• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: ransomware protection

How To Prevent Remote Ransomware: The Easy Way

How To Prevent Remote Ransomware: The Easy Way

Estimated reading time: 4 minutes

Ransomware attacks today have become increasingly prevalent and sophisticated. One such alarming trend is the surge in remote ransomware attacks, also known as malicious remote encryption. This attack vector involves using compromised endpoints to encrypt data on other devices...
Read Blog
January 9, 2024

Securing Your Endpoint in the Age of Ransomware Attacks

Securing Your Endpoint in the Age of Ransomware Attacks

Estimated reading time: 3 minutes

Last year we saw two high-profile ransomware attacks strike within a few weeks of each other, affecting more than a quarter million machines worldwide and causing major disruptions. With the adoption of the Eurocard/Mastercard/Visa payment standard increasing, credit card...
Read Blog
February 26, 2018

Become a leader in creating cyber trust with Seqrite Endpoint Security

Become a leader in creating cyber trust with Seqrite Endpoint Security

Estimated reading time: 3 minutes

Enterprises, big and small, all over the world, are waking up to the importance of garnering cyber trust. In a digital age where technology only breaches new frontiers, cyber trust has become a key differentiator. Security breaches are not...
Read Blog
January 24, 2018
17
Shares

Endpoint Security: Things to consider before choosing the right one

Endpoint Security: Things to consider before choosing the right one

Estimated reading time: 3 minutes

The term endpoint security refers to protecting endpoints such as desktops and laptops connected to the enterprise network. Endpoint security happens to be the front line in the battle against cyber-attacks because every device that connects to a corporate network...
Read Blog
January 18, 2018

Gateway protection: Next-Gen security solution

Gateway protection: Next-Gen security solution

Estimated reading time: 3 minutes

Cyberworld has become a jungle full of dangerous beasts. There are so many threats out there that it requires a large and dedicated set of professionals with state of the art equipment to protect the organization against all of...
Read Blog
September 29, 2017

Encryption: Improve information security by turning it into codes

Encryption: Improve information security by turning it into codes

Estimated reading time: 3 minutes

Today the economy is all about data. All  the business financial information, customer information, Intellectual property information, and all other information about the business is stored in digital format. All this information is data. In a pre-digital era, the data was in physical...
Read Blog
September 28, 2017

5 Best practices to prevent ransomware and safeguard your data

5 Best practices to prevent ransomware and safeguard your data

Estimated reading time: 3 minutes

Malware, including ransomware, viruses, trojans are a grave threat to organizations. Out of these, ransomware is unique. Not only does it steal and corrupt data, but it also locks out the users from their own systems so that taking...
Read Blog
September 26, 2017

Healthcare: Cybersecurity risks with vendors

Healthcare: Cybersecurity risks with vendors

Estimated reading time: 3 minutes

There has been a surge in cyber attacks in the healthcare industry. Ransomware attacks have increased across all sectors, but healthcare industry is particularly vulnerable to such attacks. Getting locked out of systems while handling critical patient data or operational...
Read Blog
September 6, 2017

Why your startup needs dedicated security solutions?

Why your startup needs dedicated security solutions?

Estimated reading time: 3 minutes

Startups usually have a lot on their plate when it comes to managing finances and security solutions. However, more often than not, the budding entrepreneurs fall short of resources needed for hiring the concerned workforce. While some resort to...
Read Blog
August 31, 2017

Setting up a business? Secure it with Seqrite EPS

Setting up a business? Secure it with Seqrite EPS

Estimated reading time: 3 minutes

Starting a new business is an exciting and stressful period in anyone’s life.  The systems, the processes, the people- everything is new, and getting it all to work together can be really a nerve-wracking experience. Further, a startup always...
Read Blog
August 22, 2017
1 2 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies