Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog12 September 2025Adaptive Cloud Security & Why You Need ItCloud computing brought with it an “always on” world. You can work...
-
Blog12 September 2025Effective Endpoint SecurityEndpoint security is a tricky subject, especially considering all the many devices...
-
Blog12 September 2025Security Threats in Banking and How to Handle ThemSecurity threats in banking are becoming much more dangerous. Especially considering how...
-
Blog12 September 2025Remote Access Trojan – Your Passwords at RiskA new variant of an old trojan has now been activated, putting...
-
Blog12 September 2025Credentials Theft: A Case StudyCyber criminals keep creatively upping their game and this new phishing attack...
-
Blog12 September 2025This Pharma Lab Data Breach Caused Multiple Plants to Shut DownA successful data breach at Dr Reddy’s, a well-known pharmaceutical company, caused...
-
Blog12 September 2025What Is Social Engineering?When it comes to cyber-attacks, our thoughts jump immediately to malicious code...
-
Blog12 September 20255 Social Engineering Attacks You Should KnowThis is Part Two of our 3-part series on Social Engineering. In this...
-
Blog12 September 2025Prevent Social Engineering AttacksThis is the final part in our on-going series on social engineering....
-
Blog12 September 2025Looking to migrate Zimbra to Office 365? There’s a better alternative to upgrade: Zimbra + Office 365 HybridZimbra is one of the leading email collaboration solutions in the market....
-
How VolumeMail SMTP Can Improve Your Business Email Marketing Strategy
Email marketing is a powerful tool for businesses of all sizes, allowing...
-
Massive Aadhaar Data Breach Exposes Personal Information of 81 Crore Indians on Dark Web
In a significant cybersecurity incident, a report from US-based cybersecurity firm Resecurity...
-
Targeting Zimbra Collaboration Servers
In recent months, an alarming cybersecurity threat has emerged, targeting Zimbra Collaboration...
-
Australia for Violating Anti-Spam Laws
In a recent development, the Australian Communications and Media Authority (ACMA) has...
-
An OTT Channel provider adopts AI powered Perception Point Email Security to stop Quishing attacks
Fake QR Code Email Phishing Scam Beware: Fraudsters are sending mails with...
-
Harnessing the Power of AI and ML for Robust Email Security
Email security remains a critical battleground. With over 90% of cyberattacks beginning...
-
Blog 12 September 2025 Logix’s Successful Partnership With Fortinet -
Blog 12 September 2025 AI Email Security to Combat AI Email Threats -
Blog 12 September 2025 Lessons from a Pune Email Scam: Protecting Your Business -
Blog 12 September 2025 Deprecation of Microsoft Basic Authentication for Exchange Online -
Blog 12 September 2025 Microsoft Shuts Down Exchange Online Basic Authentication Services -
Blog 12 September 2025 Securing hybrid IT environments
-
Logix’s Successful Partnership With FortinetLogix is an Expert Partner for Fortinet It has been two decades...
-
AI Email Security to Combat AI Email ThreatsIn the rapidly evolving landscape of 2023, Artificial Intelligence (AI) has emerged...
-
Lessons from a Pune Email Scam: Protecting Your BusinessIn the modern business world, email communication has become an essential tool...
-
Deprecation of Microsoft Basic Authentication for Exchange OnlineUntil recently, the industry has relied on basic authentication as a security...
-
Microsoft Shuts Down Exchange Online Basic Authentication ServicesAs cyber-attacks continue targeting remote workers and hybrid environments, Microsoft is taking...
-
Securing hybrid IT environmentsWhen cloud technologies had first emerged, several businesses had jumped on the...