Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog13 March 2020Microsoft Office 365 and Google G Suite Become Hot Targets for BECFBI Reports Suggest BEC should be treated as seriously as Ransomware For...
-
Blog11 March 2020COVID-19 Sparks A Series of Phishing AttacksCybercriminals exploit the mass epidemic of COVID-19 Times are tough all over...
-
Blog2 March 2020Fortinet Product LaunchFortinet Launches A New Line of Firewall, and its Features are Super...
-
Blog27 February 2020Ransomware Delivers A Gut Punch To A Texas School DistrictRansomware: The most damaging malware? The exact magnitude of a malware attack...
-
Blog24 February 2020Conversation Hijacking – The Latest Sneaky Phishing TechniqueAll About Conversation Hijacking One of the biggest yet age-old perils of...
-
Blog20 February 2020Using Artificial Intelligence To Battle Email PhishingArtificial Intelligence: A possible way to go when it comes to Email...
-
Blog17 February 2020Cyber Attacks Take A Toll On BusinessCyber Attacks become the most feared threat to businesses If you are...
-
Blog10 February 2020The Disturbing Cybercrime Statistics in IndiaCybercrime Statistic Reports Paint A Worrisome Picture Cybercrime statistics for 2019 have...
-
Blog7 February 2020Subject Lines Used For Phishing BaitSubject Lines That Are Most Frequently Used as Bait We have been...
-
Blog4 February 2020The TrickBot Trojan ResurfacesTrickBot Trojan Steals Data from the Windows Active Directory The TrickBot Trojan,...
-
Lessons from a Pune Email Scam: Protecting Your Business
In the modern business world, email communication has become an essential tool...
-
3 Ways Microsoft Teams Phone Boosts Workplace Productivity
Voice communication is a crucial element in business that plays a vital...
-
Cyber Security for Financial Institutions
The scope of cyber security for financial institutions has expanded in recent...
-
AI Email Security to Combat AI Email Threats
In the rapidly evolving landscape of 2023, Artificial Intelligence (AI) has emerged...
-
Celebrating 24 Years of Excellence: Logix InfoSecurity’s Foundation Day
On the 16th of August, as we proudly celebrate Logix InfoSecurity's foundation...
-
Mahesh Bank Cyber Incident – ₹65 Lakh Penalty for Lapses in Cybersecurity
The Mahesh Bank cyber incident was a shocking episode for banks across...
-
Blog 6 December 2022 SSL Certificates – 7 Best Practices You Must Follow -
Blog 5 December 2022 4 Ways Microsoft Collaboration Tools Go the Extra Mile -
Blog 1 December 2022 Your Guide to Choosing a Network Firewall -
Blog 30 November 2022 Oil India HQ Gets Ransom Demand of Rs 60 Crore -
Blog 25 November 2022 Securing hybrid IT environments -
Blog 20 October 2022 Microsoft Shuts Down Exchange Online Basic Authentication Services
-
SSL Certificates – 7 Best Practices You Must FollowIn an earlier blog on SSL Certificates we went over the reasons...
-
4 Ways Microsoft Collaboration Tools Go the Extra MileA business can only succeed when its resources work together cohesively towards...
-
Your Guide to Choosing a Network FirewallFirewall options and deployments are very flexible. They can be configured as...
-
Oil India HQ Gets Ransom Demand of Rs 60 CroreThe registered headquarters of Oil India Limited (OIL) at Duliajan in Assam...
-
Securing hybrid IT environmentsWhen cloud technologies had first emerged, several businesses had jumped on the...
-
Microsoft Shuts Down Exchange Online Basic Authentication ServicesAs cyber-attacks continue targeting remote workers and hybrid environments, Microsoft is taking...