Estimated reading time: 2 minutes
What do the top reviewers in the security industry think of our technology? Our product ratings this past month have been very good across the board with the leading AV testing labs, and we’ll update you on those ratings...Information Technology, Network Security & Cybersecurity Updates
Estimated reading time: 3 minutes
As we have explained in the previous Troldesh ransomawre blog, Cyber criminals are now spreading and infecting ransomware by gaining access to computers through Remote Desktop. Remote access to the victim’s computer is gained by using brute-force techniques which...Estimated reading time: 2 minutes
Cyber Security threats today have become increasingly sophisticated and complex. Organizations, however, have not been able to evolve at the same pace. As organizations move ahead and embrace new technologies without fully comprehending the implications these have on the...Estimated reading time: 2 minutes
Seqrite Endpoint Security (SEPS) v.7.0 has been released with new product variants, features, and enhancements. The new version comes with competitive features for each SEPS product variant and upgraded to support businesses of all sizes. Enterprise Suite Endpoint Security...Estimated reading time: 3 minutes
Whether your organization is into manufacturing steel or designing apps for smartphones, employee work flexibility is becoming more of a requirement than a privilege for every organization. Start-ups and SMBs are seeing real gains by encouraging Bring-Your-Own-Device (BYOD) at...