• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Uncategorized Archive

Why do boards need to empower their CISO?

Why do boards need to empower their CISO?

Estimated reading time: 2 minutes

A generation ago, the Chief Information Security Officer (CISO) role rarely existed in enterprises and even if it did, it only existed in large to very large organizations. Even here CISOs were mostly system administrators dealing mainly with IT-related...
Read More
October 22, 2019

Hackers are breaking into the enterprise through content collaboration platforms CCPs

Hackers are breaking into the enterprise through content collaboration platforms CCPs

Estimated reading time: 4 minutes

Globally, as enterprises gather and integrate optimum avenues to secure their information technology infrastructure from cyber threats, somehow, hackers are still managing to find a way to break-in. Cybersecurity vigilance has driven business stakeholders to secure core networks with...
Read More
July 17, 2019

Seqrite mSuite can be the perfect solution for the education industry

Seqrite mSuite can be the perfect solution for the education industry

Estimated reading time: 3 minutes

While financial institutions like banks or other multinational corporations (MNCs) occupy the bulk of headlines when it comes to topics like cybersecurity and data breach, it would be foolish to disregard the threats that organizations in the education industry...
Read More
April 22, 2019

Why Seqrite mSuite is the perfect solution for the research industry

Why Seqrite mSuite is the perfect solution for the research industry

Estimated reading time: 2 minutes

While market research organizations may not always attract the headlines in a manner similar to financial services and educational organizations, it would not be a misnomer to state that they remain at high risk of cyber attacks. The rationale...
Read More
April 18, 2019

Enterprises non-compliant with POPI Act in South Africa can get fined up to R10 million!

Enterprises non-compliant with POPI Act in South Africa can get fined up to R10 million!

Estimated reading time: 3 minutes

From GDPR in the European Union to now the POPI Act in South Africa, data privacy regulation is slowly making its way across the globe. The Protection of Personal Information (POPI) Act was passed in South Africa in 2013...
Read More
April 17, 2019
  • 8
    Shares

Why choose Seqrite mSuite- we give you 5 reasons!

Why choose Seqrite mSuite- we give you 5 reasons!

Estimated reading time: 2 minutes

Smartphones are no longer luxuries – in today’s day and age, they are an omnipresent reality. Mobile devices do not just offer connectivity anymore, there are used for many business functions. Business emails, document reviews, editing, and video conferencing are...
Read More
April 16, 2019

PCs fail to boot up/Freeze after receiving Microsoft Windows 9-April-2019 updates and rebooting the PC

PCs fail to boot up/Freeze after receiving Microsoft Windows 9-April-2019 updates and rebooting the PC

Estimated reading time: 2 minutes

Summary: Quick Heal and Seqrite users are reporting that PCs fails to boot up / Freeze after installing 9th April Windows Updates and Rebooting the system. Symptoms:  Users have Quick Heal or Seqrite product installed and running on their systems. The PCs fail to boot...
Read More
April 16, 2019

[INFOGRAPHIC] Why choose Seqrite MobiSMART?

[INFOGRAPHIC] Why choose Seqrite MobiSMART?

Estimated reading time: 1 minute

With the lines increasingly blurring between personal and official work, enterprises are in urgent need of cybersecurity solutions which can secure such kind of communication. Seqrite’s MobiSmart offers one such solution for employees accessing mobile productivity apps on BYOD...
Read More
April 12, 2019
  • 5
    Shares

Seqrite MobiSMART for GDPR Compliance

Seqrite MobiSMART for GDPR Compliance

Estimated reading time: 2 minutes

It has almost been a year now that the General Data Protection Regulation (GDPR) has come into effect. A landmark legislation in the history of data protection, GDPR has changed the way enterprises approach cybersecurity. With its many definitions...
Read More
April 10, 2019
  • 11
    Shares

Right to Be Forgotten – When It Applies & When It Doesn’t

Right to Be Forgotten – When It Applies & When It Doesn’t

Estimated reading time: 2 minutes

One of the most complex topics in the European Union’s landmark General Data Protection Regulation (GDPR) is the Right to be Forgotten, also known as the Right to Erasure. On the outset, the concept seems simple – individuals can...
Read More
April 9, 2019
  • 8
    Shares
← Previous 1 2 3 … 10 Next →
Popular Posts
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017
  • Indian Power Sector targeted with latest LockBit 3.0 variant Indian Power Sector targeted with latest LockBit 3.0 variant August 10, 2022
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..
  • Jayesh Kulkarni
    Jayesh Kulkarni

    Jayesh is working as a Security Researcher for a couple of years. He likes to...

    Read more..
Stay Updated!
Topics
apt (11) Cyber-attack (32) cyber-attacks (56) cyberattack (11) cyberattacks (12) Cybersecurity (301) cyber security (26) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (103) Enterprise security (15) EPS (10) Exploit (12) firewall (11) hackers (11) IoT (10) malware (64) malware attack (23) malware attacks (12) MDM (25) Microsoft (14) Network security (18) Patch Management (12) phishing (18) Ransomware (60) ransomware attack (29) ransomware attacks (30) ransomware protection (12) security (10) Seqrite (26) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (15) windows (11)
Products
  • HawkkHunt
  • HawkkEye
  • HawkkEye Endpoint Security Cloud
  • HawkkEye mSuite
  • HawkkEye Workspace
  • Endpoint Security (EPS)
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category

© 2022 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.