Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog9 December 2019Most Likely Phishing TargetsOrganizations Most at Risk of Phishing Phishing is a rapidly damaging cybercrime...
-
Blog2 December 2019Corporate Email HijackingCorporate Email Hijacking: Know how it’s done Businesses contribute heavily to the...
-
Blog28 November 2019Protection Against Online ScamsGuidelines to protect yourself against cyber-scamming Digitisation has seeped into virtually all...
-
Blog25 November 2019Cybercriminals target Windows 10 Update through Fake EmailsRansomware targets Windows 10 Update TrustWave SpiderLabs security researchers have uncovered a...
-
Blog20 November 2019Beware – A Phishing Attack through IT Refund MessageSmishing, a variant of phishing, attacks through SMS usually target individuals or...
-
Blog19 November 2019Fake voicemail notifications targetting credentialsFake voicemail notifications aid scammers to collect Office 365 login credentials Heard...
-
Blog15 November 2019Phishing goes beyond emailWhile phishing expands its horizons, should your security? Expanding its customer base...
-
Blog11 November 2019The Dangers of Identity TheftIdentity Theft - what and how to stay safe? With cloud storages...
-
Blog7 November 2019Third Party VPN services under threat of attack by the infamous APT5 TeamVPN Compromised — Are you Safe? State sponsored hacking has been around...
-
Blog4 November 2019Checkpoint Security reports a shocking rise in Sextortion EmailsThere’re no lines cybercriminals won’t cross. Now they’ve resorted to sextortion! Malware...
-
Logix’s Successful Partnership With Fortinet
Logix is an Expert Partner for Fortinet It has been two decades...
-
-
Harmful ChatGPT phishing and BEC scams
The problem with GPT-3 and ChatGPT phishing scams GPT-3 is truly valuable...
-
GoDaddy Compromised For The Last 3 Years – Terrorists Go Mad
GoDaddy has disclosed that a group of hackers had access to their...
-
7 organizational habits for a security aware culture
Security awareness For establishing a security aware culture, cyber security needs to...
-
5 Security Trends You Must Follow in 2023 For Maximum Impact
It was quiet tough to follow the security trends, especially considering the...
-
Blog 17 May 2022 Save Mailbox Space with Single Instance Storage of Cloud Zimbra -
Blog 16 May 2022 Puma Data Breach – Effects of Kronos Ransomware Attacks -
Blog 12 May 2022 Data Privacy Needs Intensify – Corporate Instagram Account Hijacking -
Blog 11 May 2022 Email Security Best Practices for Small Businesses -
Blog 22 April 2022 Why Professional Email for Small Businesses Is a Necessity -
Blog 19 April 2022 Password Strength Can Tighten Your Cybersecurity
-
Save Mailbox Space with Single Instance Storage of Cloud ZimbraSave mailbox space? It's possible that the thought hasn't even crossed your...
-
Puma Data Breach – Effects of Kronos Ransomware AttacksThe Kronos Private Cloud (KPC), which caters to several companies, recently fell...
-
Data Privacy Needs Intensify – Corporate Instagram Account HijackingData has become as equally profitable for hackers as money. They can...
-
Email Security Best Practices for Small BusinessesIn a previous blog, we discussed why professional email is a necessity...
-
Why Professional Email for Small Businesses Is a NecessityMailing goes with business operations like hand and glove. Today, sending and...
-
Password Strength Can Tighten Your CybersecurityFollowing the best cyber safety practices in your organization can go a...