Cybersecurity (329) cyber security (34) Cyber threat (33) cyber threats (48) data breach (56) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (112) Enterprise security (18) Exploit (14) firewall (11) GDPR (13) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (23) Patch Management (12) phishing (29) Ransomware (68) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (36) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies