Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog13 June 2019Defending the New Generation phishing attacksSocial engineering is an attack vector that relies heavily on human interaction...
-
Blog13 June 2019Are we still lagging behind the attack vendors? Stack Overflow and Canva attacked by hackers!Last month, 2 major data breaches took place showing how companies are...
-
Blog5 June 2019Andheri Advertisement firm looses 12 lakh INR to cyber criminalsAn advertising company in Andheri was cheated of Rs.12 Lakh in a...
-
Blog5 June 2019Office 365 users combat targeted phishing attacks better with Cisco’s Email SecurityMicrosoft Office 365 has become the most widely used e-mail service in...
-
Blog27 May 2019India ranks second in cyber attacks with 38 attacks per secondIndia is a country with the second-largest number of account take-over logins...
-
Blog15 May 2019Top 7 tips to prevent Email Phishing and Email Spoofing AttacksEmail Spoofing and Email phishing attacks are more rampant than ever. Phishing...
-
Blog6 May 2019Ransomware hits Telangana and AP’s power utilitiesThe websites of Telangana State Southern Power Distribution Company Ltd (TSSPDCL) and...
-
Blog15 April 2019Dark Web Exposes Computer-Server Data Transfer to HackersAs startling as it may sound but cybercriminals now have access to...
-
Blog10 April 2019IMAP is the most exploited protocol. Office 365 and G Suite cloud accounts hackedOne thing leads to another like a domino, with access to leaked...
-
Blog5 April 2019Why should government entities adopt DMARC? And help get rid of suspicious emails!If you think confirmation of name of the sender of the mail...
-
Microsoft Shuts Down Exchange Online Basic Authentication Services
As cyber-attacks continue targeting remote workers and hybrid environments, Microsoft is taking...
-
Deprecation of Microsoft Basic Authentication for Exchange Online
Until recently, the industry has relied on basic authentication as a security...
-
Celebrating Safety this National Cybersecurity Awareness Month (NCSAM 2022)
Every year, October is observed as National Cybersecurity Awareness Month. During this...
-
-
Logix Wins the Fortinet Best Enterprise Partner Award 4th Time in A Row
As the African proverb says, “If you want to go fast, go...
-
How Zimbra Collaboration Tool Revamped During the Pivotal Pandemic Stage
The Covid-19 pandemic seems to be receding in impact but back when...
-
Blog 18 November 2021 Indian organizations face rise in cyber security attacks -
Blog 17 November 2021 Bank data breach costs RS 29 crore -
Blog 10 November 2021 Azure network security – reduce cost and risk -
Blog 29 October 2021 5 security benefits of Next Gen Firewalls (NGFW) -
Blog 28 October 2021 US DoT impersonation leads to massive 2-day phishing scam -
Blog 25 October 2021 Become a part of NCSAM 2021
-
Indian organizations face rise in cyber security attacksSeveral organizations in India, belonging to an eclectic group of industry sectors...
-
Bank data breach costs RS 29 croreThe renowned SVC bank has registered a cyber case of criminal breach...
-
Azure network security – reduce cost and riskWith the surge towards cloud computing, more and more organizations are shifting...
-
5 security benefits of Next Gen Firewalls (NGFW)An NGFW is a staple part of any security fabric today because...
-
US DoT impersonation leads to massive 2-day phishing scamAs we continue arming ourselves and helping companies arm themselves against modernized...
-
Become a part of NCSAM 2021Being #CyberResponsible With NCSAM 2021 Every year, October is celebrated as National...