Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog3 April 2020Corporate Email Eavesdropping: Is Someone Spying On You?A Mysterious Hacker Group Has Been Spying on Corporate Email and FTP...
-
Blog2 April 2020The Google Calendar Spam: Something you need to know?Google Calendar Falls Prey to Spammers A rather unique spamming technique has...
-
Blog26 March 2020Multi-Factor Authentication: The Devil Is In The DetailsHackers attacked more than a million Microsoft Accounts ! If you need...
-
Blog23 March 2020Coronavirus Sparks A Series of Phishing RusesCurb your instincts; don’t open emails just because they claim to contain...
-
Blog17 March 2020Coronavirus Forces Employees to Work From Home. But What About Remote Security?Covid-19 Outbreak forcing you to work from home? Here are the best...
-
Blog13 March 2020Microsoft Office 365 and Google G Suite Become Hot Targets for BECFBI Reports Suggest BEC should be treated as seriously as Ransomware For...
-
Blog11 March 2020COVID-19 Sparks A Series of Phishing AttacksCybercriminals exploit the mass epidemic of COVID-19 Times are tough all over...
-
Blog2 March 2020Fortinet Product LaunchFortinet Launches A New Line of Firewall, and its Features are Super...
-
Blog27 February 2020Ransomware Delivers A Gut Punch To A Texas School DistrictRansomware: The most damaging malware? The exact magnitude of a malware attack...
-
Blog24 February 2020Conversation Hijacking – The Latest Sneaky Phishing TechniqueAll About Conversation Hijacking One of the biggest yet age-old perils of...
-
Understanding and Preventing DNS Attacks for Better Network Security
Network security is a critical concern in today's digital landscape. As organizations...
-
Lessons from a Pune Email Scam: Protecting Your Business
In the modern business world, email communication has become an essential tool...
-
3 Ways Microsoft Teams Phone Boosts Workplace Productivity
Voice communication is a crucial element in business that plays a vital...
-
Cyber Security for Financial Institutions
The scope of cyber security for financial institutions has expanded in recent...
-
AI Email Security to Combat AI Email Threats
In the rapidly evolving landscape of 2023, Artificial Intelligence (AI) has emerged...
-
Celebrating 24 Years of Excellence: Logix InfoSecurity’s Foundation Day
On the 16th of August, as we proudly celebrate Logix InfoSecurity's foundation...
-
Blog 7 December 2022 What is a firewall? -
Blog 6 December 2022 SSL Certificates – 7 Best Practices You Must Follow -
Blog 5 December 2022 4 Ways Microsoft Collaboration Tools Go the Extra Mile -
Blog 1 December 2022 Your Guide to Choosing a Network Firewall -
Blog 30 November 2022 Oil India HQ Gets Ransom Demand of Rs 60 Crore -
Blog 25 November 2022 Securing hybrid IT environments
-
-
SSL Certificates – 7 Best Practices You Must FollowIn an earlier blog on SSL Certificates we went over the reasons...
-
4 Ways Microsoft Collaboration Tools Go the Extra MileA business can only succeed when its resources work together cohesively towards...
-
Your Guide to Choosing a Network FirewallFirewall options and deployments are very flexible. They can be configured as...
-
Oil India HQ Gets Ransom Demand of Rs 60 CroreThe registered headquarters of Oil India Limited (OIL) at Duliajan in Assam...
-
Securing hybrid IT environmentsWhen cloud technologies had first emerged, several businesses had jumped on the...