• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Mahua Chakrabarthy

About Mahua Chakrabarthy

A tea connoisseur who firmly believes that life is too short for dull content. Legend has it that I was born with a keyboard in one hand and a thesaurus in the other (just kidding). You can find me engaged in philosophical debates with my Philodendrons when not typing away.

DPDP Compliance in Healthcare: Best Practices for Protecting Patient Information

DPDP Compliance in Healthcare: Best Practices for Protecting Patient Information

Estimated reading time: 3 minutes

The modern-day healthcare industry faces unique cybersecurity challenges. On the one hand, cutting-edge technologies and increasing digitization have helped elevate healthcare quality, yet they have also threatened the privacy and security of patient data. According to The HIPPA Journal’s...
Read Blog
November 6, 2024

ZTNA Explained: What It Is, Why It Matters, and How to Get Started

ZTNA Explained: What It Is, Why It Matters, and How to Get Started

Estimated reading time: 4 minutes

In June 2024, a severe data breach shook South Korea’s armed forces. An insider accessed and leaked highly confidential personal information of the country’s undercover agents, jeopardizing their lives. Incidents like this have become common in today’s rapidly evolving...
Read Blog
August 26, 2024

Strengthening Indian SMEs: Essential Cybersecurity Practices to Avert Rising Cyberattacks

Strengthening Indian SMEs: Essential Cybersecurity Practices to Avert Rising Cyberattacks

Estimated reading time: 2 minutes

Indian small and medium enterprises (SMEs) have been in the bull’s eye for cyberattacks lately. According to a recent study by the CyberPeace Foundation, approximately 43% of all cyberattacks target the country’s small businesses and startups. The most evident...
Read Blog
June 21, 2024

Traversing the Cyber Threat Terrain in 2024: Insights, Expert Guidance, and Collective Resilience

Traversing the Cyber Threat Terrain in 2024: Insights, Expert Guidance, and Collective Resilience

Estimated reading time: 2 minutes

The year 2023 was eventful, witnessing a myriad of advanced threats targeting prominent economies, including India. Many still remember the fake IRCTC app that stole sensitive user information or the infamous loan apps that devastated many innocent lives. Malware...
Read Blog
February 8, 2024

Navigating India’s Data Protection Landscape: A SEQRITE Perspective

Navigating India’s Data Protection Landscape: A SEQRITE Perspective

Estimated reading time: 3 minutes

India’s swift enactment of the Digital Personal Data Protection (DPDP) Act has triggered considerable apprehension among businesses, mainly due to the impending deadline for compliance. Several myths regarding the Act have further intensified the confusion. To educate the business...
Read Blog
January 29, 2024

Traversing the Cybersecurity Landscape: Unveiling the Essence of XDR

Traversing the Cybersecurity Landscape: Unveiling the Essence of XDR

Estimated reading time: 3 minutes

In the ever-evolving territory of cybersecurity, where businesses face persistent incidents of Advanced Attacks, the Extended Detection and Response (XDR) solution has become a crucial component in fortifying their IT infrastructure. This blog highlights the gist of the SEQRITE-ETCISO...
Read Blog
December 11, 2023
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies