Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog19 April 2022Password Strength Can Tighten Your CybersecurityFollowing the best cyber safety practices in your organization can go a...
-
Blog18 April 2022Ikea Email Server AttacksIkea, popular furnishing company, faces the heat of cybercrime as Ikea email...
-
Blog15 April 2022Proofpoint Phishing Attack Harvests Email LoginsIn a recent Proofpoint phishing attack, email logins for Microsoft and Google...
-
Blog28 March 2022Secure Microsoft 365 Email with Cisco Cloud Mailbox DefenseIn this blog, we are going over ways you can improve your...
-
Blog9 March 2022Ukraine faces cyber trouble – Ukrainian bank and State websites hitGlobal situations with respect to Ukraine are dire. But along with geopolitical...
-
Blog4 March 2022Corporate email server breach – activities of SquirrelwaffleAn email server breach at Microsoft’s Exchange servers was detected by a...
-
Blog10 February 2022A phishing attack through spoofed Amazon ordersThis phishing attack takes brand impersonation to the next level. Not only...
-
Blog5 February 2022Statistics to prepare you for cybersecurity in 2022Everyone was just waiting for the calendar to turn on 31st December...
-
Blog1 February 2022The biggest internet scams – and how to stop themPhishing is a popular internet scam that has been claiming victims by...
-
Blog17 January 2022New Emotet campaigns disrupting mailboxesThe Emotet malware seems to be back from its 10-month vacation. Mid...
-
Logix conducts webinar on Check Point email security solution
Logix in collaboration with Check Point Harmony recently conducted a email security...
-
Logix Wins Best Expert Partner 2022 at SAARC Partner SYNC 2022
We’re greatly thankful to Fortinet for awarding us with the Best Expert Partner...
-
Register for the Acronis Backup Workshop
Are you a business owner looking to ensure the safety of your...
-
Secure Your Email & Collaboration Tools with AI: Webinar Invitation
Date: 31st July | Time: 3:00 PM - 3:45 PM IST The...
-
Handling QR Code Phishing Scams
While QR codes are a quick and efficient tool for marketers and...
-
Logix is Check Point MSSP Partner
Check Point Software Technologies pairs up with Logix InfoSecurity for MSSP Partner...
-
Blog 12 February 2024 Mastering Endpoint Detection and Response (EDR): Your Shield Against Evolving Threats -
Blog 12 February 2024 Shifting to SASE for Simplifying Security in a Cloud-Driven World -
Blog 12 February 2024 Embracing Zero Trust Network Access (ZTNA) for Enhanced Cybersecurity -
Blog 12 February 2024 Malicious Email Attachments Even from Bonafide IDs -
Blog 12 February 2024 Beware of Ongoing Phishing Campaign Targeting Zimbra Collaboration Servers -
Blog 9 February 2024 New Phishing Campaign Delivers LokiBot Malware Through Microsoft Word Vulnerabilities
-
Mastering Endpoint Detection and Response (EDR): Your Shield Against Evolving ThreatsWith cyber threats constantly evolving, businesses need cutting-edge solutions to protect their...
-
Shifting to SASE for Simplifying Security in a Cloud-Driven WorldIn the dynamic world of cyber security, a new term has emerged:...
-
Embracing Zero Trust Network Access (ZTNA) for Enhanced CybersecurityIn an era where cyber threats are becoming increasingly sophisticated, and remote...
-
Malicious Email Attachments Even from Bonafide IDsIn a concerning development, the government has issued a cybersecurity circular, cautioning...
-
Beware of Ongoing Phishing Campaign Targeting Zimbra Collaboration ServersIn recent months, an alarming cybersecurity threat has emerged, targeting Zimbra Collaboration...
-
New Phishing Campaign Delivers LokiBot Malware Through Microsoft Word VulnerabilitiesIn a startling revelation, cybersecurity experts have uncovered a sophisticated phishing campaign...