Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog20 February 2020Using Artificial Intelligence To Battle Email PhishingArtificial Intelligence: A possible way to go when it comes to Email...
-
Blog17 February 2020Cyber Attacks Take A Toll On BusinessCyber Attacks become the most feared threat to businesses If you are...
-
Blog10 February 2020The Disturbing Cybercrime Statistics in IndiaCybercrime Statistic Reports Paint A Worrisome Picture Cybercrime statistics for 2019 have...
-
Blog7 February 2020Subject Lines Used For Phishing BaitSubject Lines That Are Most Frequently Used as Bait We have been...
-
Blog4 February 2020The TrickBot Trojan ResurfacesTrickBot Trojan Steals Data from the Windows Active Directory The TrickBot Trojan,...
-
Blog31 January 2020Preventive Techniques Against Spear Phishing5 Tips to Avoid Spear Phishing An energy company in Ukraine called...
-
Blog27 January 2020DeathRansom Evolves Into A Threatening SituationDeathRansom - A New Strain of Ransomware Causes an Outrage A malignant...
-
Blog23 January 2020Machine Learning Scam Targets Google Search ResultsGoogle Algorithms Targeted for Manipulating Search Results The world wide web has...
-
Blog20 January 2020Chandigarh Lawyer Tricked Out of ₹3.6 LakhsFraudulent Email Causes Massive Loss Of Money It’s incidences like these that...
-
Blog17 January 2020Young Techie Creates An Android App That Can Spoof EmailsDangers of the Email Spoofer App App-savvy people beware. A new app...
-
Mahesh Bank Cyber Incident – ₹65 Lakh Penalty for Lapses in Cybersecurity
The Mahesh Bank cyber incident was a shocking episode for banks across...
-
Logix Opens Doors for White Label Partnerships in Email Security and Collaboration Solutions
Logix, a leading provider of email security and collaboration solution has announced...
-
Additional security for Office 365
Do you need additional security for Office 365? When users deal with...
-
The Role of DMARC In Combatting BEC Attacks
Living in today’s world, it is extremely likely you have been using...
-
ION Group Ransomware Attack
LockBit ransomware strikes again ION Group, a software company located in the...
-
BlackCat Ransomware Group Exploits WinSCP in Malvertising Campaigns Targeting Corporate Networks
In a concerning development, researchers at a leading Cyber Security firm have...
-
Blog 20 October 2022 Microsoft Shuts Down Exchange Online Basic Authentication Services -
Blog 18 October 2022 Deprecation of Microsoft Basic Authentication for Exchange Online -
Blog 18 October 2022 Celebrating Safety this National Cybersecurity Awareness Month (NCSAM 2022) -
Blog 12 July 2022 How Zimbra Collaboration Tool Revamped During the Pivotal Pandemic Stage -
Blog 5 July 2022 How Digital Transformation has become a necessity for businesses -
Blog 1 July 2022 Choosing the right email server software
-
Microsoft Shuts Down Exchange Online Basic Authentication ServicesAs cyber-attacks continue targeting remote workers and hybrid environments, Microsoft is taking...
-
Deprecation of Microsoft Basic Authentication for Exchange OnlineUntil recently, the industry has relied on basic authentication as a security...
-
Celebrating Safety this National Cybersecurity Awareness Month (NCSAM 2022)Every year, October is observed as National Cybersecurity Awareness Month. During this...
-
How Zimbra Collaboration Tool Revamped During the Pivotal Pandemic StageThe Covid-19 pandemic seems to be receding in impact but back when...
-
How Digital Transformation has become a necessity for businessesOver the past couple of years, businesses have absolutely had to evolve...
-
Choosing the right email server softwareSince every business today hinges on emailing, choosing the right email server...