Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog15 April 2020Newsletter from Reserve Bank Information Technology Private Limited (ReBIT) on CybersecurityAn article shared by Mr. Nandkumar Saravade, CEO, ReBIT in Cyber Pulse...
-
Blog13 April 2020You’ve Won An Award: Is It Really Just Good News In That Celebratory Email?Congratulations! You have won … a free phishing scam! Everybody loves to...
-
Blog11 April 2020Tree Sena: An Unfortunate Cybercrime Case That Affected A Noble CauseTree Sena: A Sad Case of Identity Theft The scenario revolving around...
-
Blog6 April 2020Watch Out! Public Health Group Officials Being Imitated For Phishing CampaignsPublic Health Group Officials Imitated for Sending Out Phishing Emails We have...
-
Blog3 April 2020Corporate Email Eavesdropping: Is Someone Spying On You?A Mysterious Hacker Group Has Been Spying on Corporate Email and FTP...
-
Blog2 April 2020The Google Calendar Spam: Something you need to know?Google Calendar Falls Prey to Spammers A rather unique spamming technique has...
-
Blog26 March 2020Multi-Factor Authentication: The Devil Is In The DetailsHackers attacked more than a million Microsoft Accounts ! If you need...
-
Blog23 March 2020Coronavirus Sparks A Series of Phishing RusesCurb your instincts; don’t open emails just because they claim to contain...
-
Blog17 March 2020Coronavirus Forces Employees to Work From Home. But What About Remote Security?Covid-19 Outbreak forcing you to work from home? Here are the best...
-
Blog13 March 2020Microsoft Office 365 and Google G Suite Become Hot Targets for BECFBI Reports Suggest BEC should be treated as seriously as Ransomware For...
-
3 Ways Microsoft Teams Phone Boosts Workplace Productivity
Voice communication is a crucial element in business that plays a vital...
-
Cyber Security for Financial Institutions
The scope of cyber security for financial institutions has expanded in recent...
-
AI Email Security to Combat AI Email Threats
In the rapidly evolving landscape of 2023, Artificial Intelligence (AI) has emerged...
-
Celebrating 24 Years of Excellence: Logix InfoSecurity’s Foundation Day
On the 16th of August, as we proudly celebrate Logix InfoSecurity's foundation...
-
Mahesh Bank Cyber Incident – ₹65 Lakh Penalty for Lapses in Cybersecurity
The Mahesh Bank cyber incident was a shocking episode for banks across...
-
Logix Opens Doors for White Label Partnerships in Email Security and Collaboration Solutions
Logix, a leading provider of email security and collaboration solution has announced...
-
Blog 6 December 2022 SSL Certificates – 7 Best Practices You Must Follow -
Blog 5 December 2022 4 Ways Microsoft Collaboration Tools Go the Extra Mile -
Blog 1 December 2022 Your Guide to Choosing a Network Firewall -
Blog 30 November 2022 Oil India HQ Gets Ransom Demand of Rs 60 Crore -
Blog 25 November 2022 Securing hybrid IT environments -
Blog 20 October 2022 Microsoft Shuts Down Exchange Online Basic Authentication Services
-
SSL Certificates – 7 Best Practices You Must FollowIn an earlier blog on SSL Certificates we went over the reasons...
-
4 Ways Microsoft Collaboration Tools Go the Extra MileA business can only succeed when its resources work together cohesively towards...
-
Your Guide to Choosing a Network FirewallFirewall options and deployments are very flexible. They can be configured as...
-
Oil India HQ Gets Ransom Demand of Rs 60 CroreThe registered headquarters of Oil India Limited (OIL) at Duliajan in Assam...
-
Securing hybrid IT environmentsWhen cloud technologies had first emerged, several businesses had jumped on the...
-
Microsoft Shuts Down Exchange Online Basic Authentication ServicesAs cyber-attacks continue targeting remote workers and hybrid environments, Microsoft is taking...