• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite

Enterprise security Archive

Hackers are breaking into the enterprise through content collaboration platforms CCPs

CCPs are becoming soft targets for enterprise malware attacks.

Estimated reading time: 4 minutes

Globally, as enterprises gather and integrate optimum avenues to secure their information technology infrastructure from cyber threats, somehow, hackers are still managing to find a way to break-in. Cybersecurity vigilance has driven business stakeholders to secure core networks with...
Read More
July 17, 2019

Email could be one of the simplest ways for hackers to breach your organization

Email could be one of the simplest ways for hackers to breach your organization

Estimated reading time: 3 minutes

What is common between Sarah Palin, George HW Bush, and John Podesta? Apart from being important political figures in the United States, there’s another fact that unites them – they’ve all been victims of messy email hacks. Sometimes, danger...
Read More
July 9, 2019

New Product Launch: Seqrite Secure Web Gateway

SWG

Estimated reading time: 3 minutes

More and more organizations are opting for a secure web gateway solution as the next step up from conventional security solutions. Secure web gateways prevent unsecured traffic from entering an organization’s internal network and prevent employees/users from accessing or...
Read More
July 18, 2018
1

Poor network visibility: Don’t put your enterprise’s security at risk

network visbility

Estimated reading time: 3 minutes

This is a world that is connected. Whether is the Internet of Things (IoT) or BYOD (Bring Your Own Device), enterprise networks do not exist in silos anymore. The number of devices that connect to enterprise networks is exponentially...
Read More
May 9, 2018
  • 5
    Shares

Top 5 questions SMBs should ask potential service providers

Estimated reading time: 3 minutes

SMBs are increasingly evaluating security vendors on the basis of their endpoint encryption services and other related features. While managed security services are mostly outsourced, a better part of an organization’s security posture depends on how the endpoints are...
Read More
March 13, 2018

Remember the security basics as your cybersecurity strategy evolves

Estimated reading time: 3 minutes

Most cybersecurity strategies thrive on advanced technologies when it comes to mitigating complex threats. In the meanwhile, CISOs and the concerned IT heads tend to ignore the basic precautions and security standards required for preventing data breaches. Although technological...
Read More
November 15, 2017

Why we need to focus on protecting enterprise devices?

Estimated reading time: 3 minutes

Mobility is a widely-adopted approach that comes as a blessing for organizational growth but builds up as a headache for the IT security pros. While mobility can help enterprises reduce service costs and improve user experience by concentrating more...
Read More
October 23, 2017

Security scorecard: How much does your organization score?

Security Score Card

Estimated reading time: 3 minutes

An organization spends significant amount of money and effort on implementing cybersecurity yet it can be breached. In such situations, how does an organization identify if it had taken enough measures to protect itself before the breach occurred? This is where a security...
Read More
September 21, 2017

Use CAA DNS records for SSL Certificate and minimize cyber threats

Estimated reading time: 3 minutes

SSL or Secure Sockets Layer (commonly referred as HTTPS) has now become a necessity for protecting your websites whether it is handling any sensitive information or not. An organization needs to install SSL certificate, issued by a Certificate Authority...
Read More
September 21, 2017

Facts we bet you didn’t know about enterprise security

Estimated reading time: 1 minute

1. Mobile will continue to rise as a point of entry for hackers. Seqrite Mobile Device Management allows enterprises to grant their employees the privilege of mobile productivity without boundaries. Know more: http://bit.ly/2mSlXDI 2. Employees’ mobile devices are already causing costly...
Read More
March 17, 2017
1 2 Next →

Popular Posts

  • RAT used by Chinese cyberspies infiltrating Indian businesses RAT used by Chinese cyberspies infiltrating Indian businesses December 18, 2020
  • How can EdTech companies deal with rising security challenges? How can EdTech companies deal with rising security challenges? December 24, 2020
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • BEC and Ransomware attacks increase during the pandemic

    BEC and Ransomware attacks increase during the pandemic

    January 22, 2021
  • Are we prepared against risks generating from the IoT revolution?

    Are we prepared against risks generating from the IoT revolution?

    January 15, 2021
  • Proactiveness is the key to resolving hybrid cloud’s security challenges

    Proactiveness is the key to resolving hybrid cloud’s security challenges

    January 6, 2021

Stay Updated!

Topics

Antivirus For Linux (10) Antivirus For Server (9) BYOD (9) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (275) cyber security (25) Cyber threat (29) cyber threats (44) Data (10) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) incident response plan (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (55) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.