• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Ankita Ashesh

About Ankita Ashesh

Enterprises non-compliant with POPI Act in South Africa can get fined up to R10 million!

Enterprises non-compliant with POPI Act in South Africa can get fined up to R10 million!

Estimated reading time: 3 minutes

From GDPR in the European Union to now the POPI Act in South Africa, data privacy regulation is slowly making its way across the globe. The Protection of Personal Information (POPI) Act was passed in South Africa in 2013...
Read Blog
April 17, 2019
8
Shares

[INFOGRAPHIC] Why choose Seqrite MobiSMART?

[INFOGRAPHIC] Why choose Seqrite MobiSMART?

Estimated reading time: < 1 minute

With the lines increasingly blurring between personal and official work, enterprises are in urgent need of cybersecurity solutions which can secure such kind of communication. Seqrite’s MobiSmart offers one such solution for employees accessing mobile productivity apps on BYOD...
Read Blog
April 12, 2019
5
Shares

Right to Be Forgotten – When It Applies & When It Doesn’t

Right to Be Forgotten – When It Applies & When It Doesn’t

Estimated reading time: 2 minutes

One of the most complex topics in the European Union’s landmark General Data Protection Regulation (GDPR) is the Right to be Forgotten, also known as the Right to Erasure. On the outset, the concept seems simple – individuals can...
Read Blog
April 9, 2019
8
Shares

Artificial Intelligence – its use and misuse

Artificial Intelligence – its use and misuse

Estimated reading time: 3 minutes

The term “artificial intelligence” always conjures images of a science-fiction prototype. Thanks to the influence of popular culture, artificial intelligence is always interpreted in the popular culture as intelligent machines and robots, autonomous, independent and able to take their...
Read Blog
February 4, 2019
17
Shares

This is how hackers can invade your system without installing malware

This is how hackers can invade your system without installing malware

Estimated reading time: 3 minutes

Even those with a passive interest in cybersecurity have a fair idea of how hackers can take control of a system. This is mostly done through malware – unsuspecting users somehow download or access a malicious file or a...
Read Blog
February 1, 2019
13
Shares

How to reduce the risk of data leakage when an employee is Out Of Office

How to reduce the risk of data leakage when an employee is Out Of Office

Estimated reading time: 3 minutes

Vacations are great. Employees like to get away from it all, the pressures of work, the many meetings, the deadlines, etc. But there’s another category of people who also love vacations and employees who are Out of Office (OOO)...
Read Blog
January 18, 2019
19
Shares

How to prevent Remote Desktop Protocol (RDP) attacks

How to prevent Remote Desktop Protocol (RDP) attacks

Estimated reading time: 3 minutes

Remote Desktop Protocol (RDP) attacks can be extremely dangerous, whether from an enterprise or a single user point of view. They are basically backdoors which allow external users to access and use a system over the Internet. The United...
Read Blog
December 3, 2018
12
Shares

Cybersecurity Roundup 2018

Cybersecurity Roundup 2018

Estimated reading time: 3 minutes

In almost a blink of the eye, the year will be over. In cybersecurity terms though, 2018 could probably be defined as “business as usual”. Cyber threats only increased, there were news of even more daring attacks and cyber...
Read Blog
November 22, 2018
22
Shares

The truth about the Twitter cryptocurrency giveaway

The truth about the Twitter cryptocurrency giveaway

Estimated reading time: 3 minutes

Whether you like him or dislike him, one thing you can’t disagree with is that Elon Musk, the man behind Tesla and SpaceX, is a bonafide star. What he says makes news and his every utterance becomes a headline....
Read Blog
November 10, 2018
1
Share

Importance of SSL certificate for your company website

Importance of SSL certificate for your company website

Estimated reading time: 3 minutes

Anyone who browses the Internet is probably aware of the term SSL. It’s often bandied around as a term which people vaguely understand to be something connected to keeping your browsing data safe. For a lot of people, SSL...
Read Blog
October 29, 2018
18
Shares
1 2 … 5 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies