• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: Seqrite EPS

Here’s the checklist of an efficient endpoint security solution

Here’s the checklist of an efficient endpoint security solution

Estimated reading time: 3 minutes

For any organization, big or small, endpoint security acts as a frontline against cyber attacks. Ultimately, endpoints refer to every device that is connected to the enterprise network. Most attacks on an organization can be traced back to devices...
Read Blog
April 25, 2018
4
Shares

How ready are you for the evolution of ransomware?

How ready are you for the evolution of ransomware?

Estimated reading time: 3 minutes

Thanks to the widespread coverage that the WannaCry and the Petya attacks received in 2017, ransomware is no longer an unknown or misunderstood terms, especially for those whose work revolves around handling cybersecurity. In fact, ransomware – which basically refers to...
Read Blog
March 23, 2018
13
Shares

Will GDPR impact your business?

Will GDPR impact your business?

Estimated reading time: 3 minutes

May, 25, 2018. Mark the date. This is when the much-discussed General Data Protection Regulation (GDPR) will come into effect. A significant, wide-ranging piece of legislation which will, no doubt, have a major effect on the world of cybersecurity...
Read Blog
February 22, 2018
17
Shares

Double Whammy: What happens when one cyber-attack hides under another attack?

Double Whammy: What happens when one cyber-attack hides under another attack?

Estimated reading time: 3 minutes

When it comes to handling the cybersecurity threats, enterprises often concentrate on addressing standalone vulnerabilities and security incidents. Organizations believe that mitigating individual threats can keep catastrophic attacks at bay but the modern threat landscape is way more sophisticated than...
Read Blog
December 21, 2017
4
Shares

Know what insider threats are hiding in your network

Know what insider threats are hiding in your network

Estimated reading time: 3 minutes

The recent lawsuit filed against Anthony Levandowski of Uber signifies how terrible insider threats can be and what effects they can have on the confidential data sets. The lawsuit was filed by Alphabet which accused Levandowski of stealing more than...
Read Blog
December 18, 2017

Cybersecurity and Compliance requirements: Part 2

Cybersecurity and Compliance requirements: Part 2

Estimated reading time: 3 minutes

Cybersecurity compliance is slowly turning out to be an inseparable part of the existing IT networks with the majority of organizations concentrating on meeting the imposed regulatory standards. The last few years have witnessed a major rise in the...
Read Blog
December 15, 2017

How third-party risks are becoming a rising threat to the organization?

How third-party risks are becoming a rising threat to the organization?

Estimated reading time: 3 minutes

These days, businesses are reliant on third-party vendors who give them end-to-end support in every aspect. These third parties can easily access all the sensitive and confidential information of the client. In some cases, most of these third parties...
Read Blog
December 13, 2017
7
Shares

Which security solutions can help you secure your endpoints as we move into 2018?

Which security solutions can help you secure your endpoints as we move into 2018?

Estimated reading time: 3 minutes

With increased mobility of the workforce, the Internet of Things increasing presence across industries and companies adopting BYOD policies, endpoint security is becoming the most challenging task for security teams within organizations. Further the ever-growing threat landscape tends to...
Read Blog
December 12, 2017
8
Shares

Why you need advanced information security technologies?

Why you need advanced information security technologies?

Estimated reading time: 3 minutes

Cybersecurity threats have evolved over the years, compelling industries to focus on advanced technologies that are in line with the innovative threat vectors. That said, enterprises are committed towards improving the security posture of their IT systems and in...
Read Blog
November 28, 2017

Pillars of enterprise data protection: A proactive approach

Pillars of enterprise data protection: A proactive approach

Estimated reading time: 3 minutes

Modern day data security and protection requirements aren’t only about integrity, confidentiality, and availability. Instead, security professionals must take a proactive approach for improving business value and addressing organizational security. However, talking about proactivity isn’t going to make much...
Read Blog
November 27, 2017
1 2 … 4 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies