• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: Seqrite Services

Importance of SSL certificate for your company website

Importance of SSL certificate for your company website

Estimated reading time: 3 minutes

Anyone who browses the Internet is probably aware of the term SSL. It’s often bandied around as a term which people vaguely understand to be something connected to keeping your browsing data safe. For a lot of people, SSL...
Read Blog
October 29, 2018
18
Shares

What is a Red Team Assessment and why does RBI endorse it?

What is a Red Team Assessment and why does RBI endorse it?

Estimated reading time: 3 minutes

When it comes to cybersecurity for enterprises, one sector that finds itself at a lot of risk is the banking sector. Banks conduct financial transactions which can be worth millions in value every single day which mean they present...
Read Blog
September 25, 2018
8
Shares
1

What is social engineering? How criminals take advantage of human behavior

What is social engineering? How criminals take advantage of human behavior

Estimated reading time: 3 minutes

For all the high-tech security that is employed, an organization’s biggest chink in its defense, when it comes to cybersecurity, can be its own employees. That is not to say that these employees are deliberately doing what they are,...
Read Blog
September 14, 2018
7
Shares

Why trust Seqrite? Don’t take our word for it. Hear it from our customers

Why trust Seqrite? Don’t take our word for it. Hear it from our customers

Estimated reading time: 3 minutes

Seqrite’s range of world-class cybersecurity solutions are defined by innovation and simplicity. The solutions provided are a combination of intelligence, analysis of applications and state-of-the-art technology, and are designed to provide better protection for our customers. Backed by Quick...
Read Blog
September 5, 2018
7
Shares
1

Is your bank really safe from cyber threats? Conduct Red Team Assessment to know.

Is your bank really safe from cyber threats? Conduct Red Team Assessment to know.

Estimated reading time: 2 minutes

As cyber-attacks continue to affect businesses, it is banks that are the most lucrative target for cybercriminals. Beyond having their reputation at stake, banks also risk customer’s money and data, amplified regulatory attention and even litigation. The stakes are...
Read Blog
August 31, 2018
18
Shares

What are exploits? Everything you need to know

What are exploits? Everything you need to know

Estimated reading time: 3 minutes

Cybersecurity experts are always cautious when they hear the word “exploits”, and for good reason. Exploits are often a preferred channel through which cybercriminals like to hit their targets. What makes it easier for these criminals is that exploits...
Read Blog
August 25, 2018
16
Shares

Importance of industry certifications for security products and what do they mean

Importance of industry certifications for security products and what do they mean

Estimated reading time: 3 minutes

The importance of cybersecurity has slowly seeped into the consciousness of enterprises. A cybercrime can undo years of work in an instant and enterprises are recognizing this and trying to find ways to stay safe. Hence, investment in security...
Read Blog
August 16, 2018
3
Shares

What India’s data protection law might mean for your business

What India’s data protection law might mean for your business

Estimated reading time: 3 minutes

India has taken a step forward towards laying down a proper policy for data protection. The Srikrishna Committee, a 10-member expert committee headed by former Supreme Court judge BN Srikrishna and appointed by the Indian government in August 2017...
Read Blog
August 6, 2018
305
Shares

Tailgating: Security Risks Involved

Tailgating: Security Risks Involved

Estimated reading time: 3 minutes

It is a common scenario. An employee swipes his identity card and enters his office premises. He spots someone without an id card outside the gates, wanting to get in. He wants to help – he offers them entry...
Read Blog
July 27, 2018
4
Shares

Seqrite helps Government bodies strengthen their defense

Seqrite helps Government bodies strengthen their defense

Estimated reading time: 3 minutes

If there is one type of organization which is a favorite of cyber criminals worldwide, it is government institutions. The reasons for that are obvious: most governments, whether at the state or the federal level, are massive behemoths with...
Read Blog
June 6, 2018
1 2 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies