• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Cybersecurity Tips Archive

How safe it is to use the Zoom video-conferencing app?

How safe it is to use the Zoom video-conferencing app?

Estimated reading time: 3 minutes

Recently the Union home ministry has issued a warning raising a red flag for users of Zoom video-conferencing application and marked it as unsafe to use. Earlier, during the end of March, CERT-IN, India’s nodal cybersecurity agency had warned...
Read Blog
April 17, 2020

Why choose Seqrite mSuite- we give you 5 reasons!

Why choose Seqrite mSuite- we give you 5 reasons!

Estimated reading time: 2 minutes

Smartphones are no longer luxuries – in today’s day and age, they are an omnipresent reality. Mobile devices do not just offer connectivity anymore, there are used for many business functions. Business emails, document reviews, editing, and video conferencing are...
Read Blog
April 16, 2019

Right to Be Forgotten – When It Applies & When It Doesn’t

Right to Be Forgotten – When It Applies & When It Doesn’t

Estimated reading time: 2 minutes

One of the most complex topics in the European Union’s landmark General Data Protection Regulation (GDPR) is the Right to be Forgotten, also known as the Right to Erasure. On the outset, the concept seems simple – individuals can...
Read Blog
April 9, 2019
8
Shares

Cybersecurity for the hospitality sector: What you need to know

Cybersecurity for the hospitality sector: What you need to know

Estimated reading time: 3 minutes

Marriott International. Hilton. Four Seasons. Trump Hotels. InterContinental. Hard Rock Hotel. These are some of the biggest hospitality chains in the business. But there’s another detail also that connects the above names: In the last couple of years, all...
Read Blog
March 13, 2019
13
Shares

Top 5 IT tips for remote and mobile teams

Top 5 IT tips for remote and mobile teams

Estimated reading time: 3 minutes

Cybersecurity threats are lurking everywhere. In 2015, a vulnerability was detected in WiFi routers in hotel allowing attackers to distribute malware and monitor and record data sent over the network. A laptop is stolen every 53 seconds in the...
Read Blog
August 16, 2018
3
Shares

5 Bad tech habits you need to work on

5 Bad tech habits you need to work on

Estimated reading time: 3 minutes

Businesses know the importance of cybersecurity. But do they know the importance of employees when it comes to cybersecurity? After all, a business’s employees offer the strongest defense against the varied manners of threats that exist in the cybersecurity...
Read Blog
June 25, 2018
8
Shares

Staging a fake attack can help you evaluate your cybersecurity preparedness

Staging a fake attack can help you evaluate your cybersecurity preparedness

Estimated reading time: 3 minutes

Organizations of all hues and shades nowadays invest a lot in cybersecurity and rightly so. The world is moving from just being digital to being hyperconnected and now an organization’s most confidential information could be on the cloud. Hence,...
Read Blog
March 29, 2018
3
Shares

Found new vulnerabilities: What’s next?

Found new vulnerabilities: What’s next?

Estimated reading time: 2 minutes

A big headache which all network administrators have is the vulnerability status of their business. With more and more business being conducted online, every organization has an online presence and network. Popular software attracts the attention of malicious criminals...
Read Blog
March 14, 2018
6
Shares

Are we ready for Amazon’s automated grocery store?

Are we ready for Amazon’s automated grocery store?

Estimated reading time: 3 minutes

Welcome to the future, ladies and gentlemen. On January 22nd, on 2131, 7th Avenue in Seattle, Washington, the world got a taste of what the future could be like. The address saw the opening of the first Amazon Go...
Read Blog
February 27, 2018
17
Shares

Find out how safe you are on the Internet! Take this Quiz.

Find out how safe you are on the Internet! Take this Quiz.

Estimated reading time: < 1 minute

Take our quiz to find out how safe you are on the Internet. [slickquiz id=1]  
Read Blog
February 6, 2018
228
Shares
1
1 2 3 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (23) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (327) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (109) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (23) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies