Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog14 August 2019Top 3 cybersecurity threats of 2019Cybersecurity has risen ever higher up the corporate agenda for the very...
-
Blog9 August 2019Coping up with evolving priorities and challenges of CISOsWith the increasing cybersecurity attacks the role of CISOs have evolved drastically...
-
Blog6 August 2019FlawedAmmyy RAT Malware Attacks even patched windows Users, Beware!Always be cautious while opening email attachments. Recently, hackers have been sending...
-
Blog2 August 2019Visa Contactless cards are prone to big fraudsHackers have found new ways to bypass the payment limits on Visa contactless...
-
Blog31 July 2019Make your employees your Strongest link in Cyber SecurityYour company may be using the latest software, hardware and other resources...
-
Blog26 July 2019American Express customers targeted by Novel Phishing AttackAmerican Express customers were targeted with a Novel Phishing attack for stealing...
-
Blog23 July 2019Why SMBs are at higher risk of cyber attacks?Due to the lack of a dedicated cyber security staff for detecting...
-
Blog19 July 201980% of companies lack DMARC policies against spoofing!DMARC is a technology advancement in preventing email and domain spoofing. Inspite...
-
Blog12 July 2019Agent Smith Virus infected 1.5 crore devices in IndiaDo you see an ad popping up when opening Whatsapp? Then you...
-
Blog11 July 2019Top 5 tips to stay safe from phishing scammersEmail Spoofing and Email phishing attacks are more rampant than ever. Phishing...
-
The Importance of Digital Trust
Why digital trust - The changing trends of digital businesses The business...
-
Understanding Transport Layer Security (TLS)
When it comes to email security, it is not enough to enforce...
-
What is a firewall?
A firewall is an essential part of any network security setup. It...
-
SSL Certificates – 7 Best Practices You Must Follow
In an earlier blog on SSL Certificates we went over the reasons...
-
4 Ways Microsoft Collaboration Tools Go the Extra Mile
A business can only succeed when its resources work together cohesively towards...
-
Your Guide to Choosing a Network Firewall
Firewall options and deployments are very flexible. They can be configured as...
-
Blog 29 December 2021 India’s biggest demat depository breached -
Blog 18 December 2021 Omicron phishing attacks already started -
Blog 15 December 2021 TodayZoo phishing kit creates the Franken-phish phishing monster -
Blog 13 December 2021 SBI customers lose money to a novel bank phishing attack -
Blog 8 December 2021 Do your best work with Microsoft 365 Solutions -
Blog 3 December 2021 Russian threat group after 14,000 Gmail accounts
-
India’s biggest demat depository breachedCentral Depository Services Ltd. (CDSL), a security firm liaised with the Bombay...
-
Omicron phishing attacks already startedBack when Covid-19 had started spreading around the March of 2020, we...
-
TodayZoo phishing kit creates the Franken-phish phishing monsterA bizarre phishing campaign is afoot, using a tool called as a...
-
SBI customers lose money to a novel bank phishing attackSeveral customers of the State Bank of India have started filing complaints...
-
Do your best work with Microsoft 365 SolutionsMicrosoft 365 is here to provide the best integrate experience for your...
-
Russian threat group after 14,000 Gmail accountsA Russian-linked hacker group, APT28, purported to have been on a month-long...