• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: Seqrite EPS

Cybersecurity and Compliance requirements: Part 1

Cybersecurity and Compliance requirements: Part 1

Estimated reading time: 3 minutes

Compliance, in the simplest possible terms, refers to integrating certain industrial standards based on specific requirements. While regulatory compliance can easily impose additional costs to the IT networks and security systems, the costs and repercussions for not complying with...
Read Blog
November 24, 2017
3
Shares

Effective Patch Management requires a well-defined strategy

Effective Patch Management requires a well-defined strategy

Estimated reading time: 3 minutes

Patch Management holds a lot of relevance in an organization’s cybersecurity plan. Most hackers are on a continuous look out for system vulnerabilities to barge into IT network. This in turn offers them an opportunity to steal intellectual property...
Read Blog
November 23, 2017

The role of internal audit in cybersecurity

The role of internal audit in cybersecurity

Estimated reading time: 3 minutes

Cyber-attacks are constantly posing threats of significant proportions, and it’s important to consider their evolving nature while setting up a response plan. Be it dealing with the growing economic espionage or acts of internal and external corruption; companies often...
Read Blog
November 22, 2017

Reasons to consider managed security services

Reasons to consider managed security services

Estimated reading time: 3 minutes

Dealing with the existing cyber threat landscape requires not just a state of the art security tool but also skill and technological expertise to manage the overall organizational security. It is here that managed security services come as a...
Read Blog
November 21, 2017

Remember the security basics as your cybersecurity strategy evolves

Remember the security basics as your cybersecurity strategy evolves

Estimated reading time: 3 minutes

Most cybersecurity strategies thrive on advanced technologies when it comes to mitigating complex threats. In the meanwhile, CISOs and the concerned IT heads tend to ignore the basic precautions and security standards required for preventing data breaches. Although technological...
Read Blog
November 15, 2017

Vulnerabilities are unavoidable: Here are the top 5 commandments of Vulnerability Scan

Vulnerabilities are unavoidable: Here are the top 5 commandments of Vulnerability Scan

Estimated reading time: 3 minutes

Organizations using software modules are more likely to get affected by intruders and unsolicited access. Moreover, if the software is popular, there are additional chances that the connected services and written codes might attract hackers and malicious parties. Security...
Read Blog
November 14, 2017

Deploying Endpoint Security: Key factors to consider

Deploying Endpoint Security: Key factors to consider

Estimated reading time: 2 minutes

Endpoint security is the front line in the fight against cyber attacks. Most of the attacks on organizations can be traced to a source that is external to the network i.e. the attack originates from something connected to the enterprise network. Which...
Read Blog
November 10, 2017

Cybersecurity myths in IT organizations

Cybersecurity myths in IT organizations

Estimated reading time: 3 minutes

Hardly do we come across days where cybersecurity threats fail to make catastrophic impressions and the organizational CISOs have very little brainstorming to do. Based on reports released by high-profile newsmakers, cyber-attacks are expected to have impacted a minimum...
Read Blog
November 6, 2017

Answers to Your Top Cybersecurity Questions

Answers to Your Top Cybersecurity Questions

Estimated reading time: 3 minutes

Introduction Cybersecurity threats are incessantly eating into the organizational data reserves, and it is important that CISOs and IT Security Pros keep a close check on the proliferation of hackers and cyber-criminals. While the overall awareness towards cybersecurity is...
Read Blog
October 27, 2017

What is a Business Email Compromise (BEC) attack? How Seqrite can help in protecting your business email?

What is a Business Email Compromise (BEC) attack? How Seqrite can help in protecting your business email?

Estimated reading time: 3 minutes

A few months back, FBI released a report stating that Business Email Compromise or rather BEC scams usually cost businesses around  $3.1 billion. In addition to that, FBI also warned organizations regarding “Man-in-the-Email” and “CEO Fraud”; some of the...
Read Blog
October 19, 2017
← Previous 1 2 3 4 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies