• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Cybersecurity Tips Archive

Why choose Seqrite mSuite- we give you 5 reasons!

Why choose Seqrite mSuite- we give you 5 reasons!

Estimated reading time: 2 minutes

Smartphones are no longer luxuries – in today’s day and age, they are an omnipresent reality. Mobile devices do not just offer connectivity anymore, there are used for many business functions. Business emails, document reviews, editing, and video conferencing are...
Read Blog
April 16, 2019

Right to Be Forgotten – When It Applies & When It Doesn’t

Right to Be Forgotten – When It Applies & When It Doesn’t

Estimated reading time: 2 minutes

One of the most complex topics in the European Union’s landmark General Data Protection Regulation (GDPR) is the Right to be Forgotten, also known as the Right to Erasure. On the outset, the concept seems simple – individuals can...
Read Blog
April 9, 2019
8
Shares

Cybersecurity for the hospitality sector: What you need to know

Cybersecurity for the hospitality sector: What you need to know

Estimated reading time: 3 minutes

Marriott International. Hilton. Four Seasons. Trump Hotels. InterContinental. Hard Rock Hotel. These are some of the biggest hospitality chains in the business. But there’s another detail also that connects the above names: In the last couple of years, all...
Read Blog
March 13, 2019
13
Shares

Top 5 IT tips for remote and mobile teams

Top 5 IT tips for remote and mobile teams

Estimated reading time: 3 minutes

Cybersecurity threats are lurking everywhere. In 2015, a vulnerability was detected in WiFi routers in hotel allowing attackers to distribute malware and monitor and record data sent over the network. A laptop is stolen every 53 seconds in the...
Read Blog
August 16, 2018
3
Shares

Are we ready for Amazon’s automated grocery store?

Are we ready for Amazon’s automated grocery store?

Estimated reading time: 3 minutes

Welcome to the future, ladies and gentlemen. On January 22nd, on 2131, 7th Avenue in Seattle, Washington, the world got a taste of what the future could be like. The address saw the opening of the first Amazon Go...
Read Blog
February 27, 2018
17
Shares

How do cyber criminals celebrate Valentine’s day

How do cyber criminals celebrate Valentine’s day

Estimated reading time: 2 minutes

February 14th, Valentine’s Day, maybe the day of love but there’s no love lost between cybercriminals and their target. In recent years, these criminals are only getting smarter in their ways and ensuring that they time their attacks at...
Read Blog
February 13, 2018
201
Shares

Find out how safe you are on the Internet! Take this Quiz.

Find out how safe you are on the Internet! Take this Quiz.

Estimated reading time: < 1 minute

Take our quiz to find out how safe you are on the Internet. [slickquiz id=1]  
Read Blog
February 6, 2018
228
Shares
1

5 Major ransomware attacks in the healthcare industry

5 Major ransomware attacks in the healthcare industry

Estimated reading time: 3 minutes

Ransomware attacks affect every industry; however, the healthcare industry is highly vulnerable to them simply because of the severity of risk involved. A ransomware attack may impact either the critical services or the administrative services of a hospital or...
Read Blog
July 5, 2017

5 Cyber Attacks that Shook the World

5 Cyber Attacks that Shook the World

Estimated reading time: 3 minutes

Cyber-crime, with sophisticated methods, has become a multi billion dollar industry. Cyber-crime has evolved to data breaches and online identity theft using highly technical methods such as network eavesdropping. The definition of most expensive attack or which one is most damaging varies according...
Read Blog
June 14, 2017

Dealing with Insider Threats: A Brief Guide for CISOs

Dealing with Insider Threats: A Brief Guide for CISOs

Estimated reading time: 3 minutes

Cyber security threats are among the top concerns of an enterprise, with the fear and nervousness fueled by the recent incidents of massive security breaches and ransomware attacks. But what is less well known is that more than half of these security...
Read Blog
June 12, 2017
1 2 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (21) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (326) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies