• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: Network security

Three key verticals for securing your network

Three key verticals for securing your network

Estimated reading time: 3 minutes

Increase in the number of organized and targeted attacks and the ever-expanding attack surface for cyber threats have made security a major discussion point across the IT landscape in recent years. With technological advancements like the cloud, IoT, and...
Read Blog
March 1, 2018

What not to do if your business is the victim of a cyber attack

What not to do if your business is the victim of a cyber attack

Estimated reading time: 3 minutes

It is not a situation any network administrator ever wants to be in. Yet, considering the multitude of attacks nowadays, the possibility of being in such a situation is getting more and more likely. The last year has shown...
Read Blog
February 28, 2018
7
Shares

Benefits of having Intrusion Prevention/Detection System in your enterprise

Benefits of having Intrusion Prevention/Detection System in your enterprise

Estimated reading time: 3 minutes

Networks have been in existence for a very long time and are indeed a boon as it has brought people and the world closer to each other. With the networks, the threat of intrusion of these networks became a...
Read Blog
February 15, 2018

Multi-Factor Authentication: Everything you need to Know

Multi-Factor Authentication: Everything you need to Know

Estimated reading time: 3 minutes

It wouldn’t be wrong to assume that login credentials and other confidential user-specific insights are the most frequently compromised data sets, extensively targeted by the malicious parties. Since 2017 witnessed hackers breaching 711 million users records; thereby accessing around...
Read Blog
February 5, 2018
5
Shares

Importance of user authentication in network security

Importance of user authentication in network security

Estimated reading time: 3 minutes

Authentication can easily be termed as the foundation of any eBusiness. With companies expanding their audience-base, it becomes important that they concentrate on user-authentication for validating and securing their identity. Reliable authentication also lays the foundation for asset and...
Read Blog
January 11, 2018

Multi-layered approach is the key towards cybersecurity

Multi-layered approach is the key towards cybersecurity

Estimated reading time: 3 minutes

With the cybersecurity threat-landscape evolving with each passing day, it becomes important that organizations opt for newer and safer strategies for staying functional without worrying about cyber-threats. Moreover, organizations must readily focus on cybersecurity while keeping a track of...
Read Blog
January 9, 2018
5
Shares

5 Ways UTM can help you secure your business network

5 Ways UTM can help you secure your business network

Estimated reading time: 3 minutes

Consolidating the network security with Unified Threat Management solution is essential due to the uninhibited growth of cyber-threats. Moreover, it isn’t surprising to know that the deadliest of cyber-attacks are caused by the negligence of the employees rather than...
Read Blog
December 28, 2017
10
Shares

Key features to consider for a Unified Threat Management solution

Key features to consider for a Unified Threat Management solution

Estimated reading time: 3 minutes

Before zeroing in on the perfect Unified Threat Management (UTM) solution, it is important to look at the nooks and crannies of network infrastructure and analyze the efficacy of a UTM service module. A UTM appliance cumulates multiple security...
Read Blog
December 26, 2017
5
Shares

Understanding the importance of Web Content Filtering

Understanding the importance of Web Content Filtering

Estimated reading time: 2 minutes

The underlining concept of web content filtering has evolved over the years. While it started with SMEs blocking select websites and restricting access, the current set of technologies relies heavily on overall security, legal repercussions, and productivity. Previously, the...
Read Blog
December 14, 2017

Understanding data encryption in network security

Understanding data encryption in network security

Estimated reading time: 3 minutes

Information Security is a big concern today for CISOs and administrators everywhere. The information in question could be the company’s own information, or it could be that pertaining to its customers. In either case, protecting the information, preventing it...
Read Blog
August 14, 2017
← Previous 1 2 3 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies