• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: Enterprise security

Security scorecard: How much does your organization score?

Security scorecard: How much does your organization score?

Estimated reading time: 3 minutes

An organization spends significant amount of money and effort on implementing cybersecurity yet it can be breached. In such situations, how does an organization identify if it had taken enough measures to protect itself before the breach occurred? This is where a security...
Read Blog
September 21, 2017

Use CAA DNS records for SSL Certificate and minimize cyber threats

Use CAA DNS records for SSL Certificate and minimize cyber threats

Estimated reading time: 3 minutes

SSL or Secure Sockets Layer (commonly referred as HTTPS) has now become a necessity for protecting your websites whether it is handling any sensitive information or not. An organization needs to install SSL certificate, issued by a Certificate Authority...
Read Blog
September 21, 2017

Facts we bet you didn’t know about enterprise security

Facts we bet you didn’t know about enterprise security

Estimated reading time: < 1 minute

1. Mobile will continue to rise as a point of entry for hackers. Seqrite Mobile Device Management allows enterprises to grant their employees the privilege of mobile productivity without boundaries. Know more: https://bit.ly/2mSlXDI 2. Employees’ mobile devices are already causing costly...
Read Blog
March 17, 2017

Why should cybersecurity be a part of your Financial Budget?

Why should cybersecurity be a part of your Financial Budget?

Estimated reading time: 2 minutes

Organizations across the world that experienced a cyberattack have suffered huge revenue losses. Cybersecurity is a business priority and it is important that the C-suite must understand the importance of enterprise security and fund it appropriately. No enterprise, big...
Read Blog
February 13, 2017

Spear Phishing: What is it and how it can affect your business security

Spear Phishing: What is it and how it can affect your business security

Estimated reading time: 3 minutes

What is Spear Phishing? Spear phishing is a variation of a phishing scam wherein hackers send a targeted email to an individual which appears to be from a trusted source. The agenda of these mails like any other cyber...
Read Blog
January 16, 2017

5 Essential Security Tips for Startups

5 Essential Security Tips for Startups

Estimated reading time: < 1 minute

If you are planning to launch a startup business which essentially requires customers’ data for its development and sustainability, then IT security should be on your list of priorities. There is no denying to that fact that, investing in...
Read Blog
January 29, 2016

How Vulnerable is your Small and Medium-sized Business?

How Vulnerable is your Small and Medium-sized Business?

Estimated reading time: 4 minutes

Are you aware that the best targets for hackers and malware authors around the world are small and medium sized businesses? The reasons for this are aplenty, but the most crucial cause of this is that smaller businesses have...
Read Blog
January 29, 2016
← Previous 1 2
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies