Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog10 October 2020Why Web Application Firewall Is a Must In Your Security ArsenalIf your organization is cyber aware, you doubtless have procured some services...
-
Blog7 October 2020Credentials Theft: A Case StudyCyber criminals keep creatively upping their game and this new phishing attack...
-
Blog23 September 2020Major Data Breach of Government ComputersThe National Informatics Center (NIC) and the Ministy of Electronics & Information...
-
Blog8 September 2020Look out for Covid-19 Related Cyber ScamsWhile regulations have lifted the restrictions of strict lockdowns, common sense and...
-
Blog7 September 2020Email Invoice Fraud Prevention – A Concise GuideBusiness owners are now growing increasingly aware of cyber security concerns hanging...
-
Blog24 August 2020Logix is a Microsoft Gold Partner in IndiaWhat are our offerings as a Microsoft Gold Partner? For some time...
-
Blog18 August 2020Nykaa Email Spoofing CaseNykaa Loses 62Lakh To Cyber Fraud Most of the times, it is...
-
Blog14 August 20204 Ways Fraud Invoices Can Affect Your BusinessWhy Worry About Fraud Invoices? Fraud Invoices could victimize any business. Invoice...
-
Blog4 August 20204 Factors To Consider When Choosing Between Email Archival And DeletionIs Email Archival Better than Email Deletion? Every business relies on email...
-
-
Cisco and Logix’s Joint Security Workshop
In a recent collaborative effort, Cisco and Logix conducted an informative security...
-
Why Backup Microsoft 365: A Simple Guide
Microsoft 365 is important for storing sensitive data like emails and documents....
-
Simplifying Identity Management with Logix AD on Azure
Remote work and cloud computing are becoming the norm, ensuring robust identity...
-
Tamper-Proof Your Microsoft 365 Data Protection with Acronis Cyber Protect
In the dynamic landscape of today's digital business world, Microsoft 365 has...
-
SASE: The Network Security Game Changer for Businesses
SASE combines essential functions like web filtering, cloud app protection, and secure...
-
Renewal of Zimbra service by one of the Major PSU companies
In a critical renewal decision, a major PSU Engineering and manufacturing company...
-
Blog 5 June 2023 3 essential data protection components in cyber security -
Blog 17 May 2023 Logix’s Successful Partnership With Fortinet -
Blog 9 May 2023 ICC BEC Scam -
Blog 24 April 2023 Harmful ChatGPT phishing and BEC scams -
Blog 24 April 2023 GoDaddy Compromised For The Last 3 Years – Terrorists Go Mad -
Blog 19 April 2023 7 organizational habits for a security aware culture
-
3 essential data protection components in cyber securityWhile several things about cyber security revolve around managing the intangible aspects...
-
Logix’s Successful Partnership With FortinetLogix is an Expert Partner for Fortinet It has been two decades...
-
-
Harmful ChatGPT phishing and BEC scamsThe problem with GPT-3 and ChatGPT phishing scams GPT-3 is truly valuable...
-
GoDaddy Compromised For The Last 3 Years – Terrorists Go MadGoDaddy has disclosed that a group of hackers had access to their...
-
7 organizational habits for a security aware cultureSecurity awareness For establishing a security aware culture, cyber security needs to...