Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog19 November 2019Fake voicemail notifications targetting credentialsFake voicemail notifications aid scammers to collect Office 365 login credentials Heard...
-
Blog15 November 2019Phishing goes beyond emailWhile phishing expands its horizons, should your security? Expanding its customer base...
-
Blog11 November 2019The Dangers of Identity TheftIdentity Theft - what and how to stay safe? With cloud storages...
-
Blog7 November 2019Third Party VPN services under threat of attack by the infamous APT5 TeamVPN Compromised — Are you Safe? State sponsored hacking has been around...
-
Blog4 November 2019Checkpoint Security reports a shocking rise in Sextortion EmailsThere’re no lines cybercriminals won’t cross. Now they’ve resorted to sextortion! Malware...
-
Blog31 October 2019FakeNarrator Malware launches an all-out attack in the South-East Asian regionBeware of FakeNarrator Malware Accessibility and Productivity play a key role in...
-
Blog24 October 2019NCSAM – Where Industries and the Government team up to raise Cybersecurity AwarenessIt’s National Cybersecurity Awareness Month NCSAM is an internationally acclaimed awareness drive...
-
Blog21 October 2019The ABCs of Malware – An informative Blog Series (Part 3 of 3)All About Malware – Safeguarding Against Malware This is Part Three of...
-
Blog18 October 2019The ABCs of Malware – An informative Blog Series (Part 2 of 3)All About Malware – Types of Malware This is Part Two of the...
-
Blog14 October 2019The ABCs of Malware – An informative Blog Series (Part 1 of 3)All About Malware – Introduction & Working This is Part One of...
-
Inbound VS Outbound Email
Outbound marketing generates 3 times fewer returns than inbound marketing. Having said...
-
Importance of security awareness training
Why is security awareness training important? What does security awareness training entail?...
-
3 essential data protection components in cyber security
While several things about cyber security revolve around managing the intangible aspects...
-
Logix’s Successful Partnership With Fortinet
Logix is an Expert Partner for Fortinet It has been two decades...
-
-
Harmful ChatGPT phishing and BEC scams
The problem with GPT-3 and ChatGPT phishing scams GPT-3 is truly valuable...
-
Blog 25 May 2022 The 4 Challenges of Data Protection – With Pro Tips -
Blog 23 May 2022 Zimbra – Google Workspace Coexistence Solution -
Blog 18 May 2022 Expeditors Ransomware Attacks Put Company in Trouble -
Blog 17 May 2022 Save Mailbox Space with Single Instance Storage of Cloud Zimbra -
Blog 16 May 2022 Puma Data Breach – Effects of Kronos Ransomware Attacks -
Blog 12 May 2022 Data Privacy Needs Intensify – Corporate Instagram Account Hijacking
-
The 4 Challenges of Data Protection – With Pro TipsToday, along with monetary transactions, every business also conducts data transactions. These...
-
Zimbra – Google Workspace Coexistence SolutionWhat was the impetus for the Cloud Zimbra - Google Coexistence Solution?...
-
Expeditors Ransomware Attacks Put Company in TroubleExpeditors, an American logistics and freight transport company based out Washington, USA,...
-
Save Mailbox Space with Single Instance Storage of Cloud ZimbraSave mailbox space? It's possible that the thought hasn't even crossed your...
-
Puma Data Breach – Effects of Kronos Ransomware AttacksThe Kronos Private Cloud (KPC), which caters to several companies, recently fell...
-
Data Privacy Needs Intensify – Corporate Instagram Account HijackingData has become as equally profitable for hackers as money. They can...