Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog6 August 2019FlawedAmmyy RAT Malware Attacks even patched windows Users, Beware!Always be cautious while opening email attachments. Recently, hackers have been sending...
-
Blog2 August 2019Visa Contactless cards are prone to big fraudsHackers have found new ways to bypass the payment limits on Visa contactless...
-
Blog31 July 2019Make your employees your Strongest link in Cyber SecurityYour company may be using the latest software, hardware and other resources...
-
Blog26 July 2019American Express customers targeted by Novel Phishing AttackAmerican Express customers were targeted with a Novel Phishing attack for stealing...
-
Blog23 July 2019Why SMBs are at higher risk of cyber attacks?Due to the lack of a dedicated cyber security staff for detecting...
-
Blog19 July 201980% of companies lack DMARC policies against spoofing!DMARC is a technology advancement in preventing email and domain spoofing. Inspite...
-
Blog12 July 2019Agent Smith Virus infected 1.5 crore devices in IndiaDo you see an ad popping up when opening Whatsapp? Then you...
-
Blog11 July 2019Top 5 tips to stay safe from phishing scammersEmail Spoofing and Email phishing attacks are more rampant than ever. Phishing...
-
Blog5 July 2019Hardly 50 % of Fortune 500 companies practice email security using DMARCIn a recent survey conducted by Agari, it was discovered that just half...
-
Blog3 July 2019Increasing cyber attacks calls for increased security audits within IT companiesIndian IT companies did not give high priority to cyber security but...
-
SSL Certificates – 7 Best Practices You Must Follow
In an earlier blog on SSL Certificates we went over the reasons...
-
4 Ways Microsoft Collaboration Tools Go the Extra Mile
A business can only succeed when its resources work together cohesively towards...
-
Your Guide to Choosing a Network Firewall
Firewall options and deployments are very flexible. They can be configured as...
-
Oil India HQ Gets Ransom Demand of Rs 60 Crore
The registered headquarters of Oil India Limited (OIL) at Duliajan in Assam...
-
Securing hybrid IT environments
When cloud technologies had first emerged, several businesses had jumped on the...
-
Logix Offers Multiple Upgrade Options for Office 365 Kiosk / F1 Plan Users
Microsoft recently disabled support for POP / IMAP for its Office 365...
-
Blog 15 December 2021 TodayZoo phishing kit creates the Franken-phish phishing monster -
Blog 13 December 2021 SBI customers lose money to a novel bank phishing attack -
Blog 8 December 2021 Do your best work with Microsoft 365 Solutions -
Blog 3 December 2021 Russian threat group after 14,000 Gmail accounts -
Blog 2 December 2021 The 7 worst data breaches of 2021 -
Blog 26 November 2021 Ransomware trends in 2021
-
TodayZoo phishing kit creates the Franken-phish phishing monsterA bizarre phishing campaign is afoot, using a tool called as a...
-
SBI customers lose money to a novel bank phishing attackSeveral customers of the State Bank of India have started filing complaints...
-
Do your best work with Microsoft 365 SolutionsMicrosoft 365 is here to provide the best integrate experience for your...
-
Russian threat group after 14,000 Gmail accountsA Russian-linked hacker group, APT28, purported to have been on a month-long...
-
The 7 worst data breaches of 2021Because every business is now online, it generates plenty more data than...
-
Ransomware trends in 2021Ransomware attacks have been on a steady rise in 2021, both in number of ransomware attacks and also...