• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

security Archive

Introducing Seqrite HawkkEye – A Centralized Security Solution For The Digital Age

Introducing Seqrite HawkkEye – A Centralized Security Solution For The Digital Age

Estimated reading time: 2 minutes

The evolution of the Work From Anywhere model has led to a highly distributed workforce with a proliferation of devices that are both BYOD and corporate-owned. This proliferation has resulted in an expansion of an enterprise’s attack surface, due...
Read More
June 25, 2021

Seqrite Endpoint Security Supports Windows 10 May 2021 Update 21H1

Seqrite Endpoint Security Supports Windows 10 May 2021 Update 21H1

Estimated reading time: 1 minute

Microsoft has recently come up with a new update for Windows 10 PCs, called Windows 10 May 2021 Update (version 21H1). This post lists some of the highlights of this update and sees how Seqrite Endpoint Security is compatible...
Read More
May 19, 2021

Why ensuring employees with cyber hygiene is important for all organizations?

Why ensuring employees with cyber hygiene is important for all organizations?

Estimated reading time: 2 minutes

Current times have witnessed a large percentage of cyber breaches resulting from human errors. For example, the famous WannaCry ransomware attack that affected the entire world in 2017 increased due to negligence of security teams in ensuring  if the...
Read More
May 12, 2021

Leveraging security analytics to bolster enterprise cybersecurity

Leveraging security analytics to bolster enterprise cybersecurity

Estimated reading time: 2 minutes

Without data, you’re just another person with an opinion” – W. Edwards Deming Widely used across different industries, security analytics is slowly making its way into the domain of cybersecurity — courtesy to this industry’s rising awareness about the...
Read More
December 4, 2019

Renewed interests in excelling Security Operation Centres?

Renewed interests in excelling Security Operation Centres?

Estimated reading time: 2 minutes

According to Gartner’s Top 7 Security and Risk Trends 2019 report, a renewed interest towards excelling Security Operation Centres (SOCs) has been considered as among the top two new trends of the year. The evolution of the Security Operations...
Read More
November 1, 2019

What are some of the worst enterprise security habits?

What are some of the worst enterprise security habits?

Estimated reading time: 3 minutes

Enterprise security is a habit! Good habits take years to form – bad habits, on the other hand, take only seconds, and can bring years of hard work taken down in minutes. The same rule applies to enterprise security...
Read More
July 26, 2019

The Cyber Threat Landscape 2017

The Cyber Threat Landscape 2017

Estimated reading time: 3 minutes

Cyber threats are multiplying at an uncontrollable rate and 2017 hasn’t been any different. While global damages, concerning cybersecurity, are expected to surpass $5 billion by the end of this year, the actual predicament is the supposed yearly growth which...
Read More
December 4, 2017
  • 2
    Shares

Pillars of enterprise data protection: A proactive approach

Pillars of enterprise data protection: A proactive approach

Estimated reading time: 3 minutes

Modern day data security and protection requirements aren’t only about integrity, confidentiality, and availability. Instead, security professionals must take a proactive approach for improving business value and addressing organizational security. However, talking about proactivity isn’t going to make much...
Read More
November 27, 2017

Why your company’s server & network needs to be secure?

Why your company’s server & network needs to be secure?

Estimated reading time: 4 minutes

The continuous availability of a company’s server and protection of data stored in it is crucial for smooth operations of the business. Servers often store critical information regarding products, pricing, support, contacts, etc. which are not only essential for...
Read More
July 18, 2017

Is your Remote Desktop System safe from Bruteforce attacks?

Estimated reading time: 3 minutes

As we have explained in the previous Troldesh ransomawre blog, Cyber criminals are now spreading and infecting ransomware by gaining access to computers through Remote Desktop. Remote access to the victim’s computer is gained by using brute-force techniques which...
Read More
October 18, 2016
2
Popular Posts
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • Uncovering LockBit Black’s Attack Chain and Anti-forensic activity Uncovering LockBit Black’s Attack Chain and Anti-forensic activity February 1, 2023
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..
  • Jayesh Kulkarni
    Jayesh Kulkarni

    Jayesh is working as a Security Researcher for a couple of years. He likes to...

    Read more..
Stay Updated!
Topics
apt (11) Cyber-attack (32) cyber-attacks (56) cyberattack (11) cyberattacks (12) Cybersecurity (301) cyber security (26) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (103) Enterprise security (15) EPS (10) Exploit (12) firewall (11) hackers (11) IoT (10) malware (64) malware attack (23) malware attacks (12) MDM (25) Microsoft (14) Network security (18) Patch Management (12) phishing (18) Ransomware (60) ransomware attack (29) ransomware attacks (30) ransomware protection (12) security (10) Seqrite (26) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (15) windows (11)
Products
  • Seqrite MSSP Portal
  • HawkkScan
  • HawkkProtect
  • HawkkHunt XDR
  • HawkkEye
  • HawkkEye Endpoint Security Cloud
  • HawkkEye mSuite
  • HawkkEye Workspace
  • Endpoint Security (EPS)
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category

© 2022 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.