Blogs
-
Blog18 February 2021Microsoft Fails to Block O365 Email Spoofing AttacksMicrosoft is under the gun again for cyber fraud. 200 million+ users...
-
Blog15 February 2021What are the types of Network Security Devices?In a previous blog, we explored various concepts associated with network security....
-
Blog10 February 2021Understanding Network SecurityCommunication to and from devices essentially happens via networks. That network can...
-
Blog8 February 2021Features of Cisco Email ATPCisco provides one of the strongest email security solutions available today. In...
-
Blog1 February 2021Your Guide To Prevent Phishing – Know How Hackers ThinkCyber criminals are getting creative with their ways and organizations have to...
-
Blog7 January 2021Pune-based Engineering Company Duped Out Of 50 lakhsIt’s cyber fraud cases like these that remind us of the gravity...
-
Blog31 December 2020Why you shouldn’t ignore email security in 2021We can all agree this year has been a roller coaster ride....
-
Blog8 December 2020Looking to migrate Zimbra to Office 365? There’s a better alternative to upgrade: Zimbra + Office 365 HybridZimbra is one of the leading email collaboration solutions in the market....
-
Blog30 November 2020Prevent Social Engineering AttacksThis is the final part in our on-going series on social engineering....
-
Blog27 November 20205 Social Engineering Attacks You Should KnowThis is Part Two of our 3-part series on Social Engineering. In this...
-
Enhancing Customer Engagement with BIMI: The Key to Building Trust and Recognition
Businesses strive to stand out in the crowded online marketplace and foster...
-
Exploring the Role of Firewall Technologies in Network Security
Understanding the need for firewall technologies In today's interconnected world, network security...
-
How can IT and cybersecurity vendors enhance their email security & mailing offerings?
In today's dynamic business landscape, establishing a strong brand presence and harnessing...
-
SMTP Security and Authentication
In today's digitally interconnected world, email has become an indispensable means of...
-
Fortinet Ransomware Protection Survey
In today's interconnected digital landscape, organizations face a persistent and growing threat...
-
Barracuda Zero-Day Exploit
In a shocking revelation, cybersecurity researchers have discovered that a zero-day vulnerability...
-
Blog 14 August 2023 AI Email Security to Combat AI Email Threats -
Blog 11 August 2023 Mahesh Bank Cyber Incident – ₹65 Lakh Penalty for Lapses in Cybersecurity -
Blog 28 July 2023 Logix Opens Doors for White Label Partnerships in Email Security and Collaboration Solutions -
Blog 20 July 2023 Additional security for Office 365 -
Blog 20 July 2023 The Role of DMARC In Combatting BEC Attacks -
Blog 20 July 2023 ION Group Ransomware Attack
-
AI Email Security to Combat AI Email ThreatsIn the rapidly evolving landscape of 2023, Artificial Intelligence (AI) has emerged...
-
Mahesh Bank Cyber Incident – ₹65 Lakh Penalty for Lapses in CybersecurityThe Mahesh Bank cyber incident was a shocking episode for banks across...
-
Logix Opens Doors for White Label Partnerships in Email Security and Collaboration SolutionsLogix, a leading provider of email security and collaboration solution has announced...
-
Additional security for Office 365Do you need additional security for Office 365? When users deal with...
-
The Role of DMARC In Combatting BEC AttacksLiving in today’s world, it is extremely likely you have been using...
-
ION Group Ransomware AttackLockBit ransomware strikes again ION Group, a software company located in the...