• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: data security

Dangers of hackers breaking into your printer

Dangers of hackers breaking into your printer

Estimated reading time: 3 minutes

Do you think that printers can’t be hacked as there is really nothing to hack in there? You might be completely wrong! Printers have been a favorite target of hackers for a while now. They are routinely compromised, whether they are setup at...
Read Blog
August 4, 2017

Seqrite Data Loss Prevention (DLP) -A Multi-Layered Approach to Data Security

Seqrite Data Loss Prevention (DLP) -A Multi-Layered Approach to Data Security

Estimated reading time: 3 minutes

An increasing volume of business information assets are distributed digitally today and has been growing exponentially every year. Confidential and sensitive business information is no longer restricted to physical boundaries of business enterprises. With the implementation of policies like...
Read Blog
August 1, 2017
2

5 Security Threats in Healthcare Industry – INFOGRAPHIC

5 Security Threats in Healthcare Industry – INFOGRAPHIC

Estimated reading time: < 1 minute

Technology has touched every aspect of our lives, be it using Google Maps to get to a new place or getting on a quick Skype call with a family physician. And amidst all the benefits that technology has delivered,...
Read Blog
July 27, 2017

Top Seqrite features and solutions that made a mark in 2016

Top Seqrite features and solutions that made a mark in 2016

Estimated reading time: 4 minutes

No business is too small to evade a cyber-attack or data breach. Enterprise security has moved beyond traditional antivirus solutions and it’s time that cybersecurity becomes an important aspect of any organization’s financial budget. If 2016 has been the...
Read Blog
December 31, 2016

Pokemon Go Makes Implementation of MDM Strategy a Necessity in Organizations

Pokemon Go Makes Implementation of MDM Strategy a Necessity in Organizations

Estimated reading time: 3 minutes

Whether your organization is into manufacturing steel or designing apps for smartphones, employee work flexibility is becoming more of a requirement than a privilege for every organization. Start-ups and SMBs are seeing real gains by encouraging Bring-Your-Own-Device (BYOD) at...
Read Blog
August 1, 2016
← Previous 1 2
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies