Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog9 December 2019Most Likely Phishing TargetsOrganizations Most at Risk of Phishing Phishing is a rapidly damaging cybercrime...
-
Blog2 December 2019Corporate Email HijackingCorporate Email Hijacking: Know how it’s done Businesses contribute heavily to the...
-
Blog28 November 2019Protection Against Online ScamsGuidelines to protect yourself against cyber-scamming Digitisation has seeped into virtually all...
-
Blog25 November 2019Cybercriminals target Windows 10 Update through Fake EmailsRansomware targets Windows 10 Update TrustWave SpiderLabs security researchers have uncovered a...
-
Blog20 November 2019Beware – A Phishing Attack through IT Refund MessageSmishing, a variant of phishing, attacks through SMS usually target individuals or...
-
Blog19 November 2019Fake voicemail notifications targetting credentialsFake voicemail notifications aid scammers to collect Office 365 login credentials Heard...
-
Blog15 November 2019Phishing goes beyond emailWhile phishing expands its horizons, should your security? Expanding its customer base...
-
Blog11 November 2019The Dangers of Identity TheftIdentity Theft - what and how to stay safe? With cloud storages...
-
Blog7 November 2019Third Party VPN services under threat of attack by the infamous APT5 TeamVPN Compromised — Are you Safe? State sponsored hacking has been around...
-
Blog4 November 2019Checkpoint Security reports a shocking rise in Sextortion EmailsThere’re no lines cybercriminals won’t cross. Now they’ve resorted to sextortion! Malware...
-
The Logix Partnership Program
About Logix and its Partnerships with Domain Leaders Since 1999, Logix InfoSecurity...
-
Inbound VS Outbound Email
Outbound marketing generates 3 times fewer returns than inbound marketing. Having said...
-
Importance of security awareness training
Why is security awareness training important? What does security awareness training entail?...
-
3 essential data protection components in cyber security
While several things about cyber security revolve around managing the intangible aspects...
-
Logix’s Successful Partnership With Fortinet
Logix is an Expert Partner for Fortinet It has been two decades...
-
-
Blog 31 May 2022 Microsoft Security Now Enhanced with New Multicloud Capabilities -
Blog 25 May 2022 The 4 Challenges of Data Protection – With Pro Tips -
Blog 23 May 2022 Zimbra – Google Workspace Coexistence Solution -
Blog 18 May 2022 Expeditors Ransomware Attacks Put Company in Trouble -
Blog 17 May 2022 Save Mailbox Space with Single Instance Storage of Cloud Zimbra -
Blog 16 May 2022 Puma Data Breach – Effects of Kronos Ransomware Attacks
-
Microsoft Security Now Enhanced with New Multicloud CapabilitiesMicrosoft is often known for its dependability and comprehensive solutioning. However, customers...
-
The 4 Challenges of Data Protection – With Pro TipsToday, along with monetary transactions, every business also conducts data transactions. These...
-
Zimbra – Google Workspace Coexistence SolutionWhat was the impetus for the Cloud Zimbra - Google Coexistence Solution?...
-
Expeditors Ransomware Attacks Put Company in TroubleExpeditors, an American logistics and freight transport company based out Washington, USA,...
-
Save Mailbox Space with Single Instance Storage of Cloud ZimbraSave mailbox space? It's possible that the thought hasn't even crossed your...
-
Puma Data Breach – Effects of Kronos Ransomware AttacksThe Kronos Private Cloud (KPC), which caters to several companies, recently fell...