Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog12 September 2025Visa Contactless cards are prone to big fraudsHackers have found new ways to bypass the payment limits on Visa contactless...
-
Blog12 September 2025FlawedAmmyy RAT Malware Attacks even patched windows Users, Beware!Always be cautious while opening email attachments. Recently, hackers have been sending...
-
Blog12 September 2025Coping up with evolving priorities and challenges of CISOsWith the increasing cybersecurity attacks the role of CISOs have evolved drastically...
-
Blog12 September 2025Top 3 cybersecurity threats of 2019Cybersecurity has risen ever higher up the corporate agenda for the very...
-
Blog12 September 2025Whale Phishing has risen to be a major cyber security threatA whale phishing attack is a specific type of phishing attack that targets high-profile...
-
Blog12 September 2025Aadhar Card Data Leak calls for better cyber security!Aadhar Card data of 130 million as well as bank account details have...
-
Blog12 September 20254 things you must know about Cyber Security in the era of IoTCyber Security in the era of Internet-of-things is a changing paradigm. According...
-
Blog12 September 20255 cybersecurity question every CIO must ask in 2019There has been a far greater responsibility on the Chief Information Officers(CIOs)...
-
Blog12 September 2025In the Tax Filing Season, beware of phishing attacksBeware of email phishing attacks from hackers while filing your Income Tax...
-
-
-
G Suite Legacy Free Edition No Longer Available
Google Cloud puts an end to its G Suite Legacy Free...
-
Cyber Security Advisory – Apache Log4J Remote Code Execution Vulnerability (CVE-2021-44228
Log4Shell: RCE 0-day exploit found in log4j2, a popular Java logging package....
-
A Recap of our imMail Webinar
Logix, in partnership with imMail, recently conducted a joint webinar that turned...
-
Statistics to prepare you for cybersecurity in 2022
Everyone was just waiting for the calendar to turn on 31st December...
-
Data Privacy Needs Intensify – Corporate Instagram Account Hijacking
Data has become as equally profitable for hackers as money. They can...
-
Blog 12 September 2025 Government domains breached – official government data at risk -
Blog 12 September 2025 Widespread Ransomware 2.0 attacks -
Blog 12 September 2025 The State of Office365 Backup – Barracuda’s Cloud to Cloud Backup -
Blog 12 September 2025 5 business benefits of Cloud-to-Cloud Backup -
Blog 12 September 2025 Blocking bots – The role of an Advanced WAF -
Blog 12 September 2025 Email archives VS email backups
-
Government domains breached – official government data at riskGovernment officials are under threat of a phishing campaign as ids of...
-
-
The State of Office365 Backup – Barracuda’s Cloud to Cloud BackupResearch in recent cybersecurity and IT trends has demonstrates that the shift...
-
5 business benefits of Cloud-to-Cloud BackupBarracuda recently undertook a global IT survey to address the changing needs...
-
Blocking bots – The role of an Advanced WAFThese days, we don’t go online. We are online. All the time....
-
Email archives VS email backupsHassles of email management The volume of email data a business generates...