• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: malware

2020: A new paradigm in Cybersecurity

2020: A new paradigm in Cybersecurity

Estimated reading time: 3 minutes

As we enter a new decade, it is important to look back and learn from the decade that is about to end. From 2010 to 2019, cybersecurity moved at a furious pace. Threats erupted in multiple new vectors, spreading...
Read Blog
October 7, 2019

Effective methods for enterprises to detect and prevent network intrusions

Effective methods for enterprises to detect and prevent network intrusions

Estimated reading time: 2 minutes

Enterprise networks are susceptible to brutal intrusions – some of these intrusions could be in the form of systems on the network running unauthorized applications with vulnerabilities and backdoors. When such vulnerabilities are exploited, unsolicited access to the network...
Read Blog
October 4, 2019

Five questions every CEO should be asking about cybersecurity

Five questions every CEO should be asking about cybersecurity

Estimated reading time: 3 minutes

As the captain of the ship, the Chief Executive Officer (CEO) plays a very important role in how an enterprise addresses cybersecurity issues and concerns. When the CEO provides a buy-in towards making enterprise security safer, it trickles down...
Read Blog
October 1, 2019

Investing in Enterprise security is a necessity, not a luxury

Investing in Enterprise security is a necessity, not a luxury

Estimated reading time: 3 minutes

In the current ‘digital-first’ environment that organizations and businesses operate nowadays, success and failure can often depend on enterprise security solutions. Businesses operate in an environment where the threats from the digital sphere can often outweigh the threats from...
Read Blog
September 25, 2019

Eight great habits that enterprises can practice for bolstering cybersecurity

Eight great habits that enterprises can practice for bolstering cybersecurity

Estimated reading time: 3 minutes

Efficient cybersecurity is built on the foundation of good habits practised by internal customers. Enterprises may think a great deal about implementing effective cybersecurity practices and have plenty of meetings, but it’s actually not that complicated. An effective framework...
Read Blog
September 19, 2019

The banking sector’s top cybersecurity challenges

The banking sector’s top cybersecurity challenges

Estimated reading time: 2 minutes

While most industries around the world are affected by the looming danger of cyber threats, the banking sector has always been the worst hit. Naturally, this brings upon considerable damages due to the very environment that the banking sector...
Read Blog
September 10, 2019

The Information Technology industry’s major cybersecurity challenges

The Information Technology  industry’s major cybersecurity challenges

Estimated reading time: 3 minutes

The Information Technology (IT) sector has snowballed into an extremely profitable and revenue-generating entity in a relatively small amount of time. IT is single-handedly responsible to initiate and implement digitalization ensuring that a very large amount of information gets...
Read Blog
September 3, 2019

The retail industry’s major cybersecurity challenges

The retail industry’s major cybersecurity challenges

Estimated reading time: 3 minutes

The retail sector has always been at the risk of cyberattacks. The industry has already seen high-profile data breaches, some of which have happened in the recent past at large retail brands, lucrative to cyberattackers, such as Target, TJX...
Read Blog
August 27, 2019

Enterprises can begin securing their endpoints by following these five simple steps.

Enterprises can begin securing their endpoints by following these five simple steps.

Estimated reading time: 3 minutes

Sustainable enterprise security is both a great practice and a core business process. Enterprises are increasingly becoming aware of the diverse & intense nature of threats that exist in cybersphere and the damage it can cause – that’s where...
Read Blog
August 1, 2019

How to strike the correct balance between enterprise security and employee productivity?

How to strike the correct balance between enterprise security and employee productivity?

Estimated reading time: 3 minutes

When it comes to enterprise security, companies are always trying to hit the right spot. The problem is that enterprises require employees to be at their productive best – that is, after all, what they are hired for and...
Read Blog
July 23, 2019
← Previous 1 … 4 5 6 … 8 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies